国际象棋开局eco分类是标准的开局分类法,将所有开局分成A00-E99共个类别和分类别
王(King)的字首是K;后(Queen)的字首是Q;车(Castle,也叫Rook)的字首是R;象(Bishop)的字首是B;马(Knight)的字首是N;兵(Pawn)不用记录字首。
以上棋子代码之外,国际象棋中还使用了一些符号来辅助表示棋谱:
+将*times;吃子!好着!!妙着?坏着??失着0-0王翼王车易位(短易位)0-0-0后翼王车易位(长易位)#将死有两种记录方法,繁体记录法和简易记录法。
A类开局
A00非正规开局,1a3,b3,d3,g4A01尼姆佐维奇-拉尔森进攻,1b3A02伯德开局,1f4A03伯德开局,1f4d5A04列蒂开局,1Nf3A05列蒂开局,1Nf3Nf6A06列蒂开局,1Nf3d5A07王翼印度进攻,1Nf3d52g3A08王翼印度进攻,1Nf3d52g3c53Bg2A09列蒂开局,1Nf3d52c4A10英国式开局,1c4A11英国式开局,卡罗-坎体系,1c4c6A12英国式开局,1c4c62Nf3d53b3A13英国式开局,1c4e6A14英国式开局,新卡塔兰拒弃兵,1c4e62Nf3d53g3Nf64Bg2Be75O-OA15英国式开局,1c4Nf6A16英国式开局,1c4Nf62Nc3A17英国式开局,1c4Nf62Nc3e6A18英国式开局,麦克纳斯变例,1c4Nf62Nc3e63e4A19英国式开局,麦克纳斯变例,西西里变例,1c4Nf62Nc3e63e4c5A20英国式开局,1c4e5A21英国式开局,1c4e52Nc3A22英国式开局,1c4e52Nc3Nf6A23英国式开局,布莱曼体系,凯列斯变例,1c4e52Nc3Nf63g3c6A24英国式开局,布莱曼体系的g6变化,1c4e52Nc3Nf63g3g6A25英国式开局,1c4e52Nc3Nc6A26英国式开局,封闭体系,1c4e52Nc3Nc63g3g64Bg2Bg75d3d6A27英国式开局,三马体系,1c4e52Nc3Nc63Nf3A28英国式开局,1c4e52Nc3Nc63Nf3Nf6A29英国式开局,四马体系,王翼侧翼象,1c4e52Nc3Nc63Nf3Nf64g3A30英国式开局,对称体系,1c4c5A31英国式开局,对称体系,别诺尼结构,1c4c52Nf3Nf63d4A32英国式开局,对称变例,1c4c52Nf3Nf63d4cxd44Nxd4e65Nc3Nc6A33英国式开局,对称体系,1c4c52Nc3A34英国式开局,对称体系,1c4c52Nc3Nc6A35英国式开局,1c4c52Nc3Nc63g3A36英国式开局,1c4c52Nc3Nc63g3A37英国式开局,对称体系,1c4c52Nc3Nc63g3g64Bg2Bg75Nf3A38英国式开局,对称体系,1c4c52Nc3Nc63g3g64Bg2Bg75Nf3Nf6A39英国式开局,对称体系的d4主变,1c4c52Nc3Nc63g3g64Bg2Bg75Nf3Nf66O-OO-O7d4A40后兵开局,1d4A41后兵开局,黑方d6变化,1d4d6A42现代防御,阿维尔巴赫体系,1d4d62c4g63Nc3Bg74e4A43旧式别诺尼防御,1d4c5A44旧式别诺尼防御,1d4c52d5e5A45后兵开局,1d4Nf6A46后兵开局,1d4Nf62Nf3A47后翼印度防御,1d4Nf62Nf3b6A48王翼印度防御,1d4Nf62Nf3g6A49王翼印度防御,侧翼出动,1d4Nf62Nf3g63g3A50后兵开局,1d4Nf62c4A51布达佩斯弃兵,1d4Nf62c4e5A52布达佩斯弃兵,1d4Nf62c4e53dxe5Ng4A53古印度开局,1d4Nf62c4d6A54古印度开局,乌克兰变例,1d4Nf62c4d63Nc3e54Nf3A55古印度开局,主变,1d4Nf62c4d63Nc3e54Nf3Nbd75e4A56别诺尼防御,1d4Nf62c4c5A57平科弃兵,伏尔加弃兵,1d4Nf62c4c53d5b5A58平科弃兵,1d4Nf62c4c53d5b54cxb5a65bxa6A59平科弃兵,1d4Nf62c4c53d5b54cxb5a65bxa6Bxa66Nc3d67e4A60别诺尼防御,1d4Nf62c4c53d5e6A61别诺尼防御,1d4Nf62c4c53d5e64Nc3exd55cxd5d66Nf3g6A62别诺尼防御,侧翼象变例,1d4Nf62c4c53d5e64Nc3exd55cxd5d66Nf3g67g3Bg78Bg2O-OA63别诺尼防御,侧翼象变例,9...Nbd7变化A64别诺尼防御,侧翼象变例,11...Re8变化A65别诺尼防御,1d4Nf62c4c53d5e64Nc3exd55cxd5d66e4A66别诺尼防御,1d4Nf62c4c53d5e64Nc3exd55cxd5d66e4g67f4A67别诺尼防御,泰曼诺夫变例,1d4Nf62c4c53d5e64Nc3exd55cxd5d66e4g67f4Bg78Bb5+A68别诺尼防御,四兵进攻,1d4Nf62c4c53d5e64Nc3exd55cxd5d66e4g67f4Bg78Nf3O-OA69别诺尼防御,四兵进攻主变,A70别诺尼防御,古典体系,1d4Nf62c4c53d5e64Nc3exd55cxd5d66e4g67Nf3A71别诺尼防御,古典体系,8Bg5的变化,1d4Nf62c4c53d5e64Nc3exd55cxd5d66e4g67Nf3Bg78Bg5A72别诺尼防御,古典体系,不走9.O-O的变化,1d4Nf62c4c53d5e64Nc3exd55cxd5d66e4g67Nf3Bg78Be2O-OA73别诺尼防御,古典体系,9.O-O的变化,A74别诺尼防御,古典体系,9...a6和10.a4的变化,A75别诺尼防御,古典体系,9...a6和10.a4的主变,A76别诺尼防御,古典体系,9...Re8变化A77别诺尼防御,古典体系,9...Re8,10.Nd2的变化,A78别诺尼防御,古典体系,...Re8and...Na6的变化,A79别诺尼防御,古典体系,11.f3的变化,A80荷兰防御,1d4f5A81荷兰防御,1d4f52g3A82荷兰防御,斯汤顿弃兵,1d4f52e4A83荷兰防御,斯汤顿弃兵,1d4f52e4fxe43Nc3Nf64Bg5A84荷兰防御,1d4f52c4A85荷兰防御,c4之后走Nc3的变化,1d4f52c4Nf63Nc3A86荷兰防御,1d4f52c4Nf63g3A87荷兰防御,列宁格勒体系,1d4f52c4Nf63g3g64Bg2Bg75Nf3A88荷兰防御,列宁格勒体系,1d4f52c4Nf63g3g64Bg2Bg75Nf3O-O6O-Od67Nc3c6A89荷兰防御,列宁格勒体系,1d4f52c4Nf63g3g64Bg2Bg75Nf3O-O6O-Od67Nc3Nc6A90荷兰防御,1d4f52c4Nf63g3e64Bg2A91荷兰防御,1d4f52c4Nf63g3e64Bg2Be7A92荷兰防御,1d4f52c4Nf63g3e64Bg2Be75Nf3O-OA93荷兰防御,石墙体系,鲍特维尼克变例,1d4f52c4Nf63g3e64Bg2Be75Nf3O-O6O-Od57b3A94荷兰防御,石墙体系,1d4f52c4Nf63g3e64Bg2Be75Nf3O-O6O-Od57b3c68Ba3A95荷兰防御,石墙体系,1d4f52c4Nf63g3e64Bg2Be75Nf3O-O6O-Od57Nc3c6A96荷兰防御,古典变例,1d4f52c4Nf63g3e64Bg2Be75Nf3O-O6O-Od6A97荷兰防御,伊尔因-热涅夫斯基变例,1d4f52c4Nf63g3e64Bg2Be75Nf3O-O6O-Od67Nc3Qe8A98荷兰防御,伊尔因-热涅夫斯基变例,1d4f52c4Nf63g3e64Bg2Be75Nf3O-O6O-Od67Nc3Qe88Qc2A99荷兰防御,伊尔因-热涅夫斯基变例,1d4f52c4Nf63g3e64Bg2Be75Nf3O-O6O-Od67Nc3Qe88b3
B类开局B00不常见的王前兵开局B01斯堪的纳维亚防御,1e4d5B02阿列亨防御,1e4Nf6B03阿列亨防御,1e4Nf62e5Nd53d4B04阿列亨防御,现代体系,1e4Nf62e5Nd53d4d64Nf3B05阿列亨防御,现代体系,1e4Nf62e5Nd53d4d64Nf3Bg4B06现代防御,1e4g6B07彼尔茨-乌菲姆采夫防御,1e4d62d4Nf6B08彼尔茨-乌菲姆采夫防御,古典体系,1e4d62d4Nf63Nc3g64Nf3B09彼尔茨-乌菲姆采夫防御,奥地利进攻,1e4d62d4Nf63Nc3g64f4B10卡罗-坎防御,1e4c6B11卡罗-坎防御,双马体系,1e4c62Nc3d53Nf3Bg4B12卡罗-坎防御,1e4c62d4B13卡罗-坎防御,兑换变例,1e4c62d4d53exd5cxd5B14卡罗-坎防御,帕诺夫-鲍特维尼克攻击,1e4c62d4d53exd5cxd54c4Nf65Nc3e6B15卡罗-坎防御,1e4c62d4d53Nc3B16卡罗-坎防御,布隆斯坦-拉尔森变例,1e4c62d4d53Nc3dxe44Nxe4Nf65Nxf6+gxf6B17卡罗-坎防御,斯坦尼茨变例,1e4c62d4d53Nc3dxe44Nxe4Nd7B18卡罗-坎防御,古典体系,1e4c62d4d53Nc3dxe44Nxe4Bf5B19卡罗-坎防御,古典体系,1e4c62d4d53Nc3dxe44Nxe4Bf55Ng3Bg66h4h67Nf3Nd7B20西西里防御,1e4c5B21西西里防御,2.f4和2.d4变化,1e4c52f4B22西西里防御,阿拉宾变例,1e4c52c3B23西西里防御,封闭体系,1e4c52Nc3B24西西里防御,封闭体系,1e4c52Nc3Nc63g3B25西西里防御,封闭体系,1e4c52Nc3Nc63g3g64Bg2Bg75d3d6B26西西里防御,封闭体系中的6.Be3变化,1e4c52Nc3Nc63g3g64Bg2Bg75d3d66Be3B27西西里防御,1e4c52Nf3B28西西里防御,奥凯利变例,1e4c52Nf3a6B29西西里防御,尼姆佐维奇-鲁宾斯坦变例,1e4c52Nf3Nf6B30西西里防御,1e4c52Nf3Nc6B31西西里防御,罗索里莫变例(带…g6,无…d6),1e4c52Nf3Nc63Bb5g6B32西西里防御,拉布唐纳体系,1e4c52Nf3Nc63d4cxd44Nxd4e5B33西西里防御,阿根廷变例,1e4c52Nf3Nc63d4cxd44Nxd4B34西西里防御,西马金变例,1e4c52Nf3Nc63d4cxd44Nxd4g65Nxc6B35西西里防御,西马金变例,现代变例带Bc4,1e4c52Nf3Nc63d4cxd44Nxd4g65Nc3Bg76Be3Nf67Bc4B36西西里防御,加速侧翼象,1e4c52Nf3Nc63d4cxd44Nxd4g65c4B37西西里防御,加速侧翼象,1e4c52Nf3Nc63d4cxd44Nxd4g65c4Bg7B38西西里防御,加速侧翼象,马罗齐绑定,1e4c52Nf3Nc63d4cxd44Nxd4g65c4Bg76Be3B39西西里防御,加速侧翼象,布莱耶尔变例,1e4c52Nf3Nc63d4cxd44Nxd4g65c4Bg76Be3Nf67Nc3Ng4B40西西里防御,1e4c52Nf3e6B41西西里防御,保尔逊体系,卡恩变例,1e4c52Nf3e63d4cxd44Nxd4a6B42西西里防御,保尔逊体系,卡恩变例,1e4c52Nf3e63d4cxd44Nxd4a65Bd3B43西西里防御,保尔逊体系,卡恩变例,1e4c52Nf3e63d4cxd44Nxd4a65Nc3B44西西里防御,保尔逊体系,1e4c52Nf3e63d4cxd44Nxd4Nc6B45西西里防御,保尔逊体系,泰曼诺夫变例,1e4c52Nf3e63d4cxd44Nxd4Nc65Nc3B46西西里防御,保尔逊体系,泰曼诺夫变例,1e4c52Nf3e63d4cxd44Nxd4Nc65Nc3a6B47西西里防御,保尔逊体系,泰曼诺夫(巴斯切科夫)变例,1e4c52Nf3e63d4cxd44Nxd4Nc65Nc3Qc7B48西西里防御,保尔逊体系,泰曼诺夫变例,1e4c52Nf3e63d4cxd44Nxd4Nc65Nc3Qc76Be3B49西西里防御,保尔逊体系,泰曼诺夫变例,1e4c52Nf3e63d4cxd44Nxd4Nc65Nc3Qc76Be3a67Be2B50西西里防御,1e4c52Nf3d6B51西西里防御,卡纳尔-索科尔斯基(罗索里莫,莫斯科)进攻,1e4c52Nf3d63Bb5+B52西西里防御,卡纳尔-索科尔斯基(罗索里莫,莫斯科)进攻,1e4c52Nf3d63Bb5+Bd7B53西西里防御,切克霍夫变例,1e4c52Nf3d63d4cxd44Qxd4B54西西里防御,1e4c52Nf3d63d4cxd44Nxd4B55西西里防御,普宁斯变例,威尼斯进攻,1e4c52Nf3d63d4cxd44Nxd4Nf65f3e56Bb5+B56西西里防御,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3B57西西里防御,索金变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3Nc66Bc4B58西西里防御,鲍列斯拉夫斯基变例,1e4c52Nf3Nc63d4cxd44Nxd4Nf65Nc3d66Be2B59西西里防御,鲍列斯拉夫斯基变例,1e4c52Nf3Nc63d4cxd44Nxd4Nf65Nc3d66Be2e57Nb3B