HACK(6) BSD Reference Manual HACK(6) NNAAMMEE hack - exploring The Dungeons of Doom SSYYNNOOPPSSIISS //uussrr//ggaammeess//hhaacckk [ --dd _d_i_r_e_c_t_o_r_y ] [ --nn ] [ --uu _p_l_a_y_e_r_n_a_m_e ] //uussrr//ggaammeess//hhaacckk [ --dd _d_i_r_e_c_t_o_r_y ] --ss [ --XX ] [ _p_l_a_y_e_r_n_a_m_e_s ] DDEESSCCRRIIPPTTIIOONN _H_a_c_k is a display oriented dungeons & dragons - like game. Both display and command structure resemble rogue. (For a game with the same structure but entirely different dis- play - a real cave instead of dull rectangles - try Quest.) To get started you really only need to know two commands. The command ?? will give you a list of the available com- mands and the command // will identify the things you see on the screen. To win the game (as opposed to merely playing to beat other people high scores) you must locate the Amulet of Yendor which is somewhere below the 20th level of the dun- geon and get it out. Nobody has achieved this yet and if somebody does, he will probably go down in history as a hero among heroes. When the game ends, either by your death, when you quit, or if you escape from the caves, _h_a_c_k will give you (a fragment of) the list of top scorers. The scoring is based on many aspects of your behavior but a rough esti- mate is obtained by taking the amount of gold you've found in the cave plus four times your (real) experience. Pre- cious stones may be worth a lot of gold when brought to the exit. There is a 10% penalty for getting yourself killed. The administration of the game is kept in the directory specified with the --dd option, or, if no such option is given, in the directory specified by the environment vari- able HACKDIR, or, if no such variable exists, in the cur- rent directory. This same directory contains several aux- iliary files such as lockfiles and the list of top scorers and a subdirectory _s_a_v_e where games are saved. The game administrator may however choose to install hack with a fixed playing ground, usually /usr/games/lib/hackdir. The --nn option suppresses printing of the news. The --uu _p_l_a_y_e_r_n_a_m_e option supplies the answer to the ques- tion "Who are you?". When _p_l_a_y_e_r_n_a_m_e has as suffix one of --TT --SS --KK --FF --CC --WW then this supplies the answer to the 4th Berkeley Distribution 31 March 1985 1 HACK(6) BSD Reference Manual HACK(6) question "What kind of character ... ?". The --ss option will print out the list of your scores. It may be followed by arguments --XX where X is one of the let- ters C, F, K, S, T, W to print the scores of Cavemen, Fighters, Knights, Speleologists, Tourists or Wizards. It may also be followed by one or more player names to print the scores of the players mentioned. AAUUTTHHOORRSS Jay Fenlason (+ Kenny Woodland, Mike Thome and Jon Payne) wrote the original hack, very much like rogue (but full of bugs). Andries Brouwer continuously deformed their sources into the current version - in fact an entirely different game. FFIILLEESS hack The hack program. data, rumors Data files used by hack. help, hh Help data files. record The list of top scorers. save A subdirectory containing the saved games. bones_dd Descriptions of the ghost and belongings of a deceased adventurer. xlock.dd Description of a dungeon level. safelock Lock file for xlock. record_lock Lock file for record. EENNVVIIRROONNMMEENNTT USER or LOGNAME Your login name. HOME Your home directory. SHELL Your shell. TERM The type of your terminal. HACKPAGER, PAGER Pager used instead of default pager. MAIL Mailbox file. MAILREADER Reader used instead of default (probably /bin/mail or /usr/ucb/mail). HACKDIR Playground. HACKOPTIONS String predefining several hack options (see help file). Several other environment variables are used in debugging (wizard) mode, like GENOCIDED, INVENT, MAGIC and SHOPTYPE. BBUUGGSS Probably infinite. Mail complaints to mcvax!aeb . 4th Berkeley Distribution 31 March 1985 2