From 1eab3098b53492a24a79c4bd4069a9229f82375f Mon Sep 17 00:00:00 2001 From: Elronnd Date: Wed, 15 Mar 2017 21:55:59 -0700 Subject: [PATCH] NHDT->ANH, nethack->anethack, nhdat->anhdat --- .gitignore | 1 + dat/Arch.des | 4 +- dat/Barb.des | 4 +- dat/Caveman.des | 4 +- dat/Healer.des | 4 +- dat/Knight.des | 4 +- dat/Monk.des | 4 +- dat/Priest.des | 4 +- dat/Ranger.des | 4 +- dat/Rogue.des | 4 +- dat/Samurai.des | 4 +- dat/Tourist.des | 4 +- dat/Valkyrie.des | 4 +- dat/Wizard.des | 4 +- dat/bigroom.des | 4 +- dat/castle.des | 4 +- dat/data.base | 4 +- dat/dungeon.def | 4 +- dat/endgame.des | 4 +- dat/gehennom.des | 4 +- dat/knox.des | 4 +- dat/medusa.des | 4 +- dat/mines.des | 4 +- dat/oracle.des | 4 +- dat/quest.txt | 6 +- dat/rumors.fal | 30 +- dat/sokoban.des | 4 +- dat/tower.des | 4 +- dat/yendor.des | 4 +- doc/Guidebook.mn | 340 +++++----- doc/Guidebook.tex | 338 +++++----- doc/Guidebook.txt | 602 +++++++++--------- doc/{nethack.6 => anethack.6} | 54 +- doc/{nethack.txt => anethack.txt} | 50 +- doc/config.nh | 46 +- doc/dgn_comp.6 | 14 +- doc/dgn_comp.txt | 12 +- doc/dlb.6 | 20 +- doc/dlb.txt | 14 +- doc/fixes22.0 | 6 +- doc/fixes30.0 | 2 +- doc/fixes31.1 | 4 +- doc/fixes31.2 | 2 +- doc/fixes32.1 | 2 +- doc/fixes32.3 | 2 +- doc/fixes33.0 | 8 +- doc/fixes33.1 | 8 +- doc/fixes34.0 | 2 +- doc/fixes34.1 | 6 +- doc/fixes34.2 | 6 +- doc/fixes34.3 | 2 +- doc/fixes35.0 | 4 +- doc/fixes36.0 | 22 +- doc/fixes36.1 | 12 +- doc/lev_comp.6 | 12 +- doc/lev_comp.txt | 10 +- doc/makedefs.6 | 12 +- doc/makedefs.txt | 10 +- doc/recover.6 | 36 +- doc/recover.txt | 30 +- doc/window.doc | 36 +- include/align.h | 4 +- include/amiconf.h | 16 +- include/artifact.h | 4 +- include/artilist.h | 4 +- include/attrib.h | 4 +- include/beconf.h | 4 +- include/botl.h | 4 +- include/color.h | 4 +- include/config.h | 46 +- include/config1.h | 6 +- include/context.h | 4 +- include/coord.h | 4 +- include/decl.h | 4 +- include/def_os2.h | 4 +- include/dgn_file.h | 4 +- include/display.h | 4 +- include/dlb.h | 6 +- include/dungeon.h | 4 +- include/engrave.h | 4 +- include/extern.h | 4 +- include/flag.h | 6 +- include/func_tab.h | 4 +- include/gem_rsc.h | 4 +- include/global.h | 8 +- include/hack.h | 8 +- include/integer.h | 4 +- include/lev.h | 4 +- include/lint.h | 4 +- include/mac-carbon.h | 4 +- include/mac-qt.h | 4 +- include/mac-term.h | 6 +- include/macconf.h | 4 +- include/macpopup.h | 4 +- include/mactty.h | 4 +- include/macwin.h | 4 +- include/mail.h | 4 +- include/mextra.h | 4 +- include/mfndpos.h | 4 +- include/micro.h | 4 +- include/mkroom.h | 4 +- include/monattk.h | 4 +- include/mondata.h | 4 +- include/monflag.h | 4 +- include/monst.h | 4 +- include/monsym.h | 4 +- include/mttypriv.h | 4 +- include/ntconf.h | 6 +- include/obj.h | 4 +- include/objclass.h | 4 +- include/os2conf.h | 6 +- include/patchlevel.h | 17 +- include/pcconf.h | 10 +- include/permonst.h | 4 +- include/prop.h | 6 +- include/qt_clust.h | 4 +- include/qt_kde0.h | 4 +- include/qt_win.h | 254 ++++---- include/qtext.h | 4 +- include/qttableview.h | 2 +- include/quest.h | 4 +- include/rect.h | 4 +- include/region.h | 4 +- include/rm.h | 6 +- include/skills.h | 4 +- include/sp_lev.h | 6 +- include/spell.h | 4 +- include/sys.h | 4 +- include/system.h | 4 +- include/tcap.h | 4 +- include/tile2x11.h | 4 +- include/tileset.h | 4 +- include/timeout.h | 4 +- include/tosconf.h | 4 +- include/tradstdc.h | 10 +- include/trampoli.h | 4 +- include/trap.h | 4 +- include/unixconf.h | 12 +- include/vision.h | 4 +- include/vmsconf.h | 28 +- include/wceconf.h | 4 +- include/winGnome.h | 4 +- include/winX.h | 6 +- include/winami.h | 4 +- include/wingem.h | 4 +- include/winprocs.h | 4 +- include/wintty.h | 4 +- include/wintype.h | 4 +- include/xwindow.h | 4 +- include/xwindowp.h | 4 +- include/you.h | 4 +- include/youprop.h | 4 +- src/allmain.c | 10 +- src/alloc.c | 6 +- src/apply.c | 6 +- src/artifact.c | 6 +- src/attrib.c | 4 +- src/ball.c | 4 +- src/bones.c | 4 +- src/botl.c | 4 +- src/cmd.c | 10 +- src/dbridge.c | 4 +- src/decl.c | 4 +- src/detect.c | 4 +- src/dig.c | 4 +- src/display.c | 4 +- src/dlb.c | 8 +- src/do.c | 8 +- src/do_name.c | 4 +- src/do_wear.c | 4 +- src/dog.c | 4 +- src/dogmove.c | 6 +- src/dokick.c | 4 +- src/dothrow.c | 4 +- src/drawing.c | 8 +- src/dungeon.c | 4 +- src/eat.c | 4 +- src/end.c | 16 +- src/engrave.c | 4 +- src/exper.c | 4 +- src/explode.c | 4 +- src/extralev.c | 6 +- src/files.c | 60 +- src/fountain.c | 4 +- src/hack.c | 4 +- src/hacklib.c | 6 +- src/invent.c | 6 +- src/light.c | 4 +- src/lock.c | 4 +- src/mail.c | 10 +- src/makemon.c | 4 +- src/mapglyph.c | 4 +- src/mcastu.c | 4 +- src/mhitm.c | 4 +- src/mhitu.c | 4 +- src/minion.c | 4 +- src/mklev.c | 4 +- src/mkmap.c | 4 +- src/mkmaze.c | 4 +- src/mkobj.c | 4 +- src/mkroom.c | 4 +- src/mon.c | 4 +- src/mondata.c | 4 +- src/monmove.c | 4 +- src/monst.c | 4 +- src/mplayer.c | 6 +- src/mthrowu.c | 4 +- src/muse.c | 4 +- src/music.c | 6 +- src/o_init.c | 4 +- src/objects.c | 4 +- src/objnam.c | 4 +- src/options.c | 36 +- src/pager.c | 14 +- src/pickup.c | 4 +- src/pline.c | 6 +- src/polyself.c | 4 +- src/potion.c | 4 +- src/pray.c | 4 +- src/priest.c | 4 +- src/quest.c | 4 +- src/questpgr.c | 4 +- src/read.c | 4 +- src/rect.c | 4 +- src/region.c | 4 +- src/restore.c | 4 +- src/rip.c | 8 +- src/rnd.c | 4 +- src/role.c | 4 +- src/rumors.c | 6 +- src/save.c | 6 +- src/shk.c | 4 +- src/shknam.c | 4 +- src/sit.c | 4 +- src/sounds.c | 4 +- src/sp_lev.c | 6 +- src/spell.c | 4 +- src/steal.c | 4 +- src/steed.c | 4 +- src/sys.c | 4 +- src/teleport.c | 4 +- src/timeout.c | 4 +- src/topten.c | 6 +- src/track.c | 4 +- src/trap.c | 4 +- src/u_init.c | 4 +- src/uhitm.c | 4 +- src/vault.c | 4 +- src/version.c | 8 +- src/vision.c | 6 +- src/weapon.c | 4 +- src/were.c | 4 +- src/wield.c | 4 +- src/windows.c | 4 +- src/wizard.c | 4 +- src/worm.c | 4 +- src/worn.c | 4 +- src/write.c | 4 +- src/zap.c | 4 +- sys/amiga/Build.ami | 50 +- sys/amiga/Install.ami | 98 +-- sys/amiga/Makefile.agc | 186 +++--- sys/amiga/Makefile.ami | 202 +++--- sys/amiga/NetHack.cnf | 6 +- sys/amiga/amidos.c | 10 +- sys/amiga/amidos.p | 4 +- sys/amiga/amigst.c | 4 +- sys/amiga/amii.hlp | 6 +- sys/amiga/amimenu.c | 4 +- sys/amiga/amirip.c | 6 +- sys/amiga/amisnd.c | 4 +- sys/amiga/amistack.c | 4 +- sys/amiga/amitty.c | 4 +- sys/amiga/amiwind.c | 12 +- sys/amiga/amiwind.p | 4 +- sys/amiga/cvtsnd.c | 4 +- sys/amiga/txt2iff.c | 4 +- sys/amiga/winami.c | 12 +- sys/amiga/winami.p | 4 +- sys/amiga/winchar.c | 16 +- sys/amiga/windefs.h | 4 +- sys/amiga/winext.h | 4 +- sys/amiga/winfuncs.c | 8 +- sys/amiga/winkey.c | 4 +- sys/amiga/winmenu.c | 4 +- sys/amiga/winproto.h | 4 +- sys/amiga/winreq.c | 22 +- sys/amiga/winstr.c | 4 +- sys/amiga/xpm2iff.c | 4 +- sys/atari/Install.tos | 20 +- sys/atari/nethack.mnu | 6 +- sys/atari/tos.c | 4 +- sys/be/bemain.c | 12 +- sys/mac/Files.r | 2 +- sys/mac/Install.mw | 62 +- sys/mac/NHDeflts | 2 +- sys/mac/carbon.plist | 10 +- sys/mac/dprintf.c | 4 +- sys/mac/maccurs.c | 6 +- sys/mac/macerrs.c | 4 +- sys/mac/macfile.c | 4 +- sys/mac/macmain.c | 6 +- sys/mac/macmenu.c | 16 +- sys/mac/macsnd.c | 6 +- sys/mac/mactopl.c | 4 +- sys/mac/mactty.c | 4 +- sys/mac/macunix.c | 4 +- sys/mac/macwin.c | 4 +- sys/mac/mgetline.c | 4 +- sys/mac/mmodal.c | 4 +- sys/mac/mrecover.c | 12 +- sys/mac/mttymain.c | 4 +- sys/msdos/Install.dos | 62 +- sys/msdos/Makefile.BC | 42 +- sys/msdos/Makefile.GCC | 30 +- sys/msdos/Makefile.MSC | 34 +- sys/msdos/SCHEMA35.MSC | 8 +- sys/msdos/moveinit.pat | 2 +- sys/msdos/msdos.c | 6 +- sys/msdos/msdoshlp.txt | 26 +- sys/msdos/nhico.uu | 4 +- sys/msdos/nhpif.uu | 2 +- sys/msdos/ovlinit.c | 10 +- sys/msdos/pckeys.c | 6 +- sys/msdos/pctiles.c | 14 +- sys/msdos/pctiles.h | 12 +- sys/msdos/pcvideo.h | 8 +- sys/msdos/portio.h | 6 +- sys/msdos/schema1.BC | 4 +- sys/msdos/schema2.BC | 4 +- sys/msdos/schema3.MSC | 8 +- sys/msdos/setup.bat | 16 +- sys/msdos/sound.c | 6 +- sys/msdos/tile2bin.c | 26 +- sys/msdos/video.c | 14 +- sys/msdos/vidtxt.c | 14 +- sys/msdos/vidvesa.c | 14 +- sys/msdos/vidvga.c | 24 +- sys/os2/Install.os2 | 44 +- sys/os2/Makefile.os2 | 52 +- sys/os2/nhpmico.uu | 2 +- sys/os2/os2.c | 4 +- sys/share/Makefile.lib | 2 +- sys/share/NetHack.cnf | 32 +- sys/share/cppregex.cpp | 4 +- sys/share/dgn_lex.c | 8 +- sys/share/dgn_yacc.c | 8 +- sys/share/ioctl.c | 4 +- sys/share/lev_lex.c | 8 +- sys/share/lev_yacc.c | 8 +- sys/share/nhlan.c | 4 +- sys/share/pcmain.c | 38 +- sys/share/pcsys.c | 14 +- sys/share/pctty.c | 4 +- sys/share/pcunix.c | 6 +- sys/share/pmatchregex.c | 6 +- sys/share/posixregex.c | 6 +- sys/share/random.c | 6 +- sys/share/tclib.c | 4 +- sys/share/unixtty.c | 10 +- sys/share/uudecode.c | 2 +- sys/unix/Install.unx | 48 +- sys/unix/Makefile.dat | 22 +- sys/unix/Makefile.doc | 16 +- sys/unix/Makefile.src | 20 +- sys/unix/Makefile.top | 42 +- sys/unix/Makefile.utl | 6 +- sys/unix/NewInstall.unx | 6 +- sys/unix/README.linux | 32 +- sys/unix/{nethack.sh => anethack.sh} | 12 +- sys/unix/depend.awk | 2 +- sys/unix/hints/linux | 2 +- sys/unix/hints/linux-x11 | 2 +- sys/unix/hints/macosx | 8 +- sys/unix/hints/macosx.sh | 14 +- sys/unix/hints/macosx10.10 | 106 ++-- sys/unix/hints/macosx10.5 | 98 +-- sys/unix/hints/macosx10.7 | 98 +-- sys/unix/hints/macosx10.8 | 98 +-- sys/unix/mkmkfile.sh | 4 +- sys/unix/setup.sh | 4 +- sys/unix/snd86unx.shr | 2 +- sys/unix/unixmain.c | 10 +- sys/unix/unixres.c | 4 +- sys/unix/unixunix.c | 4 +- sys/vms/Install.vms | 142 ++--- sys/vms/Makefile.dat | 6 +- sys/vms/Makefile.doc | 10 +- sys/vms/Makefile.src | 34 +- sys/vms/Makefile.top | 6 +- sys/vms/Makefile.utl | 6 +- sys/vms/install.com | 38 +- sys/vms/lev_lex.h | 2 +- sys/vms/nethack.com | 20 +- sys/vms/oldcrtl.c | 6 +- sys/vms/spec_lev.com | 6 +- sys/vms/sysconf | 2 +- sys/vms/vmsbuild.com | 40 +- sys/vms/vmsfiles.c | 4 +- sys/vms/vmsmail.c | 12 +- sys/vms/vmsmain.c | 12 +- sys/vms/vmsmisc.c | 4 +- sys/vms/vmstty.c | 12 +- sys/vms/vmsunix.c | 20 +- sys/wince/Install.ce | 70 +-- sys/wince/bootstrp.mak | 24 +- sys/wince/celib.c | 4 +- sys/wince/cesetup.bat | 6 +- sys/wince/cesound.c | 8 +- sys/wince/defaults.nh | 10 +- sys/wince/mhaskyn.c | 4 +- sys/wince/mhaskyn.h | 4 +- sys/wince/mhcmd.c | 10 +- sys/wince/mhcmd.h | 2 +- sys/wince/mhcolor.c | 14 +- sys/wince/mhcolor.h | 4 +- sys/wince/mhdlg.c | 4 +- {win/win32 => sys/wince}/mhdlg.h | 4 +- sys/wince/mhfont.c | 4 +- sys/wince/mhfont.h | 4 +- sys/wince/mhinput.c | 6 +- sys/wince/mhinput.h | 6 +- sys/wince/mhmain.c | 16 +- sys/wince/mhmain.h | 4 +- sys/wince/mhmap.c | 12 +- sys/wince/mhmap.h | 4 +- sys/wince/mhmenu.c | 4 +- sys/wince/mhmenu.h | 4 +- sys/wince/mhmsg.h | 6 +- sys/wince/mhmsgwnd.c | 6 +- sys/wince/mhmsgwnd.h | 4 +- sys/wince/mhrip.c | 4 +- sys/wince/mhrip.h | 4 +- sys/wince/mhstatus.c | 6 +- sys/wince/mhstatus.h | 4 +- sys/wince/mhtext.c | 6 +- sys/wince/mhtext.h | 4 +- sys/wince/mhtxtbuf.c | 8 +- sys/wince/mhtxtbuf.h | 6 +- sys/wince/mswproc.c | 18 +- sys/wince/nhico.uu | 2 +- sys/wince/winMS.h | 12 +- sys/wince/winhack.c | 62 +- sys/wince/winhack.rc | 22 +- sys/wince/winhcksp.rc | 18 +- sys/wince/winmain.c | 2 +- sys/winnt/Install.nt | 148 ++--- sys/winnt/Makefile.gcc | 50 +- sys/winnt/Makefile.msc | 68 +- sys/winnt/console.rc | 14 +- sys/winnt/defaults.nh | 28 +- sys/winnt/nethack.def | 4 +- sys/winnt/nh340key.c | 14 +- sys/winnt/nhdefkey.c | 14 +- sys/winnt/nhico.uu | 2 +- sys/winnt/nhraykey.c | 8 +- sys/winnt/nhsetup.bat | 28 +- sys/winnt/ntsound.c | 8 +- sys/winnt/nttty.c | 24 +- sys/winnt/stubs.c | 2 +- sys/winnt/sysconf | 2 +- sys/winnt/win32api.h | 8 +- sys/winnt/winnt.c | 12 +- util/dgn_comp.l | 4 +- util/dgn_comp.y | 6 +- util/dgn_main.c | 4 +- util/dlb_main.c | 4 +- util/lev_comp.l | 4 +- util/lev_comp.y | 6 +- util/lev_main.c | 6 +- util/makedefs.c | 18 +- util/mdgrep.h | 4 +- util/mdgrep.pl | 16 +- util/panic.c | 4 +- util/recover.c | 16 +- win/Qt/Info.plist | 6 +- win/Qt/Install.Qt | 20 +- win/Qt/knethack.lnk | 6 +- win/Qt/nhicns.uu | 2 +- win/Qt/qpe-nethack.control | 18 +- win/Qt/qt_clust.cpp | 4 +- win/Qt/qt_win.cpp | 774 +++++++++++------------ win/Qt/qttableview.cpp | 2 +- win/Qt/tileedit.cpp | 4 +- win/Qt/tileedit.h | 4 +- win/X11/Install.X11 | 40 +- win/X11/NetHack.ad | 570 ++++++++--------- win/X11/Window.c | 4 +- win/X11/{nethack.rc => anethack.rc} | 10 +- win/X11/dialogs.c | 8 +- win/X11/nh10.bdf | 2 +- win/X11/nh32icon | 2 +- win/X11/nh56icon | 2 +- win/X11/nh72icon | 2 +- win/X11/tile2x11.c | 4 +- win/X11/winX.c | 26 +- win/X11/winmap.c | 10 +- win/X11/winmenu.c | 4 +- win/X11/winmesg.c | 4 +- win/X11/winmisc.c | 6 +- win/X11/winstat.c | 4 +- win/X11/wintext.c | 6 +- win/X11/winval.c | 4 +- win/chain/wc_chainin.c | 4 +- win/chain/wc_chainout.c | 4 +- win/chain/wc_trace.c | 4 +- win/gem/Install.gem | 8 +- win/gem/bitmfile.c | 2 +- win/gem/gr_rect.c | 4 +- win/gem/gr_rect.h | 2 +- win/gem/load_img.c | 2 +- win/gem/tile2img.c | 10 +- win/gem/wingem.c | 6 +- win/gem/wingem1.c | 12 +- win/gem/xpm2img.c | 4 +- win/gnome/gn_xpms.h | 10 +- win/gnome/gnaskstr.c | 4 +- win/gnome/gnaskstr.h | 4 +- win/gnome/gnbind.c | 12 +- win/gnome/gnbind.h | 8 +- win/gnome/gnglyph.c | 4 +- win/gnome/gnglyph.h | 4 +- win/gnome/gnmain.c | 16 +- win/gnome/gnmain.h | 4 +- win/gnome/gnmap.c | 10 +- win/gnome/gnmap.h | 4 +- win/gnome/gnmenu.c | 6 +- win/gnome/gnmenu.h | 4 +- win/gnome/gnmesg.c | 6 +- win/gnome/gnmesg.h | 4 +- win/gnome/gnomeprv.h | 6 +- win/gnome/gnopts.c | 4 +- win/gnome/gnopts.h | 4 +- win/gnome/gnplayer.c | 4 +- win/gnome/gnplayer.h | 4 +- win/gnome/gnsignal.c | 4 +- win/gnome/gnsignal.h | 4 +- win/gnome/gnstatus.c | 4 +- win/gnome/gnstatus.h | 4 +- win/gnome/gntext.c | 4 +- win/gnome/gntext.h | 4 +- win/gnome/gnworn.c | 6 +- win/gnome/gnworn.h | 6 +- win/gnome/gnyesno.c | 4 +- win/gnome/gnyesno.h | 4 +- win/macosx/NetHackGuidebook.applescript | 6 +- win/macosx/NetHackRecover.applescript | 14 +- win/macosx/NetHackTerm.applescript | 12 +- win/macosx/recover.pl | 6 +- win/share/bmptiles.c | 4 +- win/share/gifread.c | 2 +- win/share/giftiles.c | 6 +- win/share/ppmwrite.c | 2 +- win/share/renumtiles.pl | 4 +- win/share/thintile.c | 6 +- win/share/tile.doc | 8 +- win/share/tile.h | 2 +- win/share/tile2bmp.c | 10 +- win/share/tilemap.c | 4 +- win/share/tileset.c | 4 +- win/share/tiletext.c | 4 +- win/tty/getline.c | 4 +- win/tty/termcap.c | 18 +- win/tty/topl.c | 4 +- win/tty/wintty.c | 12 +- win/win32/dgnstuff.mak | 2 +- win/win32/levstuff.mak | 2 +- win/win32/mhaskyn.c | 4 +- {sys/wince => win/win32}/mhaskyn.h | 4 +- win/win32/mhdlg.c | 4 +- win/win32/mhdlg.h | 4 +- win/win32/mhfont.c | 4 +- win/win32/mhfont.h | 4 +- win/win32/mhinput.c | 6 +- win/win32/mhinput.h | 6 +- win/win32/mhmain.c | 26 +- win/win32/mhmain.h | 4 +- win/win32/mhmap.c | 14 +- win/win32/mhmap.h | 4 +- win/win32/mhmenu.c | 20 +- win/win32/mhmenu.h | 4 +- win/win32/mhmsg.h | 6 +- win/win32/mhmsgwnd.c | 8 +- win/win32/mhmsgwnd.h | 4 +- win/win32/mhrip.c | 6 +- win/win32/mhrip.h | 4 +- win/win32/mhsplash.c | 4 +- win/win32/mhsplash.h | 4 +- win/win32/mhstatus.c | 6 +- win/win32/mhstatus.h | 4 +- win/win32/mhtext.c | 14 +- win/win32/mhtext.h | 4 +- win/win32/mswproc.c | 32 +- win/win32/resource.h | 4 +- win/win32/tiles.mak | 2 +- win/win32/vs2010/NetHack.sln | 4 +- win/win32/vs2010/NetHackW.vcxproj | 66 +- win/win32/vs2010/dgncomp.vcxproj | 2 +- win/win32/vs2010/dgnstuff.vcxproj | 2 +- win/win32/vs2010/dlb_main.vcxproj | 10 +- win/win32/vs2010/levcomp.vcxproj | 2 +- win/win32/vs2010/levstuff.vcxproj | 2 +- win/win32/vs2010/makedefs.vcxproj | 10 +- win/win32/vs2010/recover.vcxproj | 2 +- win/win32/vs2010/tile2bmp.vcxproj | 2 +- win/win32/vs2010/tilemap.vcxproj | 2 +- win/win32/vs2010/tiles.vcxproj | 2 +- win/win32/vs2010/uudecode.vcxproj | 664 ++++++++++---------- win/win32/vs2013/NetHack.sln | 374 +++++------ win/win32/vs2013/NetHack.vcxproj | 984 ++++++++++++++--------------- win/win32/vs2013/NetHackW.vcxproj | 1028 +++++++++++++++---------------- win/win32/vs2013/dgncomp.vcxproj | 740 +++++++++++----------- win/win32/vs2013/dgnstuff.vcxproj | 10 +- win/win32/vs2013/dlb_main.vcxproj | 894 +++++++++++++-------------- win/win32/vs2013/levcomp.vcxproj | 736 +++++++++++----------- win/win32/vs2013/levstuff.vcxproj | 10 +- win/win32/vs2013/makedefs.vcxproj | 928 ++++++++++++++-------------- win/win32/vs2013/nhdefkey.vcxproj | 392 ++++++------ win/win32/vs2013/recover.vcxproj | 594 +++++++++--------- win/win32/vs2013/tile2bmp.vcxproj | 646 +++++++++---------- win/win32/vs2013/tilemap.vcxproj | 648 +++++++++---------- win/win32/vs2013/tiles.vcxproj | 10 +- win/win32/vs2013/uudecode.vcxproj | 704 ++++++++++----------- win/win32/winMS.h | 6 +- win/win32/winhack.c | 70 +-- win/win32/winhack.rc | 32 +- 626 files changed, 9249 insertions(+), 9249 deletions(-) rename doc/{nethack.6 => anethack.6} (86%) rename doc/{nethack.txt => anethack.txt} (86%) rename sys/unix/{nethack.sh => anethack.sh} (83%) copy {win/win32 => sys/wince}/mhdlg.h (67%) rewrite win/Qt/qpe-nethack.control (64%) rewrite win/X11/NetHack.ad (72%) rename win/X11/{nethack.rc => anethack.rc} (86%) copy {sys/wince => win/win32}/mhaskyn.h (53%) diff --git a/.gitignore b/.gitignore index a4bfbe1d..03678caa 100644 --- a/.gitignore +++ b/.gitignore @@ -52,3 +52,4 @@ Makefile.gcc-orig *.lastcodeanalysissucceeded # Win32-specific ignores end +src/anethack diff --git a/dat/Arch.des b/dat/Arch.des index 97b9cd4e..59b213a4 100644 --- a/dat/Arch.des +++ b/dat/Arch.des @@ -1,7 +1,7 @@ -# NetHack 3.6 Arch.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.10 $ +# aNetHack 0.0.1 Arch.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.10 $ # Copyright (c) 1989 by Jean-Christophe Collet # Copyright (c) 1991 by M. Stephenson -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # # The "start" level for the quest. # diff --git a/dat/Barb.des b/dat/Barb.des index 79f82322..57427084 100644 --- a/dat/Barb.des +++ b/dat/Barb.des @@ -1,7 +1,7 @@ -# NetHack 3.6 Barb.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.9 $ +# aNetHack 0.0.1 Barb.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.9 $ # Copyright (c) 1989 by Jean-Christophe Collet # Copyright (c) 1991 by M. Stephenson -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # # The "start" level for the quest. # diff --git a/dat/Caveman.des b/dat/Caveman.des index 778fa0ae..6f282eaa 100644 --- a/dat/Caveman.des +++ b/dat/Caveman.des @@ -1,7 +1,7 @@ -# NetHack 3.6 Caveman.des $ANH-Date: 1432512783 2015/05/25 00:13:03 $ $ANH-Branch: master $:$ANH-Revision: 1.8 $ +# aNetHack 0.0.1 Caveman.des $ANH-Date: 1432512783 2015/05/25 00:13:03 $ $ANH-Branch: master $:$ANH-Revision: 1.8 $ # Copyright (c) 1989 by Jean-Christophe Collet # Copyright (c) 1991 by M. Stephenson -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # # The "start" level for the quest. # diff --git a/dat/Healer.des b/dat/Healer.des index 1f2e7679..4b150873 100644 --- a/dat/Healer.des +++ b/dat/Healer.des @@ -1,7 +1,7 @@ -# NetHack 3.6 Healer.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.10 $ +# aNetHack 0.0.1 Healer.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.10 $ # Copyright (c) 1989 by Jean-Christophe Collet # Copyright (c) 1991, 1993 by M. Stephenson, P. Winner -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # # The "start" level for the quest. # diff --git a/dat/Knight.des b/dat/Knight.des index 68ab044d..4fd5a5ee 100644 --- a/dat/Knight.des +++ b/dat/Knight.des @@ -1,7 +1,7 @@ -# NetHack 3.6 Knight.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.9 $ +# aNetHack 0.0.1 Knight.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.9 $ # Copyright (c) 1989 by Jean-Christophe Collet # Copyright (c) 1991,92 by M. Stephenson -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # # The "start" level for the quest. # diff --git a/dat/Monk.des b/dat/Monk.des index c4c88c27..c6384d45 100644 --- a/dat/Monk.des +++ b/dat/Monk.des @@ -1,7 +1,7 @@ -# NetHack 3.6 Monk.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.12 $ +# aNetHack 0.0.1 Monk.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.12 $ # Copyright (c) 1989 by Jean-Christophe Collet # Copyright (c) 1991-2 by M. Stephenson -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # # The "start" level for the quest. # diff --git a/dat/Priest.des b/dat/Priest.des index 94bd2cc6..f0baa081 100644 --- a/dat/Priest.des +++ b/dat/Priest.des @@ -1,7 +1,7 @@ -# NetHack 3.6 Priest.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.11 $ +# aNetHack 0.0.1 Priest.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.11 $ # Copyright (c) 1989 by Jean-Christophe Collet # Copyright (c) 1991-2 by M. Stephenson -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # # The "start" level for the quest. # diff --git a/dat/Ranger.des b/dat/Ranger.des index 7a875623..1b8949e7 100644 --- a/dat/Ranger.des +++ b/dat/Ranger.des @@ -1,7 +1,7 @@ -# NetHack 3.6 Ranger.des $ANH-Date: 1432512783 2015/05/25 00:13:03 $ $ANH-Branch: master $:$ANH-Revision: 1.9 $ +# aNetHack 0.0.1 Ranger.des $ANH-Date: 1432512783 2015/05/25 00:13:03 $ $ANH-Branch: master $:$ANH-Revision: 1.9 $ # Copyright (c) 1989 by Jean-Christophe Collet # Copyright (c) 1991 by M. Stephenson -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # # The "start" level for the quest. # diff --git a/dat/Rogue.des b/dat/Rogue.des index c0d27acf..b86faab0 100644 --- a/dat/Rogue.des +++ b/dat/Rogue.des @@ -1,6 +1,6 @@ -# NetHack 3.6 Rogue.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.11 $ +# aNetHack 0.0.1 Rogue.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.11 $ # Copyright (c) 1992 by Dean Luick -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # # The "start" level for the quest. # diff --git a/dat/Samurai.des b/dat/Samurai.des index 1e1b6963..f6b76fd3 100644 --- a/dat/Samurai.des +++ b/dat/Samurai.des @@ -1,7 +1,7 @@ -# NetHack 3.6 Samurai.des $ANH-Date: 1432512783 2015/05/25 00:13:03 $ $ANH-Branch: master $:$ANH-Revision: 1.11 $ +# aNetHack 0.0.1 Samurai.des $ANH-Date: 1432512783 2015/05/25 00:13:03 $ $ANH-Branch: master $:$ANH-Revision: 1.11 $ # Copyright (c) 1989 by Jean-Christophe Collet # Copyright (c) 1991-92 by M. Stephenson, P. Winner -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # # The "start" level for the quest. # diff --git a/dat/Tourist.des b/dat/Tourist.des index 317149d8..9be18f12 100644 --- a/dat/Tourist.des +++ b/dat/Tourist.des @@ -1,7 +1,7 @@ -# NetHack 3.6 Tourist.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.8 $ +# aNetHack 0.0.1 Tourist.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.8 $ # Copyright (c) 1989 by Jean-Christophe Collet # Copyright (c) 1991,92 by M. Stephenson, P. Winner -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # # The "start" level for the quest. # diff --git a/dat/Valkyrie.des b/dat/Valkyrie.des index 602a2e81..e04b8323 100644 --- a/dat/Valkyrie.des +++ b/dat/Valkyrie.des @@ -1,7 +1,7 @@ -# NetHack 3.6 Valkyrie.des $ANH-Date: 1432512783 2015/05/25 00:13:03 $ $ANH-Branch: master $:$ANH-Revision: 1.13 $ +# aNetHack 0.0.1 Valkyrie.des $ANH-Date: 1432512783 2015/05/25 00:13:03 $ $ANH-Branch: master $:$ANH-Revision: 1.13 $ # Copyright (c) 1989 by Jean-Christophe Collet # Copyright (c) 1991-2 by M. Stephenson -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # # The "start" level for the quest. # diff --git a/dat/Wizard.des b/dat/Wizard.des index feefb95b..3fe21785 100644 --- a/dat/Wizard.des +++ b/dat/Wizard.des @@ -1,6 +1,6 @@ -# NetHack 3.6 Wizard.des $ANH-Date: 1432512783 2015/05/25 00:13:03 $ $ANH-Branch: master $:$ANH-Revision: 1.11 $ +# aNetHack 0.0.1 Wizard.des $ANH-Date: 1432512783 2015/05/25 00:13:03 $ $ANH-Branch: master $:$ANH-Revision: 1.11 $ # Copyright (c) 1992 by David Cohrs -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # # The "start" level for the quest. # diff --git a/dat/bigroom.des b/dat/bigroom.des index 841ba298..05f75b91 100644 --- a/dat/bigroom.des +++ b/dat/bigroom.des @@ -1,7 +1,7 @@ -# NetHack 3.6 bigroom.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.12 $ +# aNetHack 0.0.1 bigroom.