Difference between revisions of "SkibUserMacros:Defend"
From Protoi Healing
Line 58: | Line 58: | ||
### '''TRY''' to {{Method|identify}} all origins of the attacks. | ### '''TRY''' to {{Method|identify}} all origins of the attacks. | ||
### {{Method|Scan}} all origins of attacks. | ### {{Method|Scan}} all origins of attacks. | ||
+ | ### '''IF''' origins found which are inside ''<person(s)>'', '''DO:''' | ||
+ | #### '''THREAD-START''' <5> | ||
+ | ### '''IF-END''' | ||
### '''TRY''' to {{Method|defend}} against all found attacks on ''<person(s)>''. | ### '''TRY''' to {{Method|defend}} against all found attacks on ''<person(s)>''. | ||
### '''TRY''' to {{Method|reflect}} all found attacks on ''<person(s)>''. | ### '''TRY''' to {{Method|reflect}} all found attacks on ''<person(s)>''. | ||
Line 93: | Line 96: | ||
# '''THREAD''' <4> {{Comment|Remove placed inside and attached shit}} | # '''THREAD''' <4> {{Comment|Remove placed inside and attached shit}} | ||
## '''TRY''' to {{Method|remove}} everything placed inside ''<person(s)>'' during attacks, or attached to ''<person(s)>'' during attacks. | ## '''TRY''' to {{Method|remove}} everything placed inside ''<person(s)>'' during attacks, or attached to ''<person(s)>'' during attacks. | ||
+ | # '''THREAD-END''' | ||
+ | # '''THREAD''' <5> {{Comment|Remove all attacks which have their origin inside}} | ||
+ | ## {{Method|Scan}} ''<person(s)>''. | ||
+ | ## '''TRY''' to {{Method|identify}} all attacks with origin inside ''<person(s)>'' and '''TRY''' to {{Method|trace}} everything connected to the found inside attacks. | ||
+ | ## {{Method|Create}} optimal remove procedures for all found inside attacks. | ||
+ | ## '''TRY''' to {{Method|remove}} all inside attacks and everything connected to it with the remove procedures. | ||
+ | ## '''IF''' not all inside attacks and everything connected to it has been removed, '''DO:''' | ||
+ | ### '''TRY''' to {{Method|remove}} all inside attacks and everything connected to it with the remove procedures by using {{Method|butterfly-methods}}. | ||
+ | ## '''IF-END''' | ||
# '''THREAD-END''' | # '''THREAD-END''' | ||
{{EndBox}} | {{EndBox}} |
Revision as of 21:40, 6 February 2017
Name | Defend |
---|---|
Author | Drack, Grayfox, Frank |
Brief descr. | Defends, blocks and reflects attacks and starts counterattacks. |
Status | public |
Terms | Usable on oneself and others |
Resources for the UserMacro | |||||
---|---|---|---|---|---|
1 | 23 | 10 | 63 | 100 | 86 |
1k | 122 | 100k | 422 | 1kk | 2300 |
10kk | 7300 | Gmax | 1,2kkk | Omax | 6,1kk |
Resources with butterfly option | |||||
1 | 853 | 10 | 2200 | 100 | 7000 |
1k | 13k | 100k | 18k | 1kk | 43k |
10kk | 50k | Gmax | 43kk | Omax | 36 |
Command syntax
Description
- This Macro tries to defend you or the person you use it on, blocking the attacks on you or the person the macro is used on and reflecting it back and starts counterattacks on the attackers.
<person(s)>
- Defines who this macro is used on. It might be used for a person (by name) or for a group of persons (for more than 1 names at the same time) or on oneself.
{Use butterfly}
- This option activates the use of the butterfly-method inside the macro algorithm. This gives much more power, but also needs a lot of resources from Skib. You should be aware of this!
Algorithm of User Macro
- Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
- IF the option {Use butterfly} was given, DO:
- Use DATABASE 'Butterfly'.
- Use in the macro the butterfly-method for all soft blocked things.
- Store or update all butterfly-methods, which will be used in this macro, in the 'Butterfly' DATABASE.
- IF-END
- LOOP <T:3seconds> until no more attacks identified.
- THREAD-START <1> <2> <3>
- Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
- LOOP-END
- THREAD <1> Defend against the attacks
- LOOP until no more attacks identified.
- TRY to identify all origins of the attacks.
- Scan all origins of attacks.
- IF origins found which are inside <person(s)>, DO:
- THREAD-START <5>
- IF-END
- TRY to defend against all found attacks on <person(s)>.
- TRY to reflect all found attacks on <person(s)>.
- TRY to block all found attacks on <person(s)>.
- IF not all found attacks were defended, reflected or blocked and the option {Use butterfly} was given, DO:
- TRY to defend against all attacks with the butterfly-method.
- IF-END
- Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
- LOOP-END
- LOOP until no more attacks identified.
- THREAD-END
- THREAD <2> Do counter attacks
- LOOP until no more attacks identified.
- TRY to attack all found attackers and origins.
- IF not all found attackers and origins got destroyed, and the option {Use butterfly} was given, DO:
- TRY to attack all found attackers and origins with the butterfly-method.
- IF-END
- Scan the attackers and TRY to identify masks.
- IF identify found masks on the attackers DO:
- TRY to remove masks from attackers.
- IF-END
- Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
- LOOP-END
- LOOP until no more attacks identified.
- THREAD-END
- THREAD <3> Healing the attack damages
- LOOP until no more attacks identified.
- TRY to identify everything placed inside <person(s)> during attacks, or attached to <person(s)> during attacks.
- IF identify found something, DO:
- THREAD-START <4>
- IF-END
- TRY to identify any and all damages done by: the attacks, shit placed inside <person(s)>, or shit attached to <person(s)>.
- Create healing programs for all damages that were identified and TRY the healing programs.
- Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
- LOOP-END
- LOOP until no more attacks identified.
- THREAD-END
- THREAD <4> Remove placed inside and attached shit
- TRY to remove everything placed inside <person(s)> during attacks, or attached to <person(s)> during attacks.
- THREAD-END
- THREAD <5> Remove all attacks which have their origin inside
- Scan <person(s)>.
- TRY to identify all attacks with origin inside <person(s)> and TRY to trace everything connected to the found inside attacks.
- Create optimal remove procedures for all found inside attacks.
- TRY to remove all inside attacks and everything connected to it with the remove procedures.
- IF not all inside attacks and everything connected to it has been removed, DO:
- TRY to remove all inside attacks and everything connected to it with the remove procedures by using butterfly-methods.
- IF-END
- THREAD-END