xref: /netbsd-src/games/hack/hack.6 (revision d9f5a9df018fb8d9164898191a0b1bf2fdf31e1f)
1*d9f5a9dfSwiz.\"	$NetBSD: hack.6,v 1.15 2005/09/15 02:09:41 wiz Exp $	-*- nroff -*-
21c7f94e5Sjsm.\"
31c7f94e5Sjsm.\" Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica,
41c7f94e5Sjsm.\" Amsterdam
51c7f94e5Sjsm.\" All rights reserved.
61c7f94e5Sjsm.\"
71c7f94e5Sjsm.\" Redistribution and use in source and binary forms, with or without
81c7f94e5Sjsm.\" modification, are permitted provided that the following conditions are
91c7f94e5Sjsm.\" met:
101c7f94e5Sjsm.\"
111c7f94e5Sjsm.\" - Redistributions of source code must retain the above copyright notice,
121c7f94e5Sjsm.\" this list of conditions and the following disclaimer.
131c7f94e5Sjsm.\"
141c7f94e5Sjsm.\" - Redistributions in binary form must reproduce the above copyright
151c7f94e5Sjsm.\" notice, this list of conditions and the following disclaimer in the
161c7f94e5Sjsm.\" documentation and/or other materials provided with the distribution.
171c7f94e5Sjsm.\"
181c7f94e5Sjsm.\" - Neither the name of the Stichting Centrum voor Wiskunde en
191c7f94e5Sjsm.\" Informatica, nor the names of its contributors may be used to endorse or
201c7f94e5Sjsm.\" promote products derived from this software without specific prior
211c7f94e5Sjsm.\" written permission.
221c7f94e5Sjsm.\"
231c7f94e5Sjsm.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
241c7f94e5Sjsm.\" IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
251c7f94e5Sjsm.\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
261c7f94e5Sjsm.\" PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
271c7f94e5Sjsm.\" OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
281c7f94e5Sjsm.\" EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
291c7f94e5Sjsm.\" PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
301c7f94e5Sjsm.\" PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
311c7f94e5Sjsm.\" LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
321c7f94e5Sjsm.\" NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
331c7f94e5Sjsm.\" SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
341c7f94e5Sjsm.\"
351c7f94e5Sjsm.\"
361c7f94e5Sjsm.\" Copyright (c) 1982 Jay Fenlason <hack@gnu.org>
371c7f94e5Sjsm.\" All rights reserved.
381c7f94e5Sjsm.\"
391c7f94e5Sjsm.\" Redistribution and use in source and binary forms, with or without
401c7f94e5Sjsm.\" modification, are permitted provided that the following conditions
411c7f94e5Sjsm.\" are met:
421c7f94e5Sjsm.\" 1. Redistributions of source code must retain the above copyright
431c7f94e5Sjsm.\"    notice, this list of conditions and the following disclaimer.
441c7f94e5Sjsm.\" 2. Redistributions in binary form must reproduce the above copyright
451c7f94e5Sjsm.\"    notice, this list of conditions and the following disclaimer in the
461c7f94e5Sjsm.\"    documentation and/or other materials provided with the distribution.
471c7f94e5Sjsm.\" 3. The name of the author may not be used to endorse or promote products
481c7f94e5Sjsm.\"    derived from this software without specific prior written permission.
491c7f94e5Sjsm.\"
501c7f94e5Sjsm.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
511c7f94e5Sjsm.\" INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
521c7f94e5Sjsm.\" AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL
531c7f94e5Sjsm.\" THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
541c7f94e5Sjsm.\" EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
551c7f94e5Sjsm.\" PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
561c7f94e5Sjsm.\" OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
571c7f94e5Sjsm.\" WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
581c7f94e5Sjsm.\" OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
591c7f94e5Sjsm.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
601c7f94e5Sjsm.\"
61d7bbfe60Sjtc.Dd March 31, 1985
62d7bbfe60Sjtc.Dt HACK 6
63d7bbfe60Sjtc.Os
64d7bbfe60Sjtc.Sh NAME
65d7bbfe60Sjtc.Nm hack
66c91d8d6bSwiz.Nd exploring The Dungeons of Doom
67d7bbfe60Sjtc.Sh SYNOPSIS
68c91d8d6bSwiz.Nm
69d7bbfe60Sjtc.Op Fl d Ar directory
70d7bbfe60Sjtc.Op Fl n
71d7bbfe60Sjtc.Op Fl u Ar playername
72990562bfSwiz.Nm
73d7bbfe60Sjtc.Op Fl d Ar directory
74d7bbfe60Sjtc.Op Fl s
75d7bbfe60Sjtc.Op Fl X
76d7bbfe60Sjtc.Op Ar playername ...
