1 .\" $NetBSD: hack.6,v 1.11 2003/02/25 10:34:45 wiz Exp $ -*- nroff -*-
7 .Nd exploring The Dungeons of Doom
12 .Op Fl u Ar playername
20 is a display oriented dungeons \*[Am] dragons-like game.
21 Both display and command structure resemble rogue.
22 (For a game with the same structure but entirely different display -
23 a real cave instead of dull rectangles - try Quest.)
25 To get started you really only need to know two commands.
28 will give you a list of the available commands and the command
30 will identify the things you see on the screen.
32 To win the game (as opposed to merely playing to beat other people high
33 scores) you must locate the Amulet of Yendor which is somewhere below
34 the 20th level of the dungeon and get it out.
35 Nobody has achieved this yet and if somebody does, he will probably go
36 down in history as a hero among heroes.
38 When the game ends, either by your death, when you quit, or if you escape
41 will give you (a fragment of) the list of top scorers.
42 The scoring is based on many aspects of your behavior but a rough estimate
43 is obtained by taking the amount of gold you've found in the cave plus four
44 times your (real) experience.
45 Precious stones may be worth a lot of gold when brought to the exit.
46 There is a 10% penalty for getting yourself killed.
48 The administration of the game is kept in the directory specified with the
50 option, or, if no such option is given, in the directory specified by
51 the environment variable
53 or, if no such variable exists, in the current directory.
54 This same directory contains several auxiliary files such as lockfiles and
55 the list of topscorers and a subdirectory
57 where games are saved.
58 The game administrator may however choose to install hack with a fixed
59 playing ground, usually
60 .Pa /var/games/hackdir .
64 option suppresses printing of the news.
69 option supplies the answer to the question "Who are you?".
80 then this supplies the answer to the question "What kind of character ... ?".
84 option will print out the list of your scores.
85 It may be followed by arguments
87 where X is one of the letters C, F, K, S, T, W to print the scores of
88 Cavemen, Fighters, Knights, Speleologists, Tourists or Wizards.
89 It may also be followed by one or more player names to print the scores of the
92 Jay Fenlason (+ Kenny Woodland, Mike Thome and Jon Payne) wrote the
93 original hack, very much like rogue (but full of bugs).
95 Andries Brouwer continuously deformed their sources into the current
96 version - in fact an entirely different game.
98 .Bl -tag -width 24n -compact
102 Data files used by hack.
106 The list of topscorers.
108 A subdirectory containing the saved games.
110 Descriptions of the ghost and belongings of a deceased adventurer.
112 Description of a dungeon level.
116 Lock file for record.
119 .Bl -tag -width 24n -compact
120 .It Ev USER No or Ev LOGNAME
127 The type of your terminal.
128 .It Ev HACKPAGER, PAGER
129 Pager used instead of default pager.
133 Reader used instead of default (probably
134 .Pa /usr/bin/mail ) .
138 String predefining several hack options (see help file).
141 Several other environment variables are used in debugging (wizard) mode,
150 Mail complaints to mcvax!aeb .