home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
DP Tool Club 31
/
CDASC_31_1996_juillet_aout.iso
/
vrac
/
ctart_e.zip
/
CONT2.DAT
< prev
next >
Wrap
Text File
|
1995-12-22
|
5KB
|
290 lines
1.
-Geometrical motif // 1-8
1.1
--Knight forks // 1-4
1.1.1
---Removal of defence // 0-0
1.1.2
---Decoy // 0-0
1.1.3
---Square clearance // 1-4
1.1.4
---Conjunction of methods // 0-0
1.2
--Files (ranks) // 0-0
1.3
--Diagonals // 5-8
1.3.1
---Removal of obstacles // 5-8
1.3.2
---Opening of a diagonal // 0-0
1.3.3
---Decoy // 0-0
1.3.4
---Two diagonals // 0-0
1.4
--Pawn forks // 0-0
1.5
--Conjunction of geometrical motifs // 0-0
2.
-Weakness of a file // 0-0
2.1
--The back rank // 0-0
2.1.1
---Annihilation of defence // 9-9
2.1.2
---Distraction // 0-0
2.1.3
---X-ray attack // 0-0
2.1.4
---Interception // 0-0
2.1.5
---Conjunction of methods // 0-0
2.2
--The seventh rank // 0-0
2.3
--The h-file // 0-0
2.3.1
---Mate to a "cramped" king // 0-0
2.3.2
---The g6-pawn // 0-0
2.3.3
---Attack on a fianchetto // 0-0
2.3.4
---Opening of a file // 0-0
2.3.5
---Decoy // 0-0
2.4
--The g-file // 0-0
2.5
--Central files // 0-0
2.6
--Diagonals // 0-0
2.7
--Conjunction of files, ranks and // 0-0
*-diagonals
3.
-Opposing // 0-0
3.1
--Open attack // 0-0
3.1.1
---Execution of an open attack // 0-0
3.1.2
---Opening of a file // 0-0
3.1.3
---Unblocking a pawn // 0-0
3.1.4
---Removal of defence // 0-0
3.1.5
---Decoy to the opposing file // 0-0
3.1.6
---Decoy to the blow dealt by // 0-0
*--the piece moved away
3.1.7
---Placement of the attacking piece // 0-0
*--to the opposing file
3.1.8
---"Mill" // 0-0
3.2
--Exploiting a pin // 0-0
3.2.1
---Attack on a pinned piece // 0-0
3.2.2
---Distraction of a pinned pawn // 0-0
3.2.3
---Other ways of exploiting a pin // 0-0
3.3
--Decoy for a pin // 0-0
3.3.1
---Attack on a pinned piece // 0-0
3.3.2
---Attack on a piece wich lost // 0-0
*--its defence
3.4
--Counterblow by a "pinned" piece // 0-0
3.5
--Conjunction of methods // 0-0
4
-Weakness of a square (squares) // 0-0
4.1
--"The hole" of the fianchettoed bishop // 0-0
4.1.1
---The h-file // 0-0
4.1.2
---The back rank // 0-0
4.1.3
---The pawns on f6,h6,a6 and c6 // 0-0
4.1.4
---The others // 0-0
4.2
--Invasion of a file // 0-0
4.3
--Other cases // 0-0
5.
-A piece is overloaded // 0-0
5.1
--A bishop is overloaded // 0-0
5.2
--A knight is overloaded // 0-0
5.3
--A rook is overloaded // 0-0
5.4
--A queen is overloaded // 0-0
6.
-Lack of defence of the pieces // 0-0
6.1
--Annihilation of defence // 0-0
6.2
--Distraction // 0-0
6.3
--Decoy // 0-0
6.4
--Distraction with decoy // 0-0
6.5
--The others // 0-0
7.
-Bad position of the pieces // 0-0
8.
-Passed pawn // 0-0
8.1
--Pawn breakthrough // 0-0
8.2
--Distraction // 0-0
8.3
--Interception or blocking // 0-0
8.4
--A pawn is promoted to a knight // 0-0
8.5
--Forcing necessary exchanges // 0-0
8.6
--Both opponents have dangerous // 0-0
*-passed pawns
8.7
--Passed pawn supports the piece // 0-0
*-invasion of the back rank
8.8
--Passed pawn takes part in the attack // 0-0
*-on a king
8.9
--Conjunction of methods // 0-0
9.
-Limited material // 0-0
9.1
--Play for a stalemate // 0-0
9.2
--Further restricting of material and // 0-0
*-building a fortress
10.
-Cramped king position // 0-0
10.1
--Removal of defence // 0-0
10.2
--Square clearance for the attacking // 0-0
*-knight
10.3
--Blocking // 0-0
10.4
--Creating of a mating net // 0-0
11.
-Lack of a king defence // 0-0
11.1
--A king is defended by fianchetto // 0-0
11.1.1
---The bishop is absent // 0-0
11.1.2
---The f7-g6-h5 pawn chain without // 0-0
*--a bishop
11.1.3
---A king on h6 // 0-0
11.1.4
---The fianchettoed bishop defends a king // 0-0
11.1.5
---Enlarged fianchetto // 0-0
11.1.6
---"Sieve" structure (e6,f7,g6,h7) // 0-0
*--A bishop is outside "the fianchetto"
11.2
--One pawn protects the king // 0-0
11.3
--Two pawns protect the king // 0-0
11.3.1
---The pawns are on g7 and h6 // 0-0
11.3.2
---The pawns are on g7 and h7 // 0-0
11.3.3
---The pawns are on f6 and g7 // 0-0
11.3.4
---The pawns are on f7 and g7 // 0-0
11.3.5
---The f- and h-pawns // 0-0
11.4
--Three pawns protect the king // 0-0
11.4.1
---The pawns are on f7, g7 and h6 // 0-0
11.4.2
---The pawns are on f6, g7 and h7 // 0-0
11.4.3
---The pawns are on f6, g7 and h6 // 0-0
11.4.4
---The pawns are on f7, g7 and h7 // 0-0
11.5
--A king is protected by the pawns // 0-0
*-placed on the sixth and fifth ranks
11.5.1
---"Dragging a king out" // 0-0
11.5.2
---Breaking the shelter // 0-0
11.6
--Typical methods of attack in // 0-0
*-a Q-side castling position
11.7
--Piece attack on a king // 0-0
11.8
--Attack on a king undefended by pawns // 0-0
11.9
--Attack on an uncastled king // 0-0
11.9.1
---A king is on e8 // 0-0
11.9.2
---A king is on f8 // 0-0
11.9.3
---A king is on e7 // 0-0
11.9.4
---A king is on another square // 0-0
11.10
--Attack on a king in an endgame // 0-0
12.
-Conjunction of combinational motifs // 0-0
12.1
--Combinations which are not connected // 0-0
*-with mate threats
12.2
--Mate threats combined with // 0-0
*-other threats
12.2.1
---Mate threats combined with // 0-0
*--threats to attack a queen
12.2.2
---Mate threats combined with // 0-0
*--activity of a passed pawn
12.2.3
---Threats along the back rank // 0-0
12.2.4
---Exposed king // 0-0
12.2.5
---Uncastled king // 0-0
12.2.6
---The others // 0-0