home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
FishMarket 1.0
/
FishMarket v1.0.iso
/
fishies
/
001-025
/
disk_007
/
hack.man
< prev
next >
Wrap
Text File
|
1992-05-06
|
4KB
|
133 lines
HACK(6) UNIX Programmer's Manual HACK(6)
NAME
hack - Exploring The Dungeons of Doom
SYNOPSIS
/usr/games/hack [ -d _d_i_r_e_c_t_o_r_y ] [ -n ] [ -u _p_l_a_y_e_r_n_a_m_e ]
/usr/games/hack [ -d _d_i_r_e_c_t_o_r_y ] -s [ -X ] [ _p_l_a_y_e_r_n_a_m_e_s ]
DESCRIPTION
_H_a_c_k is a display oriented dungeons & dragons - like game.
Both display and command structure resemble rogue. (For a
game with the same structure but entirely different display
- a real cave instead of dull rectangles - try Quest.)
To get started you really only need to know two commands.
The command ? will give you a list of the available commands
and the command / will identify the things you see on the
screen.
To win the game (as opposed to merely playing to beat other
people high scores) you must locate the Amulet of Yendor
which is somewhere below the 20th level of the dungeon and
get it out. Nobody has achieved this yet and if somebody
does, he will probably go down in history as a hero among
heros.
When the game ends, either by your death, when you quit, or
if you escape from the caves, _h_a_c_k will give you (a fragment
of) the list of top scorers. The scoring is based on many
aspects of your behaviour but a rough estimate is obtained
by taking the amount of gold you've found in the cave plus
four times your (real) experience. Precious stones may be
worth a lot of gold when brought to the exit. There is a
10% penalty for getting yourself killed.
The administration of the game is kept in the directory
specified with the -d option, or, if no such option is
given, in the directory specified by the environment vari-
able HACKDIR, or, if no such variable exists, in the current
directory. This same directory contains several auxiliary
files such as lockfiles and the list of topscorers and a
subdirectory _s_a_v_e where games are saved.
The -n option suppresses printing of the news.
The -u _p_l_a_y_e_r_n_a_m_e option supplies the answer to the question
"Who are you?". When _p_l_a_y_e_r_n_a_m_e has as suffix one of -T -S
-K -F -C -W then this supplies the answer to the question
"What kind of character ... ?".
The -s option will print out the list of your scores. It may
be followed by arguments -X where X is one of the letters C,
F, K, S, T, W to print the scores of Cavemen, Fighters,
Printed 12/23/84 12 December 1984 1
HACK(6) UNIX Programmer's Manual HACK(6)
Knights, Speleologists, Tourists or Wizards. It may also be
followed by one or more player names to print the scores of
the players mentioned.
AUTHORS
Jay Fenlason (+ Kenny Woodland, Mike Thome and Jon Payne)
wrote the original hack, very much like rogue (but full of
bugs).
Andries Brouwer continuously deformed their sources into the
current version - in fact an entirely different game.
FILES
hack, mklev The hack program and an auxiliary
program called by hack.
data, help, rumors Data files used by hack.
record The list of topscorers.
save A subdirectory containing the saved
games.
bones_dd Descriptions of the ghost and
belongings of a deceased adventurer.
BUGS
Probably infinite. Mail complaints to mcvax!aeb .
Printed 12/23/84 12 December 1984 2