X-Git-Url: https://git.cameronkatri.com/bsdgames-darwin.git/blobdiff_plain/dd1a8e39b3a83266b1ed724eeccec96dc60cd87a..ef4d0c168ecc6f29f76a86ed3d1a69c2942c22db:/hack/hack.6?ds=inline diff --git a/hack/hack.6 b/hack/hack.6 index 5613912e..f77abcdb 100644 --- a/hack/hack.6 +++ b/hack/hack.6 @@ -1,47 +1,107 @@ -.\" $NetBSD: hack.6,v 1.8 2002/02/08 01:25:13 ross Exp $ -*- nroff -*- +.\" $NetBSD: hack.6,v 1.14 2004/06/01 10:10:06 wiz Exp $ -*- nroff -*- +.\" +.\" Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica, +.\" Amsterdam +.\" All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions are +.\" met: +.\" +.\" - Redistributions of source code must retain the above copyright notice, +.\" this list of conditions and the following disclaimer. +.\" +.\" - Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" +.\" - Neither the name of the Stichting Centrum voor Wiskunde en +.\" Informatica, nor the names of its contributors may be used to endorse or +.\" promote products derived from this software without specific prior +.\" written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS +.\" IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED +.\" TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A +.\" PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER +.\" OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, +.\" EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, +.\" PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR +.\" PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF +.\" LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING +.\" NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS +.\" SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. +.\" +.\" +.\" Copyright (c) 1982 Jay Fenlason +.\" All rights reserved. +.\" +.\" Redistribution and use in source and binary forms, with or without +.\" modification, are permitted provided that the following conditions +.\" are met: +.\" 1. Redistributions of source code must retain the above copyright +.\" notice, this list of conditions and the following disclaimer. +.\" 2. Redistributions in binary form must reproduce the above copyright +.\" notice, this list of conditions and the following disclaimer in the +.\" documentation and/or other materials provided with the distribution. +.\" 3. The name of the author may not be used to endorse or promote products +.\" derived from this software without specific prior written permission. +.\" +.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, +.\" INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY +.\" AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL +.\" THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, +.\" EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, +.\" PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; +.\" OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, +.\" WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR +.\" OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF +.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. +.\" .Dd March 31, 1985 .Dt HACK 6 .Os .Sh NAME .Nm hack -.Nd Exploring The Dungeons of Doom +.Nd exploring The Dungeons of Doom .Sh SYNOPSIS -.Nm /usr/games/hack +.Nm .Op Fl d Ar directory .Op Fl n .Op Fl u Ar playername -.Nm /usr/games/hack +.Nm .Op Fl d Ar directory .Op Fl s .Op Fl X .Op Ar playername ... .Sh DESCRIPTION .Nm -is a display oriented dungeons \*[Am] dragons - like game. +is a display oriented dungeons \*[Am] dragons-like game. Both display and command structure resemble rogue. (For a game with the same structure but entirely different display - a real cave instead of dull rectangles - try Quest.) .Pp -To get started you really only need to know two commands. The command -.Ic ? +To get started you really only need to know two commands. +The command +.Ic \&? will give you a list of the available commands and the command .Ic / will identify the things you see on the screen. .Pp -To win the game (as opposed to merely playing to beat other people high +To win the game (as opposed to merely playing to beat other people's high scores) you must locate the Amulet of Yendor which is somewhere below -the 20th level of the dungeon and get it out. Nobody has achieved this -yet and if somebody does, he will probably go down in history as a hero -among heroes. +the 20th level of the dungeon and get it out. +Nobody has achieved this yet and if somebody does, he will probably go +down in history as a hero among heroes. .Pp When the game ends, either by your death, when you quit, or if you escape from the caves, .Nm -will give you (a fragment of) the list of top scorers. The scoring -is based on many aspects of your behavior but a rough estimate is -obtained by taking the amount of gold you've found in the cave plus four -times your (real) experience. Precious stones may be worth a lot of gold -when brought to the exit. +will give you (a fragment of) the list of top scorers. +The scoring is based on many aspects of your behavior but a rough estimate +is obtained by taking the amount of gold you've found in the cave plus four +times your (real) experience. +Precious stones may be worth a lot of gold when brought to the exit. There is a 10% penalty for getting yourself killed. .Pp The administration of the game is kept in the directory specified with the @@ -80,7 +140,8 @@ then this supplies the answer to the question "What kind of character ... ?". .Pp The .Fl s -option will print out the list of your scores. It may be followed by arguments +option will print out the list of your scores. +It may be followed by arguments .Fl X where X is one of the letters C, F, K, S, T, W to print the scores of Cavemen, Fighters, Knights, Speleologists, Tourists or Wizards. @@ -128,7 +189,8 @@ Pager used instead of default pager. .It Ev MAIL Mailbox file. .It Ev MAILREADER -Reader used instead of default (probably /usr/bin/mail). +Reader used instead of default (probably +.Pa /usr/bin/mail ) . .It Ev HACKDIR Playground. .It Ev HACKOPTIONS