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.12 $ # Copyright (c) 1989 by Jean-Christophe Collet # Copyright (c) 1990 by M. Stephenson -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # # These are the bigroom levels: # diff --git a/dat/castle.des b/dat/castle.des index 559eb8d6..7201dabd 100644 --- a/dat/castle.des +++ b/dat/castle.des @@ -1,6 +1,6 @@ -# NetHack 3.6 castle.des $ANH-Date: 1432512783 2015/05/25 00:13:03 $ $ANH-Branch: master $:$ANH-Revision: 1.11 $ +# aNetHack 0.0.1 castle.des $ANH-Date: 1432512783 2015/05/25 00:13:03 $ $ANH-Branch: master $:$ANH-Revision: 1.11 $ # Copyright (c) 1989 by Jean-Christophe Collet -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # # This is the stronghold level : # there are several ways to enter it : diff --git a/dat/data.base b/dat/data.base index b18af14e..5f84ac2c 100644 --- a/dat/data.base +++ b/dat/data.base @@ -1,7 +1,7 @@ -# NetHack 3.6 data.base $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ +# aNetHack 0.0.1 data.base $ANH-Date$ $ANH-Branch$:$ANH-Revision$ # Copyright (c) 1994, 1995, 1996 by the NetHack Development Team # Copyright (c) 1994 by Boudewijn Wayers -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # # This is the source file for the "data" file generated by `makedefs -d'. # A line starting with a # is a comment and is ignored by makedefs. diff --git a/dat/dungeon.def b/dat/dungeon.def index c6b5f526..8042b684 100644 --- a/dat/dungeon.def +++ b/dat/dungeon.def @@ -1,6 +1,6 @@ -# NetHack 3.6 dungeon.def $ANH-Date: 1462486876 2016/05/05 22:21:16 $ $ANH-Branch: master $:$ANH-Revision: 1.14 $ +# aNetHack 0.0.1 dungeon.def $ANH-Date: 1462486876 2016/05/05 22:21:16 $ $ANH-Branch: master $:$ANH-Revision: 1.14 $ # Copyright (c) 1990-95 by M. Stephenson -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # # The dungeon description file for the "standard" 3.1 NetHack. # diff --git a/dat/endgame.des b/dat/endgame.des index 8febf147..49c79906 100644 --- a/dat/endgame.des +++ b/dat/endgame.des @@ -1,8 +1,8 @@ -# NetHack 3.6 endgame.des $ANH-Date: 1432512783 2015/05/25 00:13:03 $ $ANH-Branch: master $:$ANH-Revision: 1.13 $ +# aNetHack 0.0.1 endgame.des $ANH-Date: 1432512783 2015/05/25 00:13:03 $ $ANH-Branch: master $:$ANH-Revision: 1.13 $ # Copyright (c) 1989 by Jean-Christophe Collet # Copyright (c) 1992,1993 by Izchak Miller, David Cohrs, # and Timo Hakulinen -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # # These are the ENDGAME levels: earth, air, fire, water, and astral. # The top-most level, the Astral Level, has 3 temples and shrines. diff --git a/dat/gehennom.des b/dat/gehennom.des index c4d28c73..c70aa58a 100644 --- a/dat/gehennom.des +++ b/dat/gehennom.des @@ -1,7 +1,7 @@ -# NetHack 3.6 gehennom.des $ANH-Date: 1432512783 2015/05/25 00:13:03 $ $ANH-Branch: master $:$ANH-Revision: 1.13 $ +# aNetHack 0.0.1 gehennom.des $ANH-Date: 1432512783 2015/05/25 00:13:03 $ $ANH-Branch: master $:$ANH-Revision: 1.13 $ # Copyright (c) 1989 by Jean-Christophe Collet # Copyright (c) 1992 by M. Stephenson and Izchak Miller -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # MAZE: "valley", ' ' diff --git a/dat/knox.des b/dat/knox.des index ca998b62..9c919b6e 100644 --- a/dat/knox.des +++ b/dat/knox.des @@ -1,7 +1,7 @@ -# NetHack 3.6 knox.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.9 $ +# aNetHack 0.0.1 knox.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.9 $ # Copyright (c) 1989 by Jean-Christophe Collet # Copyright (c) 1992 by Izchak Miller -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # MAZE:"knox",' ' FLAGS: noteleport diff --git a/dat/medusa.des b/dat/medusa.des index b417ac57..ae5014fb 100644 --- a/dat/medusa.des +++ b/dat/medusa.des @@ -1,7 +1,7 @@ -# NetHack 3.6 medusa.des $ANH-Date: 1432512783 2015/05/25 00:13:03 $ $ANH-Branch: master $:$ANH-Revision: 1.10 $ +# aNetHack 0.0.1 medusa.des $ANH-Date: 1432512783 2015/05/25 00:13:03 $ $ANH-Branch: master $:$ANH-Revision: 1.10 $ # Copyright (c) 1989 by Jean-Christophe Collet # Copyright (c) 1990, 1991 by M. Stephenson -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # # These are the Medusa's levels : # diff --git a/dat/mines.des b/dat/mines.des index b86ca9c0..5df5648f 100644 --- a/dat/mines.des +++ b/dat/mines.des @@ -1,7 +1,7 @@ -# NetHack 3.6 mines.des $ANH-Date: 1432512783 2015/05/25 00:13:03 $ $ANH-Branch: master $:$ANH-Revision: 1.25 $ +# aNetHack 0.0.1 mines.des $ANH-Date: 1432512783 2015/05/25 00:13:03 $ $ANH-Branch: master $:$ANH-Revision: 1.25 $ # Copyright (c) 1989-95 by Jean-Christophe Collet # Copyright (c) 1991-95 by M. Stephenson -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # # The "fill" level for the mines. diff --git a/dat/oracle.des b/dat/oracle.des index 8780956c..b4b750cc 100644 --- a/dat/oracle.des +++ b/dat/oracle.des @@ -1,5 +1,5 @@ -# NetHack 3.6 oracle.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.9 $ -# NetHack may be freely redistributed. See license for details. +# aNetHack 0.0.1 oracle.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.9 $ +# aNetHack may be freely redistributed. See license for details. # # Oracle level # diff --git a/dat/quest.txt b/dat/quest.txt index 26720ac5..62ba3372 100644 --- a/dat/quest.txt +++ b/dat/quest.txt @@ -1,8 +1,8 @@ -# NetHack 3.6 quest.txt $ANH-Date: 1448540693 2015/11/26 12:24:53 $ $ANH-Branch: master $:$ANH-Revision: 1.32 $ +# aNetHack 0.0.1 quest.txt $ANH-Date: 1448540693 2015/11/26 12:24:53 $ $ANH-Branch: master $:$ANH-Revision: 1.32 $ # Copyright (c) 1991 by M. Stephenson -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # -# The quest text file for NetHack 3.4 +# The quest text file for aNetHack 3.4 # # These are the "standard" message numbers from qtext.h. All class # dialogue must have at least these entries. diff --git a/dat/rumors.fal b/dat/rumors.fal index ba01eb46..413c9dd4 100644 --- a/dat/rumors.fal +++ b/dat/rumors.fal @@ -54,7 +54,7 @@ Do you want to make more money? Sure, we all do! Join the Fort Ludios guard! Does your boss know what you're doing right now? Don't bother wishing for things. You'll probably find one on the next level. Don't eat too much: you might start hiccoughing! -Don't play NetHack at your work; your boss might hit you! +Don't play aNetHack at your work; your boss might hit you! Don't tell a soul you found a secret door, otherwise it isn't a secret anymore. Drinking potions of booze may land you in jail if you are under 21. Drop your vanity and get rid of your jewels! Pickpockets about! @@ -98,7 +98,7 @@ Kicking the terminal doesn't hurt the monsters. Killer bees keep appearing till you kill their queen. Killer bunnies can be tamed with carrots only. Latest news? Put `rec.games.roguelike.nethack' in your .newsrc! -Learn how to spell. Play NetHack! +Learn how to spell. Play aNetHack! Leprechauns hide their gold in a secret room. Let your fingers do the walking on the yulkjhnb keys. Let's face it: this time you're not going to win. @@ -110,10 +110,10 @@ Money to invest? Take it to the local branch of the Magic Memory Vault! Monsters come from nowhere to hit you everywhere. Monsters sleep because you are boring, not because they ever get tired. Most monsters prefer minced meat. That's why they are hitting you! -Most of the bugs in NetHack are on the floor. +Most of the bugs in aNetHack are on the floor. Much ado Nothing Happens. -Multi-player NetHack is a myth. -NetHack is addictive. Too late, you're already hooked. +Multi-player aNetHack is a myth. +aNetHack is addictive. Too late, you're already hooked. Never ask a shopkeeper for a price list. Never burn a tree, unless you like getting whacked with a +5 shovel. Never eat with glowing hands! @@ -173,11 +173,11 @@ There is a trap on this level! They say that Demogorgon, Asmodeus, Orcus, Yeenoghu & Juiblex is no law firm. They say that Geryon has an evil twin, beware! They say that Medusa would make a terrible pet. -They say that NetHack bugs are Seldon planned. -They say that NetHack comes in 256 flavors. -They say that NetHack is just a computer game. -They say that NetHack is more than just a computer game. -They say that NetHack is never what it used to be. +They say that aNetHack bugs are Seldon planned. +They say that aNetHack comes in 256 flavors. +They say that aNetHack is just a computer game. +They say that aNetHack is more than just a computer game. +They say that aNetHack is never what it used to be. They say that a baby dragon is too small to hurt or help you. They say that a black pudding is simply a brown pudding gone bad. They say that a black sheep has 3 bags full of wool. @@ -276,7 +276,7 @@ They say that minotaurs get lost outside of the mazes. They say that most trolls are born again. They say that naming your cat Garfield will make you more attractive. They say that no one knows everything about everything in the dungeon. -They say that no one plays NetHack just for the fun of it. +They say that no one plays aNetHack just for the fun of it. They say that no one really subscribes to rec.games.roguelike.nethack. They say that no one will admit to starting a rumor. They say that nurses sometimes carry scalpels and never use them. @@ -286,7 +286,7 @@ They say that only David can find the zoo! They say that only angels play their harps for their pets. They say that only big spenders carry gold. They say that orc shamans are healthy, wealthy and wise. -They say that playing NetHack is like walking into a death trap. +They say that playing aNetHack is like walking into a death trap. They say that problem breathing is best treated by a proper diet. They say that quaffing many potions of levitation can give you a headache. They say that queen bees get that way by eating royal jelly. @@ -301,12 +301,12 @@ They say that some Kops are on the take. They say that some guards' palms can be greased. They say that some monsters may kiss your boots to stop your drum playing. They say that sometimes you can be the hit of the party when playing a horn. -They say that the NetHack gods generally welcome your sacrifices. +They say that the aNetHack gods generally welcome your sacrifices. They say that the Three Rings are named Vilya, Nenya and Narya. They say that the Wizard of Yendor has a death wish. They say that the `hair of the dog' is sometimes an effective remedy. They say that the best time to save your game is now before it's too late. -They say that the biggest obstacle in NetHack is your mind. +They say that the biggest obstacle in aNetHack is your mind. They say that the gods are angry when they hit you with objects. They say that the priesthood are specially favored by the gods. They say that the way to make a unicorn happy is to give it what it wants. @@ -314,7 +314,7 @@ They say that there are no black or white stones, only gray. They say that there are no skeletons hence there are no skeleton keys. They say that there is a clever rogue in every hacker just dying to escape. They say that there is no such thing as free advice. -They say that there is only one way to win at NetHack. +They say that there is only one way to win at aNetHack. They say that there once was a fearsome chaotic samurai named Luk No. They say that there was a time when cursed holy water wasn't water. They say that there's no point in crying over a gray ooze. diff --git a/dat/sokoban.des b/dat/sokoban.des index e7812a87..e59d9ba5 100644 --- a/dat/sokoban.des +++ b/dat/sokoban.des @@ -1,6 +1,6 @@ -# NetHack 3.6 sokoban.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.13 $ +# aNetHack 0.0.1 sokoban.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.13 $ # Copyright (c) 1998-1999 by Kevin Hugo -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # # In case you haven't played the game Sokoban, you'll learn # quickly. This branch isn't particularly difficult, just time diff --git a/dat/tower.des b/dat/tower.des index c3c1f243..57a37276 100644 --- a/dat/tower.des +++ b/dat/tower.des @@ -1,6 +1,6 @@ -# NetHack 3.6 tower.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.9 $ +# aNetHack 0.0.1 tower.des $ANH-Date: 1432512784 2015/05/25 00:13:04 $ $ANH-Branch: master $:$ANH-Revision: 1.9 $ # Copyright (c) 1989 by Jean-Christophe Collet -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # # Upper stage of Vlad's tower MAZE:"tower1",' ' diff --git a/dat/yendor.des b/dat/yendor.des index a8d76374..17a7a6a7 100644 --- a/dat/yendor.des +++ b/dat/yendor.des @@ -1,7 +1,7 @@ -# NetHack 3.6 yendor.des $ANH-Date: 1432512783 2015/05/25 00:13:03 $ $ANH-Branch: master $:$ANH-Revision: 1.10 $ +# aNetHack 0.0.1 yendor.des $ANH-Date: 1432512783 2015/05/25 00:13:03 $ $ANH-Branch: master $:$ANH-Revision: 1.10 $ # Copyright (c) 1989 by Jean-Christophe Collet # Copyright (c) 1992 by M. Stephenson and Izchak Miller -# NetHack may be freely redistributed. See license for details. +# aNetHack may be freely redistributed. See license for details. # # The top (real) wizard level. # Keeping the Moat for old-time's sake diff --git a/doc/Guidebook.mn b/doc/Guidebook.mn index d9263acf..16c57bac 100644 --- a/doc/Guidebook.mn +++ b/doc/Guidebook.mn @@ -1,8 +1,8 @@ -.\" $NHDT-Branch: NetHack-3.6.0 $:$NHDT-Revision: 1.203 $ $NHDT-Date: 1456192371 2016/02/23 01:52:51 $ -.ds h0 "NetHack Guidebook +.\" $ANH-Branch: aNetHack-3.6.0 $:$ANH-Revision: 1.203 $ $ANH-Date: 1456192371 2016/02/23 01:52:51 $ +.ds h0 "aNetHack Guidebook .ds h1 .ds h2 % -.ds vr "NetHack 3.6 +.ds vr "aNetHack 0.0.1 .ds f0 "\*(vr .ds f1 .ds f2 "February 22, 2016 @@ -54,7 +54,7 @@ .. .mt A Guide to the Mazes of Menace -(Guidebook for NetHack) +(Guidebook for aNetHack) .au Original version - Eric S. Raymond (Edited and expanded for 3.6 by Mike Stephenson and others) @@ -115,7 +115,7 @@ dungeon... .hn 1 What is going on here? .pg -You have just begun a game of NetHack. Your goal is to grab as much +You have just begun a game of aNetHack. Your goal is to grab as much treasure as you can, retrieve the Amulet of Yendor, and escape the Mazes of Menace alive. .pg @@ -207,25 +207,25 @@ On the screen is kept a map of where you have been and what you have seen on the current dungeon level; as you explore more of the level, it appears on the screen in front of you. .pg -When NetHack's ancestor \fIrogue\fP first appeared, its screen +When aNetHack's ancestor \fIrogue\fP first appeared, its screen orientation was almost unique among computer fantasy games. Since then, screen orientation has become the norm rather than the -exception; NetHack continues this fine tradition. Unlike text +exception; aNetHack continues this fine tradition. Unlike text adventure games that accept commands in pseudo-English sentences and -explain the results in words, NetHack commands are all one or two +explain the results in words, aNetHack commands are all one or two keystrokes and the results are displayed graphically on the screen. A minimum screen size of 24 lines by 80 columns is recommended; if the screen is larger, only a 21x80 section will be used for the map. .pg -NetHack can even be played by blind players, with the assistance of Braille -readers or speech synthesisers. Instructions for configuring NetHack for +aNetHack can even be played by blind players, with the assistance of Braille +readers or speech synthesisers. Instructions for configuring aNetHack for the blind are included later in this document. .pg -NetHack generates a new dungeon every time you play it; even the +aNetHack generates a new dungeon every time you play it; even the authors still find it an entertaining and exciting game despite having won several times. .pg -NetHack offers a variety of display options. The options available to you +aNetHack offers a variety of display options. The options available to you will vary from port to port, depending on the capabilities of your hardware and software, and whether various compile-time options were enabled when your executable was created. The three possible display @@ -239,10 +239,10 @@ colors in the Guidebook, and because it is common to all ports, we will use the default ASCII characters from the monochrome character display when referring to things you might see on the screen during your game. .pg -In order to understand what is going on in NetHack, first you must -understand what NetHack is doing with the screen. The NetHack screen +In order to understand what is going on in aNetHack, first you must +understand what aNetHack is doing with the screen. The aNetHack screen replaces the ``You see ...'' descriptions of text adventure games. -Figure 1 is a sample of what a NetHack screen might look like. +Figure 1 is a sample of what a aNetHack screen might look like. The way the screen looks for you depends on your platform. .TS S @@ -381,7 +381,7 @@ The message line (top) .pg The top line of the screen is reserved for messages that describe things that are impossible to represent visually. If you see a -``\fB--More--\fP'' on the top line, this means that NetHack has +``\fB--More--\fP'' on the top line, this means that aNetHack has another message to display on the screen, but it wants to make certain that you've read the one that is there first. To read the next message, just press the space bar. @@ -469,9 +469,9 @@ Commands can be initiated by typing one or two characters to which the command is bound to, or typing the command name in the extended commands entry. Some commands, like ``search'', do not require that any more information be collected by -NetHack. Other commands might require additional information, for +aNetHack. Other commands might require additional information, for example a direction, or an object to be used. For those commands that -require additional information, NetHack will present you with either a +require additional information, aNetHack will present you with either a menu of choices or with a command line prompt requesting information. Which you are presented with will depend chiefly on how you have set the .op menustyle @@ -907,7 +907,7 @@ Escape to a shell. Perform an extended command. .lp "" .pg -As you can see, the authors of NetHack +As you can see, the authors of aNetHack used up all the letters, so this is a way to introduce the less frequently used commands. What extended commands are available depends on what features the game was @@ -1145,7 +1145,7 @@ Go up a staircase. Default key is '<'. .lp #vanquished List vanquished monsters. Autocompletes. Wizard-mode only. .lp #version -Print compile time options for this version of NetHack. +Print compile time options for this version of aNetHack. Autocompletes. Default key is 'M-v'. .lp #versionshort Show version string. Default key is 'v'. @@ -1201,7 +1201,7 @@ If your keyboard has a meta key (which, when pressed in combination with another key, modifies it by setting the `meta' [8th, or `high'] bit), you can invoke many extended commands by meta-ing the first letter of the command. -In \fINT\fP, \fIOS/2\fP, \fIPC\fP and \fIST\fP \fINetHack\fP, +In \fINT\fP, \fIOS/2\fP, \fIPC\fP and \fIST\fP \fIaNetHack\fP, the `Alt' key can be used in this fashion; on the \fIAmiga\fP, set the .op altmeta @@ -1210,7 +1210,7 @@ On other systems, if typing `Alt' plus another key transmits a two character sequence consisting of an \fBEscape\fP followed by the other key, you may set the .op altmeta -option to have nethack combine them into meta+key. +option to have anethack combine them into meta+key. .lp M-? #? (not supported by all platforms) .lp M-2 @@ -1520,13 +1520,13 @@ last victory. Objects .pg When you find something in the dungeon, it is common to want to pick -it up. In NetHack, this is accomplished automatically by walking over +it up. In aNetHack, this is accomplished automatically by walking over the object (unless you turn off the .op autopickup option (see below), or move with the `m' prefix (see above)), or manually by using the `,' command. .pg -If you're carrying too many items, NetHack will tell you so and you won't +If you're carrying too many items, aNetHack will tell you so and you won't be able to pick up anything more. Otherwise, it will add the object(s) to your pack and tell you what you just picked up. @@ -1542,13 +1542,13 @@ will get slower and you'll burn calories faster, requiring food more frequently to cope with it. Eventually, you'll be so overloaded that you'll either have to discard some of what you're carrying or collapse under its weight. .pg -NetHack will tell you how badly you have loaded yourself. The symbols +aNetHack will tell you how badly you have loaded yourself. The symbols `Burdened', `Stressed', `Strained', `Overtaxed' and `Overloaded' are displayed on the bottom line display to indicate your condition. .pg When you pick up an object, it is assigned an inventory letter. Many commands that operate on objects must ask you to find out which object -you want to use. When NetHack asks you to choose a particular object +you want to use. When aNetHack asks you to choose a particular object you are carrying, you are usually presented with a list of inventory letters to choose from (see Commands, above). .pg @@ -1557,7 +1557,7 @@ scrolls and potions, are given descriptions which vary according to type. During a game, any two objects with the same description are the same type. However, the descriptions will vary from game to game. .pg -When you use one of these objects, if its effect is obvious, NetHack +When you use one of these objects, if its effect is obvious, aNetHack will remember what it is for you. If its effect isn't extremely obvious, you will be asked what you want to call this type of object so you will recognize it later. You can also use the ``#name'' @@ -1654,7 +1654,7 @@ other worn items. .pg Those of you in the audience who are AD&D players, be aware that each weapon which existed in AD&D does roughly the same damage to monsters in -NetHack. Some of the more obscure weapons (such as the \fIaklys\fP, +aNetHack. Some of the more obscure weapons (such as the \fIaklys\fP, \fIlucern hammer\fP, and \fIbec-de-corbin\fP) are defined in an appendix to \fIUnearthed Arcana\fP, an AD&D supplement. .pg @@ -1680,7 +1680,7 @@ throw it. You'll be prompted for a direction as above, but you don't have to specify which item to throw each time you use `f'. There is also an option, .op autoquiver, -which has NetHack choose another item to automatically fill your +which has aNetHack choose another item to automatically fill your quiver (or quiver sack, or have at the ready) when the inventory slot used for `Q' runs out. .pg @@ -1789,7 +1789,7 @@ protection than others. Your armor class is a measure of this protection. Armor class (AC) is measured as in AD&D, with 10 being the equivalent of no armor, and lower numbers meaning better armor. Each suit of armor which exists in AD&D gives the same protection in -NetHack. Here is an (incomplete) list of the armor classes provided by +aNetHack. Here is an (incomplete) list of the armor classes provided by various suits of armor: .TS S @@ -1873,14 +1873,14 @@ enchantment are difficult to identify without these. .pg A mail daemon may run up and deliver mail to you as a \fIscroll of mail\fP (on versions compiled with this feature). -To use this feature on versions where NetHack mail delivery is triggered +To use this feature on versions where aNetHack mail delivery is triggered by electronic mail appearing in your system mailbox, -you must let NetHack know where to look for new mail by setting +you must let aNetHack know where to look for new mail by setting the ``MAIL'' environment variable to the file name of your mailbox. You may also want to set the ``MAILREADER'' environment -variable to the file name of your favorite reader, so NetHack can shell to it +variable to the file name of your favorite reader, so aNetHack can shell to it when you read the scroll. -On versions of NetHack where mail is randomly generated internal to the game, +On versions of aNetHack where mail is randomly generated internal to the game, these environment variables are ignored. You can disable the mail daemon by turning off the .op mail @@ -2064,7 +2064,7 @@ you are carrying (shopkeepers aside). .hn 1 Conduct .pg -As if winning NetHack were not difficult enough, certain players +As if winning aNetHack were not difficult enough, certain players seek to challenge themselves by imposing restrictions on the way they play the game. The game automatically tracks some of these challenges, which can be checked at any time with the #conduct @@ -2139,7 +2139,7 @@ using such a wielded weapon. You are still permitted to throw, fire, and kick weapons; use a wand, spell, or other type of item; or fight with your hands and feet. .pg -In NetHack, a pacifist refuses to cause the death of any other monster +In aNetHack, a pacifist refuses to cause the death of any other monster (i.e. if you would get experience for the death). This is a particularly difficult challenge, although it is still possible to gain experience by other means. @@ -2173,8 +2173,8 @@ choose ``nothing'' if you want to decline. .hn 1 Options .pg -Due to variations in personal tastes and conceptions of how NetHack -should do things, there are options you can set to change how NetHack +Due to variations in personal tastes and conceptions of how aNetHack +should do things, there are options you can set to change how aNetHack behaves. .hn 2 Setting the options @@ -2182,8 +2182,8 @@ Setting the options Options may be set in a number of ways. Within the game, the `O' command allows you to view all options and change most of them. You can also set options automatically by placing them in a configuration -file, or in the NETHACKOPTIONS environment variable. -Some versions of NetHack also have front-end programs that allow +file, or in the ANETHACKOPTIONS environment variable. +Some versions of aNetHack also have front-end programs that allow you to set options before starting the game or a global configuration for system administrators. .hn 2 @@ -2191,8 +2191,8 @@ Using a configuration file .pg The default name of the configuration file varies on different operating systems. On DOS and Windows, it is ``defaults.nh'' -in the same folder as nethack.exe or nethackW.exe. On Unix, Linux -and Mac OS X it is ``.nethackrc'' in the user's home directory. +in the same folder as anethack.exe or anethackW.exe. On Unix, Linux +and Mac OS X it is ``.anethackrc'' in the user's home directory. The file may not exist, but it is a normal ASCII text file and can be created with any text editor. .pg @@ -2219,8 +2219,8 @@ Example: \fBOPTIONS=!legacy,autopickup,pickup_types:$"=/!?