Difference between revisions of "SkibUserMacros:Defend"

From Protoi Healing

Jump to: navigation, search
Line 52: Line 52:
 
# Use '''DATABASE''' 'AttackKinds'.
 
# Use '''DATABASE''' 'AttackKinds'.
 
# Use '''DATABASE''' 'Defend'.
 
# Use '''DATABASE''' 'Defend'.
# Always store or update all in this macro identified 'attack kinds' in the 'AttackKinds' '''DATABASE'''.
+
# Always store or update all in this macro identified 'kinds of attacks' in the 'AttackKinds' '''DATABASE'''.
 
# All things used by this macro always have to be optimal protected.
 
# All things used by this macro always have to be optimal protected.
 
# '''DEFINITION''' of 'juridical person': It's the ''<person(s)>'' with all parts and all other what juridical belongs to a ''<person(s)>''.
 
# '''DEFINITION''' of 'juridical person': It's the ''<person(s)>'' with all parts and all other what juridical belongs to a ''<person(s)>''.
Line 77: Line 77:
 
#####################################################################
 
#####################################################################
 
--># {{Comment|Start of THREADS and LOOPS}}
 
--># {{Comment|Start of THREADS and LOOPS}}
# {{Method|Scan}} and {{Method|scan-off-grid}} all 'juridical person' of ''<person(s)>'' and the belonging 'ambient' and '''TRY''' to {{Method|identify}} all kinds of attacks on the 'juridical person' of ''<person(s)>'' and in the belonging 'ambient'.
+
# {{Method|Scan}} and {{Method|scan-off-grid}} all 'juridical person' of ''<person(s)>'' and the belonging 'ambient'.
 +
# '''TRY''' to {{Method|identify}} all 'kinds of attacks' and all attacks on the 'juridical person' of ''<person(s)>'' and in the belonging 'ambient'.
 
# '''SUBMACRO-START''' 'Destroy Protection' 'protection context' ''{Use butterfly}''
 
# '''SUBMACRO-START''' 'Destroy Protection' 'protection context' ''{Use butterfly}''
 
# '''THREAD-START''' <6> <7>  
 
# '''THREAD-START''' <6> <7>  
Line 85: Line 86:
 
### '''THREAD-START''' <8>
 
### '''THREAD-START''' <8>
 
## '''IF-END'''
 
## '''IF-END'''
## {{Method|Scan}} and {{Method|scan-off-grid}} all 'juridical person' of ''<person(s)>'' and the belonging 'ambient' and '''TRY''' to {{Method|identify}} all kinds of attacks on the 'juridical person' of ''<person(s)>'' and in the belonging 'ambient'.
+
## {{Method|Scan}} and {{Method|scan-off-grid}} all 'juridical person' of ''<person(s)>'' and the belonging 'ambient'.
 +
## '''TRY''' to {{Method|identify}} all 'kinds of attacks' and all attacks on the 'juridical person' of ''<person(s)>'' and in the belonging 'ambient'.
 
# '''LOOP-END'''
 
# '''LOOP-END'''
 
<!--
 
<!--
Line 93: Line 95:
 
--># '''THREAD''' <1> {{Comment|Defend against the attacks (97%)}}
 
--># '''THREAD''' <1> {{Comment|Defend against the attacks (97%)}}
 
## '''LOOP''' until no more attacks {{Method|identified}}.
 
## '''LOOP''' until no more attacks {{Method|identified}}.
### '''TRY''' to {{Method|identify}} all origins and all attackers of the attacks in the 'juridical person' of <person(s)> and in the belonging 'ambient'.
+
### '''TRY''' to {{Method|identify}} all 'origins of the attacks' and all attackers on the 'juridical person' of <person(s)> and in the belonging 'ambient'.
### '''IF''' origins found which are inside 'juridical person', '''DO:'''
+
### '''IF''' 'origins of the attacks' found which are inside 'juridical person', '''DO:'''
 
