123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210 |
- .\" $NetBSD: hack.6,v 1.14 2004/06/01 10:10:06 wiz Exp $ -*- nroff -*-
- .\"
- .\" Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica,
- .\" Amsterdam
- .\" All rights reserved.
- .\"
- .\" Redistribution and use in source and binary forms, with or without
- .\" modification, are permitted provided that the following conditions are
- .\" met:
- .\"
- .\" - Redistributions of source code must retain the above copyright notice,
- .\" this list of conditions and the following disclaimer.
- .\"
- .\" - Redistributions in binary form must reproduce the above copyright
- .\" notice, this list of conditions and the following disclaimer in the
- .\" documentation and/or other materials provided with the distribution.
- .\"
- .\" - Neither the name of the Stichting Centrum voor Wiskunde en
- .\" Informatica, nor the names of its contributors may be used to endorse or
- .\" promote products derived from this software without specific prior
- .\" written permission.
- .\"
- .\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
- .\" IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
- .\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
- .\" PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
- .\" OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
- .\" EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
- .\" PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
- .\" PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
- .\" LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
- .\" NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
- .\" SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- .\"
- .\"
- .\" Copyright (c) 1982 Jay Fenlason <hack@gnu.org>
- .\" All rights reserved.
- .\"
- .\" Redistribution and use in source and binary forms, with or without
- .\" modification, are permitted provided that the following conditions
- .\" are met:
- .\" 1. Redistributions of source code must retain the above copyright
- .\" notice, this list of conditions and the following disclaimer.
- .\" 2. Redistributions in binary form must reproduce the above copyright
- .\" notice, this list of conditions and the following disclaimer in the
- .\" documentation and/or other materials provided with the distribution.
- .\" 3. The name of the author may not be used to endorse or promote products
- .\" derived from this software without specific prior written permission.
- .\"
- .\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
- .\" INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
- .\" AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
- .\" THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
- .\" EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
- .\" PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
- .\" OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
- .\" WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
- .\" OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
- .\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- .\"
- .Dd March 31, 1985
- .Dt HACK 6
- .Os
- .Sh NAME
- .Nm hack
- .Nd exploring The Dungeons of Doom
- .Sh SYNOPSIS
- .Nm
- .Op Fl d Ar directory
- .Op Fl n
- .Op Fl u Ar playername
- .Nm
- .Op Fl d Ar directory
- .Op Fl s
- .Op Fl X
- .Op Ar playername ...
- .Sh DESCRIPTION
- .Nm
- is a display oriented dungeons \*[Am] dragons-like game.
- Both display and command structure resemble rogue.
- (For a game with the same structure but entirely different display -
- a real cave instead of dull rectangles - try Quest.)
- .Pp
- To get started you really only need to know two commands.
- The command
- .Ic \&?
- will give you a list of the available commands and the command
- .Ic /
- will identify the things you see on the screen.
- .Pp
- To win the game (as opposed to merely playing to beat other people's high
- scores) you must locate the Amulet of Yendor which is somewhere below
- the 20th level of the dungeon and get it out.
- Nobody has achieved this yet and if somebody does, he will probably go
- down in history as a hero among heroes.
- .Pp
- When the game ends, either by your death, when you quit, or if you escape
- from the caves,
- .Nm
- will give you (a fragment of) the list of top scorers.
- The scoring is based on many aspects of your behavior but a rough estimate
- is obtained by taking the amount of gold you've found in the cave plus four
- times your (real) experience.
- Precious stones may be worth a lot of gold when brought to the exit.
- There is a 10% penalty for getting yourself killed.
- .Pp
- The administration of the game is kept in the directory specified with the
- .Fl d
- option, or, if no such option is given, in the directory specified by
- the environment variable
- .Ev HACKDIR ,
- or, if no such variable exists, in the current directory.
- This same directory contains several auxiliary files such as lockfiles and
- the list of topscorers and a subdirectory
- .Pa save
- where games are saved.
- The game administrator may however choose to install hack with a fixed
- playing ground, usually
- .Pa @hack_dir@ .
- .Pp
- The
- .Fl n
- option suppresses printing of the news.
- .Pp
- The
- .Fl u
- .Ar playername
- option supplies the answer to the question "Who are you?".
- When
- .Ar playername
- has as suffix one of
- .Em -T ,
- .Em -S ,
- .Em -K ,
- .Em -F ,
- .Em -C ,
- or
- .Em -W ,
- then this supplies the answer to the question "What kind of character ... ?".
- .Pp
- The
- .Fl s
- option will print out the list of your scores.
- It may be followed by arguments
- .Fl X
- where X is one of the letters C, F, K, S, T, W to print the scores of
- Cavemen, Fighters, Knights, Speleologists, Tourists or Wizards.
- It may also be followed by one or more player names to print the scores of the
- players mentioned.
- .Sh AUTHORS
- Jay Fenlason (+ Kenny Woodland, Mike Thome and Jon Payne) wrote the
- original hack, very much like rogue (but full of bugs).
- .br
- Andries Brouwer continuously deformed their sources into the current
- version - in fact an entirely different game.
- .Sh FILES
- .Bl -tag -width 24n -compact
- .It Pa hack
- The hack program.
- .It Pa data, rumors
- Data files used by hack.
- .It Pa help, hh
- Help data files.
- .It Pa record
- The list of topscorers.
- .It Pa save
- A subdirectory containing the saved games.
- .It Pa bones_dd
- Descriptions of the ghost and belongings of a deceased adventurer.
- .It Pa xlock.dd
- Description of a dungeon level.
- .It Pa safelock
- Lock file for xlock.
- .It Pa record_lock
- Lock file for record.
- .El
- .Sh ENVIRONMENT
- .Bl -tag -width 24n -compact
- .It Ev USER No or Ev LOGNAME
- Your login name.
- .It Ev HOME
- Your home directory.
- .It Ev SHELL
- Your shell.
- .It Ev TERM
- The type of your terminal.
- .It Ev HACKPAGER, PAGER
- Pager used instead of default pager.
- .It Ev MAIL
- Mailbox file.
- .It Ev MAILREADER
- Reader used instead of default (probably
- .Pa /usr/bin/mail ) .
- .It Ev HACKDIR
- Playground.
- .It Ev HACKOPTIONS
- String predefining several hack options (see help file).
- .El
- .Pp
- Several other environment variables are used in debugging (wizard) mode,
- like
- .Ev GENOCIDED ,
- .Ev INVENT ,
- .Ev MAGIC
- and
- .Ev SHOPTYPE .
- .Sh BUGS
- Probably infinite.
- Mail complaints to mcvax!aeb .
|