Commit | Line | Data |
---|---|---|
a9fa5f4d C |
1 | |
2 | ||
3 | ||
4 | HACK(6) BSD Reference Manual HACK(6) | |
5 | ||
6 | ||
7 | N\bNA\bAM\bME\bE | |
8 | hack - exploring The Dungeons of Doom | |
9 | ||
10 | S\bSY\bYN\bNO\bOP\bPS\bSI\bIS\bS | |
11 | /\b/u\bus\bsr\br/\b/g\bga\bam\bme\bes\bs/\b/h\bha\bac\bck\bk [ -\b-d\bd _\bd_\bi_\br_\be_\bc_\bt_\bo_\br_\by ] [ -\b-n\bn ] [ -\b-u\bu _\bp_\bl_\ba_\by_\be_\br_\bn_\ba_\bm_\be ] | |
12 | /\b/u\bus\bsr\br/\b/g\bga\bam\bme\bes\bs/\b/h\bha\bac\bck\bk [ -\b-d\bd _\bd_\bi_\br_\be_\bc_\bt_\bo_\br_\by ] -\b-s\bs [ -\b-X\bX ] [ _\bp_\bl_\ba_\by_\be_\br_\bn_\ba_\bm_\be_\bs ] | |
13 | ||
14 | D\bDE\bES\bSC\bCR\bRI\bIP\bPT\bTI\bIO\bON\bN | |
15 | _\bH_\ba_\bc_\bk is a display oriented dungeons & dragons - like game. | |
16 | Both display and command structure resemble rogue. (For a | |
17 | game with the same structure but entirely different dis- | |
18 | play - a real cave instead of dull rectangles - try | |
19 | Quest.) | |
20 | ||
21 | To get started you really only need to know two commands. | |
22 | The command ?\b? will give you a list of the available com- | |
23 | mands and the command /\b/ will identify the things you see | |
24 | on the screen. | |
25 | ||
26 | To win the game (as opposed to merely playing to beat | |
27 | other people high scores) you must locate the Amulet of | |
28 | Yendor which is somewhere below the 20th level of the dun- | |
29 | geon and get it out. Nobody has achieved this yet and if | |
30 | somebody does, he will probably go down in history as a | |
31 | hero among heroes. | |
32 | ||
33 | When the game ends, either by your death, when you quit, | |
34 | or if you escape from the caves, _\bh_\ba_\bc_\bk will give you (a | |
35 | fragment of) the list of top scorers. The scoring is | |
36 | based on many aspects of your behavior but a rough esti- | |
37 | mate is obtained by taking the amount of gold you've found | |
38 | in the cave plus four times your (real) experience. Pre- | |
39 | cious stones may be worth a lot of gold when brought to | |
40 | the exit. There is a 10% penalty for getting yourself | |
41 | killed. | |
42 | ||
43 | The administration of the game is kept in the directory | |
44 | specified with the -\b-d\bd option, or, if no such option is | |
45 | given, in the directory specified by the environment vari- | |
46 | able HACKDIR, or, if no such variable exists, in the cur- | |
47 | rent directory. This same directory contains several aux- | |
48 | iliary files such as lockfiles and the list of top scorers | |
49 | and a subdirectory _\bs_\ba_\bv_\be where games are saved. The game | |
50 | administrator may however choose to install hack with a | |
51 | fixed playing ground, usually /usr/games/lib/hackdir. | |
52 | ||
53 | The -\b-n\bn option suppresses printing of the news. | |
54 | ||
55 | The -\b-u\bu _\bp_\bl_\ba_\by_\be_\br_\bn_\ba_\bm_\be option supplies the answer to the ques- | |
56 | tion "Who are you?". When _\bp_\bl_\ba_\by_\be_\br_\bn_\ba_\bm_\be has as suffix one of | |
57 | -\b-T\bT -\b-S\bS -\b-K\bK -\b-F\bF -\b-C\bC -\b-W\bW then this supplies the answer to the | |
58 | ||
59 | ||
60 | ||
61 | 4th Berkeley Distribution 31 March 1985 1 | |
62 | ||
63 | ||
64 | ||
65 | ||
66 | ||
67 | ||
68 | ||
69 | ||
70 | HACK(6) BSD Reference Manual HACK(6) | |
71 | ||
72 | ||
73 | question "What kind of character ... ?". | |
74 | ||
75 | The -\b-s\bs option will print out the list of your scores. It | |
76 | may be followed by arguments -\b-X\bX where X is one of the let- | |
77 | ters C, F, K, S, T, W to print the scores of Cavemen, | |
78 | Fighters, Knights, Speleologists, Tourists or Wizards. It | |
79 | may also be followed by one or more player names to print | |
80 | the scores of the players mentioned. | |
81 | ||
82 | A\bAU\bUT\bTH\bHO\bOR\bRS\bS | |
83 | Jay Fenlason (+ Kenny Woodland, Mike Thome and Jon Payne) | |
84 | wrote the original hack, very much like rogue (but full of | |
85 | bugs). | |
86 | Andries Brouwer continuously deformed their sources into | |
87 | the current version - in fact an entirely different game. | |
88 | ||
89 | F\bFI\bIL\bLE\bES\bS | |
90 | hack The hack program. | |
91 | data, rumors Data files used by hack. | |
92 | help, hh Help data files. | |
93 | record The list of top scorers. | |
94 | save A subdirectory containing the saved | |
95 | games. | |
96 | bones_dd Descriptions of the ghost and | |
97 | belongings of a deceased adventurer. | |
98 | xlock.dd Description of a dungeon level. | |
99 | safelock Lock file for xlock. | |
100 | record_lock Lock file for record. | |
101 | ||
102 | E\bEN\bNV\bVI\bIR\bRO\bON\bNM\bME\bEN\bNT\bT | |
103 | USER or LOGNAME Your login name. | |
104 | HOME Your home directory. | |
105 | SHELL Your shell. | |
106 | TERM The type of your terminal. | |
107 | HACKPAGER, PAGER Pager used instead of default pager. | |
108 | MAIL Mailbox file. | |
109 | MAILREADER Reader used instead of default | |
110 | (probably /bin/mail or /usr/ucb/mail). | |
111 | HACKDIR Playground. | |
112 | HACKOPTIONS String predefining several hack options | |
113 | (see help file). | |
114 | ||
115 | Several other environment variables are used in debugging | |
116 | (wizard) mode, like GENOCIDED, INVENT, MAGIC and SHOPTYPE. | |
117 | ||
118 | B\bBU\bUG\bGS\bS | |
119 | Probably infinite. Mail complaints to mcvax!aeb . | |
120 | ||
121 | ||
122 | ||
123 | ||
124 | ||
125 | ||
126 | ||
127 | 4th Berkeley Distribution 31 March 1985 2 | |
128 | ||
129 | ||
130 | ||
131 | ||
132 |