#### '''THREAD-START''' <1.1>
 
#### '''THREAD-START''' <1.1>
 
### '''IF-END'''
 
### '''IF-END'''
 +
 
### {{Method|Trace}} all origins and all attackers of the attacks.
 
### {{Method|Trace}} all origins and all attackers of the attacks.
 
### {{Method|Create}} optimal defend procedures against all found in {{Method|trace}}.
 
### {{Method|Create}} optimal defend procedures against all found in {{Method|trace}}.

Revision as of 10:36, 9 February 2017

Skib User Macro
Name Defend
Author Drack, Grayfox, Frank
Brief descr. Defends, blocks and reflects attacks and starts counterattacks.
Status public
Terms Usable on oneself and others
Resources for the UserMacro
1 23 10 63 100 86
1k 122 100k 422 1kk 2300
10kk 7300 Gmax 1,2kkk Omax 6,1kk
Resources with butterfly option
1 853 10 2200 100 7000
1k 13k 100k 18k 1kk 43k
10kk 50k Gmax 43kk Omax 36

Command syntax

Defend <person(s)> {Use butterfly} {Use solver}






Description

This Macro tries to defend you or the person you use it on, blocking the attacks on you or the person the macro is used on and reflecting it back and starts counterattacks on the attackers.


<person(s)>

Defines who this macro is used on. It might be used for a person (by name) or for a group of persons (for more than 1 names at the same time) or on oneself.


{Use butterfly}

This option activates the use of the butterfly-method inside the macro algorithm. This gives much more power, but also needs a lot of resources from Skib. You should be aware of this!