+\fP .ed .lp HACKDIR -Default location of files NetHack needs. On Windows HACKDIR -defaults to the location of the NetHack.exe or NetHackw.exe file +Default location of files aNetHack needs. On Windows HACKDIR +defaults to the location of the aNetHack.exe or aNetHackw.exe file so setting HACKDIR to override that is not usually necessary or recommended. .lp LEVELDIR The location that in-progress level files are stored. Defaults to HACKDIR, @@ -2271,7 +2271,7 @@ Highlight menu lines with different colors. See the ``Configuring Menu Colors`` section. .lp SYMBOLS Override one or more symbols in the symbols files. -See the ``Modifying NetHack Symbols'' section. +See the ``Modifying aNetHack Symbols'' section. .pg Example: .sd @@ -2308,9 +2308,9 @@ Here is a short example of config file contents: \fBOPTIONS=!splash_screen\fP .ed .hn 2 -Using the NETHACKOPTIONS environment variable +Using the ANETHACKOPTIONS environment variable .pg -The NETHACKOPTIONS variable is a comma-separated list of initial +The ANETHACKOPTIONS variable is a comma-separated list of initial values for the various options. Some can only be turned on or off. You turn one of these on by adding the name of the option to the list, and turn it off by typing a `!' or ``no'' before the name. Others take a @@ -2322,16 +2322,16 @@ For example, to set up an environment variable so that ``autoquiver'' is on, ``autopickup'' is off, the name is set to ``Blue Meanie'', and the fruit is set to ``papaya'', you would enter the command .sd -% \fBsetenv NETHACKOPTIONS "autoquiver,\e!autopickup,name:Blue Meanie,fruit:papaya"\fP +% \fBsetenv ANETHACKOPTIONS "autoquiver,\e!autopickup,name:Blue Meanie,fruit:papaya"\fP .ed in \fIcsh\fP (note the need to escape the ! since it's special to the shell), or .sd -$ \fBNETHACKOPTIONS="autoquiver,!autopickup,name:Blue Meanie,fruit:papaya"\fP -$ \fBexport NETHACKOPTIONS\fP +$ \fBANETHACKOPTIONS="autoquiver,!autopickup,name:Blue Meanie,fruit:papaya"\fP +$ \fBexport ANETHACKOPTIONS\fP .ed in \fIsh\fP or \fIksh\fP. .pg -NETHACKOPTIONS can also be set to the full name of a configuration file you +ANETHACKOPTIONS can also be set to the full name of a configuration file you want to use (possibly preceded by an `@'). .hn 2 Customization options @@ -2494,10 +2494,10 @@ If this is off, dropping an object shifts all the remaining inventory letters. Persistent. .lp "fruit " Name a fruit after something you enjoy eating (ex. ``fruit:mango'') -(default ``slime mold''). Basically a nostalgic whimsy that NetHack uses +(default ``slime mold''). Basically a nostalgic whimsy that aNetHack uses from time to time. You should set this to something you find more appetizing than slime mold. Apples, oranges, pears, bananas, and melons -already exist in NetHack, so don't use those. +already exist in aNetHack, so don't use those. .lp gender Your starting gender (gender:male or gender:female). You may specify just the first letter. Although you can @@ -2651,7 +2651,7 @@ If is used for the role, then a random one will be automatically chosen. Cannot be set with the `O' command. .lp "news " -Read the NetHack news file, if present (default on). +Read the aNetHack news file, if present (default on). Since the news is shown at the beginning of the game, there's no point in setting this with the `O' command. .lp nudist @@ -2869,7 +2869,7 @@ See ``Configuring Status Hilites'' for further information. .lp status_updates Allow updates to the status lines at the bottom of the screen (default true). .lp suppress_alert -This option may be set to a NetHack version level to suppress +This option may be set to a aNetHack version level to suppress alert notification messages about feature changes for that and prior versions (ex. ``suppress_alert:3.3.1''). .lp symset @@ -2887,9 +2887,9 @@ program.) Persistent. .lp tombstone Draw a tombstone graphic upon your death (default on). Persistent. .lp toptenwin -Put the ending display in a NetHack window instead of on stdout (default off). +Put the ending display in a aNetHack window instead of on stdout (default off). Setting this option makes the score list visible when a windowing version -of NetHack is started without a parent window, but it no longer leaves +of aNetHack is started without a parent window, but it no longer leaves the score list around after game end on a terminal or emulating window. .lp travel Allow the travel command (default on). Turning this option off will @@ -2956,67 +2956,67 @@ Where to align or place the message window (top, bottom, left, or right) .lp align_status Where to align or place the status window (top, bottom, left, or right). .lp ascii_map -NetHack should display an ascii character map if it can. +aNetHack should display an ascii character map if it can. .lp color -NetHack should display color if it can for different monsters, +aNetHack should display color if it can for different monsters, objects, and dungeon features .lp eight_bit_tty -NetHack should pass eight-bit character values (for example, specified with the +aNetHack should pass eight-bit character values (for example, specified with the .op traps option) straight through to your terminal (default off). .lp font_map -NetHack should use a font by the chosen name for the map window. +aNetHack should use a font by the chosen name for the map window. .lp font_menu -NetHack should use a font by the chosen name for menu windows. +aNetHack should use a font by the chosen name for menu windows. .lp font_message -NetHack should use a font by the chosen name for the message window. +aNetHack should use a font by the chosen name for the message window. .lp font_status -NetHack should use a font by the chosen name for the status window. +aNetHack should use a font by the chosen name for the status window. .lp font_text -NetHack should use a font by the chosen name for text windows. +aNetHack should use a font by the chosen name for text windows. .lp font_size_map -NetHack should use this size font for the map window. +aNetHack should use this size font for the map window. .lp font_size_menu -NetHack should use this size font for menu windows. +aNetHack should use this size font for menu windows. .lp font_size_message -NetHack should use this size font for the message window. +aNetHack should use this size font for the message window. .lp font_size_status -NetHack should use this size font for the status window. +aNetHack should use this size font for the status window. .lp font_size_text -NetHack should use this size font for text windows. +aNetHack should use this size font for text windows. .lp fullscreen -NetHack should try and display on the entire screen rather than in a window. +aNetHack should try and display on the entire screen rather than in a window. .lp large_font -NetHack should use a large font. +aNetHack should use a large font. .lp map_mode -NetHack should display the map in the manner specified. +aNetHack should display the map in the manner specified. .lp mouse_support Allow use of the mouse for input and travel. .lp player_selection -NetHack should pop up dialog boxes, or use prompts for character selection. +aNetHack should pop up dialog boxes, or use prompts for character selection. .lp popup_dialog -NetHack should pop up dialog boxes for input. +aNetHack should pop up dialog boxes for input. .lp preload_tiles -NetHack should preload tiles into memory. +aNetHack should preload tiles into memory. For example, in the protected mode MSDOS version, control whether tiles get pre-loaded into RAM at the start of the game. Doing so enhances performance of the tile graphics, but uses more memory. (default on). Cannot be set with the `O' command. .lp scroll_amount -NetHack should scroll the display by this number of cells +aNetHack should scroll the display by this number of cells when the hero reaches the scroll_margin. .lp scroll_margin -NetHack should scroll the display when the hero or cursor +aNetHack should scroll the display when the hero or cursor is this number of cells away from the edge of the window. .lp selectsaved -NetHack should display a menu of existing saved games for the player to +aNetHack should display a menu of existing saved games for the player to choose from at game startup, if it can. Not all ports support this option. .lp softkeyboard Display an onscreen keyboard. Handhelds are most likely to support this option. .lp splash_screen -NetHack should display an opening splash screen when it starts up (default yes). +aNetHack should display an opening splash screen when it starts up (default yes). .lp tiled_map -NetHack should display a tiled map if it can. +aNetHack should display a tiled map if it can. .lp tile_file Specify the name of an alternative tile file to override the default. .lp tile_height @@ -3026,15 +3026,15 @@ Specify the preferred width of each tile in a tile capable port .lp use_darkgray Use bold black instead of blue for black glyphs (TTY only). .lp use_inverse -NetHack should display inverse when the game specifies it. +aNetHack should display inverse when the game specifies it. .lp vary_msgcount -NetHack should display this number of messages at a time in +aNetHack should display this number of messages at a time in the message window. .lp windowcolors -NetHack should display windows with the specified foreground/background +aNetHack should display windows with the specified foreground/background colors if it can. .lp wraptext -NetHack port should wrap long lines of text if they don't fit in +aNetHack port should wrap long lines of text if they don't fit in the visible area of the window. .hn 2 Platform-specific Customization options @@ -3042,7 +3042,7 @@ Platform-specific Customization options Here are explanations of options that are used by specific platforms or ports to customize and change the port behavior. .lp altkeyhandler -Select an alternate keystroke handler dll to load (Win32 tty NetHack only). +Select an alternate keystroke handler dll to load (Win32 tty aNetHack only). The name of the handler is specified without the .dll extension and without any path information. Cannot be set with the `O' command. @@ -3051,7 +3051,7 @@ On Amiga, this option controls whether typing `Alt' plus another key functions as a meta-shift for that key (default on). .lp altmeta On other (non-Amiga) systems where this option is available, it can be -set to tell nethack to convert a two character sequence beginning with +set to tell anethack to convert a two character sequence beginning with ESC into a meta-shifted version of the second character (default off). .lp "" This conversion is only done for commands, not for other input prompts. @@ -3059,53 +3059,53 @@ Note that typing one or more digits as a count prefix prior to a command--preceded by \fBn\fP if the .op number_pad option is set--is also subject to this conversion, so attempting to -abort the count by typing ESC will leave nethack waiting for another +abort the count by typing ESC will leave anethack waiting for another character to complete the two character sequence. Type a second ESC to finish cancelling such a count. At other prompts a single ESC suffices. .lp "BIOS " Use BIOS calls to update the screen display quickly and to read the keyboard (allowing the use of arrow keys to move) on machines with an IBM PC compatible BIOS ROM (default off, -OS/2, PC, and ST NetHack only). +OS/2, PC, and ST aNetHack only). .lp flush -(default off, AMIGA NetHack only). +(default off, AMIGA aNetHack only). .lp "MACgraphics" -(default on, Mac NetHack only). +(default on, Mac aNetHack only). .lp page_wait -(default on, Mac NetHack only). +(default on, Mac aNetHack only). .lp "rawio " Force raw (non-cbreak) mode for faster output and more bulletproof input (MS-DOS sometimes treats `^P' as a printer toggle -without it) (default off, OS/2, PC, and ST NetHack only). +without it) (default off, OS/2, PC, and ST aNetHack only). Note: DEC Rainbows hang if this is turned on. Cannot be set with the `O' command. .lp soundcard -(default on, PC NetHack only). +(default on, PC aNetHack only). Cannot be set with the `O' command. .lp subkeyvalue -(Win32 tty NetHack only). +(Win32 tty aNetHack only). May be used to alter the value of keystrokes that the operating system -returns to NetHack to help compensate for international keyboard issues. +returns to aNetHack to help compensate for international keyboard issues. OPTIONS=subkeyvalue:171/92 -will return 92 to NetHack, if 171 was originally going to be returned. +will return 92 to aNetHack, if 171 was originally going to be returned. You can use multiple subkeyvalue statements in the config file if needed. Cannot be set with the `O' command. .lp video -Set the video mode used (PC NetHack only). +Set the video mode used (PC aNetHack only). Values are `autodetect', `default', or `vga'. Setting `vga' (or `autodetect' with vga hardware present) will cause the game to display tiles. Cannot be set with the `O' command. .lp videocolors Set the color palette for PC systems using NO_TERMS -(default 4-2-6-1-5-3-15-12-10-14-9-13-11, (PC NetHack only). +(default 4-2-6-1-5-3-15-12-10-14-9-13-11, (PC aNetHack only). The order of colors is red, green, brown, blue, magenta, cyan, bright.white, bright.red, bright.green, yellow, bright.blue, bright.magenta, and bright.cyan. Cannot be set with the `O' command. .lp videoshades Set the intensity level of the three gray scales available -(default dark normal light, PC NetHack only). +(default dark normal light, PC aNetHack only). If the game display is difficult to read, try adjusting these scales; if this does not correct the problem, try !color. Cannot be set with the `O' command. @@ -3113,9 +3113,9 @@ Cannot be set with the `O' command. Regular Expressions .pg Regular expressions are normally POSIX extended regular expressions. It is -possible to compile NetHack without regular expression support on a platform +possible to compile aNetHack without regular expression support on a platform where there is no regular expression library. While this is not true of any -modern platform, if your NetHack was built this way, patterns are instead glob +modern platform, if your aNetHack was built this way, patterns are instead glob patterns. This applies to Autopickup exceptions, Message types, Menu colors, and User sounds. .hn 2 @@ -3304,7 +3304,7 @@ norep - show the message once, but not again if no other message is shown in bet .ei .ed .lp "" -Here's an example of message types using NetHack's internal +Here's an example of message types using aNetHack's internal pattern matching facility: .sd .si @@ -3350,7 +3350,7 @@ Allowed attributes are none, bold, dim, underline, blink, and inverse. Note that the platform used may interpret the attributes any way it wants. .lp "" -Here's an example of menu colors using NetHack's internal +Here's an example of menu colors using aNetHack's internal pattern matching facility: .sd .si @@ -3403,7 +3403,7 @@ The pattern should be a POSIX extended regular expression. .hn 2 Configuring Status Hilites .pg -Your copy of NetHack may have been compiled with support for ``Status Hilites''. +Your copy of aNetHack may have been compiled with support for ``Status Hilites''. If so, you can customize your game display by setting thresholds to change the color or appearance of fields in the status display. .pg @@ -3450,9 +3450,9 @@ config file. The whole feature can be disabled by setting option statushilites off. .pg .hn 2 -Modifying NetHack Symbols +Modifying aNetHack Symbols .pg -NetHack can load entire symbol sets from the symbol file. +aNetHack can load entire symbol sets from the symbol file. .pg The options that are used to select a particular symbol set from the symbol file are: @@ -3464,7 +3464,7 @@ on the rogue level. .pg You can also override one or more symbols using the SYMBOLS config file option. Symbols are specified as name:value pairs. Note that -NetHack escape-processes the value string in conventional C fashion. +aNetHack escape-processes the value string in conventional C fashion. This means that \e is a prefix to take the following character literally. Thus \e needs to be represented as \e\e. The special escape form @@ -3477,7 +3477,7 @@ center; c s s c1 l1 l. .\"TABLE_START -NetHack Symbols +aNetHack Symbols Default Symbol Name Description \_ \_ \_ S_air (air) @@ -3658,10 +3658,10 @@ z S_zruty (zruty) .TE .pg .hn 2 -Configuring NetHack for Play by the Blind +Configuring aNetHack for Play by the Blind .pg -NetHack can be set up to use only standard ASCII characters for making -maps of the dungeons. This makes the MS-DOS versions of NetHack completely +aNetHack can be set up to use only standard ASCII characters for making +maps of the dungeons. This makes the MS-DOS versions of aNetHack completely accessible to the blind who use speech and/or Braille access technologies. Players will require a good working knowledge of their screen-reader's review features, and will have to know how to navigate horizontally and @@ -3676,18 +3676,18 @@ gives you the row and column of your review cursor and the PC cursor. These co-ordinates are often useful in giving players a better sense of the overall location of items on the screen. .pg -NetHack can also be compiled with support for sending the game messages +aNetHack can also be compiled with support for sending the game messages to an external program, such as a text-to-speech synthesizer. If the #version -extended command shows "external program as a message handler", your NetHack -has been compiled with the capability. When compiling NetHack from source +extended command shows "external program as a message handler", your aNetHack +has been compiled with the capability. When compiling aNetHack from source on Linux and other POSIX systems, define MSGHANDLER to enable it. To use -the capability, set the environment variable NETHACK_MSGHANDLER to an +the capability, set the environment variable ANETHACK_MSGHANDLER to an executable, which will be executed with the game message as the program's only parameter. .pg While it is not difficult for experienced users to edit the \fBdefaults.nh\fP file to accomplish this, novices may find this task somewhat daunting. -Included within the ``symbols'' file of all official distributions of NetHack +Included within the ``symbols'' file of all official distributions of aNetHack is a symset called \fBNHAccess\fP. Selecting that symset in your configuration file will cause the game to run in a manner accessible to the blind. After you have gained some experience with the game @@ -3723,11 +3723,11 @@ seen via the #attributes command. .hn 2 Global Configuration for System Administrators .pg -If NetHack is compiled with the SYSCF option, a system administrator +If aNetHack is compiled with the SYSCF option, a system administrator should set up a global configuration; this is a file in the same format as the traditional per-user configuration file (see above). This file should be named sysconf and placed in the same directory as -the other NetHack support files. +the other aNetHack support files. The options recognized in this file are listed below. Any option not set uses a compiled-in default (which may not be appropriate for your system). @@ -3802,13 +3802,13 @@ if your game is compiled with DUMPLOG. Allows the following placeholders: .hn 1 Scoring .pg -NetHack maintains a list of the top scores or scorers on your machine, +aNetHack maintains a list of the top scores or scorers on your machine, depending on how it is set up. In the latter case, each account on the machine can post only one non-winning score on this list. If you score higher than someone else on this list, or better your previous score, you will be inserted in the proper place under your current name. How many scores are kept can also be set up when -NetHack is compiled. +aNetHack is compiled. .pg Your score is chiefly based upon how much experience you gained, how much loot you accumulated, how deep you explored, and how the game @@ -3821,12 +3821,12 @@ live, or quit and stop with whatever you have. If you quit, you keep all your gold, but if you swing and live, you might find more. .pg If you just want to see what the current top players/games list is, you -can type \fBnethack -s all\fP on most versions. +can type \fBanethack -s all\fP on most versions. .hn 1 Explore mode .pg -NetHack is an intricate and difficult game. Novices might falter +aNetHack is an intricate and difficult game. Novices might falter in fear, aware of their ignorance of the means to survive. Well, fear not. Your dungeon comes equipped with an ``explore'' or ``discovery'' mode that enables you to keep old save files and cheat death, at the @@ -3874,7 +3874,7 @@ cribbed from \fIA Guide to the Dungeons of Doom\fP, by Michael C. Toy and Kenneth C. R. C. Arnold. Small portions were adapted from \fIFurther Exploration of the Dungeons of Doom\fP, by Ken Arromdee. .pg -NetHack is the product of literally dozens of people's work. +aNetHack is the product of literally dozens of people's work. Main events in the course of the game development are described below: .pg @@ -3895,24 +3895,24 @@ on to produce at least four more versions (3.0, 3.2, 3.51, and 3.6). producing ST Hack 1.03. .pg \fBMike Stephenson\fP merged these various versions back together, -incorporating many of the