![]() My current stance is to use one weaken worker per six flexihack workers, which seems to be about as much as is required to keep up with either six grow threads or six hack threads. We also schedule a small group of flexihack workers on any totally weakened target, even if it's not the most optimal one, so that we can at least have some income from hacking early on. I found the task of balancing grow and hack calls tedious, so my flexihack worker calls grow and hack adaptively (when the available money drops below 95% of max, grow is called). We try to schedule these backwards in the targets list, focusing on the highest growth servers first. The second priority is to schedule "flexihack" workers. It also spawns a small watcher script to notify the distributor when a node like this has been weakened down to the minimum level.Ĭurrently, I only do this preparation step for security level, but I should probably also grow servers before beginning to hack them. If it encounters any that are significanly more secure than their minimum security level, it will dedicate as many threads as possible among all the hosts to weakening that server. It iterates through the targets in the order the spider observed them (i.e. The first priority is to focus on weakening the weakest pending node. The new worker scheduling algorithm currently has two basic priorities. ![]() We'll be able to spend more time thinking about algorithmic improvements if we don't have to do fiddly things like managing state. Cancelling all our existing workers has some minor drawbacks in terms of performance, but what it wins us in simplicity dominates such considerations. Netscripts programming capabilities are some of the most challenging and inconsistent I've ever worked with, so I want to write as little complex code as possible. We cancel all existing workers because it is easier to solve this problem if you don't have to keep track of state. awaits a signal that something material has changed.cancels all existing distributor controlled workers,.The distributor is the most interesting part. It stores the hacked node list in a newline separated file, so that other scripts don't have to invoke a function or spend precious CPU time reconstructing the list. It uses a breadth first search across the nodes starting from home, hacking any nodes we have the capability to. The spider is very straightfoward, as you will see below in spider2.js. A distributor to coordinate work among the available owned servers.I designed a system with three main components: Minimize RAM usage (scheduling overhead of around 30GB).Allocate resources toward the most efficient available task, subject to some allowances for early progression.Weaken and grow first, before beginning to hack. ![]() Allocate resources from one server to work on another.Var serverList var targetList var hostList var exes var temp var manager = false Var files = //No touching, unless you understand everything hereĪwait ns.write(files, "weaken(args)", "w") await ns.write(files, "grow(args)", "w") await ns.write(files, "hack(args)", "w") Well I hope this brings you ideas, knowledge and or profits :D ![]() This is also set and forget, your EXEs and hacking level are reacquired each second, so new servers are added without needing to reboot it This script is a little more complicated to explain easily, it dedicates high RAM servers to attack high profit servers Welcome to the Auto Farm part 2: Electric Boogaloo Please note that it takes a while to warm up the wallets before the farming can start Let me know if there is any issue you can see, or any way to improve it further □ This guide has a little less documentation, but much higher gains than the last NOTICE: It will automatically create/overwrite 3 files in the home directory called “weak.script”, “grow.script” and “hack.script” Hello once more, today I bring you a better chunk of code! But it’s slightly less easy to understandġ00% plug and play, but put it in a. pastebin = SQgAKMX8ĮDIT: since steam scrubs the links I'll paste the entire page here. I'm only early/mid game but it's been useful from lvl 1 hacking to lvl 500+ hacking. It is awesome from start to finish from what I'm seeing. I haven't seen this program here on steam discussions so I want to share it. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |