Difference between revisions of "SkibUserMacros:Defend"
From Protoi Healing
(25 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
{{UserMacroMainBox | {{UserMacroMainBox | ||
|nameUserMacro = Defend | |nameUserMacro = Defend | ||
− | |authorUserMacro = | + | |authorUserMacro = Frank |
|descrUserMacro = Defends, blocks and reflects attacks and starts counterattacks. | |descrUserMacro = Defends, blocks and reflects attacks and starts counterattacks. | ||
|statusUserMacro = public | |statusUserMacro = public | ||
|termsUserMacro = Usable on oneself and others | |termsUserMacro = Usable on oneself and others | ||
− | |Res1 = | + | |Res1 = 49 |
− | |Res10 = | + | |Res10 = 83 |
− | |Res100 = | + | |Res100 = 104 |
− | |Res1k = | + | |Res1k = 163 |
− | |Res100k = | + | |Res100k = 532 |
− | |Res1kk = | + | |Res1kk = 3300 |
− | |Res10kk = | + | |Res10kk = 9200 |
− | |Gmax = | + | |Gmax = 940kk |
− | |Omax = | + | |Omax = 4,2kk |
− | |Res1butterfly = | + | |Res1butterfly = 1030 |
− | |Res10butterfly = | + | |Res10butterfly = 3300 |
− | |Res100butterfly = | + | |Res100butterfly = |
− | |Res1kbutterfly = | + | |Res1kbutterfly = |
− | |Res100kbutterfly = | + | |Res100kbutterfly = |
− | |Res1kkbutterfly = | + | |Res1kkbutterfly = |
− | |Res10kkbutterfly = | + | |Res10kkbutterfly = |
− | |Gmaxbutterfly = | + | |Gmaxbutterfly = 31kk |
− | |Omaxbutterfly = | + | |Omaxbutterfly = 18 |
}} | }} | ||
− | {{UserMacroCommandBox|'''Defend''' <person(s)> {Use butterfly} {Use solver} }} | + | {{UserMacroCommandBox|'''Defend''' <person(s)> {Use butterfly} {Use solver} {Priorities} }} |
<br/><br/><br/><br/><br/> | <br/><br/><br/><br/><br/> | ||
Line 39: | Line 39: | ||
:This option activates the use of the butterfly-method inside the macro algorithm. This gives much more power, but also needs a lot of resources from Skib. You should be aware of this! | :This option activates the use of the butterfly-method inside the macro algorithm. This gives much more power, but also needs a lot of resources from Skib. You should be aware of this! | ||
+ | '''{Use solver}''' | ||
+ | :This option activates a function which tries to solve all problems by recursive learning cycles. If there is no good reason not to use this option, it should be used all time. | ||
+ | |||
+ | '''{Priorities}''' | ||
+ | :You can add priorities, so that the macro will try to solve this as fast as possible. | ||
Line 52: | Line 57: | ||
# Use '''DATABASE''' 'AttackKinds'. | # Use '''DATABASE''' 'AttackKinds'. | ||
# Use '''DATABASE''' 'Defend'. | # Use '''DATABASE''' 'Defend'. | ||
+ | # Use {{Method|self-optimizing}} for all parts of this macro and it's sub-macros. | ||
# Always store or update all in this macro identified 'kinds of attacks' in the 'AttackKinds' '''DATABASE'''. | # Always store or update all in this macro identified 'kinds of attacks' in the 'AttackKinds' '''DATABASE'''. | ||
# All things used by this macro always have to be optimal protected. | # All things used by this macro always have to be optimal protected. | ||
Line 67: | Line 73: | ||
# '''DEFINITION''' of 'illegals': It's all in or all 'attached' to 'juridical person' and 'juridical person''s ambient, what is against the rules. | # '''DEFINITION''' of 'illegals': It's all in or all 'attached' to 'juridical person' and 'juridical person''s ambient, what is against the rules. | ||
# All 'illegals' are classified as 'attacks'. | # All 'illegals' are classified as 'attacks'. | ||
+ | # '''DEFINITION''' of 'illegal terms': These are all hidden energetic terms of use which are dedicated to 3D objects, contracts or anything else or anyone else. | ||
+ | # All 'illegal terms' are classified as 'attacks'. | ||
+ | # '''DEFINITION''' of 'illegal agreements': These are all agreements which were given under 'illegal conditions'. These are for example (but not only) given under blackmailing or given under hidden conditions. | ||
+ | # All 'illegal agreements' are classified as 'attacks'. | ||
+ | # '''DEFINITION''' of 'illegal orders': These are all orders which were given under 'illegal conditions'. | ||
+ | # All 'illegal orders' are classified as 'attacks'. | ||
# '''IF''' the option ''{Use butterfly}'' was given, '''DO''': | # '''IF''' the option ''{Use butterfly}'' was given, '''DO''': | ||
## Use '''DATABASE''' 'Butterfly'. | ## Use '''DATABASE''' 'Butterfly'. | ||
Line 72: | Line 84: | ||
## Store or update all {{Method|butterfly-methods}}, which have been successful used in this macro, in the 'Butterfly' '''DATABASE'''. | ## Store or update all {{Method|butterfly-methods}}, which have been successful used in this macro, in the 'Butterfly' '''DATABASE'''. | ||
# '''IF-END''' | # '''IF-END''' | ||
− | # All attacks, which cause harm of any kind at the 3D body or which cause pain of any kind, have priority. | + | # All attacks, which cause harm of any kind at the 3D body or which cause pain of any kind or which cause mental harm or which cause mental pain, have priority. |
+ | # All, what is 'wrong fractal', is classified as attack. | ||
+ | # All, what is inside 'juridical person', but got no permission from ''<person(s)>'' to be there is classified as attack. | ||
<!-- | <!-- | ||
##################################################################### | ##################################################################### | ||
Line 79: | Line 93: | ||
--># {{Comment|Start of THREADS and LOOPS}} | --># {{Comment|Start of THREADS and LOOPS}} | ||
# {{Method|Scan}} and {{Method|scan-off-grid}} all 'juridical person' of ''<person(s)>'' and the belonging 'ambient'. | # {{Method|Scan}} and {{Method|scan-off-grid}} all 'juridical person' of ''<person(s)>'' and the belonging 'ambient'. | ||
− | # '''TRY''' to {{Method|identify}} all 'kinds of attacks' and all attacks on the 'juridical person' of ''<person(s)>'' and in the belonging 'ambient'. | + | # '''TRY''' to {{Method|identify}} all 'kinds of attacks' and all attacks on the 'juridical person' of ''<person(s)>'' and in the belonging 'ambient' by using {{Method|3D-status-call}}. |
# '''SUBMACRO-START''' 'Destroy Protection' 'protection context' ''{Use butterfly}'' | # '''SUBMACRO-START''' 'Destroy Protection' 'protection context' ''{Use butterfly}'' | ||
− | + | # '''THREAD-START''' <1> <2> <3> <6> <7> <8> | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
<!-- | <!-- | ||
######################################################################### | ######################################################################### | ||
################### <1> Defend against the attacks ###################### | ################### <1> Defend against the attacks ###################### | ||
######################################################################### | ######################################################################### | ||
− | --># '''THREAD''' <1> {{Comment|Defend against the attacks ( | + | --># '''THREAD''' <1> {{Comment|Defend against the attacks (92%)}} |
## '''LOOP''' <T:4seconds> until no more attacks {{Method|identified}}. | ## '''LOOP''' <T:4seconds> until no more attacks {{Method|identified}}. | ||
− | ### '''TRY''' to {{Method|identify}} all 'origins of the attacks' and all 'attackers' on the 'juridical person' of <person(s)> and in the belonging 'ambient'. | + | ### '''TRY''' to {{Method|identify}} all 'origins of the attacks' and all 'attackers' on the 'juridical person' of <person(s)> and in the belonging 'ambient' by using {{Method|3D-status-call}}. |
− | ### {{Method|Trace}} all 'origins of the attacks' and all 'attackers'. | + | ### {{Method|Trace-recursive}} all 'origins of the attacks' and all 'attackers' by using {{Method|3D-status-call}}. |
### {{Comment|Inside attacks}} | ### {{Comment|Inside attacks}} | ||
### '''IF''' 'origins of the attacks' found which are inside 'juridical person', and which are new since the last call of THREAD <1.1> by this THREAD, '''DO:''' | ### '''IF''' 'origins of the attacks' found which are inside 'juridical person', and which are new since the last call of THREAD <1.1> by this THREAD, '''DO:''' | ||
− | #### '''DEFINITION''' of 'all inside attacks': All found with {{Method|Trace}}, which belong to attacks that have their origin inside the 'juridical person', and which are new since the last call of THREAD <1.1> by this THREAD. | + | #### '''DEFINITION''' of 'all inside attacks': All found with {{Method|Trace-recursive}}, which belong to attacks that have their origin inside the 'juridical person', and which are new since the last call of THREAD <1.1> by this THREAD. |
#### '''THREAD-START''' <1.1> 'all inside attacks' | #### '''THREAD-START''' <1.1> 'all inside attacks' | ||
### '''IF-END''' | ### '''IF-END''' | ||
### {{Comment|External attacks}} | ### {{Comment|External attacks}} | ||
### '''IF''' 'origins of the attacks' found which are not inside 'juridical person', and which are new since the last call of THREAD <1.2> by this THREAD, '''DO:''' | ### '''IF''' 'origins of the attacks' found which are not inside 'juridical person', and which are new since the last call of THREAD <1.2> by this THREAD, '''DO:''' | ||
− | #### '''DEFINITION''' of 'all external attacks': All found with {{Method|Trace}}, which belong to attacks that have their origin not inside the 'juridical person', and which are new since the last call of THREAD <1.2> by this THREAD. | + | #### '''DEFINITION''' of 'all external attacks': All found with {{Method|Trace-recursive}}, which belong to attacks that have their origin not inside the 'juridical person', and which are new since the last call of THREAD <1.2> by this THREAD. |
#### '''THREAD-START''' <1.2> 'all external attacks' | #### '''THREAD-START''' <1.2> 'all external attacks' | ||
### '''IF-END''' | ### '''IF-END''' | ||
### {{Method|Scan}} and {{Method|scan-off-grid}} all 'juridical person' of ''<person(s)>'' and the belonging 'ambient'. | ### {{Method|Scan}} and {{Method|scan-off-grid}} all 'juridical person' of ''<person(s)>'' and the belonging 'ambient'. | ||
− | ### '''TRY''' to {{Method|identify}} all 'kinds of attacks' and all attacks on the 'juridical person' of ''<person(s)>'' and in the belonging 'ambient'. | + | ### '''TRY''' to {{Method|identify}} all 'kinds of attacks' and all attacks on the 'juridical person' of ''<person(s)>'' and in the belonging 'ambient' by using {{Method|3D-status-call}}. |
## '''LOOP-END''' | ## '''LOOP-END''' | ||
# '''THREAD-END''' | # '''THREAD-END''' | ||
Line 116: | Line 122: | ||
############# <1.1> Remove all attacks which have their origin inside ############### | ############# <1.1> Remove all attacks which have their origin inside ############### | ||
− | --># '''THREAD''' <1.1> {{Comment|Remove all attacks which have their origin inside}} | + | --># '''THREAD''' <1.1> {{Comment|Remove all attacks which have their origin inside (83%)}} |
− | ## {{Method|Create}} optimal | + | ## {{Method|Create}} optimal remove or shoot down procedures for 'all inside attacks'. |
− | ## '''TRY''' to {{Method|remove}} 'all inside attacks' with the | + | ## '''TRY''' to {{Method|remove}} or {{Method|shoot}} 'all inside attacks' with the remove and shoot procedures. |
− | ## '''IF''' not 'all inside attacks' have been removed, '''DO:''' | + | ## '''IF''' not 'all inside attacks' have been removed or shot down, '''DO:''' |
− | ### '''THREAD-START''' <5> { ('all inside attacks' & {{Method|remove}}) as 'solve topic' } | + | ### '''THREAD-START''' <5> { ('all inside attacks' & {{Method|remove & shoot}}) as 'solve topic' } |
## '''IF-END''' | ## '''IF-END''' | ||
# '''THREAD-END''' | # '''THREAD-END''' | ||
Line 127: | Line 133: | ||
############# <1.2> Defend all external attacks ############### | ############# <1.2> Defend all external attacks ############### | ||
− | --># '''THREAD''' <1.2> {{Comment|Defend all external attacks}} | + | --># '''THREAD''' <1.2> {{Comment|Defend all external attacks (98%)}} |
− | ## {{Method|Create}} optimal defend procedures for 'all external attacks'. | + | ## {{Method|Create}} optimal defend and shoot procedures for 'all external attacks'. |
## '''TRY''' to {{Method|defend}} 'all external attacks' with the defend procedures. | ## '''TRY''' to {{Method|defend}} 'all external attacks' with the defend procedures. | ||
## '''IF''' not 'all external attacks' have been defended, '''DO:''' | ## '''IF''' not 'all external attacks' have been defended, '''DO:''' | ||
Line 138: | Line 144: | ||
################### <2> Counter attacks ###################### | ################### <2> Counter attacks ###################### | ||
############################################################## | ############################################################## | ||
− | --># '''THREAD''' <2> {{Comment|Counter attacks ( | + | --># '''THREAD''' <2> {{Comment|Counter attacks (92%)}} |
## '''LOOP''' <T:3seconds> until no more attacks {{Method|identified}}. | ## '''LOOP''' <T:3seconds> until no more attacks {{Method|identified}}. | ||
− | ### '''TRY''' to {{Method|identify}} all 'origins of the attacks' and all 'attackers' in the 'juridical person' of <person(s)> and in the belonging 'ambient'. | + | ### '''TRY''' to {{Method|identify}} all 'origins of the attacks' and all 'attackers' in the 'juridical person' of <person(s)> and in the belonging 'ambient' by using {{Method|3D-status-call}}. |
− | ### {{Method|Trace}} all 'origins of the attacks' and all 'attackers'. | + | ### {{Method|Trace-recursive}} all 'origins of the attacks' and all 'attackers' by using {{Method|3D-status-call}}. |
− | ### '''IF''' 'origins of the attacks' or 'attackers' found in {{Method|Trace}} which are new since the last call of THREAD <2.1> by this THREAD, '''DO:''' | + | ### '''IF''' 'origins of the attacks' or 'attackers' found in {{Method|Trace-recursive}} which are new since the last call of THREAD <2.1> by this THREAD, '''DO:''' |
− | #### ''' | + | #### '''DEFINITION''' of 'counter attack targets': All found in {{Method|Trace-recursive}} which are new since the last call of THREAD <2.1> by this THREAD. |
#### '''THREAD-START''' <2.1> 'counter attack targets' | #### '''THREAD-START''' <2.1> 'counter attack targets' | ||
### '''IF-END''' | ### '''IF-END''' | ||
### {{Method|Scan}} and {{Method|scan-off-grid}} all 'juridical person' of ''<person(s)>'' and the belonging 'ambient'. | ### {{Method|Scan}} and {{Method|scan-off-grid}} all 'juridical person' of ''<person(s)>'' and the belonging 'ambient'. | ||
− | ### '''TRY''' to {{Method|identify}} all 'kinds of attacks' and all attacks on the 'juridical person' of ''<person(s)>'' and in the belonging 'ambient'. | + | ### '''TRY''' to {{Method|identify}} all 'kinds of attacks' and all attacks on the 'juridical person' of ''<person(s)>'' and in the belonging 'ambient' by using {{Method|3D-status-call}}. |
## '''LOOP-END''' | ## '''LOOP-END''' | ||
# '''THREAD-END''' | # '''THREAD-END''' | ||
Line 154: | Line 160: | ||
############# <2.1> Execute the counter attacks ############### | ############# <2.1> Execute the counter attacks ############### | ||
− | --># '''THREAD''' <2.1> {{Comment|Execute the counter attacks}} | + | --># '''THREAD''' <2.1> {{Comment|Execute the counter attacks (92%)}} |
− | ## {{Method|Create}} optimal {{Method|attack}} procedures for all 'counter attack targets'. | + | ## {{Method|Create}} optimal {{Method|attack}} and {{Method|shoot}} procedures for all 'counter attack targets'. |
− | ## '''TRY''' to {{Method|attack}} all 'counter attack targets' with the {{Method|attack}} procedures. | + | ## '''TRY''' to {{Method|attack}} or {{Method|shoot}} down all 'counter attack targets' with the {{Method|attack}} and {{Method|shoot}} procedures. |
− | ## '''IF''' not all 'counter attack targets' have been successfully attacked, and the option ''{Use solver}'' was given '''DO:''' | + | ## '''IF''' not all 'counter attack targets' have been successfully attacked or shot down, and the option ''{Use solver}'' was given '''DO:''' |
− | ### '''THREAD-START''' <5> { ('counter attack targets' & {{Method|attack}}) as 'solve topic' } | + | ### '''THREAD-START''' <5> { ('counter attack targets' & {{Method|attack & shoot}}) as 'solve topic' } |
## '''IF-END''' | ## '''IF-END''' | ||
# '''THREAD-END''' | # '''THREAD-END''' | ||
Line 165: | Line 171: | ||
################### <3> Healing the attack damages ###################### | ################### <3> Healing the attack damages ###################### | ||
######################################################################### | ######################################################################### | ||
− | --># '''THREAD''' <3> {{Comment|Healing the attack damages ( | + | --># '''THREAD''' <3> {{Comment|Healing the attack damages (93%)}} |
− | ## '''LOOP''' until no more attacks {{Method|identified}}. | + | ## '''LOOP''' <T:15seconds> until no more attacks {{Method|identified}}. |
− | ### '''TRY''' to {{Method|identify}} | + | ### {{Comment|Removing placed inside and attached shit}} |
− | ### '''IF''' {{Method| | + | ### '''TRY''' to {{Method|identify}} all placed inside 'juridical person' and it's related 'ambient' during attacks, or attached to 'juridical person' and it's related 'ambient' during attacks by using {{Method|3D-status-call}}. |
− | #### '''THREAD-START''' < | + | ### {{Method|Trace-recursive}} all placed inside 'juridical person' and it's related 'ambient' during attacks, or attached to 'juridical person' and it's related 'ambient' during attacks by using {{Method|3D-status-call}}. |
+ | ### '''IF''' {{Method|Trace-recursive}} found anything or anyone, which/who are new since the last call of THREAD <3.1> by this THREAD, '''DO''': | ||
+ | #### '''DEFINITION''' of 'inside shit': All found in {{Method|Trace-recursive}}, what is new since the last call of THREAD <3.1> by this THREAD | ||
+ | #### '''THREAD-START''' <3.1> 'inside shit' | ||
### '''IF-END''' | ### '''IF-END''' | ||
− | ### '''TRY''' to {{Method|identify}} | + | ### {{Comment|Healing the attack damages}} |
− | ### {{Method| | + | ### '''TRY''' to {{Method|identify}} all damages done to the 'juridical person' by the attacks, or done by any of our reactions to the attacks by using {{Method|3D-status-call}}. |
− | ### {{Method|Scan}} 'juridical person' | + | ### {{Method|Trace-recursive}} all damages done to the 'juridical person' by the attacks, or done by any of our reactions to the attacks by using {{Method|3D-status-call}}. |
+ | ### '''IF''' {{Method|Trace-recursive}} found damages, which/who are new since the last call of THREAD <3.2> by this THREAD, '''DO''': | ||
+ | #### '''DEFINITION''' of 'damages to heal': All found in {{Method|Trace-recursive}}, what is new since the last call of THREAD <3.2> by this THREAD | ||
+ | #### '''THREAD-START''' <3.2> 'damages to heal' | ||
+ | ### '''IF-END''' | ||
+ | ### {{Method|Scan}} and {{Method|scan-off-grid}} all 'juridical person' of ''<person(s)>'' and the belonging 'ambient'. | ||
+ | ### '''TRY''' to {{Method|identify}} all 'kinds of attacks' and all attacks on the 'juridical person' of ''<person(s)>'' and in the belonging 'ambient' by using {{Method|3D-status-call}}. | ||
## '''LOOP-END''' | ## '''LOOP-END''' | ||
# '''THREAD-END''' | # '''THREAD-END''' | ||
<!-- | <!-- | ||
− | ################### | + | |
− | # | + | ################### <3.1> Remove all inside and attached shit ###################### |
− | ######################################### | + | |
− | --># '''THREAD''' < | + | --># '''THREAD''' <3.1> {{Comment|Remove all inside and attached shit (91%)}} |
− | + | ## {{Method|Create}} optimal {{Method|remove}} procedures for all 'inside shit'. | |
− | ## {{Method|Create}} optimal | + | ## '''TRY''' to {{Method|remove}} all 'inside shit' by using the {{Method|remove}} procedures. |
− | ## '''TRY''' to | + | ## '''IF''' not all 'inside shit' has been removed, and the option ''{Use solver}'' was given, '''DO:''' |
− | ## '''IF''' not all | + | ### '''THREAD-START''' <5> { ('inside shit' & {{Method|remove}}) as 'solve topic' } |
− | ###''' | + | ## '''IF-END''' |
+ | # '''THREAD-END''' | ||
+ | <!-- | ||
+ | |||
+ | ################### <3.2> Heal all damages caused by the attacks ###################### | ||
+ | |||
+ | --># '''THREAD''' <3.2> {{Comment|Heal all damages caused by the attacks (82%)}} | ||
+ | ## {{Method|Create}} optimal healing procedures for all 'damages to heal'. | ||
+ | ## '''TRY''' to heal all 'damages to heal' by using the healing procedures. | ||
+ | ## '''IF''' not all 'damages to heal' have been healed, and the option ''{Use solver}'' was given, '''DO:''' | ||
+ | ### '''THREAD-START''' <5> { ('damages to heal' & heal) as 'solve topic' } | ||
## '''IF-END''' | ## '''IF-END''' | ||
# '''THREAD-END''' | # '''THREAD-END''' | ||
Line 192: | Line 217: | ||
############# <5> Solver ############### | ############# <5> Solver ############### | ||
######################################## | ######################################## | ||
− | --># '''THREAD''' <5> {{Comment|Solver}} | + | --># '''THREAD''' <5> {'solve topic'} {{Comment|Solver (99%)}} |
## '''LOOP''' until all 'solve topic' is solved. | ## '''LOOP''' until all 'solve topic' is solved. | ||
+ | ### {{Method|Trace-recursive}} all 'solve topic' by using {{Method|3D-status-call}}. | ||
+ | ### Add all new found in {{Method|Trace-recursive}} to 'solve topic'. | ||
### {{Method|Create}} an optimal solution for all 'solve topic'. | ### {{Method|Create}} an optimal solution for all 'solve topic'. | ||
### {{Method|Create}} optimal procedures for the created solution. | ### {{Method|Create}} optimal procedures for the created solution. | ||
Line 200: | Line 227: | ||
#### '''TRY''' to apply the solution by using the solution procedures and by using the {{Method|butterfly-method}}. | #### '''TRY''' to apply the solution by using the solution procedures and by using the {{Method|butterfly-method}}. | ||
### '''IF-END''' | ### '''IF-END''' | ||
− | ### '''TRY''' to {{Method|identify}} the success of the solution and the procedures. | + | ### '''TRY''' to {{Method|identify}} the success of the solution and the procedures by using {{Method|3D-status-call}}. |
### Store all successful parts of the solution and the procedures in the 'Defend' '''DATABASE'''. | ### Store all successful parts of the solution and the procedures in the 'Defend' '''DATABASE'''. | ||
## '''LOOP-END''' | ## '''LOOP-END''' | ||
Line 208: | Line 235: | ||
################### <6> Try to solve malfunctions ###################### | ################### <6> Try to solve malfunctions ###################### | ||
######################################################################## | ######################################################################## | ||
− | --># '''THREAD''' <6> {{Comment|Try to solve malfunctions ( | + | --># '''THREAD''' <6> {{Comment|Try to solve malfunctions (98%)}} |
## '''IF''' option ''{Use solver}'' was not given, '''DO:''' | ## '''IF''' option ''{Use solver}'' was not given, '''DO:''' | ||
### '''THREAD-STOP''' <6>. | ### '''THREAD-STOP''' <6>. | ||
Line 218: | Line 245: | ||
################### <7> Close all interfaces/doors ###################### | ################### <7> Close all interfaces/doors ###################### | ||
######################################################################### | ######################################################################### | ||
− | --># '''THREAD''' <7> {{Comment|Close all interfaces/doors ( | + | --># '''THREAD''' <7> {{Comment|Close all interfaces/doors (98%)}} |
## {{Method|Scan}} and {{Method|scan-off-grid}} all 'juridical person' of ''<person(s)>'' and the belonging 'ambient'. | ## {{Method|Scan}} and {{Method|scan-off-grid}} all 'juridical person' of ''<person(s)>'' and the belonging 'ambient'. | ||
− | ## '''TRY''' to {{Method|identify}} all 'interfaces' in 'juridical person' and it's related 'ambient'. | + | ## '''TRY''' to {{Method|identify}} all 'interfaces' in 'juridical person' and it's related 'ambient' by using {{Method|3D-status-call}}. |
## '''TRY''' to close all found 'interfaces' and allow only what has permission from ''<person(s)>''. | ## '''TRY''' to close all found 'interfaces' and allow only what has permission from ''<person(s)>''. | ||
## '''MONITOR''' all found 'interfaces'. | ## '''MONITOR''' all found 'interfaces'. | ||
### '''IF''' any use of an interface occur, which has no permission from ''<person(s)>'', '''DO:''' | ### '''IF''' any use of an interface occur, which has no permission from ''<person(s)>'', '''DO:''' | ||
− | #### '''TRY''' to {{Method|trace}} any 'use of interfaces', which has no permission from ''<person(s)>''. | + | #### '''TRY''' to {{Method|trace-recursive}} any 'use of interfaces', which has no permission from ''<person(s)>'' by using {{Method|3D-status-call}}. |
− | #### '''TRY''' to {{Method|identify}} all 'origins' and all 'use and users' of all 'use of interfaces' found by {{Method|trace}} in the 'juridical person' and it's related 'ambient'. | + | #### '''TRY''' to {{Method|identify}} all 'origins' and all 'use and users' of all 'use of interfaces' found by {{Method|trace-recursive}} in the 'juridical person' and it's related 'ambient' and by using {{Method|3D-status-call}}. |
− | #### '''TRY''' to {{Method|trace}} all found 'origins' and all 'use and users'. | + | #### '''TRY''' to {{Method|trace-recursive}} all found 'origins' and all 'use and users' by using {{Method|3D-status-call}}. |
− | #### Declare all found in {{Method|trace}} as 'attack'. | + | #### Declare all found in {{Method|trace-recursive}} as 'attack'. |
### '''IF-END''' | ### '''IF-END''' | ||
## '''MONITOR-END''' | ## '''MONITOR-END''' | ||
Line 238: | Line 265: | ||
################### <8> Care about manipulations ###################### | ################### <8> Care about manipulations ###################### | ||
####################################################################### | ####################################################################### | ||
− | --># '''THREAD''' <8> {{Comment|Care about manipulations ( | + | --># '''THREAD''' <8> {{Comment|Care about manipulations (96%)}} |
− | ## {{Method|Scan}} 'juridical person' and it's related 'ambient'. | + | ## '''LOOP''' <T:30 seconds> until all manipulations have been solved. |
− | ## '''TRY''' to {{Method|identify}} all 'what got modified' in 'juridical person' of ''<person(s)>''. | + | ### {{Method|Scan}} 'juridical person' and it's related 'ambient'. |
− | ## '''TRY''' to {{Method|trace}} all found 'what got modified'. | + | ### '''TRY''' to {{Method|identify}} all 'what got modified' in 'juridical person' of ''<person(s)>'' by using {{Method|3D-status-call}}. |
− | ## '''TRY''' to {{Method|identify}} all 'manipulations' in all found with {{Method|trace}}. | + | ### '''TRY''' to {{Method|trace-recursive}} all found 'what got modified' by using {{Method|3D-status-call}}. |
− | ## Store all found with {{Method|trace}} in the 'Defend' '''DATABASE'''. | + | ### '''TRY''' to {{Method|identify}} all 'manipulations' in all found with {{Method|trace-recursive}}. |
− | ## {{Method| | + | ### '''TRY''' to {{Method|identify}} all creators of all found 'manipulations' and classify all found creators as 'attacks' by using {{Method|3D-status-call}}. |
− | ## {{Method| | + | ### Store all found with {{Method|trace-recursive}} in the 'Defend' '''DATABASE'''. |
− | ## ''' | + | ### '''IF''' {{Method|Trace-recursive}} found any new, which is new since the last call of THREAD <8.1> by this THREAD, '''DO''': |
− | ## '''IF''' | + | #### '''DEFINITION''' of 'all manipulations': All found in {{Method|Trace-recursive}}, what is new since the last call of THREAD <8.1> by this THREAD. |
− | ### ''' | + | #### '''THREAD-START''' <8.1> 'all manipulations' |
− | ## ''' | + | ### '''IF-END''' |
− | ## ''' | + | ## '''LOOP-END''' |
− | ## | + | # '''THREAD-END''' |
+ | <!-- | ||
+ | |||
+ | ################### <8.1> Solve the manipulations ###################### | ||
+ | |||
+ | --># '''THREAD''' <8.1> {{Comment|Solve the manipulations (93%)}} | ||
+ | ## Analyze 'all manipulations' and group all of 'all manipulations' optimal in that kind, that each group can optimal run with an own created solution, and put them into an array of groups. | ||
+ | ## '''FOR''' each group of array of groups, '''DO:''' | ||
+ | ### '''THREAD-START''' <5> { (group & solve) as 'solve topic' } | ||
+ | ## '''FOR-END''' | ||
# '''THREAD-END''' | # '''THREAD-END''' | ||
Latest revision as of 22:33, 20 May 2017
Name | Defend |
---|---|
Author | Frank |
Brief descr. | Defends, blocks and reflects attacks and starts counterattacks. |
Status | public |
Terms | Usable on oneself and others |
Resources for the UserMacro | |||||
---|---|---|---|---|---|
1 | 49 | 10 | 83 | 100 | 104 |
1k | 163 | 100k | 532 | 1kk | 3300 |
10kk | 9200 | Gmax | 940kk | Omax | 4,2kk |
Resources with butterfly option | |||||
1 | 1030 | 10 | 3300 | 100 | |
1k | 100k | 1kk | |||
10kk | Gmax | 31kk | Omax | 18 |
Command syntax
Description
- This Macro tries to defend you or the person you use it on, blocking the attacks on you or the person the macro is used on and reflecting it back and starts counterattacks on the attackers.
<person(s)>
- Defines who this macro is used on. It might be used for a person (by name) or for a group of persons (for more than 1 names at the same time) or on oneself.
{Use butterfly}
- This option activates the use of the butterfly-method inside the macro algorithm. This gives much more power, but also needs a lot of resources from Skib. You should be aware of this!
{Use solver}
- This option activates a function which tries to solve all problems by recursive learning cycles. If there is no good reason not to use this option, it should be used all time.
{Priorities}
- You can add priorities, so that the macro will try to solve this as fast as possible.
Algorithm of User Macro
- Initializing the macro
- Use DATABASE 'Malfunction'.
- Use DATABASE 'AttackKinds'.
- Use DATABASE 'Defend'.
- Use self-optimizing for all parts of this macro and it's sub-macros.
- Always store or update all in this macro identified 'kinds of attacks' in the 'AttackKinds' DATABASE.
- All things used by this macro always have to be optimal protected.
- DEFINITION of 'juridical person': It's the <person(s)> with all parts and all other what juridical belongs to a <person(s)>.
- DEFINITION of 'passive attacks': It's all, what is in the 'juridical person' but don't belong to the 'juridical person'. Excluded from this is all, what got permission to be there from the <person(s)>.
- All 'Passive attacks' are classified as 'attacks'.
- DEFINITION of 'influences': It's all, what is enters the 'juridical person' through official interfaces of the 'juridical person'. Excluded from this is all, what got permission to be there from the <person(s)>.
- All 'influences' are classified as 'attacks'.
- DEFINITION of 'manipulations': All of 'juridical person' what got modified. Excluded from this is all, what got permission for the modification from the <person(s)>.
- All 'manipulations' are classified as 'attacks'.
- DEFINITION of 'Attachments': It's all, what is attached to the 'juridical person'. Excluded from this is all, what got permission for the attachment from the <person(s)>.
- All 'attachments' are classified as 'attacks'.
- Add all 'parallel-to-reality' and all 'support mechanic' and all 'VRs' to the common DEFINITION of 'ambient'.
- DEFINITION of 'protection context': It's the 'juridical person' and it's related 'ambient'.
- DEFINITION of 'illegals': It's all in or all 'attached' to 'juridical person' and 'juridical persons ambient, what is against the rules.
- All 'illegals' are classified as 'attacks'.
- DEFINITION of 'illegal terms': These are all hidden energetic terms of use which are dedicated to 3D objects, contracts or anything else or anyone else.
- All 'illegal terms' are classified as 'attacks'.
- DEFINITION of 'illegal agreements': These are all agreements which were given under 'illegal conditions'. These are for example (but not only) given under blackmailing or given under hidden conditions.
- All 'illegal agreements' are classified as 'attacks'.
- DEFINITION of 'illegal orders': These are all orders which were given under 'illegal conditions'.
- All 'illegal orders' are classified as 'attacks'.
- IF the option {Use butterfly} was given, DO:
- Use DATABASE 'Butterfly'.
- Always use in the macro the butterfly-method for all soft-blocked things.
- Store or update all butterfly-methods, which have been successful used in this macro, in the 'Butterfly' DATABASE.
- IF-END
- All attacks, which cause harm of any kind at the 3D body or which cause pain of any kind or which cause mental harm or which cause mental pain, have priority.
- All, what is 'wrong fractal', is classified as attack.
- All, what is inside 'juridical person', but got no permission from <person(s)> to be there is classified as attack.
- Start of THREADS and LOOPS
- Scan and scan-off-grid all 'juridical person' of <person(s)> and the belonging 'ambient'.
- TRY to identify all 'kinds of attacks' and all attacks on the 'juridical person' of <person(s)> and in the belonging 'ambient' by using 3D-status-call.
- SUBMACRO-START 'Destroy Protection' 'protection context' {Use butterfly}
- THREAD-START <1> <2> <3> <6> <7> <8>
- THREAD <1> Defend against the attacks (92%)
- LOOP <T:4seconds> until no more attacks identified.
- TRY to identify all 'origins of the attacks' and all 'attackers' on the 'juridical person' of <person(s)> and in the belonging 'ambient' by using 3D-status-call.
- Trace-recursive all 'origins of the attacks' and all 'attackers' by using 3D-status-call.
- Inside attacks
- IF 'origins of the attacks' found which are inside 'juridical person', and which are new since the last call of THREAD <1.1> by this THREAD, DO:
- DEFINITION of 'all inside attacks': All found with Trace-recursive, which belong to attacks that have their origin inside the 'juridical person', and which are new since the last call of THREAD <1.1> by this THREAD.
- THREAD-START <1.1> 'all inside attacks'
- IF-END
- External attacks
- IF 'origins of the attacks' found which are not inside 'juridical person', and which are new since the last call of THREAD <1.2> by this THREAD, DO:
- DEFINITION of 'all external attacks': All found with Trace-recursive, which belong to attacks that have their origin not inside the 'juridical person', and which are new since the last call of THREAD <1.2> by this THREAD.
- THREAD-START <1.2> 'all external attacks'
- IF-END
- Scan and scan-off-grid all 'juridical person' of <person(s)> and the belonging 'ambient'.
- TRY to identify all 'kinds of attacks' and all attacks on the 'juridical person' of <person(s)> and in the belonging 'ambient' by using 3D-status-call.
- LOOP-END
- LOOP <T:4seconds> until no more attacks identified.
- THREAD-END
- THREAD <1.1> Remove all attacks which have their origin inside (83%)
- Create optimal remove or shoot down procedures for 'all inside attacks'.
- TRY to remove or shoot 'all inside attacks' with the remove and shoot procedures.
- IF not 'all inside attacks' have been removed or shot down, DO:
- THREAD-START <5> { ('all inside attacks' & remove & shoot) as 'solve topic' }
- IF-END
- THREAD-END
- THREAD <1.2> Defend all external attacks (98%)
- Create optimal defend and shoot procedures for 'all external attacks'.
- TRY to defend 'all external attacks' with the defend procedures.
- IF not 'all external attacks' have been defended, DO:
- THREAD-START <5> { ('all external attacks' & defend) as 'solve topic' }
- IF-END
- THREAD-END
- THREAD <2> Counter attacks (92%)
- LOOP <T:3seconds> until no more attacks identified.
- TRY to identify all 'origins of the attacks' and all 'attackers' in the 'juridical person' of <person(s)> and in the belonging 'ambient' by using 3D-status-call.
- Trace-recursive all 'origins of the attacks' and all 'attackers' by using 3D-status-call.
- IF 'origins of the attacks' or 'attackers' found in Trace-recursive which are new since the last call of THREAD <2.1> by this THREAD, DO:
- DEFINITION of 'counter attack targets': All found in Trace-recursive which are new since the last call of THREAD <2.1> by this THREAD.
- THREAD-START <2.1> 'counter attack targets'
- IF-END
- Scan and scan-off-grid all 'juridical person' of <person(s)> and the belonging 'ambient'.
- TRY to identify all 'kinds of attacks' and all attacks on the 'juridical person' of <person(s)> and in the belonging 'ambient' by using 3D-status-call.
- LOOP-END
- LOOP <T:3seconds> until no more attacks identified.
- THREAD-END
- THREAD <2.1> Execute the counter attacks (92%)
- Create optimal attack and shoot procedures for all 'counter attack targets'.
- TRY to attack or shoot down all 'counter attack targets' with the attack and shoot procedures.
- IF not all 'counter attack targets' have been successfully attacked or shot down, and the option {Use solver} was given DO:
- THREAD-START <5> { ('counter attack targets' & attack & shoot) as 'solve topic' }
- IF-END
- THREAD-END
- THREAD <3> Healing the attack damages (93%)
- LOOP <T:15seconds> until no more attacks identified.
- Removing placed inside and attached shit
- TRY to identify all placed inside 'juridical person' and it's related 'ambient' during attacks, or attached to 'juridical person' and it's related 'ambient' during attacks by using 3D-status-call.
- Trace-recursive all placed inside 'juridical person' and it's related 'ambient' during attacks, or attached to 'juridical person' and it's related 'ambient' during attacks by using 3D-status-call.
- IF Trace-recursive found anything or anyone, which/who are new since the last call of THREAD <3.1> by this THREAD, DO:
- DEFINITION of 'inside shit': All found in Trace-recursive, what is new since the last call of THREAD <3.1> by this THREAD
- THREAD-START <3.1> 'inside shit'
- IF-END
- Healing the attack damages
- TRY to identify all damages done to the 'juridical person' by the attacks, or done by any of our reactions to the attacks by using 3D-status-call.
- Trace-recursive all damages done to the 'juridical person' by the attacks, or done by any of our reactions to the attacks by using 3D-status-call.
- IF Trace-recursive found damages, which/who are new since the last call of THREAD <3.2> by this THREAD, DO:
- DEFINITION of 'damages to heal': All found in Trace-recursive, what is new since the last call of THREAD <3.2> by this THREAD
- THREAD-START <3.2> 'damages to heal'
- IF-END
- Scan and scan-off-grid all 'juridical person' of <person(s)> and the belonging 'ambient'.
- TRY to identify all 'kinds of attacks' and all attacks on the 'juridical person' of <person(s)> and in the belonging 'ambient' by using 3D-status-call.
- LOOP-END
- LOOP <T:15seconds> until no more attacks identified.
- THREAD-END
- THREAD <3.1> Remove all inside and attached shit (91%)
- Create optimal remove procedures for all 'inside shit'.
- TRY to remove all 'inside shit' by using the remove procedures.
- IF not all 'inside shit' has been removed, and the option {Use solver} was given, DO:
- THREAD-START <5> { ('inside shit' & remove) as 'solve topic' }
- IF-END
- THREAD-END
- THREAD <3.2> Heal all damages caused by the attacks (82%)
- Create optimal healing procedures for all 'damages to heal'.
- TRY to heal all 'damages to heal' by using the healing procedures.
- IF not all 'damages to heal' have been healed, and the option {Use solver} was given, DO:
- THREAD-START <5> { ('damages to heal' & heal) as 'solve topic' }
- IF-END
- THREAD-END
- THREAD <5> {'solve topic'} Solver (99%)
- LOOP until all 'solve topic' is solved.
- Trace-recursive all 'solve topic' by using 3D-status-call.
- Add all new found in Trace-recursive to 'solve topic'.
- Create an optimal solution for all 'solve topic'.
- Create optimal procedures for the created solution.
- TRY to apply the solution by using the solution procedures.
- IF not all 'solve topic' was solved, and the option {Use butterfly} was given, DO:
- TRY to apply the solution by using the solution procedures and by using the butterfly-method.
- IF-END
- TRY to identify the success of the solution and the procedures by using 3D-status-call.
- Store all successful parts of the solution and the procedures in the 'Defend' DATABASE.
- LOOP-END
- LOOP until all 'solve topic' is solved.
- THREAD-END
- THREAD <6> Try to solve malfunctions (98%)
- IF option {Use solver} was not given, DO:
- THREAD-STOP <6>.
- IF-END
- SUBMACRO-START 'SolveMalfunctions' {Use butterfly}
- IF option {Use solver} was not given, DO:
- THREAD-END
- THREAD <7> Close all interfaces/doors (98%)
- Scan and scan-off-grid all 'juridical person' of <person(s)> and the belonging 'ambient'.
- TRY to identify all 'interfaces' in 'juridical person' and it's related 'ambient' by using 3D-status-call.
- TRY to close all found 'interfaces' and allow only what has permission from <person(s)>.
- MONITOR all found 'interfaces'.
- IF any use of an interface occur, which has no permission from <person(s)>, DO:
- TRY to trace-recursive any 'use of interfaces', which has no permission from <person(s)> by using 3D-status-call.
- TRY to identify all 'origins' and all 'use and users' of all 'use of interfaces' found by trace-recursive in the 'juridical person' and it's related 'ambient' and by using 3D-status-call.
- TRY to trace-recursive all found 'origins' and all 'use and users' by using 3D-status-call.
- Declare all found in trace-recursive as 'attack'.
- IF-END
- IF any use of an interface occur, which has no permission from <person(s)>, DO:
- MONITOR-END
- LOOP <T:5seconds>
- TRY to close all found 'interfaces' and allow only what has permission from <person(s)>.
- LOOP-END
- THREAD-END
- THREAD <8> Care about manipulations (96%)
- LOOP <T:30 seconds> until all manipulations have been solved.
- Scan 'juridical person' and it's related 'ambient'.
- TRY to identify all 'what got modified' in 'juridical person' of <person(s)> by using 3D-status-call.
- TRY to trace-recursive all found 'what got modified' by using 3D-status-call.
- TRY to identify all 'manipulations' in all found with trace-recursive.
- TRY to identify all creators of all found 'manipulations' and classify all found creators as 'attacks' by using 3D-status-call.
- Store all found with trace-recursive in the 'Defend' DATABASE.
- IF Trace-recursive found any new, which is new since the last call of THREAD <8.1> by this THREAD, DO:
- DEFINITION of 'all manipulations': All found in Trace-recursive, what is new since the last call of THREAD <8.1> by this THREAD.
- THREAD-START <8.1> 'all manipulations'
- IF-END
- LOOP-END
- LOOP <T:30 seconds> until all manipulations have been solved.
- THREAD-END
- THREAD <8.1> Solve the manipulations (93%)
- Analyze 'all manipulations' and group all of 'all manipulations' optimal in that kind, that each group can optimal run with an own created solution, and put them into an array of groups.
- FOR each group of array of groups, DO:
- THREAD-START <5> { (group & solve) as 'solve topic' }
- FOR-END
- THREAD-END
Topics 13(13)