1*25a24f0bSjsg.\" $OpenBSD: hack.6,v 1.23 2022/02/18 23:17:14 jsg Exp $ 29498368bSjmc.\" $NetBSD: hack.6,v 1.5 1995/07/03 19:44:30 jtc Exp $ 3d25013f2Scamield.\" 4d25013f2Scamield.\" Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica, 5d25013f2Scamield.\" Amsterdam 6d25013f2Scamield.\" All rights reserved. 7d25013f2Scamield.\" 8d25013f2Scamield.\" Redistribution and use in source and binary forms, with or without 9d25013f2Scamield.\" modification, are permitted provided that the following conditions are 10d25013f2Scamield.\" met: 11d25013f2Scamield.\" 12d25013f2Scamield.\" - Redistributions of source code must retain the above copyright notice, 13d25013f2Scamield.\" this list of conditions and the following disclaimer. 14d25013f2Scamield.\" 15d25013f2Scamield.\" - Redistributions in binary form must reproduce the above copyright 16d25013f2Scamield.\" notice, this list of conditions and the following disclaimer in the 17d25013f2Scamield.\" documentation and/or other materials provided with the distribution. 18d25013f2Scamield.\" 19d25013f2Scamield.\" - Neither the name of the Stichting Centrum voor Wiskunde en 20d25013f2Scamield.\" Informatica, nor the names of its contributors may be used to endorse or 21d25013f2Scamield.\" promote products derived from this software without specific prior 22d25013f2Scamield.\" written permission. 23d25013f2Scamield.\" 24d25013f2Scamield.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS 25d25013f2Scamield.\" IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 26d25013f2Scamield.\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A 27d25013f2Scamield.\" PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER 28d25013f2Scamield.\" OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, 29d25013f2Scamield.\" EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, 30d25013f2Scamield.\" PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 31d25013f2Scamield.\" PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 32d25013f2Scamield.\" LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 33d25013f2Scamield.\" NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 34d25013f2Scamield.\" SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 35d25013f2Scamield.\" 36d25013f2Scamield.\" 37d25013f2Scamield.\" Copyright (c) 1982 Jay Fenlason <hack@gnu.org> 38d25013f2Scamield.\" All rights reserved. 39d25013f2Scamield.\" 40d25013f2Scamield.\" Redistribution and use in source and binary forms, with or without 41d25013f2Scamield.\" modification, are permitted provided that the following conditions 42d25013f2Scamield.\" are met: 43d25013f2Scamield.\" 1. Redistributions of source code must retain the above copyright 44d25013f2Scamield.\" notice, this list of conditions and the following disclaimer. 45d25013f2Scamield.\" 2. Redistributions in binary form must reproduce the above copyright 46d25013f2Scamield.\" notice, this list of conditions and the following disclaimer in the 47d25013f2Scamield.\" documentation and/or other materials provided with the distribution. 48d25013f2Scamield.\" 3. The name of the author may not be used to endorse or promote products 49d25013f2Scamield.\" derived from this software without specific prior written permission. 50d25013f2Scamield.\" 51d25013f2Scamield.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, 52d25013f2Scamield.\" INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY 53d25013f2Scamield.\" AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL 54d25013f2Scamield.\" THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, 55d25013f2Scamield.\" EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, 56d25013f2Scamield.\" PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; 57d25013f2Scamield.\" OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, 58d25013f2Scamield.\" WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR 59d25013f2Scamield.\" OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF 60d25013f2Scamield.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 61d25013f2Scamield.\" 62*25a24f0bSjsg.Dd $Mdocdate: February 18 2022 $ 63df930be7Sderaadt.Dt HACK 6 64df930be7Sderaadt.Os 65df930be7Sderaadt.Sh NAME 66df930be7Sderaadt.Nm hack 67df930be7Sderaadt.Nd Exploring The Dungeons of Doom 68df930be7Sderaadt.Sh SYNOPSIS 69a702fa09Spjanzen.Nm hack 70df930be7Sderaadt.Op Fl n 7106c83a8dSjmc.Op Fl d Ar directory 72df930be7Sderaadt.Op Fl u Ar playername 73a702fa09Spjanzen.Nm hack 7406c83a8dSjmc.Op Fl sX 75df930be7Sderaadt.Op Fl d Ar directory 76df930be7Sderaadt.Op Ar playername ... 77df930be7Sderaadt.Sh DESCRIPTION 783897dfeeSpjanzen.Nm 79df930be7Sderaadtis a display oriented dungeons & dragons - like game. 80df930be7SderaadtBoth display and command structure resemble rogue. 81df930be7Sderaadt(For a game with the same structure but entirely different display - 82df930be7Sderaadta real cave instead of dull rectangles - try Quest.) 83df930be7Sderaadt.Pp 84643075cfSpjanzenTo get started you really only need to know two commands. 85643075cfSpjanzenThe command 86e0ba81e6Sjmc.Ic ?\& 87df930be7Sderaadtwill give you a list of the available commands and the command 88df930be7Sderaadt.Ic / 89df930be7Sderaadtwill identify the things you see on the screen. 90df930be7Sderaadt.Pp 914bae03b6SjmcTo win the game (as opposed to merely playing to beat other people's high 92df930be7Sderaadtscores) you must locate the Amulet of Yendor which is somewhere below 9315facedeSjmcthe 20th level of the dungeon and get it out. 94*25a24f0bSjsgNobody has achieved this yet and whoever does 95*25a24f0bSjsgwill probably go down in history as a hero among heroes. 96df930be7Sderaadt.Pp 97df930be7SderaadtWhen the game ends, either by your death, when you quit, or if you escape 98df930be7Sderaadtfrom the caves, 993897dfeeSpjanzen.Nm 100643075cfSpjanzenwill give you (a fragment of) the list of top scorers. 101643075cfSpjanzenThe scoring is based on many aspects of your behavior but a rough estimate is 102df930be7Sderaadtobtained by taking the amount of gold you've found in the cave plus four 103643075cfSpjanzentimes your (real) experience. 104643075cfSpjanzenPrecious stones may be worth a lot of gold when brought to the exit. 105df930be7SderaadtThere is a 10% penalty for getting yourself killed. 106df930be7Sderaadt.Pp 107df930be7SderaadtThe administration of the game is kept in the directory specified with the 108df930be7Sderaadt.Fl d 1090870f47dSjmcoption or, if no such option is given, in the directory specified by 110df930be7Sderaadtthe environment variable 111df930be7Sderaadt.Ev HACKDIR , 112df930be7Sderaadtor, if no such variable exists, in the current directory. 113df930be7SderaadtThis same directory contains several auxiliary files such as lockfiles and 114df930be7Sderaadtthe list of topscorers and a subdirectory 115df930be7Sderaadt.Pa save 116df930be7Sderaadtwhere games are saved. 117df930be7Sderaadt.Pp 118df930be7SderaadtThe 119df930be7Sderaadt.Fl n 120df930be7Sderaadtoption suppresses printing of the news. 121df930be7Sderaadt.Pp 122df930be7SderaadtThe 123df930be7Sderaadt.Fl u 124df930be7Sderaadt.Ar playername 125df930be7Sderaadtoption supplies the answer to the question "Who are you?". 