Algorithm of User Macro

  1. Initializing the macro
  2. Use DATABASE 'Malfunction'.
  3. Use DATABASE 'AttackKinds'.
  4. Use DATABASE 'Defend'.
  5. Always store or update all in this macro identified 'kinds of attacks' in the 'AttackKinds' DATABASE.
  6. All things used by this macro always have to be optimal protected.
  7. DEFINITION of 'juridical person': It's the <person(s)> with all parts and all other what juridical belongs to a <person(s)>.
  8. DEFINITION of 'passive attacks': It's all, what is in the 'juridical person' but don't belong to the 'juridical person'. Excluded from this is all, what got permission to be there from the <person(s)>.
  9. All 'Passive attacks' are classified as 'attacks'.
  10. DEFINITION of 'influences': It's all, what is enters the 'juridical person' through official interfaces of the 'juridical person'. Excluded from this is all, what got permission to be there from the <person(s)>.
  11. All 'influences' are classified as 'attacks'.
  12. DEFINITION of 'manipulations': All of 'juridical person' what got modified. Excluded from this is all, what got permission for the modification from the <person(s)>.
  13. All 'manipulations' are classified as 'attacks'.
  14. DEFINITION of 'Attachments': It's all, what is attached to the 'juridical person'. Excluded from this is all, what got permission for the attachment from the <person(s)>.
  15. All 'attachments' are classified as 'attacks'.
  16. Add all 'parallel-to-reality' and all 'support mechanic' and all 'VRs' to the common DEFINITION of 'ambient'.
  17. DEFINITION of 'protection context': It's the 'juridical person' and it's related 'ambient'.
  18. DEFINITION of 'illegals': It's all in or all 'attached' to 'juridical person' and 'juridical persons ambient, what is against the rules.
  19. All 'illegals' are classified as 'attacks'.
  20. IF the option {Use butterfly} was given, DO:
    1. Use DATABASE 'Butterfly'.
    2. Always use in the macro the butterfly-method for all soft-blocked things.
    3. Store or update all butterfly-methods, which have been successful used in this macro, in the 'Butterfly' DATABASE.
  21. IF-END
  22. Start of THREADS and LOOPS
  23. Scan and scan-off-grid all 'juridical person' of <person(s)> and the belonging 'ambient'.
  24. TRY to identify all 'kinds of attacks' and all attacks on the 'juridical person' of <person(s)> and in the belonging 'ambient'.
  25. SUBMACRO-START 'Destroy Protection' 'protection context' {Use butterfly}
  26. THREAD-START <6> <7>
  27. LOOP <T:3seconds> until no more attacks identified.
    1. THREAD-START <1> <2> <3>
    2. IF found new 'manipulations', DO:
      1. THREAD-START <8>
    3. IF-END
    4. Scan and scan-off-grid all 'juridical person' of <person(s)> and the belonging 'ambient'.
    5. TRY to identify all 'kinds of attacks' and all attacks on the 'juridical person' of <person(s)> and in the belonging 'ambient'.
  28. LOOP-END
  29. THREAD <1> Defend against the attacks (97%)
    1. LOOP until no more attacks identified.
      1. TRY to identify all 'origins of the attacks' and all attackers on the 'juridical person' of <person(s)> and in the belonging 'ambient'.
      2. IF 'origins of the attacks' found which are inside 'juridical person', DO:
        1. THREAD-START <1.1>
      3. IF-END
      1. Trace all origins and all attackers of the attacks.
      2. Create optimal defend procedures against all found in trace.
      3. TRY to defend against all found in trace by using the defend procedures.
      4. Create optimal reflect procedures against all found in trace.
      5. TRY to reflect all found in trace by using the reflect procedures.
      6. Create optimal block procedures against all found in trace.
      7. TRY to block all found in trace by using the block procedures.
      8. IF not all found in trace were defended, reflected or blocked and the option {Use butterfly} was given, DO:
        1. TRY to defend against all found in trace by using the defend procedures and the butterfly-method.
        2. TRY to reflect all found in trace by using the reflect procedures and the butterfly-method.
        3. TRY to block all found in trace by using the block procedures and the butterfly-method.
      9. IF-END
      10. IF not all found in trace were defended, reflected or blocked and the option {Use solver} was given, DO:
        1. Create an optimal solution for all in trace what was not defended, reflected or blocked.
        2. Create an optimal procedure for the created solution.
        3. TRY to apply the solution by using the solution procedure.
        4. TRY to identify the success of the solution and procedure.
        5. Store all successful parts of the solution and the procedure in the 'Defend' DATABASE.
      11. IF-END
      12. Scan and scan-off-grid all 'juridical person' of <person(s)> and the belonging 'ambient' and TRY to identify all kinds of attacks on the 'juridical person' of <person(s)> and in the belonging 'ambient'.
    1. LOOP-END
  1. THREAD-END
  2. THREAD <1.1> Remove all attacks which have their origin inside (99%)
    1. Scan and scan-off-grid all 'juridical person' of <person(s)> and the belonging 'ambient'.
    2. TRY to identify all attackers and origins with origin inside 'juridical person'
    3. TRY to trace everything and everyone connected to the found attackers and origins.
