Difference between revisions of "SkibUserMacros:Defend"
From Protoi Healing
m (minor formatting and grammatical changes) |
|||
Line 7: | Line 7: | ||
}} | }} | ||
− | {{UserMacroCommandBox|'''DefendAndCounterattack''' {Use butterfly} | + | {{UserMacroCommandBox|'''DefendAndCounterattack''' {Use butterfly} <person(s)>}} |
<br/><br/><br/><br/><br/> | <br/><br/><br/><br/><br/> | ||
Line 27: | Line 27: | ||
## '''TRY''' to {{Method|reflect}} all found attacks on ''<person(s)>''. | ## '''TRY''' to {{Method|reflect}} all found attacks on ''<person(s)>''. | ||
## '''TRY''' to {{Method|block}} all found attacks on ''<person(s)>''. | ## '''TRY''' to {{Method|block}} all found attacks on ''<person(s)>''. | ||
− | ## '''IF''' not all found | + | ## '''IF''' not all found attacks were {{Method|defended}}, {{Method|reflected}} or {{Method|blocked}} and the option ''{Use butterfly}'' was given, '''DO''' : |
### '''Try''' to {{Method|defend}} against all attacks with the {{Method|butterfly-method}}. | ### '''Try''' to {{Method|defend}} against all attacks with the {{Method|butterfly-method}}. | ||
## '''IF-END''' | ## '''IF-END''' | ||
Line 35: | Line 35: | ||
## '''IF-END''' | ## '''IF-END''' | ||
## '''TRY''' to {{Method|attack}} all found attackers and origins. | ## '''TRY''' to {{Method|attack}} all found attackers and origins. | ||
− | ## '''IF''' not all found attackers and origins got destroyed, and option ''{Use butterfly}'' was given, '''DO''': | + | ## '''IF''' not all found attackers and origins got destroyed, and the option ''{Use butterfly}'' was given, '''DO''': |
### '''TRY''' to {{Method|attack}} all found attackers and origins with the {{Method|butterfly-method}}. | ### '''TRY''' to {{Method|attack}} all found attackers and origins with the {{Method|butterfly-method}}. | ||
## '''IF-END''' | ## '''IF-END''' |
Revision as of 02:36, 6 February 2017
Name | DefendAndCounterattack |
---|---|
Author | Drack, Grayfox, Frank |
Brief descr. | Defends,blocks and reflects attacks and starts counterattacks. |
Status | public |
Terms | Usable on oneself and others |
Resources for the UserMacro | |||||
---|---|---|---|---|---|
1 | 00 | 10 | 00 | 100 | 00 |
1k | 00 | 100k | 00 | 1kk | 00 |
10kk | 00 | Gmax | 00 | Omax | 00 |
Resources with butterfly option | |||||
1 | 00 | 10 | 00 | 100 | 00 |
1k | 00 | 100k | 00 | 1kk | 00 |
10kk | 00 | Gmax | 00 | Omax | 00 |
Command syntax
Description
- This Macro tries to defend you or the person you use it on , blocking the attacks on you or the person the macro is used on and reflecting it back and starts counterattacks on the attackers.
<person(s)>
- Defines who this macro is used on. It might be used for a person (by name) or for a group of persons (for more than 1 names at the same time) or on oneself.
Algorithm of User Macro
- Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
- LOOP until no more attacks identified.
- TRY to identify all origins of the attacks.
- Scan all origins of attacks.
- TRY to defend against all found attacks on <person(s)>.
- TRY to reflect all found attacks on <person(s)>.
- TRY to block all found attacks on <person(s)>.
- IF not all found attacks were defended, reflected or blocked and the option {Use butterfly} was given, DO :
- Try to defend against all attacks with the butterfly-method.
- IF-END
- Scan the attackers and TRY to identify masks.
- IF identify found masks on the attackers DO:
- TRY to remove masks from attackers.
- IF-END
- TRY to attack all found attackers and origins.
- IF not all found attackers and origins got destroyed, and the option {Use butterfly} was given, DO:
- TRY to attack all found attackers and origins with the butterfly-method.
- IF-END
- TRY to identify everything placed inside <person(s)> during attacks, or attached to <person(s)> during attacks.
- IF identify found something, DO:
- TRY to remove everything what was found.
- IF-END
- TRY to identify any and all damages done by: the attacks, shit placed inside <person(s)>, or shit attached to <person(s)>.
- Create healing programs for all damages that were identified and TRY the healing programs.
- Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
- LOOP-END