added features, and produced NetHack 1.4. +incorporating many of the added features, and produced aNetHack 1.4. He then coordinated a cast of thousands in enhancing and debugging -NetHack 1.4 and released NetHack versions 2.2 and 2.3. +aNetHack 1.4 and released aNetHack versions 2.2 and 2.3. .pg Later, Mike coordinated a major rewrite of the game, heading a team which included \fBKen Arromdee\fP, \fBJean-Christophe Collet\fP, \fBSteve Creps\fP, \fBEric Hendrickson\fP, \fBIzchak Miller\fP, \fBJohn Rupley\fP, -\fBMike Threepoint\fP, and \fBJanet Walz\fP, to produce NetHack 3.0c. +\fBMike Threepoint\fP, and \fBJanet Walz\fP, to produce aNetHack 3.0c. .pg -NetHack 3.0 was ported to the Atari by \fBEric R. Smith\fP, to OS/2 by +aNetHack 3.0 was ported to the Atari by \fBEric R. Smith\fP, to OS/2 by \fBTimo Hakulinen\fP, and to VMS by \fBDavid Gentzel\fP. The three of them and \fBKevin Darcy\fP later joined the main development team to produce subsequent revisions of 3.0. .pg -\fBOlaf Seibert\fP ported NetHack 2.3 and 3.0 to the Amiga. +\fBOlaf Seibert\fP ported aNetHack 2.3 and 3.0 to the Amiga. \fBNorm Meluch\fP, \fBStephen Spackman\fP and \fBPierre Martineau\fP designed -overlay code for PC NetHack 3.0. \fBJohnny Lee\fP ported -NetHack 3.0 to the Macintosh. Along with various other Dungeoneers, they +overlay code for PC aNetHack 3.0. \fBJohnny Lee\fP ported +aNetHack 3.0 to the Macintosh. Along with various other Dungeoneers, they continued to enhance the PC, Macintosh, and Amiga ports through the later revisions of 3.0. .pg @@ -3924,31 +3924,31 @@ Headed by \fBMike Stephenson\fP and coordinated by \fBIzchak Miller\fP and revision of 3.0. They re-structured the game's design, and re-wrote major parts of the code. They added multiple dungeons, a new display, special individual character quests, a new endgame and many other new features, and -produced NetHack 3.1. +produced aNetHack 3.1. .pg \fBKen Lorber\fP, \fBGregg Wonderly\fP and \fBGreg Olson\fP, with help from \fBRichard Addison\fP, \fBMike Passaretti\fP, and \fBOlaf Seibert\fP, -developed NetHack 3.1 for the Amiga. +developed aNetHack 3.1 for the Amiga. .pg \fBNorm Meluch\fP and \fBKevin Smolkowski\fP, with help from \fBCarl Schelin\fP, \fBStephen Spackman\fP, \fBSteve VanDevender\fP, -and \fBPaul Winner\fP, ported NetHack 3.1 to the PC. +and \fBPaul Winner\fP, ported aNetHack 3.1 to the PC. .pg \fBJon W{tte\fP and \fBHao-yang Wang\fP, with help from \fBRoss Brown\fP, \fBMike Engber\fP, \fBDavid Hairston\fP, \fBMichael Hamel\fP, \fBJonathan Handler\fP, \fBJohnny Lee\fP, \fBTim Lennan\fP, \fBRob Menke\fP, -and \fBAndy Swanson\fP, developed NetHack 3.1 for the Macintosh, +and \fBAndy Swanson\fP, developed aNetHack 3.1 for the Macintosh, porting it for MPW. Building on their development, \fBBarton House\fP added a Think C port. .pg -\fBTimo Hakulinen\fP ported NetHack 3.1 to OS/2. \fBEric Smith\fP -ported NetHack 3.1 to the Atari. \fBPat Rankin\fP, with help from -\fBJoshua Delahunty\fP, was responsible for the VMS version of NetHack 3.1. -\fBMichael Allison\fP ported NetHack 3.1 to Windows NT. +\fBTimo Hakulinen\fP ported aNetHack 3.1 to OS/2. \fBEric Smith\fP +ported aNetHack 3.1 to the Atari. \fBPat Rankin\fP, with help from +\fBJoshua Delahunty\fP, was responsible for the VMS version of aNetHack 3.1. +\fBMichael Allison\fP ported aNetHack 3.1 to Windows NT. .pg -\fBDean Luick\fP, with help from \fBDavid Cohrs\fP, developed NetHack +\fBDean Luick\fP, with help from \fBDavid Cohrs\fP, developed aNetHack 3.1 for X11. -\fBWarwick Allison\fP wrote a tiled version of NetHack for the Atari; +\fBWarwick Allison\fP wrote a tiled version of aNetHack for the Atari; he later contributed the tiles to the DevTeam and tile support was then added to other platforms. .pg @@ -3967,24 +3967,24 @@ and 3.2, one of the founding members of the development team, \fBDr. Izchak Miller\fP, was diagnosed with cancer and passed away. That release of the game was dedicated to him by the development and porting teams. .pg -During the lifespan of NetHack 3.1 and 3.2, several enthusiasts +During the lifespan of aNetHack 3.1 and 3.2, several enthusiasts of the game added their own modifications to the game and made these ``variants'' publicly available: .pg -\fBTom Proudfoot\fP and \fBYuval Oren\fP created NetHack++, -which was quickly renamed NetHack--. -Working independently, \fBStephen White\fP wrote NetHack Plus. -\fBTom Proudfoot\fP later merged NetHack Plus -and his own NetHack-- to produce SLASH. +\fBTom Proudfoot\fP and \fBYuval Oren\fP created aNetHack++, +which was quickly renamed aNetHack--. +Working independently, \fBStephen White\fP wrote aNetHack Plus. +\fBTom Proudfoot\fP later merged aNetHack Plus +and his own aNetHack-- to produce SLASH. \fBLarry Stewart-Zerba\fP and \fBWarwick Allison\fP improved the spell casting system with the Wizard Patch. -\fBWarwick Allison\fP also ported NetHack to use the Qt interface. +\fBWarwick Allison\fP also ported aNetHack to use the Qt interface. .pg \fBWarren Cheung\fP combined SLASH with the Wizard Patch to produce Slash'em, and with the help of \fBKevin Hugo\fP, added more features. Kevin later joined the -DevTeam and incorporated the best of these ideas in NetHack 3.3. +DevTeam and incorporated the best of these ideas in aNetHack 3.3. .pg The final update to 3.2 was the bug fix release 3.2.3, which was released simultaneously with 3.3.0 in December 1999 just in time for the Year 2000. @@ -4014,14 +4014,14 @@ The 3.4 development team initially consisted of \fBDavid Cohrs\fP, \fBJessie Collet\fP, \fBKevin Hugo\fP, \fBKen Lorber\fP, \fBDean Luick\fP, \fBPat Rankin\fP, \fBMike Stephenson\fP, \fBJanet Walz\fP, and \fBPaul Winner\fP, with \fB Warwick Allison\fP joining -just before the release of NetHack 3.4.0 in March 2002. +just before the release of aNetHack 3.4.0 in March 2002. .pg As with version 3.3, various people contributed to the game as a whole as -well as supporting ports on the different platforms that NetHack runs on: +well as supporting ports on the different platforms that aNetHack runs on: .pg \fBPat Rankin\fP maintained 3.4 for VMS. .pg -\fBMichael Allison\fP maintained NetHack 3.4 for the MS-DOS platform. \fBPaul Winner\fP +\fBMichael Allison\fP maintained aNetHack 3.4 for the MS-DOS platform. \fBPaul Winner\fP and \fBYitzhak Sapir\fP provided encouragement. .pg \fBDean Luick\fP, \fBMark Modrall\fP, and \fBKevin Hugo\fP maintained and enhanced the @@ -4034,9 +4034,9 @@ platform. \fBAlex Kompel\fP contributed a new graphical interface for the Windows port. \fBAlex Kompel\fP also contributed a Windows CE port for 3.4.1. .pg -\fBRon Van Iwaarden\fP was the sole maintainer of NetHack for OS/2 the past +\fBRon Van Iwaarden\fP was the sole maintainer of aNetHack for OS/2 the past several releases. Unfortunately Ron's last OS/2 machine stopped working in -early 2006. A great many thanks to Ron for keeping NetHack alive on OS/2 +early 2006. A great many thanks to Ron for keeping aNetHack alive on OS/2 all these years. .pg \fBJanne Salmijarvi\fP and \fBTeemu Suikki\fP maintained and @@ -4046,13 +4046,13 @@ it for 3.3.1. \fBChristian ``Marvin'' Bressler\fP maintained 3.4 for the Atari after he resurrected it for 3.3.1. .pg -The release of NetHack 3.4.3 in December 2003 marked the beginning of a +The release of aNetHack 3.4.3 in December 2003 marked the beginning of a long release hiatus. 3.4.3 proved to be a remarkably stable version that provided continued enjoyment by the community for more than a decade. The devteam slowly and quietly continued to work on the game behind the scenes during the tenure of 3.4.3. It was during that same period that several new -variants emerged within the NetHack community. Notably sporkhack by -\fBDerek S. Ray\fP, unnethack by \fBPatric Mueller\fP, nitrohack and its +variants emerged within the aNetHack community. Notably sporkhack by +\fBDerek S. Ray\fP, unanethack by \fBPatric Mueller\fP, nitrohack and its successors originally by \fBDaniel Thaler\fP and then by \fBAlex Smith\fP, and Dynahack by \fBTung Nguyen\fP. Some of those variants continue to be developed, maintained, and enjoyed by the community to this day. @@ -4065,32 +4065,32 @@ as 3.6.0, the development team consisted of \fBWarwick Allison\fP, \fBMike Stephenson\fP, \fBJanet Walz\fP, and \fBPaul Winner\fP. Leading up to the release of 3.6.0 in early 2015, new members \fBSean Hunt\fP, \fBPasi Kallinen\fP, and \fBDerek S. Ray\fP -joined the NetHack development team. +joined the aNetHack development team. .pg In September 2014, an interim snapshot of the code under development was released publicly by other parties. Since that code was a work-in-progress and had not gone through the process of debugging it as a suitable release, it was decided that the version numbers present on that code snapshot would -be retired and never used in an official NetHack release. An announcement -was posted on the devteam's official nethack.org website to that effect, +be retired and never used in an official aNetHack release. An announcement +was posted on the devteam's official anethack.org website to that effect, stating that there would never be a 3.4.4, 3.5, or 3.5.0 official release version. .pg -In November 2014, preparation began for the release of NetHack 3.6. The 3.6 +In November 2014, preparation began for the release of aNetHack 0.0.1. The 3.6 version merges work done by the development team since the previous release with some of the beloved community patches. Many bugs were fixed and a large amount of code was restructured. .pg \fBThe development team, as well as \fBSteve VanDevender\fP and -\fBKevin Smolkowski\fP ensured that NetHack 3.6 continued to operate on +\fBKevin Smolkowski\fP ensured that aNetHack 0.0.1 continued to operate on various Unix flavors and maintained the X11 interface. .pg \fBKen Lorber\fP, \fBHaoyang Wang\fP, \fBPat Rankin\fP, and \fBDean Luick\fP -maintained the port of NetHack 3.6 for Mac. +maintained the port of aNetHack 0.0.1 for Mac. .pg \fBMichael Allison\fP, \fBDerek S. Ray\fP, \fBYitzhak Sapir\fP, \fBAlex Kompel\fP, and \fBDion Nicolaas\fP maintained the port of -NetHack 3.6 for Microsoft Windows. +aNetHack 0.0.1 for Microsoft Windows. .pg The 3.6 development team consisting of \fBMichael Allison\fP, \fBWarwick Allison\fP, \fBKen Arromdee\fP, @@ -4100,17 +4100,17 @@ The 3.6 development team consisting of \fBPaul Winner\fP released 3.6.1 as a bug fix release in January 2016. .pg -The official NetHack web site is maintained by \fBKen Lorber\fP at http://www.nethack.org/. +The official aNetHack web site is maintained by \fBKen Lorber\fP at http://www.anethack.org/. .pg SHOUT-OUTS .pg The devteam would like to give a special "shout-out" to thank the generous -people primarily responsible for the public NetHack servers available for -playing the game at nethack.alt.org and devnull.net. In addition to providing -a way for the public to play a game of NetHack from almost anywhere, they -have hosted annual NetHack tournaments for many, many years. +people primarily responsible for the public aNetHack servers available for +playing the game at anethack.alt.org and devnull.net. In addition to providing +a way for the public to play a game of aNetHack from almost anywhere, they +have hosted annual aNetHack tournaments for many, many years. .pg -On behalf of the NetHack community, thank you very much to +On behalf of the aNetHack community, thank you very much to \fBM. Drew Streib\fP, \fBPasi Kallinen\fP and \fBRobin Bandy\fP. .pg - - - - - - - - - - diff --git a/doc/Guidebook.tex b/doc/Guidebook.tex index 11c40a89..e462ae1c 100644 --- a/doc/Guidebook.tex +++ b/doc/Guidebook.tex @@ -1,5 +1,5 @@ \documentstyle[titlepage,longtable]{article} -% NetHack 3.6 Guidebook.tex $NHDT-Date: 1431192762 2015/12/16 17:32:42 $ $NHDT-Branch: master $:$NHDT-Revision: 1.60 $ */ +% aNetHack 0.0.1 Guidebook.tex $ANH-Date: 1431192762 2015/12/16 17:32:42 $ $ANH-Branch: master $:$ANH-Revision: 1.60 $ */ %+% we're still limping along in LaTeX 2.09 compatibility mode %-%\documentclass{article} %-%\usepackage{hyperref} % before longtable @@ -40,7 +40,7 @@ %.mt \title{\LARGE A Guide to the Mazes of Menace:\\ -\Large Guidebook for {\it NetHack\/}} +\Large Guidebook for {\it aNetHack\/}} %.au \author{Original version - Eric S. Raymond\\ @@ -111,7 +111,7 @@ dungeon\ldots \section{What is going on here?} %.pg -You have just begun a game of {\it NetHack}. Your goal is to grab as much +You have just begun a game of {\it aNetHack}. Your goal is to grab as much treasure as you can, retrieve the Amulet of Yendor, and escape the Mazes of Menace alive. @@ -250,28 +250,28 @@ seen on the current dungeon level; as you explore more of the level, it appears on the screen in front of you. %.pg -When {\it NetHack\/}'s ancestor {\it rogue\/} first appeared, its screen +When {\it aNetHack\/}'s ancestor {\it rogue\/} first appeared, its screen orientation was almost unique among computer fantasy games. Since then, screen orientation has become the norm rather than the -exception; {\it NetHack\/} continues this fine tradition. Unlike text +exception; {\it aNetHack\/} continues this fine tradition. Unlike text adventure games that accept commands in pseudo-English sentences and -explain the results in words, {\it NetHack\/} commands are all one or two +explain the results in words, {\it aNetHack\/} commands are all one or two keystrokes and the results are displayed graphically on the screen. A minimum screen size of 24 lines by 80 columns is recommended; if the screen is larger, only a $21\times80$ section will be used for the map. %.pg -{\it NetHack\/} can even be played by blind players, with the assistance of +{\it aNetHack\/} can even be played by blind players, with the assistance of Braille readers or speech synthesisers. Instructions for configuring -{\it NetHack\/} for the blind are included later in this document. +{\it aNetHack\/} for the blind are included later in this document. %.pg -{\it NetHack\/} generates a new dungeon every time you play it; even the +{\it aNetHack\/} generates a new dungeon every time you play it; even the authors still find it an entertaining and exciting game despite having won several times. %.pg -{\it NetHack\/} offers a variety of display options. The options available to +{\it aNetHack\/} offers a variety of display options. The options available to you will vary from port to port, depending on the capabilities of your hardware and software, and whether various compile-time options were enabled when your executable was created. The three possible display @@ -285,10 +285,10 @@ colors in the Guidebook, and because it is common to all ports, we will use the default ASCII characters from the monochrome character display when referring to things you might see on the screen during your game. %.pg -In order to understand what is going on in {\it NetHack}, first you must -understand what {\it NetHack\/} is doing with the screen. The {\it NetHack\/} +In order to understand what is going on in {\it aNetHack}, first you must +understand what {\it aNetHack\/} is doing with the screen. The {\it aNetHack\/} screen replaces the ``You see \ldots'' descriptions of text adventure games. -Figure 1 is a sample of what a {\it NetHack\/} screen might look like. +Figure 1 is a sample of what a {\it aNetHack\/} screen might look like. The way the screen looks for you depends on your platform. \vbox{ @@ -452,7 +452,7 @@ all relevant status conditions. %.pg The top line of the screen is reserved for messages that describe things that are impossible to represent visually. If you see a -``{\tt --More--}'' on the top line, this means that {\it NetHack\/} has +``{\tt --More--}'' on the top line, this means that {\it aNetHack\/} has another message to display on the screen, but it wants to make certain that you've read the one that is there first. To read the next message, just press the space bar. @@ -575,9 +575,9 @@ Commands can initiated by typing one or two characters to which the command is bound to, or typing the command name in the extended commands entry. Some commands, like ``{\tt search}'', do not require that any more information be collected -by {\it NetHack\/}. Other commands might require additional information, for +by {\it aNetHack\/}. Other commands might require additional information, for example a direction, or an object to be used. For those commands that -require additional information, {\it NetHack\/} will present you with either +require additional information, {\it aNetHack\/} will present you with either a menu of choices, or with a command line prompt requesting information. Which you are presented with will depend chiefly on how you have set the `{\it menustyle\/}' @@ -1086,7 +1086,7 @@ Escape to a shell. \item[\tb{\#}] Perform an extended command.\\ %.lp "" -As you can see, the authors of {\it NetHack\/} +As you can see, the authors of {\it aNetHack\/} used up all the letters, so this is a way to introduce the less frequently used commands. What extended commands are available depends on what features @@ -1419,7 +1419,7 @@ Go up a staircase. Default key is '{\tt <}'. List vanquished monsters. Autocompletes. Wizard-mode only. %.lp \item[\tb{\#version}] -Print compile time options for this version of {\it NetHack}. +Print compile time options for this version of {\it aNetHack}. Autocompletes. Default key is '{\tt M-v}'. %.lp \item[\tb{\#versionshort}] @@ -1498,13 +1498,13 @@ Help menu: get the list of available extended commands. with another key, modifies it by setting the `meta' [8th, or `high'] bit), you can invoke many extended commands by meta-ing the first letter of the command. -In {\it NT, OS/2, PC\/ {\rm and} ST NetHack}, +In {\it NT, OS/2, PC\/ {\rm and} ST aNetHack}, the `Alt' key can be used in this fashion; on the {\it Amiga\/}, set the {\it altmeta\/} option to get this behavior. On other systems, if typing `Alt' plus another key transmits a two character sequence consisting of an {\tt Escape} followed by the other key, you may set the {\it altmeta\/} -option to have nethack combine them into meta\+key. +option to have anethack combine them into meta\+key. \blist{} %.lp \item[\tb{M-?}] @@ -1903,12 +1903,12 @@ last victory. %.pg When you find something in the dungeon, it is common to want to pick -it up. In {\it NetHack}, this is accomplished automatically by walking over +it up. In {\it aNetHack}, this is accomplished automatically by walking over the object (unless you turn off the {\it autopickup\/} option (see below), or move with the `{\tt m}' prefix (see above)), or manually by using the `{\tt ,}' command. %.pg -If you're carrying too many items, {\it NetHack\/} will tell you so and you +If you're carrying too many items, {\it aNetHack\/} will tell you so and you won't be able to pick up anything more. Otherwise, it will add the object(s) to your pack and tell you what you just picked up. %.pg @@ -1923,14 +1923,14 @@ will get slower and you'll burn calories faster, requiring food more frequently to cope with it. Eventually, you'll be so overloaded that you'll either have to discard some of what you're carrying or collapse under its weight. %.pg -NetHack will tell you how badly you have loaded yourself. The symbols +aNetHack will tell you how badly you have loaded yourself. The symbols `Burdened', `Stressed', `Strained', `Overtaxed' and `Overloaded' are displayed on the bottom line display to indicate your condition. %.pg When you pick up an object, it is assigned an inventory letter. Many commands that operate on objects must ask you to find out which object -you want to use. When {\it NetHack\/} asks you to choose a particular object +you want to use. When {\it aNetHack\/} asks you to choose a particular object you are carrying, you are usually presented with a list of inventory letters to choose from (see Commands, above). @@ -1941,7 +1941,7 @@ type. During a game, any two objects with the same description are the same type. However, the descriptions will vary from game to game. %.pg -When you use one of these objects, if its effect is obvious, {\it NetHack\/} +When you use one of these objects, if its effect is obvious, {\it aNetHack\/} will remember what it is for you. If its effect isn't extremely obvious, you will be asked what you want to call this type of object so you will recognize it later. You can also use the ``{\tt \#name}'' @@ -2052,7 +2052,7 @@ other worn items. %.pg Those of you in the audience who are AD\&D players, be aware that each weapon which existed in AD\&D does roughly the same damage to monsters in -{\it NetHack}. Some of the more obscure weapons (such as the % +{\it aNetHack}. Some of the more obscure weapons (such as the % {\it aklys}, {\it lucern hammer}, and {\it bec-de-corbin\/}) are defined in an appendix to {\it Unearthed Arcana}, an AD\&D supplement. @@ -2082,7 +2082,7 @@ throw it. You'll be prompted for a direction as above, but you don't have to specify which item to throw each time you use `{\tt f}'. There is also an option, {\it autoquiver}, -which has {\it NetHack\/} choose another item to automatically fill your +which has {\it aNetHack\/} choose another item to automatically fill your quiver (or quiver sack, or have at the ready) when the inventory slot used for `{\tt Q}' runs out. @@ -2204,7 +2204,7 @@ protection than others. Your armor class is a measure of this protection. Armor class (AC) is measured as in AD\&D, with 10 being the equivalent of no armor, and lower numbers meaning better armor. Each suit of armor which exists in AD\&D gives the same protection in -{\it NetHack}. Here is an (incomplete) list of the armor classes provided by +{\it aNetHack}. Here is an (incomplete) list of the armor classes provided by various suits of armor: \begin{center} @@ -2296,14 +2296,14 @@ enchantment are difficult to identify without these. %.pg A mail daemon may run up and deliver mail to you as a % {\it scroll of mail} (on versions compiled with this feature). -To use this feature on versions where {\it NetHack\/} +To use this feature on versions where {\it aNetHack\/} mail delivery is triggered by electronic mail appearing in your system mailbox, -you must let {\it NetHack\/} know where to look for new mail by setting the +you must let {\it aNetHack\/} know where to look for new mail by setting the ``MAIL'' environment variable to the file name of your mailbox. You may also want to set the ``MAILREADER'' environment variable to the -file name of your favorite reader, so {\it NetHack\/} can shell to it when you +file name of your favorite reader, so {\it aNetHack\/} can shell to it when you read the scroll. -On versions of {\it NetHack\/} where mail is randomly +On versions of {\it aNetHack\/} where mail is randomly generated internal to the game, these environment variables are ignored. You can disable the mail daemon by turning off the {\it mail\/} option. @@ -2532,7 +2532,7 @@ you are carrying (shopkeepers aside). \section{Conduct} %.pg -As if winning {\it NetHack\/} were not difficult enough, certain players +As if winning {\it aNetHack\/} were not difficult enough, certain players seek to challenge themselves by imposing restrictions on the way they play the game. The game automatically tracks some of these challenges, which can be checked at any time with the {\tt \#conduct} @@ -2616,7 +2616,7 @@ fire, and kick weapons; use a wand, spell, or other type of item; or fight with your hands and feet. %.pg -In {\it NetHack\/}, a pacifist refuses to cause the death of any other monster +In {\it aNetHack\/}, a pacifist refuses to cause the death of any other monster (i.e. if you would get experience for the death). This is a particularly difficult challenge, although it is still possible to gain experience by other means. @@ -2653,8 +2653,8 @@ choose ``nothing'' if you want to decline. \section{Options} %.pg -Due to variations in personal tastes and conceptions of how {\it NetHack\/} -should do things, there are options you can set to change how {\it NetHack\/} +Due to variations in personal tastes and conceptions of how {\it aNetHack\/} +should do things, there are options you can set to change how {\it aNetHack\/} behaves. %.hn 2 @@ -2664,8 +2664,8 @@ behaves. Options may be set in a number of ways. Within the game, the `{\tt O}' command allows you to view all options and change most of them. You can also set options automatically by placing them in a configuration -file, or in the ``NETHACKOPTIONS'' environment variable. -Some versions of {\it NetHack\/} also have front-end programs that allow +file, or in the ``ANETHACKOPTIONS'' environment variable. +Some versions of {\it aNetHack\/} also have front-end programs that allow you to set options before starting the game or a global configuration for system administrators. @@ -2675,8 +2675,8 @@ for system administrators. %.pg The default name of the configuration file varies on different operating systems. On DOS and Windows, it is ``defaults.nh'' -in the same folder as nethack.exe or nethackW.exe. On Unix, Linux -and Mac OS X it is ``.nethackrc'' in the user's home directory. +in the same folder as anethack.exe or anethackW.exe. On Unix, Linux +and Mac OS X it is ``.anethackrc'' in the user's home directory. The file may not exist, but it is a normal ASCII text file and can be created with any text editor. @@ -2713,8 +2713,8 @@ Example: %.lp \item[\bb{HACKDIR}] -Default location of files NetHack needs. On Windows HACKDIR -defaults to the location of the NetHack.exe or NetHackw.exe file +Default location of files aNetHack needs. On Windows HACKDIR +defaults to the location of the aNetHack.exe or aNetHackw.exe file so setting HACKDIR to override that is not usually necessary or recommended. %.lp \item[\bb{LEVELDIR}] @@ -2783,7 +2783,7 @@ See the ``Configuring Menu Colors`` section. %.lp \item[\bb{SYMBOLS}] Override one or more symbols in the symbols files. -See the ``Modifying NetHack Symbols'' section. +See the ``Modifying aNetHack Symbols'' section. %.pg Example: %.sd @@ -2833,10 +2833,10 @@ Here is a short example of config file contents: %.ed %.hn 2 -\subsection*{Using the NETHACKOPTIONS environment variable} +\subsection*{Using the ANETHACKOPTIONS environment variable} %.pg -The NETHACKOPTIONS variable is a comma-separated list of initial +The ANETHACKOPTIONS variable is a comma-separated list of initial values for the various options. Some can only be turned on or off. You turn one of these on by adding the name of the option to the list, and turn it off by typing a `{\tt !