Difference between revisions of "SkibUserMacros:Defend"
From Protoi Healing
Line 36: | Line 36: | ||
## '''IF''' not all found attackers and origins got destroyed, and option ''{Use butterfly}'' was given, '''DO''': | ## '''IF''' not all found attackers and origins got destroyed, and option ''{Use butterfly}'' was given, '''DO''': | ||
### '''TRY''' to {{Method|attack}} all found attackers and origins with the {{Method|butterfly-method}}. | ### '''TRY''' to {{Method|attack}} all found attackers and origins with the {{Method|butterfly-method}}. | ||
+ | ### {{Method|Scan}} ''<person(s)>'' and '''TRY''' to {{Method|identify}} everything placed inside ''<person(s)>'' during attacks, or attached to ''<person(s)>'' during attacks. | ||
## '''IF-END''' | ## '''IF-END''' | ||
## {{Method|Scan}} ''<person(s)>'' and '''TRY''' to {{Method|identify}} all kinds of attacks on the ''<person(s)>''. | ## {{Method|Scan}} ''<person(s)>'' and '''TRY''' to {{Method|identify}} all kinds of attacks on the ''<person(s)>''. |
Revision as of 00:51, 6 February 2017
Name | DefendAndCounterattack |
---|---|
Author | Drack |
Brief descr. | Defends,blocks and reflects attacks and starts counterattacks. |
Status | public |
Terms | Usable on oneself and others |
Resources for the UserMacro | |||||
---|---|---|---|---|---|
1 | 00 | 10 | 00 | 100 | 00 |
1k | 00 | 100k | 00 | 1kk | 00 |
10kk | 00 | Gmax | 00 | Omax | 00 |
Resources with butterfly option | |||||
1 | 00 | 10 | 00 | 100 | 00 |
1k | 00 | 100k | 00 | 1kk | 00 |
10kk | 00 | Gmax | 00 | Omax | 00 |
Command syntax
Description
- This Macro tries to defend you or the person you use it on , blocking the attacks on you or the person the macro is used on and reflecting it back and starts counterattacks on the attackers.
<person(s)>
- Defines who this macro is used on. It might be used for a person (by name) or for a group of persons (for more than 1 names at the same time) or on oneself.
Algorithm of User Macro
- Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
- LOOP until no more attacks identified.
- TRY to identify all origins of the attacks.
- TRY to defend against all found attacks on <person(s)>.
- TRY to reflect all found attacks on <person(s)>.
- TRY to block all found attacks on <person(s)>.
- IF not all found attack were defended, reflected or blocked and option {use butterfly} was given, DO :
- Try to defend against all attacks with the butterfly-method.
- IF-END
- Scan the attackers and TRY to identify masks.
- IF identify found masks on the attackers DO:
- TRY to remove masks from attackers.
- IF-END
- TRY to attack all found attackers and origins.
- IF not all found attackers and origins got destroyed, and option {Use butterfly} was given, DO:
- TRY to attack all found attackers and origins with the butterfly-method.
- Scan <person(s)> and TRY to identify everything placed inside <person(s)> during attacks, or attached to <person(s)> during attacks.
- IF-END
- Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
- LOOP-END