Difference between revisions of "SkibUserMacros:Defend"
From Protoi Healing
(corrected some errors) |
|||
Line 22: | Line 22: | ||
# {{Method|Scan}} ''<person(s)>'' and '''TRY''' to {{Method|identify}} all kinds of attacks on the ''<person(s)>''. | # {{Method|Scan}} ''<person(s)>'' and '''TRY''' to {{Method|identify}} all kinds of attacks on the ''<person(s)>''. | ||
# '''LOOP''' until no more attacks {{Method|identified}}. | # '''LOOP''' until no more attacks {{Method|identified}}. | ||
− | |||
## '''TRY''' to {{Method|identify}} all origins of the attacks. | ## '''TRY''' to {{Method|identify}} all origins of the attacks. | ||
+ | ## {{Method|Scan}} all origins of attacks. | ||
## '''TRY''' to {{Method|defend}} against all found attacks on ''<person(s)>''. | ## '''TRY''' to {{Method|defend}} against all found attacks on ''<person(s)>''. | ||
## '''TRY''' to {{Method|reflect}} all found attacks on ''<person(s)>''. | ## '''TRY''' to {{Method|reflect}} all found attacks on ''<person(s)>''. | ||
Line 43: | Line 43: | ||
## '''IF-END''' | ## '''IF-END''' | ||
## '''TRY''' to {{Method|identify}} any and all damages done by: the attacks, shit placed inside ''<person(s)>'', or shit attached to ''<person(s)>''. | ## '''TRY''' to {{Method|identify}} any and all damages done by: the attacks, shit placed inside ''<person(s)>'', or shit attached to ''<person(s)>''. | ||
− | ## {{Method|Create}} healing programs | + | ## {{Method|Create}} healing programs for all damages that were {{Method|identified}} and '''TRY''' the healing programs. |
## {{Method|Scan}} ''<person(s)>'' and '''TRY''' to {{Method|identify}} all kinds of attacks on the ''<person(s)>''. | ## {{Method|Scan}} ''<person(s)>'' and '''TRY''' to {{Method|identify}} all kinds of attacks on the ''<person(s)>''. | ||
# '''LOOP-END''' | # '''LOOP-END''' | ||
{{EndBox}} | {{EndBox}} |
Revision as of 01:35, 6 February 2017
Name | DefendAndCounterattack |
---|---|
Author | Drack |
Brief descr. | Defends,blocks and reflects attacks and starts counterattacks. |
Status | public |
Terms | Usable on oneself and others |
Resources for the UserMacro | |||||
---|---|---|---|---|---|
1 | 00 | 10 | 00 | 100 | 00 |
1k | 00 | 100k | 00 | 1kk | 00 |
10kk | 00 | Gmax | 00 | Omax | 00 |
Resources with butterfly option | |||||
1 | 00 | 10 | 00 | 100 | 00 |
1k | 00 | 100k | 00 | 1kk | 00 |
10kk | 00 | Gmax | 00 | Omax | 00 |
Command syntax
Description
- This Macro tries to defend you or the person you use it on , blocking the attacks on you or the person the macro is used on and reflecting it back and starts counterattacks on the attackers.
<person(s)>
- Defines who this macro is used on. It might be used for a person (by name) or for a group of persons (for more than 1 names at the same time) or on oneself.
Algorithm of User Macro
- Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
- LOOP until no more attacks identified.
- TRY to identify all origins of the attacks.
- Scan all origins of attacks.
- TRY to defend against all found attacks on <person(s)>.
- TRY to reflect all found attacks on <person(s)>.
- TRY to block all found attacks on <person(s)>.
- IF not all found attack were defended, reflected or blocked and option {use butterfly} was given, DO :
- Try to defend against all attacks with the butterfly-method.
- IF-END
- Scan the attackers and TRY to identify masks.
- IF identify found masks on the attackers DO:
- TRY to remove masks from attackers.
- IF-END
- TRY to attack all found attackers and origins.
- IF not all found attackers and origins got destroyed, and option {Use butterfly} was given, DO:
- TRY to attack all found attackers and origins with the butterfly-method.
- IF-END
- TRY to identify everything placed inside <person(s)> during attacks, or attached to <person(s)> during attacks.
- IF identify found something, DO:
- TRY to remove everything what was found.
- IF-END
- TRY to identify any and all damages done by: the attacks, shit placed inside <person(s)>, or shit attached to <person(s)>.
- Create healing programs for all damages that were identified and TRY the healing programs.
- Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
- LOOP-END