Article 829 of rec.games.corewar: Organization: Penn State University Date: Monday, 4 May 1992 13:36:59 EDT From: Jeff Raven Message-ID: <92125.133700JAR129@psuvm.psu.edu> Newsgroups: rec.games.corewar Subject: Redcode - A "Possessor" Lines: 32 With the recent mentioning of "possessors", I was reminded of one of the first programs I wrote (about four weeks ago). It's a B-field scanner, which, upon finding a target, SPLits to it, waits a cycle, and then bombs it with a DAT. When I submitted it to the hill a while back, it made it to about 16th, and then fell off. It does particularly bad against some pit trappers, since it has a tendency to attack the pit, and paralyze itself (though the DAT bomb that was placed eventually frees it). ;redcode verbose ;name Overload 1.1 ;author Jeff Raven ; ;strategy - Version 1.1 ;strategy - Overload scans the core, and, upon finding another program, ;strategy - executes it. Not particularly aggressive, it tends to tie ;strategy - programs which make lots of copies. ; first EQU 0 ; First address checked by scanner step EQU 3044 ; Step size for the search bomb DAT #0 start ADD #step, locus locus JMZ start, first SPL @locus MOV 0, 0 MOV bomb, @locus JMP start END start