60西西里防御,拉乌舍尔攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3Nc66Bg5B61西西里防御,拉乌舍尔攻击,拉尔森变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3Nc66Bg5Bd77Qd2B62西西里防御,拉乌舍尔攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3Nc66Bg5e6B63西西里防御,拉乌舍尔攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3Nc66Bg5e67Qd2B64西西里防御,拉乌舍尔攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3Nc66Bg5e67Qd2Be78O-O-OO-O9f4B65西西里防御,拉乌舍尔攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3Nc66Bg5e67Qd2Be78O-O-OO-O9f4NxdQxd4B66西西里防御,拉乌舍尔攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3Nc66Bg5e67Qd2a6B67西西里防御,拉乌舍尔攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3Nc66Bg5e67Qd2a68O-O-OBd7B68西西里防御,拉乌舍尔攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3Nc66Bg5e67Qd2a68O-O-OBd79f4Be7B69西西里防御,拉乌舍尔攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3Nc66Bg5e67Qd2a68O-O-OBd79f4BeNf3bBxf6B70西西里防御,龙式变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3g6B71西西里防御,龙式变例,列文菲什变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3g66f4B72西西里防御,龙式变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3g66Be3B73西西里防御,龙式变例,古典体系,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3g66Be3Bg77Be2Nc68O-OB74西西里防御,龙式变例,古典体系,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3g66Be3Bg77Be2Nc68O-OO-O9Nb3B75西西里防御,龙式变例,南斯拉夫攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3g66Be3Bg77f3B76西西里防御,龙式变例,南斯拉夫攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3g66Be3Bg77f3O-OB77西西里防御,龙式变例,南斯拉夫攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3g66Be3Bg77f3O-O8Qd2Nc69Bc4B78西西里防御,龙式变例,南斯拉夫攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3g66Be3Bg77f3O-O8Qd2Nc69Bc4BdO-O-OB79西西里防御,龙式变例,南斯拉夫攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3g66Be3Bg77f3O-O8Qd2Nc69Bc4BdO-O-OQaBb3Rfch4B80西西里防御,舍维宁根变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3e6B81西西里防御,舍维宁根变例,凯列斯攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3e66g4B82西西里防御,舍维宁根变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3e66f4B83西西里防御,舍维宁根变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3e66Be2B84西西里防御,舍维宁根变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3e66Be2a6B85西西里防御,舍维宁根变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3e66Be2a67O-OQc78f4Nc6B86西西里防御,菲舍尔-索金攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3e66Bc4B87西西里防御,菲舍尔-索金攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3e66Bc4a67Bb3b5B88西西里防御,菲舍尔-索金攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3e66Bc4Nc6B89西西里防御,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3e66Bc4Nc67Be3B90西西里防御,纳道尔夫变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3a6B91西西里防御,纳道尔夫变例,萨格勒布变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3a66g3B92西西里防御,纳道尔夫变例,萨格勒布变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3a66Be2B93西西里防御,纳道尔夫变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3a66f4B94西西里防御,纳道尔夫变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3a66Bg5B95西西里防御,纳道尔夫变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3a66Bg5e6B96西西里防御,纳道尔夫变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3a66Bg5e67f4B97西西里防御,纳道尔夫变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3a66Bg5e67f4Qb6B98西西里防御,纳道尔夫变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3a66Bg5e67f4Be7B99西西里防御,纳道尔夫变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3a66Bg5e67f4Be78Qf3Qc79O-O-ONbd7
C类开局
C00法兰西防御,1e4e6C01法兰西防御,兑换变例,1e4e62d4d53exd5exd54Nc3Nf65Bg5C02法兰西防御,推进变例,1e4e62d4d53e5C03法兰西防御,塔拉什防御,1e4e62d4d53Nd2,C04法兰西防御,塔拉什防御,吉马德主变,1e4e62d4d53Nd2Nc64Ngf3Nf6C05法兰西防御,塔拉什防御,1e4e62d4d53Nd2Nf6C06法兰西防御,塔拉什防御,1e4e62d4d53Nd2Nf64e5Nfd75Bd3c56c3Nc67Ne2cxd48cxd4C07法兰西防御,塔拉什防御,1e4e62d4d53Nd2c5C08法兰西防御,塔拉什防御,开放变例,1e4e62d4d53Nd2c54exd5exd5C09法兰西防御,塔拉什防御,开放变例主变,1e4e62d4d53Nd2c54exd5exd55Ngf3Nc6C10法兰西防御,保尔森变例,1e4e62d4d53Nc3C11法兰西防御,1e4e62d4d53Nc3Nf6C12法兰西防御,迈克卡西昂变例,1e4e62d4d53Nc3Nf64Bg5Bb4变例,1e4e62d4d53Nc3Nf64Bg5Be7C14法兰西防御,古典变例,1e4e62d4d53Nc3Nf64Bg5Be75e5Nfd76Bxe7Qxe7C15法兰西防御,温纳维尔(尼姆佐维奇)变例,1e4e62d4d53Nc3Bb4C16法兰西防御,温纳维尔(尼姆佐维奇)变例,推进变例,1e4e62d4d53Nc3Bb44e5C17法兰西防御,温纳维尔(尼姆佐维奇)变例,推进变例,1e4e62d4d53Nc3Bb44e5c5C18法兰西防御,温纳维尔(尼姆佐维奇)变例,推进变例,1e4e62d4d53Nc3Bb44e5c55a3Bxc3+6bxc3C19法兰西防御,温纳维尔(尼姆佐维奇)变例,推进变例,1e4e62d4d53Nc3Bb44e5c55a3Bxc3+6bxc3Ne7C20王兵开局,1e4e5C21中心开局,丹麦弃兵,1e4e52d4exd4C22中心开局,1e4e52d4exd43Qxd4Nc6C23飞象开局,1e4e52Bc4C24飞象开局,柏林防御,1e4e52Bc4Nf6C25维也纳开局,1e4e52Nc3C26维也纳开局,佛克比尔变例,1e4e52Nc3Nf6C27维也纳开局,1e4e52Nc3Nf63Bc4Nxe4C28维也纳开局,1e4e52Nc3Nf63Bc4Nc6C29维也纳弃兵局,考夫曼变例,1e4e52Nc3Nf63f4C30拒绝王翼弃兵局,1e4e52f4C31拒绝王翼弃兵局,佛克比尔反弃兵,1e4e52f4d5C32拒绝王翼弃兵局,佛克比尔反弃兵,1e4e52f4d53exd5e44d3Nf6C33接受王翼弃兵局,1e4e52f4exf4C34接受王翼弃兵局,1e4e52f4exf43Nf3C35接受王翼弃兵局,科宁汉姆防御,1e4e52f4exf43Nf3Be7C36接受王翼弃兵局,阿巴西亚防御(古典防御,现代防御),1e4e52f4exf43Nf3d5C37接受王翼弃兵局,科沃爱德弃兵,1e4e52f4exf43Nf3g54Nc3C38接受王翼弃兵局,1e4e52f4exf43Nf3g54Bc4Bg7C39接受王翼弃兵局,1e4e52f4exf43Nf3g54h4C40王翼马开局,1e4e52Nf3C41菲立道尔防御,1e4e52Nf3d6C42俄罗斯防御(彼得罗夫防御),1e4e52Nf3Nf6C43俄罗斯防御(彼得罗夫防御),现代攻击(斯坦尼茨攻击),1e4e52Nf3Nf63d4exd44e5Ne45Qxd4C44庞齐阿尼开局,1e4e52Nf3Nc6C45苏格兰开局,1e4e52Nf3Nc63d4exd44Nxd4C46三马开局,1e4e52Nf3Nc63Nc3C47四马开局,苏格兰变例,1e4e52Nf3Nc63Nc3Nf6C48四马开局,西班牙变例,1e4e52Nf3Nc63Nc3Nf64Bb5C49四马开局,1e4e52Nf3Nc63Nc3Nf64Bb5Bb4C50意大利开局(钢琴开局),1e4e52Nf3Nc63Bc4Bc5C51意大利开局,伊文思弃兵,1e4e52Nf3Nc63Bc4Bc54b4C52意大利开局,伊文思弃兵,1e4e52Nf3Nc63Bc4Bc54b4Bxb45c3Ba5C53意大利开局,1e4e52Nf3Nc63Bc4Bc54c3C54意大利开局,1e4e52Nf3Nc63Bc4Bc54c3Nf65d4exd46cxd4演示以及下载C55双马防御,1e4e52Nf3Nc63Bc4Nf6C56双马防御,1e4e52Nf3Nc63Bc4Nf64d4exd45O-ONxe4C57双马防御,1e4e52Nf3Nc63Bc4Nf64Ng5C58双马防御,1e4e52Nf3Nc63Bc4Nf64Ng5d55exd5Na5C59双马防御,1e4e52Nf3Nc63Bc4Nf64Ng5d55exd5Na56Bb5+c67dxc6bxc68Be2h6C60西班牙开局,1e4e52Nf3Nc63Bb5C61西班牙开局,别尔德防御,1e4e52Nf3Nc63Bb5Nd4C62西班牙开局,斯坦尼茨防御,1e4e52Nf3Nc63Bb5d6C63西班牙开局,雅尼什弃兵,1e4e52Nf3Nc63Bb5f5C64西班牙开局,古典体系,1e4e52Nf3Nc63Bb5Bc5C65西班牙开局,柏林防御,1e4e52Nf3Nc63Bb5Nf6C66西班牙开局,柏林防御,1e4e52Nf3Nc63Bb5Nf64O-Od6C67西班牙开局,柏林防御,开放变例,1e4e52Nf3Nc63Bb5Nf64O-ONxe4C68西班牙开局,兑换变例,1e4e52Nf3Nc63Bb5a64Bxc6C69西班牙开局,兑换变例,格里戈利奇变例,1e4e52Nf3Nc63Bb5a64Bxc6dc5O-Of66d4C70西班牙开局,现代斯坦尼茨防御,1e4e52Nf3Nc63Bb5a64Ba4C71西班牙开局,现代斯坦尼茨防御,1e4e52Nf3Nc63Bb5a64Ba4d6C72西班牙开局,现代斯坦尼茨防御,1e4e52Nf3Nc63Bb5a64Ba4d65O-O