}' or ``{\tt no}'' before the name. @@ -2851,7 +2851,7 @@ is on, {\it autopickup\/} is off, the {\it name\/} is set to ``Blue Meanie'', and the {\it fruit\/} is set to ``papaya'', you would enter the command %.sd \begin{verbatim} - setenv NETHACKOPTIONS "autoquiver,\!autopickup,name:Blue Meanie,fruit:papaya" + setenv ANETHACKOPTIONS "autoquiver,\!autopickup,name:Blue Meanie,fruit:papaya" \end{verbatim} %.ed @@ -2859,15 +2859,15 @@ and the {\it fruit\/} is set to ``papaya'', you would enter the command (note the need to escape the ! since it's special to the shell), or %.sd \begin{verbatim} - NETHACKOPTIONS="autoquiver,!autopickup,name:Blue Meanie,fruit:papaya" - export NETHACKOPTIONS + ANETHACKOPTIONS="autoquiver,!autopickup,name:Blue Meanie,fruit:papaya" + export ANETHACKOPTIONS \end{verbatim} %.ed \nd in {\it sh\/} or {\it ksh}. %.pg -NETHACKOPTIONS can also be set to the full name of a configuration file you +ANETHACKOPTIONS can also be set to the full name of a configuration file you want to use (possibly preceded by an `{\tt @}'). %.hn 2 @@ -3057,9 +3057,9 @@ Persistent. \item[\ib{fruit}] Name a fruit after something you enjoy eating (ex.\ ``{\tt fruit:mango}'') (default ``{\tt slime mold}''). Basically a nostalgic whimsy that -{\it NetHack\/} uses from time to time. You should set this to something you +{\it aNetHack\/} uses from time to time. You should set this to something you find more appetizing than slime mold. Apples, oranges, pears, bananas, and -melons already exist in {\it NetHack}, so don't use those. +melons already exist in {\it aNetHack}, so don't use those. %.lp \item[\ib{gender}] Your starting gender ({\tt gender:male} or {\tt gender:female}). @@ -3234,7 +3234,7 @@ automatically chosen. Cannot be set with the `{\tt O}' command. %.lp \item[\ib{news}] -Read the {\it NetHack\/} news file, if present (default on). +Read the {\it aNetHack\/} news file, if present (default on). Since the news is shown at the beginning of the game, there's no point in setting this with the `{\tt O}' command. %.lp @@ -3491,7 +3491,7 @@ See ``{\it Configuring Status Hilites\/}'' for further information. Allow updates to the status lines at the bottom of the screen (default true). %.lp \item[\ib{suppress\verb+_+alert}] -This option may be set to a NetHack version level to suppress +This option may be set to a aNetHack version level to suppress alert notification messages about feature changes for that and prior versions (ex.\ ``{\tt suppress\verb+_+alert:3.3.1}'') %.lp @@ -3514,9 +3514,9 @@ program.) Persistent. Draw a tombstone graphic upon your death (default on). Persistent. %.lp \item[\ib{toptenwin}] -Put the ending display in a NetHack window instead of on stdout (default off). +Put the ending display in a aNetHack window instead of on stdout (default off). Setting this option makes the score list visible when a windowing version -of NetHack is started without a parent window, but it no longer leaves +of aNetHack is started without a parent window, but it no longer leaves the score list around after game end on a terminal or emulating window. %.lp \item[\ib{travel}] @@ -3601,10 +3601,10 @@ with the `{\tt O}' command. Where to align or place the status window (top, bottom, left, or right). %.lp \item[\ib{ascii\verb+_+map}] -NetHack should display an ascii map if it can. +aNetHack should display an ascii map if it can. %.lp \item[\ib{color}] -NetHack should display color if it can for different monsters, +aNetHack should display color if it can for different monsters, objects, and dungeon features %.lp \item[\ib{eight\verb+_+bit\verb+_+tty}] @@ -3612,80 +3612,80 @@ Pass eight-bit character values (for example, specified with the {\it traps \/} option) straight through to your terminal (default off). %.lp \item[\ib{font\verb+_+map}] -NetHack should use a font by the chosen name for the map window. +aNetHack should use a font by the chosen name for the map window. %.lp \item[\ib{font\verb+_+menu}] -NetHack should use a font by the chosen name for menu windows. +aNetHack should use a font by the chosen name for menu windows. %.lp \item[\ib{font\verb+_+message}] -NetHack should use a font by the chosen name for the message window. +aNetHack should use a font by the chosen name for the message window. %.lp \item[\ib{font\verb+_+status}] -NetHack should use a font by the chosen name for the status window. +aNetHack should use a font by the chosen name for the status window. %.lp \item[\ib{font\verb+_+text}] -NetHack should use a font by the chosen name for text windows. +aNetHack should use a font by the chosen name for text windows. %.lp \item[\ib{font\verb+_+size\verb+_+map}] -NetHack should use this size font for the map window. +aNetHack should use this size font for the map window. %.lp \item[\ib{font\verb+_+size\verb+_+menu}] -NetHack should use this size font for menu windows. +aNetHack should use this size font for menu windows. %.lp \item[\ib{font\verb+_+size\verb+_+message}] -NetHack should use this size font for the message window. +aNetHack should use this size font for the message window. %.lp \item[\ib{font\verb+_+size\verb+_+status}] -NetHack should use this size font for the status window. +aNetHack should use this size font for the status window. %.lp \item[\ib{font\verb+_+size\verb+_+text}] -NetHack should use this size font for text windows. +aNetHack should use this size font for text windows. %.lp \item[\ib{fullscreen}] -NetHack should try and display on the entire screen rather than in a window. +aNetHack should try and display on the entire screen rather than in a window. %.lp \item[\ib{large\verb+_+font}] -NetHack should use a large font. +aNetHack should use a large font. %.lp \item[\ib{map\verb+_+mode}] -NetHack should display the map in the manner specified. +aNetHack should display the map in the manner specified. %.lp \item[\ib{mouse\verb+_+support}] Allow use of the mouse for input and travel. %.lp \item[\ib{player\verb+_+selection}] -NetHack should pop up dialog boxes or use prompts for character selection. +aNetHack should pop up dialog boxes or use prompts for character selection. %.lp \item[\ib{popup\verb+_+dialog}] -NetHack should pop up dialog boxes for input. +aNetHack should pop up dialog boxes for input. %.lp \item[\ib{preload\verb+_+tiles}] -NetHack should preload tiles into memory. +aNetHack should preload tiles into memory. For example, in the protected mode MSDOS version, control whether tiles get pre-loaded into RAM at the start of the game. Doing so enhances performance of the tile graphics, but uses more memory. (default on). Cannot be set with the `{\tt O}' command. %.lp \item[\ib{scroll\verb+_+amount}] -NetHack should scroll the display by this number of cells +aNetHack should scroll the display by this number of cells when the hero reaches the scroll\verb+_+margin. %.lp \item[\ib{scroll\verb+_+margin}] -NetHack should scroll the display when the hero or cursor +aNetHack should scroll the display when the hero or cursor is this number of cells away from the edge of the window. %.lp \item[\ib{selectsaved}] -NetHack should display a menu of existing saved games for the player to +aNetHack should display a menu of existing saved games for the player to choose from at game startup, if it can. Not all ports support this option. %.lp \item[\ib{softkeyboard}] Display an onscreen keyboard. Handhelds are most likely to support this option. %.lp \item[\ib{splash\verb+_+screen}] -NetHack should display an opening splash screen when it starts up (default yes). +aNetHack should display an opening splash screen when it starts up (default yes). %.lp \item[\ib{tiled\verb+_+map}] -NetHack should display a tiled map if it can. +aNetHack should display a tiled map if it can. %.lp \item[\ib{tile\verb+_+file}] Specify the name of an alternative tile file to override the default. @@ -3700,17 +3700,17 @@ Specify the preferred width of each tile in a tile capable port Use bold black instead of blue for black glyphs (TTY only). %.lp \item[\ib{use\verb+_+inverse}] -NetHack should display inverse when the game specifies it. +aNetHack should display inverse when the game specifies it. %.lp \item[\ib{vary\verb+_+msgcount}] -NetHack should display this number of messages at a time in the message window. +aNetHack should display this number of messages at a time in the message window. %.lp \item[\ib{windowcolors}] -NetHack should display windows with the specified foreground/background +aNetHack should display windows with the specified foreground/background colors if it can. %.lp \item[\ib{wraptext}] -NetHack port should wrap long lines of text if they don't fit in +aNetHack port should wrap long lines of text if they don't fit in the visible area of the window. \elist @@ -3724,7 +3724,7 @@ or ports to customize and change the port behavior. \blist{} %.lp \item[\ib{altkeyhandler}] -Select an alternate keystroke handler dll to load ({\it Win32 tty\/ NetHack\/} only). +Select an alternate keystroke handler dll to load ({\it Win32 tty\/ aNetHack\/} only). The name of the handler is specified without the .dll extension and without any path information. Cannot be set with the `{\tt O}' command. @@ -3735,7 +3735,7 @@ functions as a meta-shift for that key (default on). %.lp \item[\ib{altmeta}] On other (non-Amiga) systems where this option is available, it can be -set to tell nethack to convert a two character sequence beginning with +set to tell anethack to convert a two character sequence beginning with ESC into a meta-shifted version of the second character (default off). %.lp "" @@ -3743,46 +3743,46 @@ This conversion is only done for commands, not for other input prompts. Note that typing one or more digits as a count prefix prior to a command---preceded by {\tt n} if the {\it number\verb+_+pad\/} option is set---is also subject to this conversion, so attempting to -abort the count by typing ESC will leave nethack waiting for another +abort the count by typing ESC will leave anethack waiting for another character to complete the two character sequence. Type a second ESC to finish cancelling such a count. At other prompts a single ESC suffices. %.lp \item[\ib{BIOS}] Use BIOS calls to update the screen display quickly and to read the keyboard (allowing the use of arrow keys to move) on machines with an IBM PC -compatible BIOS ROM (default off, {\it OS/2, PC\/ {\rm and} ST NetHack\/} only). +compatible BIOS ROM (default off, {\it OS/2, PC\/ {\rm and} ST aNetHack\/} only). %.lp \item[\ib{flush}] -(default off, {\it Amiga NetHack \/} only). +(default off, {\it Amiga aNetHack \/} only). %.lp \item[\ib{Macgraphics}] -(default on, {\it Mac NetHack \/} only). +(default on, {\it Mac aNetHack \/} only). %.lp \item[\ib{page\verb+_+wait}] -(default off, {\it Mac NetHack \/} only). +(default off, {\it Mac aNetHack \/} only). %.lp \item[\ib{rawio}] Force raw (non-cbreak) mode for faster output and more bulletproof input (MS-DOS sometimes treats `{\tt \^{}P}' as a printer toggle -without it) (default off, {\it OS/2, PC\/ {\rm and} ST NetHack\/} only). +without it) (default off, {\it OS/2, PC\/ {\rm and} ST aNetHack\/} only). Note: DEC Rainbows hang if this is turned on. Cannot be set with the `{\tt O}' command. %.lp \item[\ib{soundcard}] -(default off, {\it PC NetHack \/} only). +(default off, {\it PC aNetHack \/} only). Cannot be set with the `{\tt O}' command. %.lp \item[\ib{subkeyvalue}] -({\it Win32 tty NetHack \/} only). +({\it Win32 tty aNetHack \/} only). May be used to alter the value of keystrokes that the operating system -returns to NetHack to help compensate for international keyboard issues. +returns to aNetHack to help compensate for international keyboard issues. OPTIONS=subkeyvalue:171/92 -will return 92 to NetHack, if 171 was originally going to be returned. +will return 92 to aNetHack, if 171 was originally going to be returned. You can use multiple subkeyvalue statements in the config file if needed. Cannot be set with the `{\tt O}' command. %.lp \item[\ib{video}] -Set the video mode used ({\it PC\/ NetHack\/} only). +Set the video mode used ({\it PC\/ aNetHack\/} only). Values are {\it autodetect\/}, {\it default\/}, or {\it vga\/}. Setting {\it vga\/} (or {\it autodetect\/} with vga hardware present) will cause the game to display tiles. @@ -3791,7 +3791,7 @@ Cannot be set with the `{\tt O}' command. \item[\ib{videocolors}] \begin{sloppypar} Set the color palette for PC systems using NO\verb+_+TERMS -(default 4-2-6-1-5-3-15-12-10-14-9-13-11, {\it PC\/ NetHack\/} only). +(default 4-2-6-1-5-3-15-12-10-14-9-13-11, {\it PC\/ aNetHack\/} only). The order of colors is red, green, brown, blue, magenta, cyan, bright.white, bright.red, bright.green, yellow, bright.blue, bright.magenta, and bright.cyan. @@ -3800,7 +3800,7 @@ Cannot be set with the `{\tt O}' command. %.lp \item[\ib{videoshades}] Set the intensity level of the three gray scales available -(default dark normal light, {\it PC\/ NetHack\/} only). +(default dark normal light, {\it PC\/ aNetHack\/} only). If the game display is difficult to read, try adjusting these scales; if this does not correct the problem, try {\tt !color}. Cannot be set with the `{\tt O}' command. @@ -3811,9 +3811,9 @@ Cannot be set with the `{\tt O}' command. %.pg Regular expressions are normally POSIX extended regular expressions. It is -possible to compile NetHack without regular expression support on a platform where +possible to compile aNetHack without regular expression support on a platform where there is no regular expression library. While this is not true of any modern -platform, if your NetHack was built this way, patterns are instead glob +platform, if your aNetHack was built this way, patterns are instead glob patterns. This applies to Autopickup exceptions, Message types, Menu colors, and User sounds. @@ -4056,7 +4056,7 @@ the pattern to match. The pattern should be a regular expression. \elist %.lp "" -Here's an example of message types using NetHack's internal +Here's an example of message types using aNetHack's internal pattern matching facility: \begin{verbatim} @@ -4120,7 +4120,7 @@ Note that the platform used may interpret the attributes any way it wants. %.lp "" -Here's an example of menu colors using NetHack's internal +Here's an example of menu colors using aNetHack's internal pattern matching facility: \begin{verbatim} @@ -4185,7 +4185,7 @@ The pattern should be a regular expression. \subsection*{Configuring Status Hilites} %.pg -Your copy of NetHack may have been compiled with support for {\it Status Hilites}. +Your copy of aNetHack may have been compiled with support for {\it Status Hilites}. If so, you can customize your game display by setting thresholds to change the color or appearance of fields in the status display. @@ -4235,10 +4235,10 @@ The whole feature can be disable by setting option {\it statushilites} off. %.lp %.hn 2 -\subsection*{Modifying NetHack Symbols} +\subsection*{Modifying aNetHack Symbols} %.pg -NetHack can load entire symbol sets from the symbol file. +aNetHack can load entire symbol sets from the symbol file. %.pg The options that are used to select a particular symbol set from the @@ -4258,7 +4258,7 @@ on the rogue level. You can also override one or more symbols using the {\it SYMBOLS\/} config file option. Symbols are specified as {\it name:value\/} pairs. Note that -{\it NetHack\/} escape-processes the {\it value\/} string in conventional C +{\it aNetHack\/} escape-processes the {\it value\/} string in conventional C fashion. This means that `\verb+\+' is a prefix to take the following character literally. Thus `\verb+\+' needs to be represented as `\verb+\\+'. The special escape form @@ -4269,7 +4269,7 @@ character. { \small \begin{longtable}{lll} -\caption[]{NetHack Symbols}\\ +\caption[]{aNetHack Symbols}\\ Default & Symbol Name & Description\\ \hline \hline \endhead @@ -4452,11 +4452,11 @@ Default & Symbol Name & Description\\ %.lp %.hn 2 -\subsection*{Configuring NetHack for Play by the Blind} +\subsection*{Configuring aNetHack for Play by the Blind} %.pg -NetHack can be set up to use only standard ASCII characters for making -maps of the dungeons. This makes the MS-DOS versions of NetHack completely +aNetHack can be set up to use only standard ASCII characters for making +maps of the dungeons. This makes the MS-DOS versions of aNetHack completely accessible to the blind who use speech and/or Braille access technologies. Players will require a good working knowledge of their screen-reader's review features, and will have to know how to navigate horizontally and @@ -4471,18 +4471,18 @@ gives you the row and column of your review cursor and the PC cursor. These co-ordinates are often useful in giving players a better sense of the overall location of items on the screen. %.pg -NetHack can also be compiled with support for sending the game messages +aNetHack can also be compiled with support for sending the game messages to an external program, such as a text-to-speech synthesizer. If the \#version -extended command shows "external program as a message handler", your NetHack -has been compiled with the capability. When compiling NetHack from source +extended command shows "external program as a message handler", your aNetHack +has been compiled with the capability. When compiling aNetHack from source on Linux and other POSIX systems, define {\it MSGHANDLER\/} to enable it. To use -the capability, set the environment variable {\it NETHACK\_MSGHANDLER\/} to an +the capability, set the environment variable {\it ANETHACK\_MSGHANDLER\/} to an executable, which will be executed with the game message as the program's only parameter. %.pg While it is not difficult for experienced users to edit the {\it defaults.nh\/} file to accomplish this, novices may find this task somewhat daunting. -Included within the symbol file of all official distributions of NetHack +Included within the symbol file of all official distributions of aNetHack is a symset called {\it NHAccess\/}. Selecting that symset in your configuration file will cause the game to run in a manner accessible to the blind. After you have gained some experience with the game @@ -4531,12 +4531,12 @@ seen via the #attributes command. \subsection*{Global Configuration for System Administrators} %.pg -If NetHack is compiled with the SYSCF option, a system administrator +If aNetHack is compiled with the SYSCF option, a system administrator should set up a global configuration; this is a file in the same format as the traditional per-user configuration file (see above). This file should be named sysconf and placed in the same directory as -the other NetHack support files. +the other aNetHack support files. The options recognized in this file are listed below. Any option not set uses a compiled-in default (which may not be appropriate for your system). @@ -4619,13 +4619,13 @@ if your game is compiled with DUMPLOG. Allows the following placeholders: \section{Scoring} %.pg -{\it NetHack\/} maintains a list of the top scores or scorers on your machine, +{\it aNetHack\/} maintains a list of the top scores or scorers on your machine, depending on how it is set up. In the latter case, each account on the machine can post only one non-winning score on this list. If you score higher than someone else on this list, or better your previous score, you will be inserted in the proper place under your current name. How many scores are kept can also be set up when -{\it NetHack\/} is compiled. +{\it aNetHack\/} is compiled. %.pg Your score is chiefly based upon how much experience you gained, how @@ -4642,7 +4642,7 @@ all your gold, but if you swing and live, you might find more. If you just want to see what the current top players/games list is, you can type \begin{verbatim} - nethack -s all + anethack -s all \end{verbatim} on most versions. @@ -4650,7 +4650,7 @@ on most versions. \section{Explore mode} %.pg -{\it NetHack\/} is an intricate and difficult game. Novices might falter +{\it aNetHack\/} is an intricate and difficult game. Novices might falter in fear, aware of their ignorance of the means to survive. Well, fear not. Your dungeon comes equipped with an ``explore'' or ``discovery'' mode that enables you to keep old save files and cheat death, at the @@ -4705,7 +4705,7 @@ and Kenneth C. R. C. Arnold. Small portions were adapted from {\it Further Exploration of the Dungeons of Doom}, by Ken Arromdee. %.pg -{\it NetHack\/} is the product of literally dozens of people's work. +{\it aNetHack\/} is the product of literally dozens of people's work. Main events in the course of the game development are described below: %.pg @@ -4734,9 +4734,9 @@ version 1.03g, and went on to produce at least four more versions (3.0, 3.2, %.pg \medskip \nd {\it Mike Stephenson\/} merged these various versions back together, -incorporating many of the added features, and produced {\it NetHack\/} version +incorporating many of the added features, and produced {\it aNetHack\/} version 1.4. He then coordinated a cast of thousands in enhancing and debugging -{\it NetHack\/} 1.4 and released {\it NetHack\/} versions 2.2 and 2.3. +{\it aNetHack\/} 1.4 and released {\it aNetHack\/} versions 2.2 and 2.3. %.pg \medskip @@ -4744,21 +4744,21 @@ incorporating many of the added features, and produced {\it NetHack\/} version included {\it Ken Arromdee}, {\it Jean-Christophe