Difference between revisions of "SkibUserMacros:Defend"

From Protoi Healing

Jump to: navigation, search
Line 50: Line 50:
 
## Store or update all {{Method|butterfly-methods}}, which will be used in this macro, in the 'Butterfly' '''DATABASE'''.
 
## Store or update all {{Method|butterfly-methods}}, which will be used in this macro, in the 'Butterfly' '''DATABASE'''.
 
# '''IF-END'''
 
# '''IF-END'''
# '''LOOP''' until no more attacks {{Method|identified}}.
+
# '''THREAD-START''' <1> <2> <3>
## '''TRY''' to {{Method|identify}} all origins of the attacks.
+
# '''THREAD''' <1> {{Comment|Defend against the attacks}}
## {{Method|Scan}} all origins of attacks.
+
## '''LOOP''' until no more attacks {{Method|identified}}.
## '''TRY''' to {{Method|defend}} against all found attacks on ''<person(s)>''.
+
### '''TRY''' to {{Method|identify}} all origins of the attacks.
## '''TRY''' to {{Method|reflect}} all found attacks on ''<person(s)>''.
+
### {{Method|Scan}} all origins of attacks.
## '''TRY''' to {{Method|block}} all found attacks on ''<person(s)>''.
+
### '''TRY''' to {{Method|defend}} against all found attacks on ''<person(s)>''.
## '''IF''' not all found attacks were {{Method|defended}}, {{Method|reflected}} or {{Method|blocked}} and the option ''{Use butterfly}'' was given, '''DO''' :  
+
### '''TRY''' to {{Method|reflect}} all found attacks on ''<person(s)>''.
### '''Try''' to {{Method|defend}} against all attacks with the {{Method|butterfly-method}}.
+
### '''TRY''' to {{Method|block}} all found attacks on ''<person(s)>''.
## '''IF-END'''
+
### '''IF''' not all found attacks were {{Method|defended}}, {{Method|reflected}} or {{Method|blocked}} and the option ''{Use butterfly}'' was given, '''DO''' :  
## {{Method|Scan}} the attackers and '''TRY''' to {{Method|identify}} masks.
+
#### '''Try''' to {{Method|defend}} against all attacks with the {{Method|butterfly-method}}.
## '''IF''' {{Method|identify}} found masks on the attackers '''DO''':
+
### '''IF-END'''
### '''TRY''' to {{Method|remove}} masks from attackers.
+
### {{Method|Scan}} ''<person(s)>'' and '''TRY''' to {{Method|identify}} all kinds of attacks on the ''<person(s)>''.
## '''IF-END'''
+
## '''LOOP-END'''
## '''TRY''' to {{Method|attack}} all found attackers and origins.
+
# '''THREAD-END'''
## '''IF''' not all found attackers and origins got destroyed, and the option ''{Use butterfly}'' was given, '''DO''':
+
# '''THREAD''' <2> {{Comment|Do counter attacks}}
### '''TRY''' to {{Method|attack}} all found attackers and origins with the {{Method|butterfly-method}}.
+
## '''LOOP''' until no more attacks {{Method|identified}}.
## '''IF-END'''
+
### '''TRY''' to {{Method|attack}} all found attackers and origins.
## '''TRY''' to {{Method|identify}} everything placed inside ''<person(s)>'' during attacks, or attached to ''<person(s)>'' during attacks.
+
### '''IF''' not all found attackers and origins got destroyed, and the option ''{Use butterfly}'' was given, '''DO''':
## '''IF''' {{Method|identify}} found something, '''DO''':
+
#### '''TRY''' to {{Method|attack}} all found attackers and origins with the {{Method|butterfly-method}}.
### '''TRY''' to {{Method|remove}} everything what was found.
+
### '''IF-END'''
## '''IF-END'''
+
### {{Method|Scan}} the attackers and '''TRY''' to {{Method|identify}} masks.
## '''TRY''' to {{Method|identify}} any and all damages done by: the attacks, shit placed inside ''<person(s)>'', or shit attached to ''<person(s)>''.
+
### '''IF''' {{Method|identify}} found masks on the attackers '''DO''':
## {{Method|Create}} healing programs for all damages that were {{Method|identified}} and '''TRY''' the healing programs.
+
#### '''TRY''' to {{Method|remove}} masks from attackers.
## {{Method|Scan}} ''<person(s)>'' and '''TRY''' to {{Method|identify}} all kinds of attacks on the ''<person(s)>''.
+
### '''IF-END'''
# '''LOOP-END'''
+
### {{Method|Scan}} ''<person(s)>'' and '''TRY''' to {{Method|identify}} all kinds of attacks on the ''<person(s)>''.
 +
## '''LOOP-END'''
 +
# '''THREAD-END'''
 +
# '''THREAD''' <3> {{Comment|Healing the attack damages}}
 +
## '''LOOP''' until no more attacks {{Method|identified}}.
 +
### '''TRY''' to {{Method|identify}} everything placed inside ''<person(s)>'' during attacks, or attached to ''<person(s)>'' during attacks.
 +
### '''IF''' {{Method|identify}} found something, '''DO''':
 +
#### '''THREAD-START''' <4>
 +
### '''IF-END'''
 +
### '''TRY''' to {{Method|identify}} any and all damages done by: the attacks, shit placed inside ''<person(s)>'', or shit attached to ''<person(s)>''.
 +
### {{Method|Create}} healing programs for all damages that were {{Method|identified}} and '''TRY''' the healing programs.
 +
### {{Method|Scan}} ''<person(s)>'' and '''TRY''' to {{Method|identify}} all kinds of attacks on the ''<person(s)>''.
 +
## '''LOOP-END'''
 +
# '''THREAD-END'''
 +
# '''THREAD''' <4> {{Comment|Remove placed inside and attached shit}}
 +
## '''TRY''' to {{Method|remove}} everything placed inside ''<person(s)>'' during attacks, or attached to ''<person(s)>'' during attacks.
 +
# '''THREAD-END'''
  