C73西班牙开局,现代斯坦尼茨防御,1e4e52Nf3Nc63Bb5a64Ba4d65Bxc6+bxc66d4C74西班牙开局,现代斯坦尼茨防御,1e4e52Nf3Nc63Bb5a64Ba4d65c3C75西班牙开局,现代斯坦尼茨防御,1e4e52Nf3Nc63Bb5a64Ba4d65c3Bd7C76西班牙开局,现代斯坦尼茨防御,侧翼象防御(布龙斯坦防御),1e4e52Nf3Nc63Bb5a64Ba4d65c3Bd76d4g6C77西班牙开局,摩菲防御,1e4e52Nf3Nc63Bb5a64Ba4Nf6C78西班牙开局,摩菲防御,1e4e52Nf3Nc63Bb5a64Ba4Nf65O-OC79西班牙开局,延迟斯坦尼茨防御(俄罗斯防御),1e4e52Nf3Nc63Bb5a64Ba4Nf65O-Od6C80西班牙开局,开放变例(塔拉什防御、苏格兰变例),1e4e52Nf3Nc63Bb5a64Ba4Nf65O-ONxe4C81西班牙开局,开放变例,霍维尔攻击,1e4e52Nf3Nc63Bb5a64Ba4Nf65O-ONxe46d4b57Bb3d58dxe5Be6C82西班牙开局,开放变例,1e4e52Nf3Nc63Bb5a64Ba4Nf65O-ONxe46d4b57Bb3d58dxe5Be69c3C83西班牙开局,开放变例,古典体系,1e4e52Nf3Nc63Bb5a64Ba4Nf65O-ONxe46d4b57Bb3d58dxe5Be6C84西班牙开局,封闭体系,1e4e52Nf3Nc63Bb5a64Ba4Nf65O-OBe7C85西班牙开局,兑换变例双重延迟,1e4e52Nf3Nc63Bb5a64Ba4Nf65O-OBe76Bxc6dxc6C86西班牙开局,沃罗尔攻击,1e4e52Nf3Nc63Bb5a64Ba4Nf65O-OBe76Qe2C87西班牙开局,封闭体系,阿维尔巴赫变例,1e4e52Nf3Nc63Bb5a64Ba4Nf65O-OBe76Re1d6C88西班牙开局,封闭体系,反马歇尔弃兵变例,1e4e52Nf3Nc63Bb5a64Ba4Nf65O-OBe76Re1b57Bb3C89西班牙开局,封闭体系,马歇尔弃兵,1e4e52Nf3Nc63Bb5a64Ba4Nf65O-OBe76Re1b57Bb3O-O8c3d5C90西班牙开局,封闭体系,1e4e52Nf3Nc63Bb5a64Ba4Nf65O-OBe76Re1b57Bb3O-O8c3d6C91西班牙开局,封闭体系,1e4e52Nf3Nc63Bb5a64Ba4Nf65O-OBe76Re1b57Bb3O-O8c3d69d4C92西班牙开局,封闭体系,1e4e52Nf3Nc63Bb5a64Ba4Nf65O-OBe76Re1b57Bb3O-O8c3d69h3C93西班牙开局,封闭体系,斯梅斯洛夫防御,1e4e52Nf3Nc63Bb5a64Ba4Nf65O-OBe76Re1b57Bb3O-O8c3d69h3h6C94西班牙开局,封闭体系,布列热尔防御,1e4e52Nf3Nc63Bb5a64Ba4Nf65O-OBe76Re1b57Bb3O-O8c3d69h3Nb8C95西班牙开局,封闭体系,布列热尔防御,1e4e52Nf3Nc63Bb5a64Ba4Nf65O-OBe76Re1b57Bb3O-O8c3d69h3Nbd4C96西班牙开局,封闭体系,1e4e52Nf3Nc63Bb5a64Ba4Nf65O-OBe76Re1b57Bb3O-O8c3d69h3NaBc2C97西班牙开局,封闭体系,奇戈林变例,1e4e52Nf3Nc63Bb5a64Ba4Nf65O-OBe76Re1b57Bb3O-O8c3d69h3NaBc2cd4Qc7C98西班牙开局,封闭体系,奇戈林变例,1e4e52Nf3Nc63Bb5a64Ba4Nf65O-OBe76Re1b57Bb3O-O8c3d69h3NaBc2cd4QcNbd2Nc6C99西班牙开局,封闭体系,奇戈林变例,1e4e52Nf3Nc63Bb5a64Ba4Nf65O-OBe76Re1b57Bb3O-O8c3d69h3NaBc2cd4QcNbd2cxdcxd4
D类开局
D00后兵开局,1d4d5D01后兵开局,里赫特尔-威列索夫攻击,1d4d52Nc3Nf63Bg5D02后兵开局,1d4d52Nf3D03后兵开局,托雷攻击(塔塔科维尔变例),1d4d52Nf3Nf63Bg5d4d52Nf3Nf63e3D05后兵开局,楚克尔托特变例,1d4d52Nf3Nf63e3e6D06拒绝后翼弃兵局,1d4d52c4D07拒绝后翼弃兵局,奇戈林防御,1d4d52c4Nc6D08拒绝后翼弃兵局,阿尔宾反弃兵,1d4d52c4e5D09拒绝后翼弃兵局,阿尔宾反弃兵,1d4d52c4e53dxe5d44Nf3Nc65g3D10拒绝后翼弃兵局,斯拉夫防御,1d4d52c4c6D11拒绝后翼弃兵局,斯拉夫防御,1d4d52c4c63Nf3D12拒绝后翼弃兵局,斯拉夫防御,1d4d52c4c63Nf3Nf64e3Bf5D13拒绝后翼弃兵局,斯拉夫防御,兑换变例,1d4d52c4c63Nf3Nf64cxd5cxd5D14拒绝后翼弃兵局,斯拉夫防御,兑换变例,1d4d52c4c63Nf3Nf64cxd5cxd55Nc3Nc66Bf4Bf5D15拒绝后翼弃兵局,斯拉夫防御,兑换变例,1d4d52c4c63Nf3Nf64Nc3D16拒绝后翼弃兵局,斯拉夫防御,阿拉宾变例,1d4d52c4c63Nf3Nf64Nc3dxc45a4D17拒绝后翼弃兵局,斯拉夫防御,捷克防御,1d4d52c4c63Nf3Nf64Nc3dxc45a4Bf5D18拒绝后翼弃兵局,斯拉夫防御,荷兰变例,1d4d52c4c63Nf3Nf64Nc3dxc45a4Bf56e3D19拒绝后翼弃兵局,斯拉夫防御,荷兰变例,1d4d52c4c63Nf3Nf64Nc3dxc45a4Bf56e3e67Bxc4Bb48O-OO-O9Qe2D20接受后翼弃兵局,1d4d52c4dxc4D21接受后翼弃兵局,1d4d52c4dxc43Nf3D22接受后翼弃兵局,阿廖欣防御,1d4d52c4dxc43Nf3a64e3Bg45Bxc4e66d5D23接受后翼弃兵局,1d4d52c4dxc43Nf3Nf6D24接受后翼弃兵局,1d4d52c4dxc43Nf3Nf64Nc3D25接受后翼弃兵局,1d4d52c4dxc43Nf3Nf64e3D26接受后翼弃兵局,古典变例,1d4d52c4dxc43Nf3Nf64e3e6演D27接受后翼弃兵局,古典变例,1d4d52c4dxc43Nf3Nf64e3e65