Difference between revisions of "SkibUserMacros:Defend"
From Protoi Healing
Line 39: | Line 39: | ||
## {{Method|Scan}} ''<person(s)>'' and '''TRY''' to {{Method|identify}} everything placed inside ''<person(s)>'' during attacks, or attached to ''<person(s)>'' during attacks. | ## {{Method|Scan}} ''<person(s)>'' and '''TRY''' to {{Method|identify}} everything placed inside ''<person(s)>'' during attacks, or attached to ''<person(s)>'' during attacks. | ||
## '''IF''' {{Method|identify}} found something, '''DO''': | ## '''IF''' {{Method|identify}} found something, '''DO''': | ||
− | ### TRY to {{Method|remove}} everything what was found. | + | ### '''TRY''' to {{Method|remove}} everything what was found. |
## '''IF-END''' | ## '''IF-END''' | ||
## {{Method|Scan}} ''<person(s)>'' and '''TRY''' to {{Method|identify}} all kinds of attacks on the ''<person(s)>''. | ## {{Method|Scan}} ''<person(s)>'' and '''TRY''' to {{Method|identify}} all kinds of attacks on the ''<person(s)>''. |
Revision as of 23:55, 5 February 2017
Name | DefendAndCounterattack |
---|---|
Author | Drack |
Brief descr. | Defends,blocks and reflects attacks and starts counterattacks. |
Status | public |
Terms | Usable on oneself and others |
Resources for the UserMacro | |||||
---|---|---|---|---|---|
1 | 00 | 10 | 00 | 100 | 00 |
1k | 00 | 100k | 00 | 1kk | 00 |
10kk | 00 | Gmax | 00 | Omax | 00 |
Resources with butterfly option | |||||
1 | 00 | 10 | 00 | 100 | 00 |
1k | 00 | 100k | 00 | 1kk | 00 |
10kk | 00 | Gmax | 00 | Omax | 00 |
Command syntax
Description
- This Macro tries to defend you or the person you use it on , blocking the attacks on you or the person the macro is used on and reflecting it back and starts counterattacks on the attackers.
<person(s)>
- Defines who this macro is used on. It might be used for a person (by name) or for a group of persons (for more than 1 names at the same time) or on oneself.
Algorithm of User Macro
- Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
- LOOP until no more attacks identified.
- TRY to identify all origins of the attacks.
- TRY to defend against all found attacks on <person(s)>.
- TRY to reflect all found attacks on <person(s)>.
- TRY to block all found attacks on <person(s)>.
- IF not all found attack were defended, reflected or blocked and option {use butterfly} was given, DO :
- Try to defend against all attacks with the butterfly-method.
- IF-END
- Scan the attackers and TRY to identify masks.
- IF identify found masks on the attackers DO:
- TRY to remove masks from attackers.
- IF-END
- TRY to attack all found attackers and origins.
- IF not all found attackers and origins got destroyed, and option {Use butterfly} was given, DO:
- TRY to attack all found attackers and origins with the butterfly-method.
- IF-END
- Scan <person(s)> and TRY to identify everything placed inside <person(s)> during attacks, or attached to <person(s)> during attacks.
- IF identify found something, DO:
- TRY to remove everything what was found.
- IF-END
- Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
- LOOP-END