Difference between revisions of "SkibUserMacros:Defend"

From Protoi Healing

Jump to: navigation, search
Line 31: Line 31:
 
## '''TRY''' to {{Method|block}} all found attacks on <person(s)>.
 
## '''TRY''' to {{Method|block}} all found attacks on <person(s)>.
 
## '''TRY''' to {{Method|reflect}} all found attacks on <person(s)>.
 
## '''TRY''' to {{Method|reflect}} all found attacks on <person(s)>.
 
 
## {{Method|Scan}} the attackers for masks.
 
## {{Method|Scan}} the attackers for masks.
 
## '''IF''' {{Method|Scan}} found masks on the attackers '''DO''':
 
## '''IF''' {{Method|Scan}} found masks on the attackers '''DO''':

Revision as of 23:37, 5 February 2017

Skib User Macro
Name DefendAndCounterattack/DAC for short
Author Drack
Brief descr. Defends,blocks and reflects attacks and starts counterattacks.
Status public
Terms Usable on oneself and others
Resources for the UserMacro
1 00 10 00 100 00
1k 00 100k 00 1kk 00
10kk 00 Gmax 00 Omax 00
Resources with butterfly option
1 00 10 00 100 00
1k 00 100k 00 1kk 00
10kk 00 Gmax 00 Omax 00

Command syntax

DefendAndCounterattack {Use butterfly} <person(s)>






Description

This Macro tries to defend you or the person you use it on , blocking the attacks on you or the person the macro is used on and reflecting it back and starts counterattacks on the attackers.

<person(s)>

defines who this macro is used on.

it might be used for a person (by name) or for a group of persons (for more than 1 names at the same time)

or on oneself.


Algorithm of User Macro

  1. Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
  2. LOOP until no more attacks identified.
    1. TRY to identify all origins of the attacks.
    2. TRY to defend all found attacks on <person(s)>.
    3. TRY to block all found attacks on <person(s)>.
    4. TRY to reflect all found attacks on <person(s)>.
    5. Scan the attackers for masks.
    6. IF Scan found masks on the attackers DO:
      1. TRY to Remove masks from attackers.
    7. IF-END
    8. TRY to start counterattacks for all attackers.
    9. TRY to Block attackers weapons from attacking.
    10. Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
  3. LOOP-END