77d7bbfe60Sjtc.Sh DESCRIPTION
7851ea0cbaSlukem.Nm
79dc5571b2Srossis a display oriented dungeons \*[Am] dragons-like game.
8061f28255ScgdBoth display and command structure resemble rogue.
8161f28255Scgd(For a game with the same structure but entirely different display -
8261f28255Scgda real cave instead of dull rectangles - try Quest.)
83d7bbfe60Sjtc.Pp
840d22e30cSwizTo get started you really only need to know two commands.
850d22e30cSwizThe command
8603721033Swiz.Ic \&?
8761f28255Scgdwill give you a list of the available commands and the command
88d7bbfe60Sjtc.Ic /
8961f28255Scgdwill identify the things you see on the screen.
90d7bbfe60Sjtc.Pp
912eabcd5eSwizTo win the game (as opposed to merely playing to beat other people's high
9261f28255Scgdscores) you must locate the Amulet of Yendor which is somewhere below
930d22e30cSwizthe 20th level of the dungeon and get it out.
940d22e30cSwizNobody has achieved this yet and if somebody does, he will probably go
950d22e30cSwizdown in history as a hero among heroes.
96d7bbfe60Sjtc.Pp
9761f28255ScgdWhen the game ends, either by your death, when you quit, or if you escape
9861f28255Scgdfrom the caves,
9951ea0cbaSlukem.Nm
1000d22e30cSwizwill give you (a fragment of) the list of top scorers.
1010d22e30cSwizThe scoring is based on many aspects of your behavior but a rough estimate
1020d22e30cSwizis obtained by taking the amount of gold you've found in the cave plus four
1030d22e30cSwiztimes your (real) experience.
1040d22e30cSwizPrecious stones may be worth a lot of gold when brought to the exit.
10561f28255ScgdThere is a 10% penalty for getting yourself killed.
106d7bbfe60Sjtc.Pp
10761f28255ScgdThe administration of the game is kept in the directory specified with the
108d7bbfe60Sjtc.Fl d
10961f28255Scgdoption, or, if no such option is given, in the directory specified by
110d7bbfe60Sjtcthe environment variable
111d7bbfe60Sjtc.Ev HACKDIR ,
112d7bbfe60Sjtcor, if no such variable exists, in the current directory.
113d7bbfe60SjtcThis same directory contains several auxiliary files such as lockfiles and
114d7bbfe60Sjtcthe list of topscorers and a subdirectory
115d7bbfe60Sjtc.Pa save
11661f28255Scgdwhere games are saved.
11761f28255ScgdThe game administrator may however choose to install hack with a fixed
118d7bbfe60Sjtcplaying ground, usually
119d7bbfe60Sjtc.Pa /var/games/hackdir .
120d7bbfe60Sjtc.Pp
12161f28255ScgdThe
122d7bbfe60Sjtc.Fl n
12361f28255Scgdoption suppresses printing of the news.
124d7bbfe60Sjtc.Pp
12561f28255ScgdThe
126d7bbfe60Sjtc.Fl u
127d7bbfe60Sjtc.Ar playername
12861f28255Scgdoption supplies the answer to the question "Who are you?".
12961f28255ScgdWhen
130d7bbfe60Sjtc.Ar playername
13161f28255Scgdhas as suffix one of
132d7bbfe60Sjtc.Em -T ,
133d7bbfe60Sjtc.Em -S ,
134d7bbfe60Sjtc.Em -K ,
135d7bbfe60Sjtc.Em -F ,
136d7bbfe60Sjtc.Em -C ,
137d7bbfe60Sjtcor
138d7bbfe60Sjtc.Em -W ,
13961f28255Scgdthen this supplies the answer to the question "What kind of character ... ?".