    4. Create optimal removal procedures for all found in the trace.
    5. TRY to remove all found in the trace with the removal procedures.
    6. IF not all found in the trace has been removed, and the option {Use butterfly} was given, DO:
      1. TRY to remove all found in the trace with the removal procedures by using butterfly-methods.
    7. IF-END
  3. THREAD-END
  4. THREAD <2> Do counter attacks (96%)
    1. LOOP until no more attacks identified.
      1. TRY to identify all origins and all attackers of the attacks in the 'juridical person' of <person(s)> and in the belonging 'ambient'.
      2. Trace everything and everyone connected to all attackers and all origins.
      3. Create optimal attack procedures to attack all found in trace.
      4. TRY to attack all found attackers and origins by using the attack procedures.
      5. IF not all found attackers and all origins got destroyed, and the option {Use butterfly} was given, DO:
        1. TRY to attack all found attackers and all origins by using the attack procedures and the butterfly-method.
      6. IF-END
      7. Scan and scan-off-grid all attackers and all origins and all the belonging 'ambient'.
      8. TRY to identify masks in all attackers and all origins and all the belonging 'ambient'.
      9. IF identify found masks DO:
        1. Create optimal remove procedures to remove all found masks.
        2. TRY to remove all found masks by using the remove procedures.
      10. IF-END
      11. Scan and scan-off-grid all 'juridical person' of <person(s)> and the belonging 'ambient' and TRY to identify all kinds of attacks on the 'juridical person' of <person(s)> and in the belonging 'ambient'.
    2. LOOP-END
  5. THREAD-END
  6. THREAD <3> Healing the attack damages (98%)
    1. LOOP until no more attacks identified.
      1. TRY to identify everything and everyone placed inside 'juridical person' and it's related 'ambient' during attacks, or attached to 'juridical person' and it's related 'ambient' during attacks.
      2. IF identify found something, DO:
        1. THREAD-START <4>
      3. IF-END
      4. TRY to identify any and all damages done by everything and everyone placed inside 'juridical person' during attacks, or attached to 'juridical person' during attacks.
      5. Create healing programs for all damages that were identified and TRY the healing programs.
      6. Scan 'juridical person' and it's related 'ambient' and TRY to identify all kinds of attacks on the 'juridical person'.
    2. LOOP-END
  7. THREAD-END
  8. THREAD <4> Remove placed inside and attached shit (94%)
    1. Trace all placed inside 'juridical person' during attacks, or attached to 'juridical person' during attacks.
    2. Create optimal removal procedures for all found in trace.
    3. TRY to remove all found in trace by using the removal procedures.
    4. IF not all found in trace has been removed, and the option {Use butterfly} was given, DO:
      1. TRY to remove all found in trace by using the removal procedures and by using the butterfly-methods.
    5. IF-END
  9. THREAD-END
  10. THREAD <6> Try to solve malfunctions (93%)
    1. IF option {Use solver} was not given, DO:
      1. THREAD-STOP <6>.
    2. IF-END
    3. SUBMACRO-START 'SolveMalfunctions' {Use butterfly}
  11. THREAD-END
  12. THREAD <7> Close all interfaces/doors (96%)
    1. Scan and scan-off-grid all 'juridical person' of <person(s)> and the belonging 'ambient'.
    2. TRY to identify all 'interfaces' in 'juridical person' and it's related 'ambient'.
    3. TRY to close all found 'interfaces' and allow only what has permission from <person(s)>.
    4. MONITOR all found 'interfaces'.
      1. IF any use of an interface occur, which has no permission from <person(s)>, DO:
        1. TRY to trace any 'use of interfaces', which has no permission from <person(s)>.
        2. TRY to identify all 'origins' and all 'use and users' of all 'use of interfaces' found by trace in the 'juridical person' and it's related 'ambient'.
        3. TRY to trace all found 'origins' and all 'use and users'.
        4. Declare all found in trace as 'attack'.
      2. IF-END
    5. MONITOR-END
    6. LOOP <T:5seconds>
      1. TRY to close all found 'interfaces' and allow only what has permission from <person(s)>.
    7. LOOP-END
  13. THREAD-END
  14. THREAD <8> Care about manipulations (93%)
    1. Scan 'juridical person' and it's related 'ambient'.
    2. TRY to identify all 'what got modified' in 'juridical person' of <person(s)>.
    3. TRY to trace all found 'what got modified'.
    4. TRY to identify all 'manipulations' in all found with trace.
    5. Store all found with trace in the 'Defend' DATABASE.
    6. Create an optimal solution for all found 'manipulations'.
    7. Create optimal procedures for the solution.
    8. TRY to apply the solution by using the optimal solution procedures.
    9. IF the former solution or parts of the solution failed and the option {Use butterfly} was given, DO:
      1. TRY again to apply the failed solution or the failed parts of the solution by using butterfly-method.
    10. IF-END
    11. TRY to identify the success of the solution and procedures.
    12. Store all successful parts of the solution and the procedures in the 'Defend' DATABASE.
  15. THREAD-END


Topics 13(13)