X-Git-Url: https://git.cameronkatri.com/bsdgames-darwin.git/blobdiff_plain/94b5353c71e7246077d468afe68d51ce85fc213d..ef4d0c168ecc6f29f76a86ed3d1a69c2942c22db:/hack/hack.6 diff --git a/hack/hack.6 b/hack/hack.6 index 42af6082..f77abcdb 100644 --- a/hack/hack.6 +++ b/hack/hack.6 @@ -1,61 +1,121 @@ -.\" $NetBSD: hack.6,v 1.4 1995/03/23 08:29:44 cgd Exp $ -*- nroff -*- +.\" $NetBSD: hack.6,v 1.14 2004/06/01 10:10:06 wiz Exp $ -*- nroff -*- +.\" +.\" Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica, +.\" Amsterdam +.\" All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions are +.\" met: +.\" +.\" - Redistributions of source code must retain the above copyright notice, +.\" this list of conditions and the following disclaimer. +.\" +.\" - Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" +.\" - Neither the name of the Stichting Centrum voor Wiskunde en +.\" Informatica, nor the names of its contributors may be used to endorse or +.\" promote products derived from this software without specific prior +.\" written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS +.\" IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED +.\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A +.\" PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER +.\" OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, +.\" EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, +.\" PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR +.\" PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF +.\" LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING +.\" NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS +.\" SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. +.\" +.\" +.\" Copyright (c) 1982 Jay Fenlason +.\" All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. The name of the author may not be used to endorse or promote products +.\" derived from this software without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, +.\" INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY +.\" AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL +.\" THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, +.\" EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, +.\" PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; +.\" OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, +.\" WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR +.\" OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF +.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. +.\" .Dd March 31, 1985 .Dt HACK 6 .Os .Sh NAME .Nm hack -.Nd Exploring The Dungeons of Doom +.Nd exploring The Dungeons of Doom .Sh SYNOPSIS -.Nm /usr/games/hack +.Nm .Op Fl d Ar directory .Op Fl n .Op Fl u Ar playername -.Nm /usr/games/hack +.Nm .Op Fl d Ar directory .Op Fl s .Op Fl X .Op Ar playername ... .Sh DESCRIPTION -.Nm Hack -is a display oriented dungeons & dragons - like game. +.Nm +is a display oriented dungeons \*[Am] dragons-like game. Both display and command structure resemble rogue. (For a game with the same structure but entirely different display - a real cave instead of dull rectangles - try Quest.) .Pp -To get started you really only need to know two commands. The command -.Ic ? +To get started you really only need to know two commands. +The command +.Ic \&? will give you a list of the available commands and the command .Ic / will identify the things you see on the screen. .Pp -To win the game (as opposed to merely playing to beat other people high +To win the game (as opposed to merely playing to beat other people's high scores) you must locate the Amulet of Yendor which is somewhere below -the 20th level of the dungeon and get it out. Nobody has achieved this -yet and if somebody does, he will probably go down in history as a hero -among heroes. +the 20th level of the dungeon and get it out. +Nobody has achieved this yet and if somebody does, he will probably go +down in history as a hero among heroes. .Pp When the game ends, either by your death, when you quit, or if you escape from the caves, -.Nm hack -will give you (a fragment of) the list of top scorers. The scoring -is based on many aspects of your behavior but a rough estimate is -obtained by taking the amount of gold you've found in the cave plus four -times your (real) experience. Precious stones may be worth a lot of gold -when brought to the exit. +.Nm +will give you (a fragment of) the list of top scorers. +The scoring is based on many aspects of your behavior but a rough estimate +is obtained by taking the amount of gold you've found in the cave plus four +times your (real) experience. +Precious stones may be worth a lot of gold when brought to the exit. There is a 10% penalty for getting yourself killed. .Pp The administration of the game is kept in the directory specified with the .Fl d option, or, if no such option is given, in the directory specified by -the environment variable -.Ev HACKDIR , +the environment variable +.Ev HACKDIR , or, if no such variable exists, in the current directory. This same directory contains several auxiliary files such as lockfiles and the list of topscorers and a subdirectory .Pa save where games are saved. The game administrator may however choose to install hack with a fixed -playing ground, usually +playing ground, usually .Pa /var/games/hackdir . .Pp The @@ -75,12 +135,13 @@ has as suffix one of .Em -F , .Em -C , or -.Em -W, +.Em -W , then this supplies the answer to the question "What kind of character ... ?". .Pp The .Fl s -option will print out the list of your scores. It may be followed by arguments +option will print out the list of your scores. +It may be followed by arguments .Fl X where X is one of the letters C, F, K, S, T, W to print the scores of Cavemen, Fighters, Knights, Speleologists, Tourists or Wizards. @@ -128,7 +189,8 @@ Pager used instead of default pager. .It Ev MAIL Mailbox file. .It Ev MAILREADER -Reader used instead of default (probably /bin/mail or /usr/ucb/mail). +Reader used instead of default (probably +.Pa /usr/bin/mail ) . .It Ev HACKDIR Playground. .It Ev HACKOPTIONS @@ -136,10 +198,10 @@ String predefining several hack options (see help file). .El .Pp Several other environment variables are used in debugging (wizard) mode, -like +like .Ev GENOCIDED , -.Ev INVENT , -.Ev MAGIC +.Ev INVENT , +.Ev MAGIC and .Ev SHOPTYPE . .Sh BUGS