 
{{EndBox}}
 
{{EndBox}}

Revision as of 20:49, 6 February 2017

Skib User Macro
Name Defend
Author Drack, Grayfox, Frank
Brief descr. Defends, blocks and reflects attacks and starts counterattacks.
Status public
Terms Usable on oneself and others
Resources for the UserMacro
1 23 10 63 100 86
1k 122 100k 422 1kk 2300
10kk 7300 Gmax 1,2kkk Omax 6,1kk
Resources with butterfly option
1 853 10 2200 100 7000
1k 13k 100k 18k 1kk 43k
10kk 50k Gmax 43kk Omax 36

Command syntax

Defend <person(s)> {Use butterfly}






Description

This Macro tries to defend you or the person you use it on, blocking the attacks on you or the person the macro is used on and reflecting it back and starts counterattacks on the attackers.


<person(s)>

Defines who this macro is used on. It might be used for a person (by name) or for a group of persons (for more than 1 names at the same time) or on oneself.


{Use butterfly}

This option activates the use of the butterfly-method inside the macro algorithm. This gives much more power, but also needs a lot of resources from Skib. You should be aware of this!


Algorithm of User Macro

  1. Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
  2. IF the option {Use butterfly} was given, DO:
    1. Use DATABASE 'Butterfly'.
    2. Use in the macro the butterfly-method for all soft blocked things.
    3. Store or update all butterfly-methods, which will be used in this macro, in the 'Butterfly' DATABASE.
  3. IF-END
  4. THREAD-START <1> <2> <3>
  5. THREAD <1> Defend against the attacks
    1. LOOP until no more attacks identified.
      1. TRY to identify all origins of the attacks.
      2. Scan all origins of attacks.
      3. TRY to defend against all found attacks on <person(s)>.
      4. TRY to reflect all found attacks on <person(s)>.
      5. TRY to block all found attacks on <person(s)>.
      6. IF not all found attacks were defended, reflected or blocked and the option {Use butterfly} was given, DO :
        1. Try to defend against all attacks with the butterfly-method.
      7. IF-END
      8. Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
    2. LOOP-END
  6. THREAD-END
  7. THREAD <2> Do counter attacks
    1. LOOP until no more attacks identified.
      1. TRY to attack all found attackers and origins.
      2. IF not all found attackers and origins got destroyed, and the option {Use butterfly} was given, DO:
        1. TRY to attack all found attackers and origins with the butterfly-method.
      3. IF-END
      4. Scan the attackers and TRY to identify masks.
      5. IF identify found masks on the attackers DO:
        1. TRY to remove masks from attackers.
      6. IF-END
      7. Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
    2. LOOP-END
  8. THREAD-END
  9. THREAD <3> Healing the attack damages
    1. LOOP until no more attacks identified.
      1. TRY to identify everything placed inside <person(s)> during attacks, or attached to <person(s)> during attacks.
      2. IF identify found something, DO:
        1. THREAD-START <4>
      3. IF-END
      4. TRY to identify any and all damages done by: the attacks, shit placed inside <person(s)>, or shit attached to <person(s)>.
      5. Create healing programs for all damages that were identified and TRY the healing programs.
      6. Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
    2. LOOP-END
  10. THREAD-END
  11. THREAD <4> Remove placed inside and attached shit
    1. TRY to remove everything placed inside <person(s)> during attacks, or attached to <person(s)> during attacks.
  12. THREAD-END