Defend
From Protoi Healing
Name | DefendAndCounterattack |
---|---|
Author | Drack |
Brief descr. | Defends,blocks and reflects attacks and starts counterattacks. |
Status | public |
Terms | Usable on oneself and others |
Resources for the UserMacro | |||||
---|---|---|---|---|---|
1 | 00 | 10 | 00 | 100 | 00 |
1k | 00 | 100k | 00 | 1kk | 00 |
10kk | 00 | Gmax | 00 | Omax | 00 |
Resources with butterfly option | |||||
1 | 00 | 10 | 00 | 100 | 00 |
1k | 00 | 100k | 00 | 1kk | 00 |
10kk | 00 | Gmax | 00 | Omax | 00 |
Command syntax
Description
- This Macro tries to defend you or the person you use it on , blocking the attacks on you or the person the macro is used on and reflecting it back and starts counterattacks on the attackers.
<person(s)>
- Defines who this macro is used on. It might be used for a person (by name) or for a group of persons (for more than 1 names at the same time) or on oneself.
Algorithm of User Macro
- Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
- LOOP until no more attacks identified.
- TRY to identify all origins of the attacks.
- Scan all origins of attacks.
- TRY to defend against all found attacks on <person(s)>.
- TRY to reflect all found attacks on <person(s)>.
- TRY to block all found attacks on <person(s)>.
- IF not all found attack were defended, reflected or blocked and option {use butterfly} was given, DO :
- Try to defend against all attacks with the butterfly-method.
- IF-END
- Scan the attackers and TRY to identify masks.
- IF identify found masks on the attackers DO:
- TRY to remove masks from attackers.
- IF-END
- TRY to attack all found attackers and origins.
- IF not all found attackers and origins got destroyed, and option {Use butterfly} was given, DO:
- TRY to attack all found attackers and origins with the butterfly-method.
- IF-END
- TRY to identify everything placed inside <person(s)> during attacks, or attached to <person(s)> during attacks.
- IF identify found something, DO:
- TRY to remove everything what was found.
- IF-END
- TRY to identify any and all damages done by: the attacks, shit placed inside <person(s)>, or shit attached to <person(s)>.
- Create healing programs for all damages that were identified and TRY the healing programs.
- Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
- LOOP-END