Collet}, {\it Steve Creps}, {\it Eric Hendrickson}, {\it Izchak Miller}, {\it Eric S. Raymond}, {\it John Rupley}, {\it Mike Threepoint}, and {\it Janet Walz}, to produce {\it -NetHack\/} 3.0c. +aNetHack\/} 3.0c. %.pg \medskip -\nd {\it NetHack\/} 3.0 was ported to the Atari by {\it Eric R. Smith}, to OS/2 by +\nd {\it aNetHack\/} 3.0 was ported to the Atari by {\it Eric R. Smith}, to OS/2 by {\it Timo Hakulinen}, and to VMS by {\it David Gentzel}. The three of them and {\it Kevin Darcy\/} later joined the main development team to produce subsequent revisions of 3.0. %.pg \medskip -\nd {\it Olaf Seibert\/} ported {\it NetHack\/} 2.3 and 3.0 to the Amiga. {\it +\nd {\it Olaf Seibert\/} ported {\it aNetHack\/} 2.3 and 3.0 to the Amiga. {\it Norm Meluch}, {\it Stephen Spackman\/} and {\it Pierre Martineau\/} designed -overlay code for {\it PC NetHack\/} 3.0. {\it Johnny Lee\/} ported {\it -NetHack\/} 3.0 to the Macintosh. Along with various other Dungeoneers, they +overlay code for {\it PC aNetHack\/} 3.0. {\it Johnny Lee\/} ported {\it +aNetHack\/} 3.0 to the Macintosh. Along with various other Dungeoneers, they continued to enhance the PC, Macintosh, and Amiga ports through the later revisions of 3.0. @@ -4772,19 +4772,19 @@ revisions of 3.0. revision of 3.0. They re-structured the game's design, and re-wrote major parts of the code. They added multiple dungeons, a new display, special individual character quests, a new endgame and many other new features, and -produced {\it NetHack\/} 3.1. +produced {\it aNetHack\/} 3.1. %.pg \medskip \nd {\it Ken Lorber}, {\it Gregg Wonderly\/} and {\it Greg Olson}, with help from {\it Richard Addison}, {\it Mike Passaretti}, and {\it Olaf Seibert}, -developed {\it NetHack\/} 3.1 for the Amiga. +developed {\it aNetHack\/} 3.1 for the Amiga. %.pg \medskip \nd {\it Norm Meluch\/} and {\it Kevin Smolkowski}, with help from {\it Carl Schelin}, {\it Stephen Spackman}, {\it Steve VanDevender}, -and {\it Paul Winner}, ported {\it NetHack\/} 3.1 to the PC. +and {\it Paul Winner}, ported {\it aNetHack\/} 3.1 to the PC. %.pg \medskip @@ -4792,22 +4792,22 @@ and {\it Paul Winner}, ported {\it NetHack\/} 3.1 to the PC. with help from {\it Ross Brown}, {\it Mike Engber}, {\it David Hairston}, {\it Michael Hamel}, {\it Jonathan Handler}, {\it Johnny Lee}, {\it Tim Lennan}, {\it Rob Menke}, and {\it Andy Swanson}, -developed {\it NetHack\/} 3.1 for the Macintosh, porting it for MPW. +developed {\it aNetHack\/} 3.1 for the Macintosh, porting it for MPW. Building on their development, {\it Barton House} added a Think C port. %.pg \medskip -\nd {\it Timo Hakulinen\/} ported {\it NetHack\/} 3.1 to OS/2. -{\it Eric Smith\/} ported {\it NetHack\/} 3.1 to the Atari. +\nd {\it Timo Hakulinen\/} ported {\it aNetHack\/} 3.1 to OS/2. +{\it Eric Smith\/} ported {\it aNetHack\/} 3.1 to the Atari. {\it Pat Rankin}, with help from {\it Joshua Delahunty}, -was responsible for the VMS version of {\it NetHack\/} 3.1. -{\it Michael Allison} ported {\it NetHack\/} 3.1 to Windows NT. +was responsible for the VMS version of {\it aNetHack\/} 3.1. +{\it Michael Allison} ported {\it aNetHack\/} 3.1 to Windows NT. %.pg \medskip -\nd {\it Dean Luick}, with help from {\it David Cohrs}, developed {\it NetHack\/} +\nd {\it Dean Luick}, with help from {\it David Cohrs}, developed {\it aNetHack\/} 3.1 for X11. -{\it Warwick Allison} wrote a tiled version of NetHack for the Atari; +{\it Warwick Allison} wrote a tiled version of aNetHack for the Atari; he later contributed the tiles to the DevTeam and tile support was then added to other platforms. @@ -4831,21 +4831,21 @@ dedicated to him by the development and porting teams. %.pg \medskip -During the lifespan of {\it NetHack\/} 3.1 and 3.2, several enthusiasts +During the lifespan of {\it aNetHack\/} 3.1 and 3.2, several enthusiasts of the game added their own modifications to the game and made these ``variants'' publicly available: %.pg \medskip -{\it Tom Proudfoot} and {\it Yuval Oren} created {\it NetHack++}, -which was quickly renamed {\it NetHack$--$}. -Working independently, {\it Stephen White} wrote {\it NetHack Plus}. -{\it Tom Proudfoot} later merged {\it NetHack Plus} -and his own {\it NetHack$--$} to produce {\it SLASH}. +{\it Tom Proudfoot} and {\it Yuval Oren} created {\it aNetHack++}, +which was quickly renamed {\it aNetHack$--$}. +Working independently, {\it Stephen White} wrote {\it aNetHack Plus}. +{\it Tom Proudfoot} later merged {\it aNetHack Plus} +and his own {\it aNetHack$--$} to produce {\it SLASH}. {\it Larry Stewart-Zerba} and {\it Warwick Allison} improved the spell casting system with the Wizard Patch. -{\it Warwick Allison} also ported NetHack to use the Qt interface. +{\it Warwick Allison} also ported aNetHack to use the Qt interface. %.pg \medskip @@ -4853,7 +4853,7 @@ casting system with the Wizard Patch. to produce {\it Slash'em\/}, and with the help of {\it Kevin Hugo}, added more features. Kevin later joined the -DevTeam and incorporated the best of these ideas into NetHack 3.3. +DevTeam and incorporated the best of these ideas into aNetHack 3.3. %.pg \medskip @@ -4889,12 +4889,12 @@ The 3.4 development team initially consisted of {\it David Cohrs}, {\it Jessie Collet}, {\it Kevin Hugo}, {\it Ken Lorber}, {\it Dean Luick}, {\it Pat Rankin}, {\it Mike Stephenson}, {\it Janet Walz}, and {\it Paul Winner}, with {\it Warwick Allison} joining -just before the release of NetHack 3.4.0 in March 2002. +just before the release of aNetHack 3.4.0 in March 2002. %.pg \medskip As with version 3.3, various people contributed to the game as a whole as -well as supporting ports on the different platforms that {\it NetHack\/} +well as supporting ports on the different platforms that {\it aNetHack\/} runs on: %.pg @@ -4903,7 +4903,7 @@ runs on: %.pg \medskip -\nd {\it Michael Allison} maintained NetHack 3.4 for the MS-DOS platform. +\nd {\it Michael Allison} maintained aNetHack 3.4 for the MS-DOS platform. {\it Paul Winner} and {\it Yitzhak Sapir} provided encouragement. %.pg @@ -4920,9 +4920,9 @@ enhanced the Macintosh port of 3.4. %.pg \medskip -\nd {\it Ron Van Iwaarden} was the sole maintainer of NetHack for OS/2 the past +\nd {\it Ron Van Iwaarden} was the sole maintainer of aNetHack for OS/2 the past several releases. Unfortunately Ron's last OS/2 machine stopped working in -early 2006. A great many thanks to Ron for keeping NetHack alive on OS/2 +early 2006. A great many thanks to Ron for keeping aNetHack alive on OS/2 all these years. %.pg @@ -4938,13 +4938,13 @@ resurrected it for 3.3.1. %.pg \medskip -The release of NetHack 3.4.3 in December 2003 marked the beginning of a +The release of aNetHack 3.4.3 in December 2003 marked the beginning of a long release hiatus. 3.4.3 proved to be a remarkably stable version that provided continued enjoyment by the community for more than a decade. The devteam slowly and quietly continued to work on the game behind the scenes during the tenure of 3.4.3. It was during that same period that several new -variants emerged within the NetHack community. Notably sporkhack by -Derek S. Ray, unnethack by Patric Mueller, nitrohack and its successors +variants emerged within the aNetHack community. Notably sporkhack by +Derek S. Ray, unanethack by Patric Mueller, nitrohack and its successors originally by Daniel Thaler and then by Alex Smith, and Dynahack by Tung Nguyen. Some of those variants continue to be developed, maintained, and enjoyed by the community to this day. @@ -4959,7 +4959,7 @@ as 3.6.0, the development team consisted of {\it Warwick Allison}, {\it Mike Stephenson}, {\it Janet Walz}, and {\it Paul Winner}. Leading up to the release of 3.6.0 in early 2015, new members {\it Sean Hunt}, {\it Pasi Kallinen}, and {\it Derek S. Ray} -joined the NetHack development team. +joined the aNetHack development team. %.pg \medskip @@ -4967,14 +4967,14 @@ In September 2014, an interim snapshot of the code under development was released publicly by other parties. Since that code was a work-in-progress and had not gone through the process of debugging it as a suitable release, it was decided that the version numbers present on that code snapshot would -be retired and never used in an official NetHack release. An announcement -was posted on the devteam's official nethack.org website to that effect, +be retired and never used in an official aNetHack release. An announcement +was posted on the devteam's official anethack.org website to that effect, stating that there would never be a 3.4.4, 3.5, or 3.5.0 official release version. %.pg \medskip -In November 2014, preparation began for the release of NetHack 3.6. The 3.6 +In November 2014, preparation began for the release of aNetHack 0.0.1. The 3.6 version merges work done by the development team since the previous release with some of the beloved community patches. Many bugs were fixed and a large amount of code was restructured. @@ -4982,18 +4982,18 @@ large amount of code was restructured. %.pg \medskip The development team, as well as {\it Steve VanDevender} and -{\it Kevin Smolkowski} ensured that NetHack 3.6 continued to operate on +{\it Kevin Smolkowski} ensured that aNetHack 0.0.1 continued to operate on various Unix flavors and maintained the X11 interface. %.pg {\it Ken Lorber}, {\it Haoyang Wang}, {\it Pat Rankin}, and {\it Dean Luick} -maintained the port of NetHack 3.6 for Mac. +maintained the port of aNetHack 0.0.1 for Mac. %.pg \medskip {\it Michael Allison}, {\it Derek S. Ray}, {\it Yitzhak Sapir}, {\it Alex Kompel}, and {\it Dion Nicolaas} maintained the port of -NetHack 3.6 for Microsoft Windows. +aNetHack 0.0.1 for Microsoft Windows. %.pg \medskip @@ -5006,10 +5006,10 @@ released 3.6.1 as a bug fix release in January 2016. %.pg \medskip -\nd The official NetHack web site is maintained by {\it Ken Lorber} at +\nd The official aNetHack web site is maintained by {\it Ken Lorber} at {\catcode`\#=11 -\special{html:}} -http:{\tt /}{\tt /}www.nethack.org{\tt /}. +\special{html:}} +http:{\tt /}{\tt /}www.anethack.org{\tt /}. {\catcode`\#=11 \special{html:}} @@ -5018,12 +5018,12 @@ http:{\tt /}{\tt /}www.nethack.org{\tt /}. \subsection*{Shout Outs} \nd The devteam would like to give a special "shout-out" to thank the generous -people primarily responsible for the public NetHack servers available for -playing the game at nethack.alt.org and devnull.net. In addition to providing -a way for the public to play a game of NetHack from almost anywhere, they -have hosted annual NetHack tournaments for many, many years. +people primarily responsible for the public aNetHack servers available for +playing the game at anethack.alt.org and devnull.net. In addition to providing +a way for the public to play a game of aNetHack from almost anywhere, they +have hosted annual aNetHack tournaments for many, many years. %.pg -\nd On behalf of the NetHack community, thank you very much to +\nd On behalf of the aNetHack community, thank you very much to {\it M. Drew Streib}, {\it Pasi Kallinen} and {\it Robin Bandy}. \clearpage %.hn diff --git a/doc/Guidebook.txt b/doc/Guidebook.txt index dfde235b..998d583d 100644 --- a/doc/Guidebook.txt +++ b/doc/Guidebook.txt @@ -9,7 +9,7 @@ A Guide to the Mazes of Menace - (Guidebook for NetHack) + (Guidebook for aNetHack) Original version - Eric S. Raymond @@ -60,13 +60,13 @@ amulet of which they spoke. Even if the rumors of the amulet's - NetHack Guidebook 1 + aNetHack Guidebook 1 - NetHack Guidebook 2 + aNetHack Guidebook 2 @@ -90,7 +90,7 @@ 2. What is going on here? - You have just begun a game of NetHack. Your goal is to grab + You have just begun a game of aNetHack. Your goal is to grab as much treasure as you can, retrieve the Amulet of Yendor, and escape the Mazes of Menace alive. @@ -126,13 +126,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 3 + aNetHack Guidebook 3 @@ -192,13 +192,13 @@ thing (including other orcs). Above all others, Orcs hate Elves - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 4 + aNetHack Guidebook 4 @@ -212,27 +212,27 @@ you have seen on the current dungeon level; as you explore more of the level, it appears on the screen in front of you. - When NetHack's ancestor rogue first appeared, its screen + When aNetHack's ancestor rogue first appeared, its screen orientation was almost unique among computer fantasy games. Since then, screen orientation has become the norm rather than - the exception; NetHack continues this fine tradition. Unlike + the exception; aNetHack continues this fine tradition. Unlike text adventure games that accept commands in pseudo-English sen- - tences and explain the results in words, NetHack commands are all + tences and explain the results in words, aNetHack commands are all one or two keystrokes and the results are displayed graphically on the screen. A minimum screen size of 24 lines by 80 columns is recommended; if the screen is larger, only a 21x80 section will be used for the map. - NetHack can even be played by blind players, with the assis- + aNetHack can even be played by blind players, with the assis- tance of Braille readers or speech synthesisers. Instructions - for configuring NetHack for the blind are included later in this + for configuring aNetHack for the blind are included later in this document. - NetHack generates a new dungeon every time you play it; even + aNetHack generates a new dungeon every time you play it; even the authors still find it an entertaining and exciting game de- spite having won several times. - NetHack offers a variety of display options. The options + aNetHack offers a variety of display options. The options available to you will vary from port to port, depending on the capabilities of your hardware and software, and whether various compile-time options were enabled when your executable was creat- @@ -248,23 +248,23 @@ the monochrome character display when referring to things you might see on the screen during your game. - In order to understand what is going on in NetHack, first - you must understand what NetHack is doing with the screen. The - NetHack screen replaces the ``You see ...'' descriptions of text - adventure games. Figure 1 is a sample of what a NetHack screen + In order to understand what is going on in aNetHack, first + you must understand what aNetHack is doing with the screen. The + aNetHack screen replaces the ``You see ...'' descriptions of text + adventure games. Figure 1 is a sample of what a aNetHack screen might look like. The way the screen looks for you depends on your platform. - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 5 + aNetHack Guidebook 5 @@ -324,13 +324,13 @@ ing capacity from your constitution no longer matters. - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 6 + aNetHack Guidebook 6 @@ -390,13 +390,13 @@ ence point totals, you gain an experience level. The more - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 7 + aNetHack Guidebook 7 @@ -437,7 +437,7 @@ The top line of the screen is reserved for messages that de- scribe things that are impossible to represent visually. If you - see a ``--More--'' on the top line, this means that NetHack has + see a ``--More--'' on the top line, this means that aNetHack has another message to display on the screen, but it wants to make certain that you've read the one that is there first. To read the next message, just press the space bar. @@ -456,13 +456,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 8 + aNetHack Guidebook 8 @@ -522,13 +522,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 9 + aNetHack Guidebook 9 @@ -550,10 +550,10 @@ Commands are initiated by typing one or two characters. Some commands, like ``search'', do not require that any more in- - formation be collected by NetHack. Other commands might require + formation be collected by aNetHack. Other commands might require additional information, for example a direction, or an object to be used. For those commands that require additional information, - NetHack will present you with either a menu of choices or with a + aNetHack will present you with either a menu of choices or with a command line prompt requesting information. Which you are pre- sented with will depend chiefly on how you have set the menustyle option. @@ -588,13 +588,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 10 + aNetHack Guidebook 10 @@ -654,13 +654,13 @@ Figure 2 - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 11 + aNetHack Guidebook 11 @@ -720,13 +720,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 12 + aNetHack Guidebook 12 @@ -786,13 +786,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 13 + aNetHack Guidebook 13 @@ -852,13 +852,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 14 + aNetHack Guidebook 14 @@ -918,13 +918,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 15 + aNetHack Guidebook 15 @@ -984,13 +984,13 @@ (R)UNIX is a registered trademark of AT&T. - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 16 + aNetHack Guidebook 16 @@ -1034,7 +1034,7 @@ # Perform an extended command. - As you can see, the authors of NetHack used up all the let- + As you can see, the authors of aNetHack used up all the let- ters, so this is a way to introduce the less frequently used commands. What extended commands are available depends on what features the game was compiled with. @@ -1050,13 +1050,13 @@ just'' can also be used to split a stack of objects; when - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 17 + aNetHack Guidebook 17 @@ -1116,13 +1116,13 @@ Corpses of recently killed monsters are the fodder of - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 18 + aNetHack Guidebook 18 @@ -1182,13 +1182,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 19 + aNetHack Guidebook 19 @@ -1202,7 +1202,7 @@ monsters. #version - Print compile time options for this version of NetHack. + Print compile time options for this version of aNetHack. #wipe Wipe off your face. @@ -1214,11 +1214,11 @@ bination with another key, modifies it by setting the `meta' [8th, or `high'] bit), you can invoke many extended commands by meta-ing the first letter of the command. In NT, OS/2, PC and ST - NetHack, the `Alt' key can be used in this fashion; on the Amiga, + aNetHack, the `Alt' key can be used in this fashion; on the Amiga, set the altmeta option to get this behavior. On other systems, if typing `Alt' plus another key transmits a two character se- quence consisting of an Escape followed by the other key, you may - set the altmeta option to have nethack combine them into + set the altmeta option to have anethack combine them into meta+key. M-? #? (not supported by all platforms) @@ -1248,13 +1248,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 20 + aNetHack Guidebook 20 @@ -1314,13 +1314,13 @@ Any lit areas within your line of sight will be displayed; dark - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 21 + aNetHack Guidebook 21 @@ -1380,13 +1380,13 @@ two down staircases, one continuing into the dungeon and the - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 22 + aNetHack Guidebook 22 @@ -1446,13 +1446,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 23 + aNetHack Guidebook 23 @@ -1512,13 +1512,13 @@ useful results. - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 24 + aNetHack Guidebook 24 @@ -1578,13 +1578,13 @@ Many a dungeoneer has had to resort to magic and wizardry in - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 25 + aNetHack Guidebook 25 @@ -1611,12 +1611,12 @@ 7. Objects When you find something in the dungeon, it is common to want - to pick it up. In NetHack, this is accomplished automatically by + to pick it up. In aNetHack, this is accomplished automatically by walking over the object (unless you turn off the autopickup op- tion (see below), or move with the `m' prefix (see above)), or manually by using the `,' command. - If you're carrying too many items, NetHack will tell you so + If you're carrying too many items, aNetHack will tell you so and you won't be able to pick up anything more. Otherwise, it will add the object(s) to your pack and tell you what you just picked up. @@ -1632,25 +1632,25 @@ ally, you'll be so overloaded that you'll either have to discard some of what you're carrying or collapse under its weight. - NetHack will tell you how badly you have loaded yourself. + aNetHack will tell you how badly you have loaded yourself. The symbols `Burdened', `Stressed', `Strained', `Overtaxed' and `Overloaded' are displayed on the bottom line display to indicate your condition. When you pick up an object, it is assigned an inventory let- ter. Many commands that operate on objects must ask you to find - out which object you want to use. When NetHack asks you to + out which object you want to use. When aNetHack asks you to choose a particular object you are carrying, you are usually pre- sented with a list of inventory letters to choose from (see - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 26 + aNetHack Guidebook 26 @@ -1663,7 +1663,7 @@ will vary from game to game. When you use one of these objects, if its effect is obvious, - NetHack will remember what it is for you. If its effect isn't + aNetHack will remember what it is for you. If its effect isn't extremely obvious, you will be asked what you want to call this type of object so you will recognize it later. You can also use the ``#name'' command, or its synonym `C', for the same purpose @@ -1710,13 +1710,13 @@ have ``uncursed'' be displayed even when that can be deduced from - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 27 + aNetHack Guidebook 27 @@ -1776,19 +1776,19 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 28 + aNetHack Guidebook 28 Those of you in the audience who are AD&D players, be aware that each weapon which existed in AD&D does roughly the same dam- - age to monsters in NetHack. Some of the more obscure weapons + age to monsters in aNetHack. Some of the more obscure weapons (such as the aklys, lucern hammer, and bec-de-corbin) are defined in an appendix to Unearthed Arcana, an AD&D supplement. @@ -1813,7 +1813,7 @@ command to throw it. You'll be prompted for a direction as above, but you don't have to specify which item to throw each time you use `f'. There is also an option, autoquiver, which has - NetHack choose another item to automatically fill your quiver (or + aNetHack choose another item to automatically fill your quiver (or quiver sack, or have at the ready) when the inventory slot used for `Q' runs out. @@ -1842,13 +1842,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 29 + aNetHack Guidebook 29 @@ -1908,13 +1908,13 @@ two weapons at once. The primary is your wielded weapon and the - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 30 + aNetHack Guidebook 30 @@ -1952,7 +1952,7 @@ protection. Armor class (AC) is measured as in AD&D, with 10 be- ing the equivalent of no armor, and lower numbers meaning better armor. Each suit of armor which exists in AD&D gives the same - protection in NetHack. Here is an (incomplete) list of the armor + protection in aNetHack. Here is an (incomplete) list of the armor classes provided by various suits of armor: dragon scale mail 1 @@ -1974,13 +1974,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 31 + aNetHack Guidebook 31 @@ -2040,13 +2040,13 @@ ``THANX MAUD'' backwards). Scrolls disappear after you read them - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 32 + aNetHack Guidebook 32 @@ -2060,13 +2060,13 @@ A mail daemon may run up and deliver mail to you as a scroll of mail (on versions compiled with this feature). To use this - feature on versions where NetHack mail delivery is triggered by + feature on versions where aNetHack mail delivery is triggered by electronic mail appearing in your system mailbox, you must let - NetHack know where to look for new mail by setting the ``MAIL'' + aNetHack know where to look for new mail by setting the ``MAIL'' environment variable to the file name of your mailbox. You may also want to set the ``MAILREADER'' environment variable to the - file name of your favorite reader, so NetHack can shell to it - when you read the scroll. On versions of NetHack where mail is + file name of your favorite reader, so aNetHack can shell to it + when you read the scroll. On versions of aNetHack where mail is randomly generated internal to the game, these environment vari- ables are ignored. You can disable the mail daemon by turning off the mail option. @@ -2106,13 +2106,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 33 + aNetHack Guidebook 33 @@ -2172,13 +2172,13 @@ lar to wands. To cast one at yourself, just give a `.' or `s' - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 34 + aNetHack Guidebook 34 @@ -2238,13 +2238,13 @@ cial, some harmful, which are activated by putting them on. - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 35 + aNetHack Guidebook 35 @@ -2288,7 +2288,7 @@ 8. Conduct - As if winning NetHack were not difficult enough, certain + As if winning aNetHack were not difficult enough, certain players seek to challenge themselves by imposing restrictions on the way they play the game. The game automatically tracks some of these challenges, which can be checked at any time with the @@ -2304,13 +2304,13 @@ The most difficult of these is the foodless challenge. Although - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 36 + aNetHack Guidebook 36 @@ -2370,13 +2370,13 @@ of Yendor to your god is necessary to win the game and is not - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 37 + aNetHack Guidebook 37 @@ -2391,7 +2391,7 @@ throw, fire, and kick weapons; use a wand, spell, or other type of item; or fight with your hands and feet. - In NetHack, a pacifist refuses to cause the death of any + In aNetHack, a pacifist refuses to cause the death of any other monster (i.e. if you would get experience for the death). This is a particularly difficult challenge, although it is still possible to gain experience by other means. @@ -2427,8 +2427,8 @@ 9. Options Due to variations in personal tastes and conceptions of how - NetHack should do things, there are options you can set to change - how NetHack behaves. + aNetHack should do things, there are options you can set to change + how aNetHack behaves. 