140d7bbfe60Sjtc.Pp
14161f28255ScgdThe
142d7bbfe60Sjtc.Fl s
1430d22e30cSwizoption will print out the list of your scores.
1440d22e30cSwizIt may be followed by arguments
145d7bbfe60Sjtc.Fl X
14661f28255Scgdwhere X is one of the letters C, F, K, S, T, W to print the scores of
14761f28255ScgdCavemen, Fighters, Knights, Speleologists, Tourists or Wizards.
14861f28255ScgdIt may also be followed by one or more player names to print the scores of the
14961f28255Scgdplayers mentioned.
150d7bbfe60Sjtc.Sh ENVIRONMENT
151d7bbfe60Sjtc.Bl -tag -width 24n -compact
152d7bbfe60Sjtc.It Ev USER No or Ev LOGNAME
153d7bbfe60SjtcYour login name.
154d7bbfe60Sjtc.It Ev HOME
155d7bbfe60SjtcYour home directory.
156d7bbfe60Sjtc.It Ev SHELL
157d7bbfe60SjtcYour shell.
158d7bbfe60Sjtc.It Ev TERM
159d7bbfe60SjtcThe type of your terminal.
160d7bbfe60Sjtc.It Ev HACKPAGER, PAGER
161d7bbfe60SjtcPager used instead of default pager.
162d7bbfe60Sjtc.It Ev MAIL
163d7bbfe60SjtcMailbox file.
164d7bbfe60Sjtc.It Ev MAILREADER
165c91d8d6bSwizReader used instead of default (probably
166c91d8d6bSwiz.Pa /usr/bin/mail ) .
167d7bbfe60Sjtc.It Ev HACKDIR
168d7bbfe60SjtcPlayground.
169d7bbfe60Sjtc.It Ev HACKOPTIONS
170d7bbfe60SjtcString predefining several hack options (see help file).
171d7bbfe60Sjtc.El
172d7bbfe60Sjtc.Pp
17361f28255ScgdSeveral other environment variables are used in debugging (wizard) mode,
174d7bbfe60Sjtclike
175d7bbfe60Sjtc.Ev GENOCIDED ,
176d7bbfe60Sjtc.Ev INVENT ,
177d7bbfe60Sjtc.Ev MAGIC
178d7bbfe60Sjtcand
179d7bbfe60Sjtc.Ev SHOPTYPE .
180*d9f5a9dfSwiz.Sh FILES
181*d9f5a9dfSwiz.Bl -tag -width 24n -compact
182*d9f5a9dfSwiz.It Pa hack
183*d9f5a9dfSwizThe hack program.
184*d9f5a9dfSwiz.It Pa data, rumors
185*d9f5a9dfSwizData files used by hack.
186*d9f5a9dfSwiz.It Pa help, hh
187*d9f5a9dfSwizHelp data files.
188*d9f5a9dfSwiz.It Pa record
189*d9f5a9dfSwizThe list of topscorers.
190*d9f5a9dfSwiz.It Pa save
191*d9f5a9dfSwizA subdirectory containing the saved games.
192*d9f5a9dfSwiz.It Pa bones_dd
193*d9f5a9dfSwizDescriptions of the ghost and belongings of a deceased adventurer.
194*d9f5a9dfSwiz.It Pa xlock.dd
195*d9f5a9dfSwizDescription of a dungeon level.
196*d9f5a9dfSwiz.It Pa safelock
197*d9f5a9dfSwizLock file for xlock.
198*d9f5a9dfSwiz.It Pa record_lock
199*d9f5a9dfSwizLock file for record.
200*d9f5a9dfSwiz.El
201*d9f5a9dfSwiz.Sh AUTHORS
202*d9f5a9dfSwizJay Fenlason (+ Kenny Woodland, Mike Thome and Jon Payne) wrote the
203*d9f5a9dfSwizoriginal hack, very much like rogue (but full of bugs).
204*d9f5a9dfSwiz.Pp
205*d9f5a9dfSwizAndries Brouwer continuously deformed their sources into the current
206*d9f5a9dfSwizversion - in fact an entirely different game.
207d7bbfe60Sjtc.Sh BUGS
20861f28255ScgdProbably infinite.
20961f28255ScgdMail complaints to mcvax!aeb .
210