Bxc4c56O-Oa6D28接受后翼弃兵局,古典变例,1d4d52c4dxc43Nf3Nf64e3e65Bxc4c56O-Oa67Qe2D29接受后翼弃兵局,古典变例,1d4d52c4dxc43Nf3Nf64e3e65Bxc4c56O-Oa67Qe2b58Bb3Bb7D30拒绝后翼弃兵局,1d4d52c4e6D31拒绝后翼弃兵局,1d4d52c4e63Nc3D32拒绝后翼弃兵局,塔拉什防御,1d4d52c4e63Nc3c5演D33拒绝后翼弃兵局,塔拉什防御,施莱切特-鲁宾斯坦体系,1d4d52c4e63Nc3c54cxd5exd55Nf3Nc66g3D34拒绝后翼弃兵局,塔拉什防御,1d4d52c4e63Nc3c54cxd5exd55Nf3Nc66g3Nf67Bg2Be7D35拒绝后翼弃兵局,1d4d52c4e63Nc3Nf6D36拒绝后翼弃兵局,兑换变例,局面路线,1d4d52c4e63Nc3Nf64cxd5exd55Bg5c66Qc2D37拒绝后翼弃兵局,1d4d52c4e63Nc3Nf64Nf3D38拒绝后翼弃兵局,拉戈金变例,1d4d52c4e63Nc3Nf64Nf3Bb4D39拒绝后翼弃兵局,拉戈金变例,维也纳体系,1d4d52c4e63Nc3Nf64Nf3Bb45Bg5dxc4D40拒绝后翼弃兵局,半塔拉什防御,1d4d52c4e63Nc3Nf64Nf3c5D41拒绝后翼弃兵局,半塔拉什防御,1d4d52c4e63Nc3Nf64Nf3c55cxd5D42拒绝后翼弃兵局,半塔拉什防御,1d4d52c4e63Nc3Nf64Nf3c55cxd5Nxd56e3Nc67Bd3D43拒绝后翼弃兵局,半斯拉夫防御,1d4d52c4e63Nc3Nf64Nf3c6D44拒绝后翼弃兵局,半斯拉夫防御,1d4d52c4e63Nc3Nf64Nf3c65Bg5dxc4D45拒绝后翼弃兵局,半斯拉夫防御,1d4d52c4e63Nc3Nf64Nf3c65e3D46拒绝后翼弃兵局,半斯拉夫防御,1d4d52c4e63Nc3Nf64Nf3c65e3Nbd76Bd3
D47,1d4d52c4e63Nc3Nf64Nf3c65e3Nbd76Bd3dxc47Bxc4D48拒绝后翼弃兵局,半斯拉夫防御,1d4d52c4e63Nc3Nf64Nf3c65e3Nbd76Bd3dxc47Bxc4b58Bd3a6D49拒绝后翼弃兵局,半斯拉夫防御,1d4d52c4e63Nc3Nf64Nf3c65e3Nbd76Bd3dxc47Bxc4b58Bd3a69e4ce5cxdNxb5D50拒绝后翼弃兵局,1d4d52c4e63Nc3Nf64Bg5D51拒绝后翼弃兵局,1d4d52c4e63Nc3Nf64Bg5Nbd7D52拒绝后翼弃兵局,1d4d52c4e63Nc3Nf64Bg5Nbd75e3c66Nf3D53拒绝后翼弃兵局,1d4d52c4e63Nc3Nf64Bg5Be7D54拒绝后翼弃兵局,反新正统变例,1d4d52c4e63Nc3Nf64Bg5Be75e3O-O6Rc1D55拒绝后翼弃兵局,1d4d52c4e63Nc3Nf64Bg5Be75e3O-O6Nf3演示以及下载D56拒绝后翼弃兵局,拉斯克防御,1d4d52c4e63Nc3Nf64Bg5Be75e3O-O6Nf3h67Bh4D57拒绝后翼弃兵局,拉斯克防御,1d4d52c4e63Nc3Nf64Bg5Be75e3O-O6Nf3h67Bh4Ne48Bxe7Qxe7D58拒绝后翼弃兵局,塔塔科维尔(马卡贡诺夫-邦达列夫斯基)体系,1d4d52c4e63Nc3Nf64Bg5Be75e3O-O6Nf3h67Bh4b6D59拒绝后翼弃兵局,塔塔科维尔体体系,1d4d52c4e63Nc3Nf64Bg5Be75e3O-O6Nf3h67Bh4b68cxd5Nxd5D60拒绝后翼弃兵局,正统防御,1d4d52c4e63Nc3Nf64Bg5Be75e3O-O6Nf3Nbd7D61拒绝后翼弃兵局,正统防御,鲁宾斯坦攻击,1d4d52c4e63Nc3Nf64Bg5Be75e3O-O6Nf3Nbd77Qc2D62拒绝后翼弃兵局,正统防御,鲁宾斯坦攻击,1d4d52c4e63Nc3Nf64Bg5Be75e3O-O6Nf3Nbd77Qc2c58cxd5D63拒绝后翼弃兵局,正统防御,鲁宾斯坦攻击,1d4d52c4e63Nc3Nf64Bg5Be75e3O-O6Nf3Nbd77Rc1D64拒绝后翼弃兵局,正统防御,鲁宾斯坦攻击,1d4d52c4e63Nc3Nf64Bg5Be75e3O-O6Nf3Nbd77Rc1c68Qc2D65拒绝后翼弃兵局,正统防御,鲁宾斯坦攻击,1d4d52c4e63Nc3Nf64Bg5Be75e3O-O6Nf3Nbd77Rc1c68Qc2a69cxd5D66拒绝后翼弃兵局,正统防御,1d4d52c4e63Nc3Nf64Bg5Be75e3O-O6Nf3Nbd77Rc1c68Bd3D67拒绝后翼弃兵局,正统防御,1d4d52c4e63Nc3Nf64Bg5Be75e3O-O6Nf3Nbd77Rc1c68Bd3dxc49Bxc4Nd5D68拒绝后翼弃兵局,正统防御,古典体系,1d4d52c4e63Nc3Nf64Bg5Be75e3O-O6Nf3Nbd77Rc1c68Bd3dxc4D69拒绝后翼弃兵局,正统防御,古典体系,1d4d52c4e63Nc3Nf64Bg5Be75e3O-O6Nf3Nbd77Rc1c68Bd3dxc4D70新格林菲尔德防御,1d4Nf62c4g63f3d5D71新格林菲尔德防御,1d4Nf62c4g63g3d5D72新格林菲尔德防御,5.cd主变,1d4Nf62c4g63g3d54Bg2Bg75cxd5Nxd56e4Nb67Ne2D73新格林菲尔德防御,1d4Nf62c4g63g3d54Bg2Bg75Nf3D74新格林菲尔德防御,1d4Nf62c4g63g3d54Bg2Bg75Nf3O-O6cxd5Nxd57O-OD75新格林菲尔德防御,1d4Nf62c4g63g3d54Bg2Bg75Nf3O-O6cxd5Nxd57O-Oc58dxc5D76新格林菲尔德防御,1d4Nf62c4g63g3d54Bg2Bg75Nf3O-O6cxd5Nxd57O-ONb6D77新格林菲尔德防御,1d4Nf62c4g63g3d54Bg2Bg75Nf3O-O6O-OD78新格林菲尔德防御,1d4Nf62c4g63g3d54Bg2Bg75Nf3O-O6O-Oc6D79新格林菲尔德防御,6.O-O主变,1d4Nf62c4g63g3d54Bg2Bg75Nf3O-O6O-Oc67cxd5cxd5D80格林菲尔德防御,1d4Nf62c4g63Nc3d5D81格林菲尔德防御,俄罗斯变例,1d4Nf62c4g63Nc3d54Qb3D82格林菲尔德防御,1d4Nf62c4g63Nc3d54Bf4D83格林菲尔德防御,弃兵变例,1d4Nf62c4g63Nc3d54Bf4Bg75e