The core wars are played as follows: How do the two sides write a program to input the two programs on the same computer? In the memory system, they chase each other.
The next level sometimes stops to repair (re-write) several lines of commands destroyed by the other party; when it is trapped, it can also copy itself once and escape from danger because they both
In the middle of the computer's memory core, the core game was named.
This game features that people playing games on both sides will only be able to watch the game on the screen after the program enters the computer, without making any changes until a certain
Party A's program is completely [eaten] by the other party. The magnetic core war is a general name. In fact, it can also be divided into several programs written by Yao Lai, called [dal
This includes the meaning of [Survival of the fittest]. Its game rules are the closest to the one described above in Assembly Language)
Each program is called organism. The two computers compete until one party kills the other and replaces the other.
At that time, Morris often beat his opponent.
In addition, each time a Creeper reads it, it copies a copy. In addition, it also [crawls] from one computer to another.
Connected computers. Soon the original information on the computer was squeezed out by the crawlers. The crawlers were born in a breeding place.
In order to deal with [crawler], someone wrote a [Receiver] (Reaper). Its only survival goal is to find the crawler and destroy it. When all the crawlers are
After being harvested, the receiver executes the last command in the program: destroys himself from the computer.
[Dwarf] (Dwarf) is not as clever as Darwin, but an extremely dangerous character. It moves into the memory system every 5 [address] (address)
Turning everything stored there into zero will stop the original program.
The most strange thing is that a war program called [impu] (Imp) has only one line of command, that is, MOV 01. MOV indicates the meaning of [MOVE.
It writes (shifts) the [0] contained in the address to the next address. When the inpu expands, all the original commands on the computer are changed to [MOV 01]. change sentence
In other words, there are a lot of [MOV 01]. [Gemini] (Germini) on the fluorescent screen, which is also an interesting guy. It has only one function: copy yourself to the next one hundred
The address is discarded.
A series of programs are derived from Gemini. [victims] (Juggeraut) copy the program and send it to the next 10 addresses, while [Bigfoot] (Bigfoot) copy the original program.
The address between the replica and the replica is set to a large prime number. It is very difficult to catch the snowman. In addition, there is John suo of the Xerox site
The [Worm] (Worm) written by John F. Shoch aims to control the computers that intrude.