Difference between revisions of "SkibUserMacros:Defend"

From Protoi Healing

Jump to: navigation, search
Line 21: Line 21:
  
 
# {{Method|Scan}} ''<person(s)>'' and '''TRY''' to {{Method|identify}} all kinds of attacks on the ''<person(s)>''.
 
# {{Method|Scan}} ''<person(s)>'' and '''TRY''' to {{Method|identify}} all kinds of attacks on the ''<person(s)>''.
# LOOP until no more attacks {{Method|identified}}.
+
# '''LOOP''' until no more attacks {{Method|identified}}.
 
## '''TRY''' to {{Method|identify}} all origins of the attacks.
 
## '''TRY''' to {{Method|identify}} all origins of the attacks.
 
## '''TRY''' to {{Method|defend}} against all attacks on ''<person(s)>''.
 
## '''TRY''' to {{Method|defend}} against all attacks on ''<person(s)>''.
 
## '''TRY''' to {{Method|reflect}} all found attacks on ''<person(s)>''.
 
## '''TRY''' to {{Method|reflect}} all found attacks on ''<person(s)>''.
## '''TRY''' to {{Method|block}} all found attacks on <person(s)>.
+
## '''TRY''' to {{Method|block}} all found attacks on ''<person(s)>''.
 
## '''IF''' not all found attack were {{Method|defended}}, {{Method|reflected}} or {{Method|blocked}} and option ''{use butterfly}'' was given, '''DO''' :  
 
## '''IF''' not all found attack were {{Method|defended}}, {{Method|reflected}} or {{Method|blocked}} and option ''{use butterfly}'' was given, '''DO''' :  
### '''Try''' to DEFEND against all attacks with butterfly-method.
+
### '''Try''' to '''DEFEND''' against all attacks with the {{Method|butterfly-method}}.
 
## '''IF-END'''
 
## '''IF-END'''
 
## {{Method|Scan}} the attackers and '''TRY''' to {{Method|identify}} masks.
 
## {{Method|Scan}} the attackers and '''TRY''' to {{Method|identify}} masks.
Line 35: Line 35:
 
## '''TRY''' to {{Method|attack}} all found attackers and origins.
 
## '''TRY''' to {{Method|attack}} all found attackers and origins.
 
## '''IF''' not all found attackers and origins got destroyed, and option ''{Use butterfly}'' was given, '''DO''':
 
## '''IF''' not all found attackers and origins got destroyed, and option ''{Use butterfly}'' was given, '''DO''':
### '''TRY''' to {{Method|attack}} all found attackers and origins with butterfly-method.
+
### '''TRY''' to {{Method|attack}} all found attackers and origins with the {{Method|butterfly-method}}.
 
## '''IF-END'''
 
## '''IF-END'''
 
## {{Method|Scan}} ''<person(s)>'' and '''TRY''' to {{Method|identify}} all kinds of attacks on the ''<person(s)>''.
 
## {{Method|Scan}} ''<person(s)>'' and '''TRY''' to {{Method|identify}} all kinds of attacks on the ''<person(s)>''.
# LOOP-END
+
# '''LOOP-END'''
  
 
{{EndBox}}
 
{{EndBox}}

Revision as of 00:35, 6 February 2017

Skib User Macro
Name DefendAndCounterattack
Author Drack
Brief descr. Defends,blocks and reflects attacks and starts counterattacks.
Status public
Terms Usable on oneself and others
Resources for the UserMacro
1 00 10 00 100 00
1k 00 100k 00 1kk 00
10kk 00 Gmax 00 Omax 00
Resources with butterfly option
1 00 10 00 100 00
1k 00 100k 00 1kk 00
10kk 00 Gmax 00 Omax 00

Command syntax

DefendAndCounterattack {Use butterfly} <person(s)>






Description

This Macro tries to defend you or the person you use it on , blocking the attacks on you or the person the macro is used on and reflecting it back and starts counterattacks on the attackers.

<person(s)>

Defines who this macro is used on. It might be used for a person (by name) or for a group of persons (for more than 1 names at the same time) or on oneself.


Algorithm of User Macro

  1. Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
  2. LOOP until no more attacks identified.
    1. TRY to identify all origins of the attacks.
    2. TRY to defend against all attacks on <person(s)>.
    3. TRY to reflect all found attacks on <person(s)>.
    4. TRY to block all found attacks on <person(s)>.
    5. IF not all found attack were defended, reflected or blocked and option {use butterfly} was given, DO :
      1. Try to DEFEND against all attacks with the butterfly-method.
    6. IF-END
    7. Scan the attackers and TRY to identify masks.
    8. IF identify found masks on the attackers DO:
      1. TRY to Remove masks from attackers.
    9. IF-END
    10. TRY to attack all found attackers and origins.
    11. IF not all found attackers and origins got destroyed, and option {Use butterfly} was given, DO:
      1. TRY to attack all found attackers and origins with the butterfly-method.
    12. IF-END
    13. Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
  3. LOOP-END