3O-OD84格林菲尔德防御,接受弃兵变例,1d4Nf62c4g63Nc3d54Bf4Bg75e3O-O6cxd5Nxd57Nxd5Qxd58Bxc7D85格林菲尔德防御,兑换变例,1d4Nf62c4g63Nc3d54cxd5Nxd5D86格林菲尔德防御,兑换变例,1d4Nf62c4g63Nc3d54cxd5Nxd55e4Nxc36bxc3Bg77Bc4D87格林菲尔德防御,兑换变例,1d4Nf62c4g63Nc3d54cxd5Nxd55e4Nxc36bxc3Bg77Bc4O-O8Ne2c5D88格林菲尔德防御,斯帕斯基变例的主变(10…cd,11.cd),1d4Nf62c4g63Nc3d54cxd5Nxd55e4Nxc36bxc3Bg77Bc4O-O8Ne2D89格林菲尔德防御,斯帕斯基变例的主变(13.Bd3),1d4Nf62c4g63Nc3d54cxd5Nxd55e4Nxc36bxc3Bg77Bc4O-O8Ne2D90格林菲尔德防御,三马变例,1d4Nf62c4g63Nc3d54Nf3D91格林菲尔德防御,三马变例,1d4Nf62c4g63Nc3d54Nf3Bg75Bg5D92格林菲尔德防御,1d4Nf62c4g63Nc3d54Nf3Bg75Bf4D93格林菲尔德防御,1d4Nf62c4g63Nc3d54Nf3Bg75Bf4O-O6e3D94格林菲尔德防御,1d4Nf62c4g63Nc3d54Nf3Bg75e3D95格林菲尔德防御,1d4Nf62c4g63Nc3d54Nf3Bg75e3O-O6Qb3D96格林菲尔德防御,俄罗斯变例,1d4Nf62c4g63Nc3d54Nf3Bg75Qb3演示以及下载D97格林菲尔德防御,俄罗斯变例,1d4Nf62c4g63Nc3d54Nf3Bg75Qb3dxc46Qxc4O-O7e4演示以及下载D98格林菲尔德防御,俄罗斯变例,1d4Nf62c4g63Nc3d54Nf3Bg75Qb3dxc46Qxc4O-O7e4Bg4演示以及下载D99格林菲尔德防御,斯梅斯洛夫变例,1d4Nf62c4g63Nc3d54Nf3Bg75Qb3dxc46Qxc4O-O7e4Bg48Be3演示以及下载
E类开局
E00后兵开局,1d4Nf62c4e6演示以及下载E01卡塔龙开局,封闭体系,1d4Nf62c4e63g3d54Bg2演示以及下载E02卡塔龙开局,开放体系,1d4Nf62c4e63g3d54Bg2dxc45Qa4+演示以及下载E03卡塔龙开局,开放体系,1d4Nf62c4e63g3d54Bg2dxc45Qa4+Nbd76Qxc4演示以及下载E04卡塔龙开局,开放体系,1d4Nf62c4e63g3d54Bg2dxc45Nf3演示以及下载E05卡塔龙开局,开放体系,1d4Nf62c4e63g3d54Bg2dxc45Nf3Be7演示以及下载E06卡塔龙开局,封闭体系,1d4Nf62c4e63g3d54Bg2Be75Nf3E07卡塔龙开局,封闭体系,1d4Nf62c4e63g3d54Bg2Be75Nf3O-O6O-ONbd7E08卡塔龙开局,封闭体系,1d4Nf62c4e63g3d54Bg2Be75Nf3O-O6O-ONbd77Qc2E09卡塔龙开局,封闭体系,1d4Nf62c4e63g3d54Bg2Be75Nf3O-O6O-ONbd77Qc2c68Nbd2E10后兵开局,1d4Nf62c4e63Nf3E11波刚-印度防御,1d4Nf62c4e63Nf3Bb4+E12新印度防御(后翼印度防御),1d4Nf62c4e63Nf3b6演示以及下载E13新印度防御,1d4Nf62c4e63Nf3b64Nc3Bb75Bg5h66Bh4Bb4演示以及下载E14新印度防御,1d4Nf62c4e63Nf3b64e3E15新印度防御,1d4Nf62c4e63Nf3b64g3E16新印度防御,1d4Nf62c4e63Nf3b64g3Bb75Bg2Bb4+演示以及下载E17新印度防御,1d4Nf62c4e63Nf3b64g3Bb75Bg2Be7演示以及下载E18新印度防御,旧主变(7.Nc3),1d4Nf62c4e63Nf3b64g3Bb75Bg2Be76O-OO-O7Nc3演示以及下载E19新印度防御,旧主变(9.Qxc3),1d4Nf62c4e63Nf3b64g3Bb75Bg2Be76O-OO-O7Nc3Ne48Qc2Nxc3演示以及下载E20尼姆佐维奇防御(尼姆佐维奇印度防御),1d4Nf62c4e63Nc3Bb4演示以及下载E21尼姆佐维奇防御,三马变例,1d4Nf62c4e63Nc3Bb44Nf3演示以及下载E22尼姆佐维奇防御,斯皮尔曼变例,1d4Nf62c4e63Nc3Bb44Qb3演示以及下载E23尼姆佐维奇防御,斯皮尔曼变例,1d4Nf62c4e63Nc3Bb44Qb3c55dxc5Nc6演示以及下载E24尼姆佐维奇防御,杰米什变例,1d4Nf62c4e63Nc3Bb44a3Bxc3+5bxc3演示以及下载E25尼姆佐维奇防御,杰米什变例,凯列斯变例,1d4Nf62c4e63Nc3Bb44a3Bxc3+5bxc3c56f3d57cxd5演示以及下载E26尼姆佐维奇防御,杰米什变例,1d4Nf62c4e63Nc3Bb44a3Bxc3+5bxc3c56e3奇防御63N例,主变,1d4Nf62c4e63Nc3Bb44a3Bxc3+5bxc尼姆佐维奇防御,列宁格勒变例,1d4Nf62c4e63Nc3Bb44Bg5E31尼姆佐维奇防御,列宁格勒变例主变,1d4Nf62c4e63Nc3Bb44Bg5h65Bh4c56d5d6E32尼姆佐维奇防御,古典体系,1d4Nf62c4e63Nc3Bb44Qc2E33尼姆佐维奇防御,古典体系,1d4Nf62c4e63Nc3Bb44Qc2Nc6E34尼姆佐维奇防御,古典体系,诺阿4e63Nc3Bb44Qc2d5E35尼姆佐维奇防御,古典体系,诺阿变例,1d4Nf62c4e63Nc3Bb44Qc2d55cxd5exd5E36尼姆佐维奇防御,古典体系,诺阿变例,1d4Nf62c4e63Nc3Bb44Qc2d55a3E37尼姆佐维奇防御,古典体系,诺阿变例主变,1d4Nf62c4e63Nc3Bb44Qc2d55a3Bxc3+6Qxc3Ne47Qc2E38尼姆佐维奇防御,古典体系,1d4Nf62c4e63Nc3Bb44Qc2c5E39尼姆佐维奇防御,古典体系,彼尔茨变例,1d4Nf62c4e63Nc3Bb44Qc2c55dxc5O-OE40尼姆佐维奇防御,1d4Nf62c4e63Nc3Bb44e3E41尼姆佐维奇防御,1d4Nf62c4e63Nc3Bb44e3c5E42尼姆佐维奇防御,鲁宾斯坦体系,1d4Nf62c4e63Nc3Bb44e3c55Ne2E43尼姆佐维奇防御,菲舍尔变例,1d4Nf62c4e63Nc3Bb44e3b6E44尼姆佐维奇防御,菲舍尔变例,1d4Nf62c4e63Nc3Bb44e3b65Ne2演示