9.1. Setting the options @@ -2436,25 +2436,25 @@ the `O' command allows you to view all options and change most of - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 38 + aNetHack Guidebook 38 them. You can also set options automatically by placing them in - the NETHACKOPTIONS environment variable or in a configuration - file. Some versions of NetHack also have front-end programs that + the ANETHACKOPTIONS environment variable or in a configuration + file. Some versions of aNetHack also have front-end programs that allow you to set options before starting the game or a global configuration for system administrators. - 9.2. Using the NETHACKOPTIONS environment variable + 9.2. Using the ANETHACKOPTIONS environment variable - The NETHACKOPTIONS variable is a comma-separated list of + The ANETHACKOPTIONS variable is a comma-separated list of initial values for the various options. Some can only be turned on or off. You turn one of these on by adding the name of the option to the list, and turn it off by typing a `!' or ``no'' be- @@ -2468,13 +2468,13 @@ ``Blue Meanie'', and the fruit is set to ``papaya'', you would enter the command - % setenv NETHACKOPTIONS "autoquiver,\!autopickup,name:Blue Meanie,fruit:papaya" + % setenv ANETHACKOPTIONS "autoquiver,\!autopickup,name:Blue Meanie,fruit:papaya" in csh (note the need to escape the ! since it's special to the shell), or - $ NETHACKOPTIONS="autoquiver,!autopickup,name:Blue Meanie,fruit:papaya" - $ export NETHACKOPTIONS + $ ANETHACKOPTIONS="autoquiver,!autopickup,name:Blue Meanie,fruit:papaya" + $ export ANETHACKOPTIONS in sh or ksh. @@ -2483,7 +2483,7 @@ Any line in the configuration file starting with `#' is treated as a comment. Any line in the configuration file start- ing with ``OPTIONS='' may be filled out with options in the same - syntax as in NETHACKOPTIONS. Any line starting with ``SYMBOLS='' + syntax as in ANETHACKOPTIONS. Any line starting with ``SYMBOLS='' is taken as defining the corresponding symbol in a different syn- tax, a sequence of decimal numbers giving the character position in the current font to be used in displaying each entry. Such a @@ -2496,19 +2496,19 @@ The default name of the configuration file varies on differ- ent operating systems. On DOS and Windows, it is ``defaults.nh'' - in the same folder as nethack.exe or nethackW.exe. On Unix, Linux - and Mac OS X it is ``.nethackrc'' in the user's home directory. - NETHACKOPTIONS can also be set to the full name of a file you + in the same folder as anethack.exe or anethackW.exe. On Unix, Linux + and Mac OS X it is ``.anethackrc'' in the user's home directory. + ANETHACKOPTIONS can also be set to the full name of a file you want to use (possibly preceded by an `@'). - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 39 + aNetHack Guidebook 39 @@ -2568,13 +2568,13 @@ Persistent. See pickup_types to refine the behavior. - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 40 + aNetHack Guidebook 40 @@ -2634,13 +2634,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 41 + aNetHack Guidebook 41 @@ -2700,13 +2700,13 @@ available commands. It is keystroke compatible with the - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 42 + aNetHack Guidebook 42 @@ -2726,9 +2726,9 @@ fruit Name a fruit after something you enjoy eating (ex. ``fruit:man- go'') (default ``slime mold''). Basically a nostalgic whimsy - that NetHack uses from time to time. You should set this to + that aNetHack uses from time to time. You should set this to something you find more appetizing than slime mold. Apples, - oranges, pears, bananas, and melons already exist in NetHack, + oranges, pears, bananas, and melons already exist in aNetHack, so don't use those. gender @@ -2766,13 +2766,13 @@ Name your starting horse (ex. ``horsename:Trigger''). Cannot - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 43 + aNetHack Guidebook 43 @@ -2832,13 +2832,13 @@ Menu character accelerator to deselect all items in a menu. - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 44 + aNetHack Guidebook 44 @@ -2898,13 +2898,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 45 + aNetHack Guidebook 45 @@ -2940,7 +2940,7 @@ be set with the `O' command. news - Read the NetHack news file, if present (default on). Since the + Read the aNetHack news file, if present (default on). Since the news is shown at the beginning of the game, there's no point in setting this with the `O' command. @@ -2964,13 +2964,13 @@ For backward compatibility, omitting a value is the same as - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 46 + aNetHack Guidebook 46 @@ -3030,13 +3030,13 @@ character class that uses multiple types of pets; or choose to - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 47 + aNetHack Guidebook 47 @@ -3096,13 +3096,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 48 + aNetHack Guidebook 48 @@ -3162,13 +3162,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 49 + aNetHack Guidebook 49 @@ -3212,7 +3212,7 @@ uring Status Hilites'' for futher information. suppress_alert - This option may be set to a NetHack version level to suppress + This option may be set to a aNetHack version level to suppress alert notification messages about feature changes for that and prior versions (ex. ``suppress_alert:3.3.1''). @@ -3228,13 +3228,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 50 + aNetHack Guidebook 50 @@ -3250,9 +3250,9 @@ tent. toptenwin - Put the ending display in a NetHack window instead of on stdout + Put the ending display in a aNetHack window instead of on stdout (default off). Setting this option makes the score list visi- - ble when a windowing version of NetHack is started without a + ble when a windowing version of aNetHack is started without a parent window, but it no longer leaves the score list around after game end on a terminal or emulating window. @@ -3294,13 +3294,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 51 + aNetHack Guidebook 51 @@ -3328,111 +3328,111 @@ or right). ascii_map - NetHack should display an ascii character map if it can. + aNetHack should display an ascii character map if it can. color - NetHack should display color if it can for different monsters, + aNetHack should display color if it can for different monsters, objects, and dungeon features eight_bit_tty - NetHack should pass eight-bit character values (for example, + aNetHack should pass eight-bit character values (for example, specified with the traps option) straight through to your ter- minal (default off). font_map - NetHack should use a font by the chosen name for the map win- + aNetHack should use a font by the chosen name for the map win- dow. font_menu - NetHack should use a font by the chosen name for menu windows. + aNetHack should use a font by the chosen name for menu windows. font_message - NetHack should use a font by the chosen name for the message + aNetHack should use a font by the chosen name for the message window. font_status - NetHack should use a font by the chosen name for the status + aNetHack should use a font by the chosen name for the status window. font_text - NetHack should use a font by the chosen name for text windows. + aNetHack should use a font by the chosen name for text windows. - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 52 + aNetHack Guidebook 52 font_size_map - NetHack should use this size font for the map window. + aNetHack should use this size font for the map window. font_size_menu - NetHack should use this size font for menu windows. + aNetHack should use this size font for menu windows. font_size_message - NetHack should use this size font for the message window. + aNetHack should use this size font for the message window. font_size_status - NetHack should use this size font for the status window. + aNetHack should use this size font for the status window. font_size_text - NetHack should use this size font for text windows. + aNetHack should use this size font for text windows. fullscreen - NetHack should try and display on the entire screen rather than + aNetHack should try and display on the entire screen rather than in a window. large_font - NetHack should use a large font. + aNetHack should use a large font. map_mode - NetHack should display the map in the manner specified. + aNetHack should display the map in the manner specified. mouse_support Allow use of the mouse for input and travel. player_selection - NetHack should pop up dialog boxes, or use prompts for charac- + aNetHack should pop up dialog boxes, or use prompts for charac- ter selection. popup_dialog - NetHack should pop up dialog boxes for input. + aNetHack should pop up dialog boxes for input. preload_tiles - NetHack should preload tiles into memory. For example, in the + aNetHack should preload tiles into memory. For example, in the protected mode MSDOS version, control whether tiles get pre- loaded into RAM at the start of the game. Doing so enhances performance of the tile graphics, but uses more memory. (de- fault on). Cannot be set with the `O' command. scroll_amount - NetHack should scroll the display by this number of cells when + aNetHack should scroll the display by this number of cells when the hero reaches the scroll_margin. scroll_margin - NetHack should scroll the display when the hero or cursor is + aNetHack should scroll the display when the hero or cursor is this number of cells away from the edge of the window. selectsaved - NetHack should display a menu of existing saved games for the + aNetHack should display a menu of existing saved games for the player to choose from at game startup, if it can. Not all ports support this option. - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 53 + aNetHack Guidebook 53 @@ -3441,11 +3441,11 @@ support this option. splash_screen - NetHack should display an opening splash screen when it starts + aNetHack should display an opening splash screen when it starts up (default yes). tiled_map - NetHack should display a tiled map if it can. + aNetHack should display a tiled map if it can. tile_file Specify the name of an alternative tile file to override the @@ -3462,18 +3462,18 @@ Use bold black instead of blue for black glyphs (TTY only). use_inverse - NetHack should display inverse when the game specifies it. + aNetHack should display inverse when the game specifies it. vary_msgcount - NetHack should display this number of messages at a time in the + aNetHack should display this number of messages at a time in the message window. windowcolors - NetHack should display windows with the specified fore- + aNetHack should display windows with the specified fore- ground/background colors if it can. wraptext - NetHack port should wrap long lines of text if they don't fit + aNetHack port should wrap long lines of text if they don't fit in the visible area of the window. 9.6. Platform-specific Customization options @@ -3483,7 +3483,7 @@ altkeyhandler Select an alternate keystroke handler dll to load (Win32 tty - NetHack only). The name of the handler is specified without + aNetHack only). The name of the handler is specified without the .dll extension and without any path information. Cannot be set with the `O' command. @@ -3492,19 +3492,19 @@ er key functions as a meta-shift for that key (default on). - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 54 + aNetHack Guidebook 54 altmeta On other (non-Amiga) systems where this option is available, it - can be set to tell nethack to convert a two character sequence + can be set to tell anethack to convert a two character sequence beginning with ESC into a meta-shifted version of the second character (default off). @@ -3512,7 +3512,7 @@ prompts. Note that typing one or more digits as a count prefix prior to a command--preceded by n if the number_pad option is set--is also subject to this conversion, so attempting to abort - the count by typing ESC will leave nethack waiting for another + the count by typing ESC will leave anethack waiting for another character to complete the two character sequence. Type a sec- ond ESC to finish cancelling such a count. At other prompts a single ESC suffices. @@ -3521,50 +3521,50 @@ Use BIOS calls to update the screen display quickly and to read the keyboard (allowing the use of arrow keys to move) on ma- chines with an IBM PC compatible BIOS ROM (default off, OS/2, - PC, and ST NetHack only). + PC, and ST aNetHack only). flush - (default off, AMIGA NetHack only). + (default off, AMIGA aNetHack only). MACgraphics - (default on, Mac NetHack only). + (default on, Mac aNetHack only). page_wait - (default on, Mac NetHack only). + (default on, Mac aNetHack only). rawio Force raw (non-cbreak) mode for faster output and more bullet- proof input (MS-DOS sometimes treats `^P' as a printer toggle - without it) (default off, OS/2, PC, and ST NetHack only). + without it) (default off, OS/2, PC, and ST aNetHack only). Note: DEC Rainbows hang if this is turned on. Cannot be set with the `O' command. soundcard - (default on, PC NetHack only). Cannot be set with the `O' com- + (default on, PC aNetHack only). Cannot be set with the `O' com- mand. subkeyvalue - (Win32 tty NetHack only). May be used to alter the value of - keystrokes that the operating system returns to NetHack to help + (Win32 tty aNetHack only). May be used to alter the value of + keystrokes that the operating system returns to aNetHack to help compensate for international keyboard issues. OPTIONS=subkey- - value:171/92 will return 92 to NetHack, if 171 was originally + value:171/92 will return 92 to aNetHack, if 171 was originally going to be returned. You can use multiple subkeyvalue state- ments in the config file if needed. Cannot be set with the `O' command. video - Set the video mode used (PC NetHack only). Values are `autode- + Set the video mode used (PC aNetHack only). Values are `autode- tect', `default', or `vga'. Setting `vga' (or `autodetect' with vga hardware present) will cause the game to display - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 55 + aNetHack Guidebook 55 @@ -3572,7 +3572,7 @@ videocolors Set the color palette for PC systems using NO_TERMS (default - 4-2-6-1-5-3-15-12-10-14-9-13-11, (PC NetHack only). The order + 4-2-6-1-5-3-15-12-10-14-9-13-11, (PC aNetHack only). The order of colors is red, green, brown, blue, magenta, cyan, bright.white, bright.red, bright.green, yellow, bright.blue, bright.magenta, and bright.cyan. Cannot be set with the `O' @@ -3580,7 +3580,7 @@ videoshades Set the intensity level of the three gray scales available (de- - fault dark normal light, PC NetHack only). If the game display + fault dark normal light, PC aNetHack only). If the game display is difficult to read, try adjusting these scales; if this does not correct the problem, try !color. Cannot be set with the `O' command. @@ -3588,10 +3588,10 @@ 9.7. Regular Expressions Regular expressions are normally POSIX extended regular ex- - pressions. It is possible to compile NetHack without regular ex- + pressions. It is possible to compile aNetHack without regular ex- pression support on a platform where there is no regular expres- sion library. While this is not true of any modern platform, if - your NetHack was built this way, patterns are instead glob pat- + your aNetHack was built this way, patterns are instead glob pat- terns. This applies to Autopickup exceptions, Message types, Menu colors, and User sounds. @@ -3624,13 +3624,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 56 + aNetHack Guidebook 56 @@ -3665,7 +3665,7 @@ stop - wait for user with more-prompt. norep - show the message once, but not again if no other message is shown in between. - Here's an example of message types using NetHack's internal + Here's an example of message types using aNetHack's internal pattern matching facility: MSGTYPE=stop "You feel hungry." @@ -3690,13 +3690,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 57 + aNetHack Guidebook 57 @@ -3721,7 +3721,7 @@ inverse. Note that the platform used may interpret the at- tributes any way it wants. - Here's an example of menu colors using NetHack's internal pat- + Here's an example of menu colors using aNetHack's internal pat- tern matching facility: MENUCOLOR="* blessed *"=green @@ -3756,13 +3756,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 58 + aNetHack Guidebook 58 @@ -3781,7 +3781,7 @@ 9.12. Configuring Status Hilites - Your copy of NetHack may have been compiled with support for + Your copy of aNetHack may have been compiled with support for ``Status Hilites''. If so, you can customize your game display by setting thresholds to change the color or appearance of fields in the status display. @@ -3822,22 +3822,22 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 59 + aNetHack Guidebook 59 The whole feature can be disabled by setting option sta- tushilites off. - 9.13. Modifying NetHack Symbols + 9.13. Modifying aNetHack Symbols - NetHack can load entire symbol sets from the symbol file. + aNetHack can load entire symbol sets from the symbol file. The options that are used to select a particular symbol set from the symbol file are: @@ -3851,14 +3851,14 @@ You can also override one or more symbols using the SYMBOLS config file option. Symbols are specified as name:value pairs. - Note that NetHack escape-processes the value string in conven- + Note that aNetHack escape-processes the value string in conven- tional C fashion. This means that \ is a prefix to take the fol- lowing character literally. Thus \ needs to be represented as \\. The special escape form \m switches on the meta bit in the symbol value, and the \^ prefix causes the following character to be treated as a control character. - NetHack Symbols + aNetHack Symbols Default Symbol Name Description ------------------------------------------------------------------------ S_air (air) @@ -3888,13 +3888,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 60 + aNetHack Guidebook 60 @@ -3954,13 +3954,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 61 + aNetHack Guidebook 61 @@ -4020,13 +4020,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 62 + aNetHack Guidebook 62 @@ -4066,11 +4066,11 @@ Z S_zombie (zombie) z S_zruty (zruty) - 9.14. Configuring NetHack for Play by the Blind + 9.14. Configuring aNetHack for Play by the Blind - NetHack can be set up to use only standard ASCII characters + aNetHack can be set up to use only standard ASCII characters for making maps of the dungeons. This makes the MS-DOS versions - of NetHack completely accessible to the blind who use speech + of aNetHack completely accessible to the blind who use speech and/or Braille access technologies. Players will require a good working knowledge of their screen-reader's review features, and will have to know how to navigate horizontally and vertically @@ -4086,13 +4086,13 @@ These co-ordinates are often useful in giving players a better - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 63 + aNetHack Guidebook 63 @@ -4101,7 +4101,7 @@ While it is not difficult for experienced users to edit the defaults.nh file to accomplish this, novices may find this task somewhat daunting. Included within the ``symbols'' file of all - official distributions of NetHack is a symset called NHAccess. + official distributions of aNetHack is a symset called NHAccess. Selecting that symset in your configuration file will cause the game to run in a manner accessible to the blind. After you have gained some experience with the game and with editing files, you @@ -4126,11 +4126,11 @@ 9.15. Global Configuration for System Administrators - If NetHack is compiled with the SYSCF option, a system ad- + If aNetHack is compiled with the SYSCF option, a system ad- ministrator should set up a global configuration; this is a file in the same format as the traditional per-user configuration file (see above). This file should be named sysconf and placed in the - same directory as the other NetHack support files. The options + same directory as the other aNetHack support files. The options recognized in this file are listed below. Any option not set us- es a compiled-in default (which may not be appropriate for your system). @@ -4152,13 +4152,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 64 + aNetHack Guidebook 64 @@ -4197,13 +4197,13 @@ 10. Scoring - NetHack maintains a list of the top scores or scorers on + aNetHack maintains a list of the top scores or scorers on your machine, depending on how it is set up. In the latter case, each account on the machine can post only one non-winning score on this list. If you score higher than someone else on this list, or better your previous score, you will be inserted in the proper place under your current name. How many scores are kept - can also be set up when NetHack is compiled. + can also be set up when aNetHack is compiled. Your score is chiefly based upon how much experience you gained, how much loot you accumulated, how deep you explored, and @@ -4218,23 +4218,23 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 65 + aNetHack Guidebook 65 If you just want to see what the current top players/games - list is, you can type nethack -s all on most versions. + list is, you can type anethack -s all on most versions. 