Difference between revisions of "SkibUserMacros:Defend"

From Protoi Healing

Jump to: navigation, search
Line 22: Line 22:
 
# {{Method|Scan}} ''<person(s)>'' and '''TRY''' to {{Method|identify}} all kinds of attacks on the ''<person(s)>''.
 
# {{Method|Scan}} ''<person(s)>'' and '''TRY''' to {{Method|identify}} all kinds of attacks on the ''<person(s)>''.
 
# '''LOOP''' until no more attacks {{Method|identified}}.
 
# '''LOOP''' until no more attacks {{Method|identified}}.
 +
## {{Method|Scan}} for all origins of attacks.
 
## '''TRY''' to {{Method|identify}} all origins of the attacks.
 
## '''TRY''' to {{Method|identify}} all origins of the attacks.
 
## '''TRY''' to {{Method|defend}} against all found attacks on ''<person(s)>''.
 
## '''TRY''' to {{Method|defend}} against all found attacks on ''<person(s)>''.
Line 37: Line 38:
 
### '''TRY''' to {{Method|attack}} all found attackers and origins with the {{Method|butterfly-method}}.
 
### '''TRY''' to {{Method|attack}} all found attackers and origins with the {{Method|butterfly-method}}.
 
## '''IF-END'''
 
## '''IF-END'''
## {{Method|Scan}} ''<person(s)>'' and '''TRY''' to {{Method|identify}} everything placed inside ''<person(s)>'' during attacks, or attached to ''<person(s)>'' during attacks.
+
## '''TRY''' to {{Method|identify}} everything placed inside ''<person(s)>'' during attacks, or attached to ''<person(s)>'' during attacks.
 
## '''IF''' {{Method|identify}} found something, '''DO''':
 
## '''IF''' {{Method|identify}} found something, '''DO''':
 
### '''TRY''' to {{Method|remove}} everything what was found.
 
### '''TRY''' to {{Method|remove}} everything what was found.
### {{Method|Scan}} for damages done by the attacks, the stuff placed inside ''<person(s)>'' or attached to ''<person(s)>'' and {{Method|identify}} those.
 
### create a optimal healprogram for those and execute it once done.
 
 
## '''IF-END'''
 
## '''IF-END'''
 +
## '''TRY''' to {{Method|identify}} any and all damages done by: the attacks, shit placed inside ''<person(s)>'', or shit attached to ''<person(s)>''.
 +
## {{Method|Create}} healing programs and '''TRY''' healings for all damages that were {{Method|identified}}.
 
## {{Method|Scan}} ''<person(s)>'' and '''TRY''' to {{Method|identify}} all kinds of attacks on the ''<person(s)>''.
 
## {{Method|Scan}} ''<person(s)>'' and '''TRY''' to {{Method|identify}} all kinds of attacks on the ''<person(s)>''.
 
# '''LOOP-END'''
 
# '''LOOP-END'''
  
 
{{EndBox}}
 
{{EndBox}}

Revision as of 01:28, 6 February 2017

Skib User Macro
Name DefendAndCounterattack
Author Drack
Brief descr. Defends,blocks and reflects attacks and starts counterattacks.
Status public
Terms Usable on oneself and others
Resources for the UserMacro
1 00 10 00 100 00
1k 00 100k 00 1kk 00
10kk 00 Gmax 00 Omax 00
Resources with butterfly option
1 00 10 00 100 00
1k 00 100k 00 1kk 00
10kk 00 Gmax 00 Omax 00

Command syntax

DefendAndCounterattack {Use butterfly} <person(s)>






Description

This Macro tries to defend you or the person you use it on , blocking the attacks on you or the person the macro is used on and reflecting it back and starts counterattacks on the attackers.

<person(s)>

Defines who this macro is used on. It might be used for a person (by name) or for a group of persons (for more than 1 names at the same time) or on oneself.


Algorithm of User Macro

  1. Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
  2. LOOP until no more attacks identified.
    1. Scan for all origins of attacks.
    2. TRY to identify all origins of the attacks.
    3. TRY to defend against all found attacks on <person(s)>.
    4. TRY to reflect all found attacks on <person(s)>.
    5. TRY to block all found attacks on <person(s)>.
    6. IF not all found attack were defended, reflected or blocked and option {use butterfly} was given, DO :
      1. Try to defend against all attacks with the butterfly-method.
    7. IF-END
    8. Scan the attackers and TRY to identify masks.
    9. IF identify found masks on the attackers DO:
      1. TRY to remove masks from attackers.
    10. IF-END
    11. TRY to attack all found attackers and origins.
    12. IF not all found attackers and origins got destroyed, and option {Use butterfly} was given, DO:
      1. TRY to attack all found attackers and origins with the butterfly-method.
    13. IF-END
    14. TRY to identify everything placed inside <person(s)> during attacks, or attached to <person(s)> during attacks.
    15. IF identify found something, DO:
      1. TRY to remove everything what was found.
    16. IF-END
    17. TRY to identify any and all damages done by: the attacks, shit placed inside <person(s)>, or shit attached to <person(s)>.
    18. Create healing programs and TRY healings for all damages that were identified.
    19. Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
  3. LOOP-END