BSD 4_4_Lite2 development
[unix-history] / usr / share / man / cat6 / hack.0
CommitLineData
a9fa5f4d
C
1
2
3
4HACK(6) BSD Reference Manual HACK(6)
5
6
7N\bNA\bAM\bME\bE
8 hack - exploring The Dungeons of Doom
9
10S\bSY\bYN\bNO\bOP\bPS\bSI\bIS\bS
11 /\b/u\bus\bsr\br/\b/g\bga\bam\bme\bes\bs/\b/h\bha\bac\bck\bk [ -\b-d\bd _\bd_\bi_\br_\be_\bc_\bt_\bo_\br_\by ] [ -\b-n\bn ] [ -\b-u\bu _\bp_\bl_\ba_\by_\be_\br_\bn_\ba_\bm_\be ]
12 /\b/u\bus\bsr\br/\b/g\bga\bam\bme\bes\bs/\b/h\bha\bac\bck\bk [ -\b-d\bd _\bd_\bi_\br_\be_\bc_\bt_\bo_\br_\by ] -\b-s\bs [ -\b-X\bX ] [ _\bp_\bl_\ba_\by_\be_\br_\bn_\ba_\bm_\be_\bs ]
13
14D\bDE\bES\bSC\bCR\bRI\bIP\bPT\bTI\bIO\bON\bN
15 _\bH_\ba_\bc_\bk is a display oriented dungeons & dragons - like game.
16 Both display and command structure resemble rogue. (For a
17 game with the same structure but entirely different dis-
18 play - a real cave instead of dull rectangles - try
19 Quest.)
20
21 To get started you really only need to know two commands.
22 The command ?\b? will give you a list of the available com-
23 mands and the command /\b/ will identify the things you see
24 on the screen.
25
26 To win the game (as opposed to merely playing to beat
27 other people high scores) you must locate the Amulet of
28 Yendor which is somewhere below the 20th level of the dun-
29 geon and get it out. Nobody has achieved this yet and if
30 somebody does, he will probably go down in history as a
31 hero among heroes.
32
33 When the game ends, either by your death, when you quit,
34 or if you escape from the caves, _\bh_\ba_\bc_\bk will give you (a
35 fragment of) the list of top scorers. The scoring is
36 based on many aspects of your behavior but a rough esti-
37 mate is obtained by taking the amount of gold you've found
38 in the cave plus four times your (real) experience. Pre-
39 cious stones may be worth a lot of gold when brought to
40 the exit. There is a 10% penalty for getting yourself
41 killed.
42
43 The administration of the game is kept in the directory
44 specified with the -\b-d\bd option, or, if no such option is
45 given, in the directory specified by the environment vari-
46 able HACKDIR, or, if no such variable exists, in the cur-
47 rent directory. This same directory contains several aux-
48 iliary files such as lockfiles and the list of top scorers
49 and a subdirectory _\bs_\ba_\bv_\be where games are saved. The game
50 administrator may however choose to install hack with a
51 fixed playing ground, usually /usr/games/lib/hackdir.
52
53 The -\b-n\bn option suppresses printing of the news.
54
55 The -\b-u\bu _\bp_\bl_\ba_\by_\be_\br_\bn_\ba_\bm_\be option supplies the answer to the ques-
56 tion "Who are you?". When _\bp_\bl_\ba_\by_\be_\br_\bn_\ba_\bm_\be has as suffix one of
57 -\b-T\bT -\b-S\bS -\b-K\bK -\b-F\bF -\b-C\bC -\b-W\bW then this supplies the answer to the
58
59
60
614th Berkeley Distribution 31 March 1985 1
62
63
64
65
66
67
68
69
70HACK(6) BSD Reference Manual HACK(6)
71
72
73 question "What kind of character ... ?".
74
75 The -\b-s\bs option will print out the list of your scores. It
76 may be followed by arguments -\b-X\bX where X is one of the let-
77 ters C, F, K, S, T, W to print the scores of Cavemen,
78 Fighters, Knights, Speleologists, Tourists or Wizards. It
79 may also be followed by one or more player names to print
80 the scores of the players mentioned.
81
82A\bAU\bUT\bTH\bHO\bOR\bRS\bS
83 Jay Fenlason (+ Kenny Woodland, Mike Thome and Jon Payne)
84 wrote the original hack, very much like rogue (but full of
85 bugs).
86 Andries Brouwer continuously deformed their sources into
87 the current version - in fact an entirely different game.
88
89F\bFI\bIL\bLE\bES\bS
90 hack The hack program.
91 data, rumors Data files used by hack.
92 help, hh Help data files.
93 record The list of top scorers.
94 save A subdirectory containing the saved
95 games.
96 bones_dd Descriptions of the ghost and
97 belongings of a deceased adventurer.
98 xlock.dd Description of a dungeon level.
99 safelock Lock file for xlock.
100 record_lock Lock file for record.
101
102E\bEN\bNV\bVI\bIR\bRO\bON\bNM\bME\bEN\bNT\bT
103 USER or LOGNAME Your login name.
104 HOME Your home directory.
105 SHELL Your shell.
106 TERM The type of your terminal.
107 HACKPAGER, PAGER Pager used instead of default pager.
108 MAIL Mailbox file.
109 MAILREADER Reader used instead of default
110 (probably /bin/mail or /usr/ucb/mail).
111 HACKDIR Playground.
112 HACKOPTIONS String predefining several hack options
113 (see help file).
114
115 Several other environment variables are used in debugging
116 (wizard) mode, like GENOCIDED, INVENT, MAGIC and SHOPTYPE.
117
118B\bBU\bUG\bGS\bS
119 Probably infinite. Mail complaints to mcvax!aeb .
120
121
122
123
124
125
126
1274th Berkeley Distribution 31 March 1985 2
128
129
130
131
132