126df930be7SderaadtWhen 127df930be7Sderaadt.Ar playername 128df930be7Sderaadthas as suffix one of 129df930be7Sderaadt.Em -T , 130df930be7Sderaadt.Em -S , 131df930be7Sderaadt.Em -K , 132df930be7Sderaadt.Em -F , 133df930be7Sderaadt.Em -C , 134df930be7Sderaadtor 135df930be7Sderaadt.Em -W , 136df930be7Sderaadtthen this supplies the answer to the question "What kind of character ... ?". 137df930be7Sderaadt.Pp 138df930be7SderaadtThe 139df930be7Sderaadt.Fl s 140643075cfSpjanzenoption will print out the list of your scores. 141643075cfSpjanzenIt may be followed by arguments 142df930be7Sderaadt.Fl X 143df930be7Sderaadtwhere X is one of the letters C, F, K, S, T, W to print the scores of 144df930be7SderaadtCavemen, Fighters, Knights, Speleologists, Tourists or Wizards. 145df930be7SderaadtIt may also be followed by one or more player names to print the scores of the 146df930be7Sderaadtplayers mentioned. 147df930be7Sderaadt.Sh ENVIRONMENT 148df930be7Sderaadt.Bl -tag -width 24n -compact 149df930be7Sderaadt.It Ev USER No or Ev LOGNAME 150df930be7SderaadtYour login name. 151df930be7Sderaadt.It Ev HOME 152df930be7SderaadtYour home directory. 153df930be7Sderaadt.It Ev SHELL 154df930be7SderaadtYour shell. 155df930be7Sderaadt.It Ev TERM 156df930be7SderaadtThe type of your terminal. 157df930be7Sderaadt.It Ev HACKPAGER , PAGER 158df930be7SderaadtPager used instead of default pager. 159df930be7Sderaadt.It Ev MAIL 160df930be7SderaadtMailbox file. 161df930be7Sderaadt.It Ev MAILREADER 162df930be7SderaadtReader used instead of default (probably /usr/bin/mail). 163df930be7Sderaadt.It Ev HACKDIR 164df930be7SderaadtPlayground. 165df930be7Sderaadt.It Ev HACKOPTIONS 166df930be7SderaadtString predefining several hack options (see help file). 167df930be7Sderaadt.El 168df930be7Sderaadt.Pp 169df930be7SderaadtSeveral other environment variables are used in debugging (wizard) mode, 170df930be7Sderaadtlike 171df930be7Sderaadt.Ev GENOCIDED , 172df930be7Sderaadt.Ev INVENT , 173df930be7Sderaadt.Ev MAGIC 174df930be7Sderaadtand 175df930be7Sderaadt.Ev SHOPTYPE . 176df756572Spjanzen.Sh FILES 177df756572Spjanzen.Bl -tag -width 24n -compact 178df756572Spjanzen.It Pa hack 179df756572SpjanzenThe hack program. 180df756572Spjanzen.It Pa data , rumors 181df756572SpjanzenData files used by hack. 182df756572Spjanzen.It Pa help , hh 183df756572SpjanzenHelp data files. 184df756572Spjanzen.It Pa record 185df756572SpjanzenThe list of topscorers. 186df756572Spjanzen.It Pa save 187df756572SpjanzenA subdirectory containing the saved games. 188df756572Spjanzen.It Pa bones_dd 189df756572SpjanzenDescriptions of the ghost and belongings of a deceased adventurer. 190df756572Spjanzen.It Pa xlock.dd 191df756572SpjanzenDescription of a dungeon level. 192df756572Spjanzen.It Pa safelock 193df756572SpjanzenLock file for xlock. 194df756572Spjanzen.It Pa record_lock 195df756572SpjanzenLock file for record. 196df756572Spjanzen.El 197df756572Spjanzen.Sh AUTHORS 19827e95970Sschwarze.An -nosplit 19927e95970Sschwarze.An Jay Fenlason 20027e95970Sschwarze.Po + 20127e95970Sschwarze.An Kenny Woodland , 20227e95970Sschwarze.An Mike Thome 20327e95970Sschwarzeand 20427e95970Sschwarze.An Jon Payne 20527e95970Sschwarze.Pc 20627e95970Sschwarzewrote the original hack, very much like rogue (but full of bugs). 20706c83a8dSjmc.Pp 20827e95970Sschwarze.An Andries Brouwer 20927e95970Sschwarzecontinuously deformed their sources into the current 21006c83a8dSjmcversion \(en in fact an entirely different game. 211