;redcode-x verbose ;name Spreader 2.0 ;author Scott Adkins ;kill Spreader ; ;strategy By the use of copying some heavy-duty bombing programs to the ;strategy extremeties of the write limit, this program effectively bombs ;strategy 1100 memory locations quickly and thorougly. Just in case the ;strategy enemy program does not venture into this war zone, two bombing ;strategy programs are sent out into the core in opposite directions to ;strategy clean everything else out. ; length equ dst1-pest1+100 source equ dst1-src1+100 output1 equ -15 output2 equ 200 pest1 mov #length, count1 mov #source, src1 mov #output1, dst1 move1 mov scan2c mov bomb2, >scan2c mov bomb2, >scan2c mov bomb2, >scan2c mov bomb2, >scan2c scan2b djn scan2a, #50 mov #50, scan2b mov #1, scan2c scan2c jmp scan2a, #1 kill2a mov bomb2, >kill2i kill2b mov bomb2, >kill2i kill2c mov bomb2, >kill2i kill2d mov bomb2, >kill2i kill2e mov bomb2, >kill2i kill2f djn kill2a, #50 kill2g mov #50, kill2f kill2h mov #1, kill2i kill2i jmp kill2a, #1 bomb2 dat #0, #0 copy2 mov kill2a, 250 mov kill2b, 250 mov kill2c, 250 mov kill2d, 250 mov kill2e, 250 mov kill2f, 250 mov kill2g, 250 mov kill2h, 250 mov kill2i, 250 spl 241 jmp scan2a pest2 mov #length, count2 mov #source, src2 mov #output2, dst2 move2 mov