| 1 | |
| 2 | |
| 3 | |
| 4 | HACK(6) BSD Reference Manual HACK(6) |
| 5 | |
| 6 | |
| 7 | N\bNA\bAM\bME\bE |
| 8 | hack - exploring The Dungeons of Doom |
| 9 | |
| 10 | S\bSY\bYN\bNO\bOP\bPS\bSI\bIS\bS |
| 11 | /\b/u\bus\bsr\br/\b/g\bga\bam\bme\bes\bs/\b/h\bha\bac\bck\bk [ -\b-d\bd _\bd_\bi_\br_\be_\bc_\bt_\bo_\br_\by ] [ -\b-n\bn ] [ -\b-u\bu _\bp_\bl_\ba_\by_\be_\br_\bn_\ba_\bm_\be ] |
| 12 | /\b/u\bus\bsr\br/\b/g\bga\bam\bme\bes\bs/\b/h\bha\bac\bck\bk [ -\b-d\bd _\bd_\bi_\br_\be_\bc_\bt_\bo_\br_\by ] -\b-s\bs [ -\b-X\bX ] [ _\bp_\bl_\ba_\by_\be_\br_\bn_\ba_\bm_\be_\bs ] |
| 13 | |
| 14 | D\bDE\bES\bSC\bCR\bRI\bIP\bPT\bTI\bIO\bON\bN |
| 15 | _\bH_\ba_\bc_\bk is a display oriented dungeons & dragons - like game. |
| 16 | Both display and command structure resemble rogue. (For a |
| 17 | game with the same structure but entirely different dis- |
| 18 | play - a real cave instead of dull rectangles - try |
| 19 | Quest.) |
| 20 | |
| 21 | To get started you really only need to know two commands. |
| 22 | The command ?\b? will give you a list of the available com- |
| 23 | mands and the command /\b/ will identify the things you see |
| 24 | on the screen. |
| 25 | |
| 26 | To win the game (as opposed to merely playing to beat |
| 27 | other people high scores) you must locate the Amulet of |
| 28 | Yendor which is somewhere below the 20th level of the dun- |
| 29 | geon and get it out. Nobody has achieved this yet and if |
| 30 | somebody does, he will probably go down in history as a |
| 31 | hero among heroes. |
| 32 | |
| 33 | When the game ends, either by your death, when you quit, |
| 34 | or if you escape from the caves, _\bh_\ba_\bc_\bk will give you (a |
| 35 | fragment of) the list of top scorers. The scoring is |
| 36 | based on many aspects of your behavior but a rough esti- |
| 37 | mate is obtained by taking the amount of gold you've found |
| 38 | in the cave plus four times your (real) experience. Pre- |
| 39 | cious stones may be worth a lot of gold when brought to |
| 40 | the exit. There is a 10% penalty for getting yourself |
| 41 | killed. |
| 42 | |
| 43 | The administration of the game is kept in the directory |
| 44 | specified with the -\b-d\bd option, or, if no such option is |
| 45 | given, in the directory specified by the environment vari- |
| 46 | able HACKDIR, or, if no such variable exists, in the cur- |
| 47 | rent directory. This same directory contains several aux- |
| 48 | iliary files such as lockfiles and the list of top scorers |
| 49 | and a subdirectory _\bs_\ba_\bv_\be where games are saved. The game |
| 50 | administrator may however choose to install hack with a |
| 51 | fixed playing ground, usually /usr/games/lib/hackdir. |
| 52 | |
| 53 | The -\b-n\bn option suppresses printing of the news. |
| 54 | |
| 55 | The -\b-u\bu _\bp_\bl_\ba_\by_\be_\br_\bn_\ba_\bm_\be option supplies the answer to the ques- |
| 56 | tion "Who are you?". When _\bp_\bl_\ba_\by_\be_\br_\bn_\ba_\bm_\be has as suffix one of |
| 57 | -\b-T\bT -\b-S\bS -\b-K\bK -\b-F\bF -\b-C\bC -\b-W\bW then this supplies the answer to the |
| 58 | |
| 59 | |
| 60 | |
| 61 | 4th Berkeley Distribution 31 March 1985 1 |
| 62 | |
| 63 | |
| 64 | |
| 65 | |
| 66 | |
| 67 | |
| 68 | |
| 69 | |
| 70 | HACK(6) BSD Reference Manual HACK(6) |
| 71 | |
| 72 | |
| 73 | question "What kind of character ... ?". |
| 74 | |
| 75 | The -\b-s\bs option will print out the list of your scores. It |
| 76 | may be followed by arguments -\b-X\bX where X is one of the let- |
| 77 | ters C, F, K, S, T, W to print the scores of Cavemen, |
| 78 | Fighters, Knights, Speleologists, Tourists or Wizards. It |
| 79 | may also be followed by one or more player names to print |
| 80 | the scores of the players mentioned. |
| 81 | |
| 82 | A\bAU\bUT\bTH\bHO\bOR\bRS\bS |
| 83 | Jay Fenlason (+ Kenny Woodland, Mike Thome and Jon Payne) |
| 84 | wrote the original hack, very much like rogue (but full of |
| 85 | bugs). |
| 86 | Andries Brouwer continuously deformed their sources into |
| 87 | the current version - in fact an entirely different game. |
| 88 | |
| 89 | F\bFI\bIL\bLE\bES\bS |
| 90 | hack The hack program. |
| 91 | data, rumors Data files used by hack. |
| 92 | help, hh Help data files. |
| 93 | record The list of top scorers. |
| 94 | save A subdirectory containing the saved |
| 95 | games. |
| 96 | bones_dd Descriptions of the ghost and |
| 97 | belongings of a deceased adventurer. |
| 98 | xlock.dd Description of a dungeon level. |
| 99 | safelock Lock file for xlock. |
| 100 | record_lock Lock file for record. |
| 101 | |
| 102 | E\bEN\bNV\bVI\bIR\bRO\bON\bNM\bME\bEN\bNT\bT |
| 103 | USER or LOGNAME Your login name. |
| 104 | HOME Your home directory. |
| 105 | SHELL Your shell. |
| 106 | TERM The type of your terminal. |
| 107 | HACKPAGER, PAGER Pager used instead of default pager. |
| 108 | MAIL Mailbox file. |
| 109 | MAILREADER Reader used instead of default |
| 110 | (probably /bin/mail or /usr/ucb/mail). |
| 111 | HACKDIR Playground. |
| 112 | HACKOPTIONS String predefining several hack options |
| 113 | (see help file). |
| 114 | |
| 115 | Several other environment variables are used in debugging |
| 116 | (wizard) mode, like GENOCIDED, INVENT, MAGIC and SHOPTYPE. |
| 117 | |
| 118 | B\bBU\bUG\bGS\bS |
| 119 | Probably infinite. Mail complaints to mcvax!aeb . |
| 120 | |
| 121 | |
| 122 | |
| 123 | |
| 124 | |
| 125 | |
| 126 | |
| 127 | 4th Berkeley Distribution 31 March 1985 2 |
| 128 | |
| 129 | |
| 130 | |
| 131 | |
| 132 | |