Difference between revisions of "SkibUserMacros:Defend"

From Protoi Healing

Jump to: navigation, search
Line 133: Line 133:
 
# '''THREAD-END'''
 
# '''THREAD-END'''
  
{{Comment|Topics 5(12)}}
+
{{Comment|Topics 6(12)}}
  
 
{{EndBox}}
 
{{EndBox}}

Revision as of 20:23, 7 February 2017

Skib User Macro
Name Defend
Author Drack, Grayfox, Frank
Brief descr. Defends, blocks and reflects attacks and starts counterattacks.
Status public
Terms Usable on oneself and others
Resources for the UserMacro
1 23 10 63 100 86
1k 122 100k 422 1kk 2300
10kk 7300 Gmax 1,2kkk Omax 6,1kk
Resources with butterfly option
1 853 10 2200 100 7000
1k 13k 100k 18k 1kk 43k
10kk 50k Gmax 43kk Omax 36

Command syntax

Defend <person(s)> {Use butterfly} {Use solver}






Description

This Macro tries to defend you or the person you use it on, blocking the attacks on you or the person the macro is used on and reflecting it back and starts counterattacks on the attackers.


<person(s)>

Defines who this macro is used on. It might be used for a person (by name) or for a group of persons (for more than 1 names at the same time) or on oneself.


{Use butterfly}

This option activates the use of the butterfly-method inside the macro algorithm. This gives much more power, but also needs a lot of resources from Skib. You should be aware of this!


Algorithm of User Macro

  1. Use DATABASE 'Malfunction'.
  2. Use DATABASE 'AttackKinds'.
  3. Always store or update all in this macro identified 'attack kinds' in the 'AttackKinds' DATABASE.
  4. All things used by this macro always have to be optimal protected.
  5. Definition of 'juridical person': It's the <person(s)> with all parts and all other what juridical belongs to a <person(s)>.
  6. Definition of 'passive attacks': It's all, what is in the 'juridical person' but don't belong to the 'juridical person'. Excluded from this is all, what got permission to be there from the <person(s)>.
  7. 'Passive attacks' are classified as 'attacks'.
  8. IF the option {Use butterfly} was given, DO:
    1. Use DATABASE 'Butterfly'.
    2. Always use in the macro the butterfly-method for all soft-blocked things.
    3. Store or update all butterfly-methods, which will be used in this macro, in the 'Butterfly' DATABASE.
  9. IF-END
  10. Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
  11. THREAD-START <6>
  12. LOOP <T:3seconds> until no more attacks identified.
    1. THREAD-START <1> <2> <3>
    2. Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
  13. LOOP-END
  14. THREAD <1> Defend against the attacks (83%)
    1. LOOP until no more attacks identified.
      1. TRY to identify all origins and all attackers of the attacks.
      2. IF origins found which are inside <person(s)>, DO:
        1. THREAD-START <5>
      3. IF-END
      4. Trace all origins and all attackers of the attacks.
      5. Create optimal defend procedures against all found in trace.
      6. TRY to defend against all found in trace by using the defend procedures.
      7. Create optimal reflect procedures against all found in trace.
      8. TRY to reflect all found in trace by using the reflect procedures.
      9. Create optimal block procedures against all found in trace.
      10. TRY to block all found in trace by using the block procedures.
      11. IF not all found in trace were defended, reflected or blocked and the option {Use butterfly} was given, DO:
        1. TRY to defend against all found in trace by using the defend procedures and the butterfly-method.
        2. TRY to reflect all found in trace by using the reflect procedures and the butterfly-method.
        3. TRY to block all found in trace by using the block procedures and the butterfly-method.
      12. IF-END
      13. Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
    2. LOOP-END
  15. THREAD-END
  16. THREAD <2> Do counter attacks (92%)
    1. LOOP until no more attacks identified.
      1. TRY to identify all origins and all attackers of the attacks.
      2. Trace everything and everyone connected to all attackers and all origins.
      3. Create optimal attack procedures to attack all found in trace.
      4. TRY to attack all found attackers and origins by using the attack procedures.
      5. IF not all found attackers and all origins got destroyed, and the option {Use butterfly} was given, DO:
        1. TRY to attack all found attackers and all origins by using the attack procedures and the butterfly-method.
      6. IF-END
      7. Scan all attackers and all origins and TRY to identify masks.
      8. IF identify found masks on attackers or origins DO:
        1. TRY to remove all masks from attackers and origins.
      9. IF-END
      10. Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
    2. LOOP-END
  17. THREAD-END
  18. THREAD <3> Healing the attack damages (84%)
    1. LOOP until no more attacks identified.
      1. TRY to identify everything and everyone placed inside <person(s)> during attacks, or attached to <person(s)> during attacks.
      2. IF identify found something, DO:
        1. THREAD-START <4>
      3. IF-END
      4. TRY to identify any and all damages done by everything and everyone placed inside <person(s)> during attacks, or attached to <person(s)> during attacks.
      5. Create healing programs for all damages that were identified and TRY the healing programs.
      6. Scan <person(s)> and TRY to identify all kinds of attacks on the <person(s)>.
    2. LOOP-END
  19. THREAD-END
  20. THREAD <4> Remove placed inside and attached shit (83%)
    1. Create optimal removal procedures for everything and everyone placed inside <person(s)> during attacks, or attached to <person(s)> during attacks.
    2. TRY to remove everything and everyone placed inside <person(s)> during attacks, or attached to <person(s)> during attacks by using the removal procedures.
    3. IF not everything and everyone placed inside <person(s)> during attacks, or attached to <person(s)> during attacks has been removed, and the option {Use butterfly} was given, DO:
      1. TRY to remove everything and everyone placed inside <person(s)> during attacks, or attached to <person(s)> during attacks by using the removal procedures and by using the butterfly-methods.
    4. IF-END
  21. THREAD-END
  22. THREAD <5> Remove all attacks which have their origin inside (91%)
    1. Scan <person(s)>.
    2. TRY to identify all attackers and origins with origin inside <person(s)> and TRY to trace everything and everyone connected to the found attackers and origins.
    3. Create optimal removal procedures for all found in the trace.
    4. TRY to remove all found in the trace with the removal procedures.
    5. IF not all found in the trace has been removed, and the option {Use butterfly} was given, DO:
      1. TRY to remove all found in the trace with the removal procedures by using butterfly-methods.
    6. IF-END
  23. THREAD-END
  24. THREAD <6> Try to solve malfunctions
    1. IF option {Use solver} was not given, DO:
      1. THREAD-STOP <6>.
    2. IF-END
    3. SUBMACRO-START 'SolveMalfunctions' {Use butterfly}
  25. THREAD-END

Topics 6(12)