Difference between revisions of "SkibUserMacros:Destroy Protection"

From Protoi Healing

Jump to: navigation, search
 
Line 50: Line 50:
  
 
# All things used by this macro always have to be optimal protected, if this got declared in the calling macro.
 
# All things used by this macro always have to be optimal protected, if this got declared in the calling macro.
 +
# '''IF''' the option ''{Use butterfly}'' was given, '''DO''':
 +
## Use '''DATABASE''' 'Butterfly'.
 +
## Always use in the macro the {{Method|butterfly-method}} for all soft-blocked things.
 +
## Store or update all {{Method|butterfly-methods}}, which have been successful used in this macro, in the 'Butterfly' '''DATABASE'''.
 +
# '''IF-END'''
 +
# Use '''DATABASE''' 'Destroy'.
 +
# Store or update all solutions and procedures, which have been successful used in this macro, in the 'Destroy' '''DATABASE'''.
 
# '''THREAD-START <1>
 
# '''THREAD-START <1>
 
<!--
 
<!--

Latest revision as of 20:33, 8 February 2017

Skib User Macro
Name Destroy Protection
Author Frank
Brief descr. Destroys all dark protection
Status public
Terms sub-macro only
Resources for the UserMacro
1 10 100
1k 100k 1kk
10kk Gmax Omax
Resources with butterfly option
1 10 100
1k 100k 1kk
10kk Gmax Omax

Command syntax

Destroy Protection <protection context> {Use butterfly}






Description

Destroys all dark protection in <protection context>, which tries to block or limit our actions or our access to and in the 'protection context'.

<protection context>

The calling program MUST define this. Example:
# Add all 'parallel-to-reality' and all 'support mechanic' and all 'VRs' to the common '''DEFINITION''' of 'ambient'.
# '''DEFINITION''' of 'protection context': It's <whatever it is here> and it's related 'ambient'.


{Use butterfly}

Whatever option 1 does..


Algorithm of User Macro

  1. All things used by this macro always have to be optimal protected, if this got declared in the calling macro.
  2. IF the option {Use butterfly} was given, DO:
    1. Use DATABASE 'Butterfly'.
    2. Always use in the macro the butterfly-method for all soft-blocked things.
    3. Store or update all butterfly-methods, which have been successful used in this macro, in the 'Butterfly' DATABASE.
  3. IF-END
  4. Use DATABASE 'Destroy'.
  5. Store or update all solutions and procedures, which have been successful used in this macro, in the 'Destroy' DATABASE.
  6. THREAD-START <1>
  7. THREAD <1> Find counter protection
    1. LOOP <T:1minutes>
      1. Scan and scan-off-grid all of 'protection context'.
      2. TRY to identify all 'counter protections' in 'protection context', which tries to block or limit our actions or our access to and in the 'protection context'.
      3. TRY to trace all found 'counter protections'.
      4. TRY to identify all 'origins' and all 'creators' in all found with trace.
      5. IF any of the found 'counter protections', 'origins' or 'creators' are new since the last THREAD <2> call, DO:
        1. DEFINITION of 'new protections': all found 'counter protections', 'origins' or 'creators' which are new since the last THREAD <2> call.
        2. THREAT-START <2>
      6. IF-END
    2. LOOP-END
  8. THREAD-END
  9. THREAD <2> Destroy counter protection
    1. Create an optimal solution to destroy all 'new protections'.
    2. Create optimal procedures for the solution.
    3. TRY to apply the solution by using the optimal solution procedures.
    4. IF the former solution or parts of the solution failed and the option {Use butterfly} was given, DO:
      1. TRY again to apply the failed solution or the failed parts of the solution by using butterfly-method.
    5. IF-END
  10. THREAD-END