以及下载E45尼姆佐维奇防御,布龙斯坦变例,1d4Nf62c4e63Nc3Bb44e3b65Ne2Ba6演示以及下载E46尼姆佐维奇防御,1d4Nf62c4e63Nc3Bb44e3O-O演示以及下载E47尼姆佐维奇防御,1d4Nf62c4e63Nc3Bb44e3O-O5Bd3E48尼姆佐维奇防御,1d4Nf62c4e63Nc3Bb44e3O-O5Bd3d53O-O5Bd3d56a3BxNf3E51尼姆佐维奇c4e63Nc3Bb44e3O-O5Nf3d5E52尼姆佐维奇防御,1d4Nf62c4e63Nc3Bb44e3O-O5Nf3d56Bd3b6E53尼姆佐维奇防御,1d4Nf62c4e63Nc3Bb44e3O-O5Nf3d56Bd3c5E54尼姆佐维奇防御,格里戈利奇体系,1d4Nf62c4e63Nc3Bb44e3O-O5Nf3d56Bd3c57O-Odxc48Bxc4E55尼姆佐维奇防御,格里戈利奇体系,布龙斯坦变例,1d4Nf62c4e63Nc3Bb44e3O-O5Nf3d56Bd3c57O-Odxc48Bxc4Nbd7E56尼姆佐维奇防御,1d4Nf62c4e63Nc3Bb44e3O-O5Nf3d56Bd3c57O-ONc6E57尼姆佐维奇防御,1d4Nf62c4e63Nc3Bb44e3O-O5Nf3d56Bd3c57O-ONc68a3dxc4E58尼姆佐维奇防御,1d4Nf62c4e63Nc3Bb44e3O-O5Nf3d56Bd3c57O-ONc68a3Bxc39bxc3E59尼姆佐维奇防御,1d4Nf62c4e63Nc3Bb44e3O-O5Nf3d56Bd3c57O-ONc68a3Bxc39bxc3dxcBxc4
E60古印度防御(王翼印度防御),1d4Nf62c4g6E61古印度防御,1d4Nf62c4g63Nc3E62古印度防御,侧翼象变例,1d4Nf62c4g63Nc3Bg74Nf3d65g3演示以及下载E63古印度防御,侧翼象变例,潘诺变例,1d4Nf62c4g63Nc3Bg74Nf3d65g3O-O6Bg2Nc67O-Oa6演示以及下载E64古印度防御,侧翼象变例,南斯拉夫体系,1d4Nf62c4g63Nc3Bg74Nf3d65g3O-O6Bg2c5演示以及下载E65古印度防御,侧翼象变例,南斯拉夫体系,1d4Nf62c4g63Nc3Bg74Nf3d65g3O-O6Bg2c57O-OE66古印度防御,侧翼象变例,潘诺变例,1d4Nf62c4g63Nc3Bg74Nf3d65g3O-O6Bg2c57O-ONc68d5E67古印度防御,侧翼象变例,1d4Nf62c4g63Nc3Bg74Nf3d65g3O-O6Bg2Nbd7E68古印度防御,侧翼象变例,古典变例,1d4Nf62c4g63Nc3Bg74Nf3d65g3O-O6Bg2Nbd77O-Oe58e4E69古印度防御,侧翼象变例,古典变例主变,1d4Nf62c4g63Nc3Bg74Nf3d65g3O-O6Bg2Nbd77O-Oe58e4c69h3E70古印度防御,1d4Nf62c4g63Nc3Bg74e4E71古印度防御,马卡贡诺夫体系,1d4Nf62c4g63Nc3Bg74e4d65h3演示以及下载E72古印度防御,1d4Nf62c4g63Nc3Bg74e4d65g3E73古印度防御,1d4Nf62c4g63Nc3Bg74e4d65Be2E74古印度防御,阿维尔巴赫变例,1d4Nf62c4g63Nc3Bg74e4d65Be2O-O6Bg5c5E75古印度防御,阿维尔巴赫变例主变,1d4Nf62c4g63Nc3Bg74e4d65Be2O-O6Bg5c57d5e6E76古印度防御,四兵进攻,1d4Nf62c4g63Nc3Bg74e4d65f4E77古印度防御,四兵进攻,1d4Nf62c4g63Nc3Bg74e4d65f4O-O6Be2E78古印度防御,四兵进攻,1d4Nf62c4g63Nc3Bg74e4d65f4O-O6Be2c57Nf3E79古印度防御,四兵进攻主变,1d4Nf62c4g63Nc3Bg74e4d65f4O-O6Be2c57Nf3cxd48Nxd4Nc69Be3E80古印度防御,杰米什变例,1d4Nf62c4g63Nc3Bg74e4d65f3E81古印度防御,杰米什变例,1d4Nf62c4g63Nc3Bg74e4d65f3O-OE82古印度防御,杰米什变例,双侧翼象变例,1d4Nf62c4g63Nc3Bg74e4d65f3O-O6Be3b6
E83古印度防御,杰米什变例,1d4Nf62c4g63Nc3Bg74e4d65f3O-O6Be3Nc6E84古印度防御,杰米什变例,潘诺变例,1d4Nf62c4g63Nc3Bg74e4d65f3O-O6Be3Nc67Nge2a68Qd2Rb8E85古印度防御,杰米什变例,正统变例,1d4Nf62c4g63Nc3Bg74e4d65f3O-O6Be3e5E86古印度防御,杰米什变例,正统变例,1d4Nf62c4g63Nc3Bg74e4d65f3O-O6Be3e57Nge2c6E87古印度防御,杰米什变例,正统变例,1d4Nf62c4g63Nc3Bg74e4d65f3O-O6Be3e57d5E88古印度防御,杰米什变例,正统变例,1d4Nf62c4g63Nc3Bg74e4d65f3O-O6Be3e57d5c6E89古印度防御,杰米什变例,正统变例,1d4Nf62c4g63Nc3Bg74e4d65f3O-O6Be3e57d5c68Nge2cxd5E90古印度防御,1d4Nf62c4g63Nc3Bg74e4d65Nf3E91古印度防御,1d4Nf62c4g63Nc3Bg74e4d65Nf3O-O6Be2E92古印度防御,1d4Nf62c4g63Nc3Bg74e4d65Nf3O-O6Be2e5演示以及下载E93古印度防御,1d4Nf62c4g63Nc3Bg74e4d65Nf3O-O6Be2e57d5Nbd7E94古印度防御,正统变例,1d4Nf62c4g63Nc3Bg74e4d65Nf3O-O6Be2e57O-OE95古印度防御,正统变例,1d4Nf62c4g63Nc3Bg74e4d65Nf3O-O6Be2e57O-ONbd78Re1E96古印度防御,正统变例,1d4Nf62c4g63Nc3Bg74e4d65Nf3O-O6Be2e57O-ONbd78Re1c69Bf1a5E97古印度防御,正统变例,1d4Nf62c4g63Nc3Bg74e4d65Nf3O-O6Be2e57O-ONc6E98古印度防御,正统变例,阿朗宁-泰曼诺夫变例,1d4Nf62c4g63Nc3Bg74e4d65Nf3O-O6Be2e57O-ONc68d5Ne79Ne1E99古印度防御,正统变例,阿朗宁-泰曼诺夫变例,1d4Nf62c4g63Nc3Bg74e4d65Nf3O-O6Be2e57O-ONc68d5Ne79Ne1Ndf3f5
预览时标签不可点收录于合集#个上一篇下一篇