11. Explore mode - NetHack is an intricate and difficult game. Novices might + aNetHack is an intricate and difficult game. Novices might falter in fear, aware of their ignorance of the means to survive. Well, fear not. Your dungeon comes equipped with an ``explore'' or ``discovery'' mode that enables you to keep old save files and @@ -4278,19 +4278,19 @@ and Kenneth C. R. C. Arnold. Small portions were adapted from Further Exploration of the Dungeons of Doom, by Ken Arromdee. - NetHack is the product of literally dozens of people's work. + aNetHack is the product of literally dozens of people's work. Main events in the course of the game development are described below: - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 66 + aNetHack Guidebook 66 @@ -4310,23 +4310,23 @@ 520/1040ST, producing ST Hack 1.03. Mike Stephenson merged these various versions back together, - incorporating many of the added features, and produced NetHack + incorporating many of the added features, and produced aNetHack 1.4. He then coordinated a cast of thousands in enhancing and - debugging NetHack 1.4 and released NetHack versions 2.2 and 2.3. + debugging aNetHack 1.4 and released aNetHack versions 2.2 and 2.3. Later, Mike coordinated a major rewrite of the game, heading a team which included Ken Arromdee, Jean-Christophe Collet, Steve Creps, Eric Hendrickson, Izchak Miller, John Rupley, Mike Threep- - oint, and Janet Walz, to produce NetHack 3.0c. + oint, and Janet Walz, to produce aNetHack 3.0c. - NetHack 3.0 was ported to the Atari by Eric R. Smith, to + aNetHack 3.0 was ported to the Atari by Eric R. Smith, to OS/2 by Timo Hakulinen, and to VMS by David Gentzel. The three of them and Kevin Darcy later joined the main development team to produce subsequent revisions of 3.0. - Olaf Seibert ported NetHack 2.3 and 3.0 to the Amiga. Norm + Olaf Seibert ported aNetHack 2.3 and 3.0 to the Amiga. Norm Meluch, Stephen Spackman and Pierre Martineau designed overlay - code for PC NetHack 3.0. Johnny Lee ported NetHack 3.0 to the + code for PC aNetHack 3.0. Johnny Lee ported aNetHack 3.0 to the Macintosh. Along with various other Dungeoneers, they continued to enhance the PC, Macintosh, and Amiga ports through the later revisions of 3.0. @@ -4339,40 +4339,40 @@ They re-structured the game's design, and re-wrote major parts of the code. They added multiple dungeons, a new display, special individual character quests, a new endgame and many other new - features, and produced NetHack 3.1. + features, and produced aNetHack 3.1. Ken Lorber, Gregg Wonderly and Greg Olson, with help from Richard Addison, Mike Passaretti, and Olaf Seibert, developed - NetHack 3.1 for the Amiga. + aNetHack 3.1 for the Amiga. Norm Meluch and Kevin Smolkowski, with help from Carl Sche- lin, Stephen Spackman, Steve VanDevender, and Paul Winner, ported - NetHack 3.1 to the PC. + aNetHack 3.1 to the PC. - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 67 + aNetHack Guidebook 67 Jon W{tte and Hao-yang Wang, with help from Ross Brown, Mike Engber, David Hairston, Michael Hamel, Jonathan Handler, Johnny - Lee, Tim Lennan, Rob Menke, and Andy Swanson, developed NetHack + Lee, Tim Lennan, Rob Menke, and Andy Swanson, developed aNetHack 3.1 for the Macintosh, porting it for MPW. Building on their de- velopment, Barton House added a Think C port. - Timo Hakulinen ported NetHack 3.1 to OS/2. Eric Smith port- - ed NetHack 3.1 to the Atari. Pat Rankin, with help from Joshua - Delahunty, was responsible for the VMS version of NetHack 3.1. - Michael Allison ported NetHack 3.1 to Windows NT. + Timo Hakulinen ported aNetHack 3.1 to OS/2. Eric Smith port- + ed aNetHack 3.1 to the Atari. Pat Rankin, with help from Joshua + Delahunty, was responsible for the VMS version of aNetHack 3.1. + Michael Allison ported aNetHack 3.1 to Windows NT. - Dean Luick, with help from David Cohrs, developed NetHack - 3.1 for X11. Warwick Allison wrote a tiled version of NetHack + Dean Luick, with help from David Cohrs, developed aNetHack + 3.1 for X11. Warwick Allison wrote a tiled version of aNetHack for the Atari; he later contributed the tiles to the DevTeam and tile support was then added to other platforms. @@ -4391,22 +4391,22 @@ diagnosed with cancer and passed away. That release of the game was dedicated to him by the development and porting teams. - During the lifespan of NetHack 3.1 and 3.2, several enthusi- + During the lifespan of aNetHack 3.1 and 3.2, several enthusi- asts of the game added their own modifications to the game and made these ``variants'' publicly available: - Tom Proudfoot and Yuval Oren created NetHack++, which was - quickly renamed NetHack--. Working independently, Stephen White - wrote NetHack Plus. Tom Proudfoot later merged NetHack Plus and - his own NetHack-- to produce SLASH. Larry Stewart-Zerba and War- + Tom Proudfoot and Yuval Oren created aNetHack++, which was + quickly renamed aNetHack--. Working independently, Stephen White + wrote aNetHack Plus. Tom Proudfoot later merged aNetHack Plus and + his own aNetHack-- to produce SLASH. Larry Stewart-Zerba and War- wick Allison improved the spell casting system with the Wizard - Patch. Warwick Allison also ported NetHack to use the Qt inter- + Patch. Warwick Allison also ported aNetHack to use the Qt inter- face. Warren Cheung combined SLASH with the Wizard Patch to pro- duce Slash'em, and with the help of Kevin Hugo, added more fea- tures. Kevin later joined the DevTeam and incorporated the best - of these ideas in NetHack 3.3. + of these ideas in aNetHack 3.3. The final update to 3.2 was the bug fix release 3.2.3, which was released simultaneously with 3.3.0 in December 1999 just in @@ -4416,13 +4416,13 @@ Arromdee, David Cohrs, Jessie Collet, Steve Creps, Kevin Darcy, - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 68 + aNetHack Guidebook 68 @@ -4448,15 +4448,15 @@ lison, Ken Arromdee, David Cohrs, Jessie Collet, Kevin Hugo, Ken Lorber, Dean Luick, Pat Rankin, Mike Stephenson, Janet Walz, and Paul Winner, with Warwick Allison joining just before the re- - lease of NetHack 3.4.0 in March 2002. + lease of aNetHack 3.4.0 in March 2002. As with version 3.3, various people contributed to the game as a whole as well as supporting ports on the different platforms - that NetHack runs on: + that aNetHack runs on: Pat Rankin maintained 3.4 for VMS. - Michael Allison maintained NetHack 3.4 for the MS-DOS plat- + Michael Allison maintained aNetHack 3.4 for the MS-DOS plat- form. Paul Winner and Yitzhak Sapir provided encouragement. Dean Luick, Mark Modrall, and Kevin Hugo maintained and en- @@ -4468,10 +4468,10 @@ face for the Windows port. Alex Kompel also contributed a Win- dows CE port for 3.4.1. - Ron Van Iwaarden was the sole maintainer of NetHack for OS/2 + Ron Van Iwaarden was the sole maintainer of aNetHack for OS/2 the past several releases. Unfortunately Ron's last OS/2 machine stopped working in early 2006. A great many thanks to Ron for - keeping NetHack alive on OS/2 all these years. + keeping aNetHack alive on OS/2 all these years. Janne Salmijarvi and Teemu Suikki maintained and enhanced the Amiga port of 3.4 after Janne Salmijarvi resurrected it for @@ -4482,24 +4482,24 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 69 + aNetHack Guidebook 69 - The release of NetHack 3.4.3 in December 2003 marked the be- + The release of aNetHack 3.4.3 in December 2003 marked the be- ginning of a long release hiatus. 3.4.3 proved to be a remarkably stable version that provided continued enjoyment by the community for more than a decade. The devteam slowly and quietly continued to work on the game behind the scenes during the tenure of 3.4.3. It was during that same period that several new variants emerged - within the NetHack community. Notably sporkhack by Derek S. Ray, - unnethack by Patric Mueller, nitrohack and its successors origi- + within the aNetHack community. Notably sporkhack by Derek S. Ray, + unanethack by Patric Mueller, nitrohack and its successors origi- nally by Daniel Thaler and then by Alex Smith, and Dynahack by Tung Nguyen. Some of those variants continue to be developed, maintained, and enjoyed by the community to this day. @@ -4510,33 +4510,33 @@ let, Ken Lorber, Dean Luick, Pat Rankin, Mike Stephenson, Janet Walz, and Paul Winner. Leading up to the release of 3.6.0 in early 2015, new members Sean Hunt, Pasi Kallinen, and Derek S. - Ray joined the NetHack development team. + Ray joined the aNetHack development team. In September 2014, an interim snapshot of the code under de- velopment was released publicly by other parties. Since that code was a work-in-progress and had not gone through the process of debugging it as a suitable release, it was decided that the ver- sion numbers present on that code snapshot would be retired and - never used in an official NetHack release. An announcement was - posted on the devteam's official nethack.org website to that ef- + never used in an official aNetHack release. An announcement was + posted on the devteam's official anethack.org website to that ef- fect, stating that there would never be a 3.4.4, 3.5, or 3.5.0 official release version. In November 2014, preparation began for the release of - NetHack 3.6. The 3.6 version merges work done by the development + aNetHack 3.6. The 3.6 version merges work done by the development team since the previous release with some of the beloved communi- ty patches. Many bugs were fixed and a large amount of code was restructured. The development team, as well as Steve VanDevender and Kevin - Smolkowski ensured that NetHack 3.6 continued to operate on vari- + Smolkowski ensured that aNetHack 0.0.1 continued to operate on vari- ous Unix flavors and maintained the X11 interface. Ken Lorber, Haoyang Wang, Pat Rankin, and Dean Luick main- - tained the port of NetHack 3.6 for Mac. + tained the port of aNetHack 0.0.1 for Mac. Michael Allison, Derek S. Ray, Yitzhak Sapir, Alex Kompel, - and Dion Nicolaas maintained the port of NetHack 3.6 for Mi- + and Dion Nicolaas maintained the port of aNetHack 3.6 for Mi- crosoft Windows. The 3.6 development team consisting of Michael Allison, War- @@ -4548,29 +4548,29 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 70 + aNetHack Guidebook 70 - The official NetHack web site is maintained by Ken Lorber at - http://www.nethack.org/. + The official aNetHack web site is maintained by Ken Lorber at + http://www.anethack.org/. SHOUT-OUTS The devteam would like to give a special "shout-out" to thank the generous people primarily responsible for the public - NetHack servers available for playing the game at nethack.alt.org + aNetHack servers available for playing the game at anethack.alt.org and devnull.net. In addition to providing a way for the public to - play a game of NetHack from almost anywhere, they have hosted an- - nual NetHack tournaments for many, many years. + play a game of aNetHack from almost anywhere, they have hosted an- + nual aNetHack tournaments for many, many years. - On behalf of the NetHack community, thank you very much to + On behalf of the aNetHack community, thank you very much to M. Drew Streib, Pasi Kallinen and Robin Bandy. - - - - - - - - - - @@ -4614,13 +4614,13 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 - NetHack Guidebook 71 + aNetHack Guidebook 71 @@ -4680,7 +4680,7 @@ - NetHack 3.6 February 22, 2016 + aNetHack 0.0.1 February 22, 2016 diff --git a/doc/nethack.6 b/doc/anethack.6 similarity index 86% rename from doc/nethack.6 rename to doc/anethack.6 index 3803ae58..7d5a4ddc 100644 --- a/doc/nethack.6 +++ b/doc/anethack.6 @@ -1,11 +1,11 @@ -.TH NETHACK 6 "7 December 2015" -.\" NetHack 3.6 nethack.6 $NHDT-Date: 1449616496 2015/12/08 23:14:56 $ $NHDT-Branch: NetHack-3.6.0 $:$NHDT-Revision: 1.11 $ +.TH ANETHACK 6 "7 December 2015" +.\" aNetHack 0.0.1 anethack.6 $ANH-Date: 1449616496 2015/12/08 23:14:56 $ $ANH-Branch: aNetHack-3.6.0 $:$ANH-Revision: 1.11 $ .SH NAME -nethack \- Exploring The Mazes of Menace +anethack \- Exploring The Mazes of Menace .SH SYNOPSIS .na .hy 0 -.B nethack +.B anethack [ .B \-d .I directory @@ -35,7 +35,7 @@ nethack \- Exploring The Mazes of Menace .B \-ibm ] .PP -.B nethack +.B anethack [ .B \-d .I directory @@ -58,10 +58,10 @@ nethack \- Exploring The Mazes of Menace .ad .hy 14 .\" Make sure path is not hyphenated below -.hw nethackdir +.hw anethackdir .SH DESCRIPTION .PP -.I NetHack +.I aNetHack is a display oriented Dungeons & Dragons(tm) - like game. The standard tty display and command structure resemble rogue. .PP @@ -85,7 +85,7 @@ section on Conduct if this game has gotten too easy for you. .PP When the game ends, whether by your dying, quitting, or escaping from the caves, -.I NetHack +.I aNetHack will give you (a fragment of) the list of top scorers. The scoring is based on many aspects of your behavior, but a rough estimate is obtained by taking the amount of gold you've found in the cave plus four @@ -93,7 +93,7 @@ times your (real) experience. Precious stones may be worth a lot of gold when brought to the exit. There is a 10% penalty for getting yourself killed. .PP -The environment variable NETHACKOPTIONS can be used to initialize many +The environment variable ANETHACKOPTIONS can be used to initialize many run-time options. The ? command provides a description of these options and syntax. (The @@ -112,10 +112,10 @@ Because the option list can be very long (particularly when specifying graphics characters), options may also be included in a configuration file. The default is located in your home directory and -named .nethackrc on Unix systems. On other systems, the default may be -different, usually NetHack.cnf. On DOS or Windows, the name is -defaults.nh, while on the Macintosh or BeOS, it is NetHack Defaults. -The configuration file's location may be specified by setting NETHACKOPTIONS +named .anethackrc on Unix systems. On other systems, the default may be +different, usually aNetHack.cnf. On DOS or Windows, the name is +defaults.nh, while on the Macintosh or BeOS, it is aNetHack Defaults. +The configuration file's location may be specified by setting ANETHACKOPTIONS to a string consisting of an @ character followed by the filename. .PP The @@ -199,9 +199,9 @@ The .B \-d option, which must be the first argument if it appears, supplies a directory which is to serve as the playground. -It overrides the value from NETHACKDIR, HACKDIR, +It overrides the value from ANETHACKDIR, HACKDIR, or the directory specified by the game administrator during compilation -(usually /usr/games/lib/nethackdir). +(usually /usr/games/lib/anethackdir). This option is usually only useful to the game administrator. The playground must contain several auxiliary files such as help files, the list of top scorers, and a subdirectory @@ -221,28 +221,28 @@ people who reside in that place between the worlds, the Usenet Zone. A number of these miscreants are immortalized in the historical roll of dishonor and various other places. .PP -The resulting mess is now called NetHack, to denote its +The resulting mess is now called aNetHack, to denote its development by the Usenet. Andries Brouwer has made this request for the distinction, as he may eventually release a new version of his own. .SH FILES .PP Run-time configuration options were discussed above and use a platform specific name for a file in a platform specific location. For Unix, the -name is '.nethackrc' in the user's home directory. +name is '.anethackrc' in the user's home directory. .br All other files are in the playground directory, -normally /usr/games/lib/nethackdir. +normally /usr/games/lib/anethackdir. If DLB was defined during the compile, the data files and special levels -will be inside a larger file, normally nhdat, instead of being separate +will be inside a larger file, normally anhdat, instead of being separate files. .br .DT .ta \w'cmdhelp, opthelp, wizhelp\ \ \ 'u -nethack The program itself. +anethack The program itself. .br -data, oracles, rumors Data files used by NetHack. +data, oracles, rumors Data files used by aNetHack. .br quest.dat, bogusmon More data files. .br @@ -265,7 +265,7 @@ cmdhelp, opthelp, wizhelp More help data files. .br dungeon Control file for special levels. .br -history A short history of NetHack. +history A short history of aNetHack. .br license Rules governing redistribution. .br @@ -327,7 +327,7 @@ except by updating source file "config.h" and rebuilding the program. In a perfect world, 'paniclog' would remain empty. .SH ENVIRONMENT .DT -.ta \w'NETHACKDIR or HACKDIR\ \ \ 'u +.ta \w'ANETHACKDIR or HACKDIR\ \ \ 'u USER or LOGNAME Your login name. .br HOME Your home directory. @@ -344,15 +344,15 @@ MAILREADER Replacement for default reader .br (probably /bin/mail or /usr/ucb/mail). .br -NETHACKDIR or HACKDIR Playground. +ANETHACKDIR or HACKDIR Playground. .br -NETHACKOPTIONS String predefining several NetHack +ANETHACKOPTIONS String predefining several aNetHack .br options. .br -If the same option is specified in both NETHACKOPTIONS and .nethackrc, -the value assigned in NETHACKOPTIONS takes precedence. +If the same option is specified in both ANETHACKOPTIONS and .anethackrc, +the value assigned in ANETHACKOPTIONS takes precedence. .br SHOPTYPE and SPLEVTYPE can be used in debugging (wizard) mode. diff --git a/doc/nethack.txt b/doc/anethack.txt similarity index 86% rename from doc/nethack.txt rename to doc/anethack.txt index 9e6275ed..9a6b08ef 100644 --- a/doc/nethack.txt +++ b/doc/anethack.txt @@ -1,19 +1,19 @@ -NETHACK(6) NETHACK(6) +ANETHACK(6) ANETHACK(6) NAME - nethack - Exploring The Mazes of Menace + anethack - Exploring The Mazes of Menace SYNOPSIS - nethack [ -d directory ] [ -n ] [ -p profession ] [ -r race ] [ -[DX] ] + anethack [ -d directory ] [ -n ] [ -p profession ] [ -r race ] [ -[DX] ] [ -u playername ] [ -dec ] [ -ibm ] - nethack [ -d directory ] -s [ -v ] [ -p profession ] [ -r race ] [ + anethack [ -d directory ] -s [ -v ] [ -p profession ] [ -r race ] [ playernames ] DESCRIPTION - NetHack is a display oriented Dungeons & Dragons(tm) - like game. The + aNetHack is a display oriented Dungeons & Dragons(tm) - like game. The standard tty display and command structure resemble rogue. Other, more graphical display options exist for most platforms. @@ -32,14 +32,14 @@ DESCRIPTION you. When the game ends, whether by your dying, quitting, or escaping from - the caves, NetHack will give you (a fragment of) the list of top scor- + the caves, aNetHack will give you (a fragment of) the list of top scor- ers. The scoring is based on many aspects of your behavior, but a rough estimate is obtained by taking the amount of gold you've found in the cave plus four times your (real) experience. Precious stones may be worth a lot of gold when brought to the exit. There is a 10% penalty for getting yourself killed. - The environment variable NETHACKOPTIONS can be used to initialize many + The environment variable ANETHACKOPTIONS can be used to initialize many run-time options. The ? command provides a description of these options and syntax. (The -dec and -ibm command line options are equiv- alent to the decgraphics and ibmgraphics run-time options described @@ -49,10 +49,10 @@ DESCRIPTION Because the option list can be very long (particularly when specifying graphics characters), options may also be included in a configuration file. The default is located in your home directory and named - .nethackrc on Unix systems. On other systems, the default may be dif- - ferent, usually NetHack.cnf. On DOS or Windows, the name is - defaults.nh, while on the Macintosh or BeOS, it is NetHack Defaults. - The configuration file's location may be specified by setting NETHACK- + .anethackrc on Unix systems. On other systems, the default may be dif- + ferent, usually aNetHack.cnf. On DOS or Windows, the name is + defaults.nh, while on the Macintosh or BeOS, it is aNetHack Defaults. + The configuration file's location may be specified by setting ANETHACK- OPTIONS to a string consisting of an @ character followed by the file- name. @@ -108,8 +108,8 @@ DESCRIPTION The -d option, which must be the first argument if it appears, supplies a directory which is to serve as the playground. It overrides the - value from NETHACKDIR, HACKDIR, or the directory specified by the game - administrator during compilation (usually /usr/games/lib/nethackdir). + value from ANETHACKDIR, HACKDIR, or the directory specified by the game + administrator during compilation (usually /usr/games/lib/anethackdir). This option is usually only useful to the game administrator. The playground must contain several auxiliary files such as help files, the list of top scorers, and a subdirectory save where games are saved. @@ -127,22 +127,22 @@ AUTHORS Zone. A number of these miscreants are immortalized in the historical roll of dishonor and various other places. - The resulting mess is now called NetHack, to denote its development by + The resulting mess is now called aNetHack, to denote its development by the Usenet. Andries Brouwer has made this request for the distinction, as he may eventually release a new version of his own. FILES Run-time configuration options were discussed above and use a platform specific name for a file in a platform specific location. For Unix, - the name is '.nethackrc' in the user's home directory. + the name is '.anethackrc' in the user's home directory. All other files are in the playground directory, normally - /usr/games/lib/nethackdir. If DLB was defined during the compile, the + /usr/games/lib/anethackdir. If DLB was defined during the compile, the data files and special levels will be inside a larger file, normally - nhdat, instead of being separate files. + anhdat, instead of being separate files. - nethack The program itself. - data, oracles, rumors Data files used by NetHack. + anethack The program itself. + data, oracles, rumors Data files used by aNetHack. quest.dat, bogusmon More data files. engrave, epitaph, tribute Still more data files. symbols Data file holding sets of specifications @@ -154,7 +154,7 @@ FILES cmdhelp, opthelp, wizhelp More help data files. *.lev Predefined special levels. dungeon Control file for special levels. - history A short history of NetHack. + history A short history of aNetHack. license Rules governing redistribution. record The list of top scorers. logfile An extended list of games played @@ -196,12 +196,12 @@ ENVIRONMENT MAIL Mailbox file. MAILREADER Replacement for default reader (probably /bin/mail or /usr/ucb/mail). - NETHACKDIR or HACKDIR Playground. - NETHACKOPTIONS String predefining several NetHack + ANETHACKDIR or HACKDIR Playground. + ANETHACKOPTIONS String predefining several aNetHack options. - If the same option is specified in both NETHACKOPTIONS and .nethackrc, - the value assigned in NETHACKOPTIONS takes precedence. + If the same option is specified in both ANETHACKOPTIONS and .anethackrc, + the value assigned in ANETHACKOPTIONS takes precedence. SHOPTYPE and SPLEVTYPE can be used in debugging (wizard) mode. DEBUGFILES can be used if the program was built with 'DEBUG' enabled. @@ -218,4 +218,4 @@ BUGS - 7 December 2015 NETHACK(6) + 7 December 2015 ANETHACK(6) diff --git a/doc/config.nh b/doc/config.nh index b8b5f6cc..9db2a967 100644 --- a/doc/config.nh +++ b/doc/config.nh @@ -1,4 +1,4 @@ -# Sample config file for NetHack 3.6 +# Sample config file for aNetHack 0.0.1 # # A '#' at the beginning of a line means the rest of the line is a comment. # @@ -6,10 +6,10 @@ # playing. # # Copy the contents of this file into -# * defaults.nh, same folder as nethack.exe or nethackW.exe (DOS, Windows) -# * ~/.nethackrc (Unix, linux, Mac OS X) -# * "NetHack Defaults" on pre-OSX Mac and BeOS -# * NetHack.cnf on Amiga, Atari, OS/2, and VMS +# * defaults.nh, same folder as anethack.exe or anethackW.exe (DOS, Windows) +# * ~/.anethackrc (Unix, linux, Mac OS X) +# * "aNetHack Defaults" on pre-OSX Mac and BeOS +# * aNetHack.cnf on Amiga, Atari, OS/2, and VMS # # To change the configuration, comment out the unwanted lines, and # uncomment the configuration you want. @@ -51,12 +51,12 @@ # Enable messages about what your character hears #OPTIONS=acoustics -# Causes NetHack's top level command loop to treat two character sequence +# Causes aNetHack's top level command loop to treat two character sequence # "ESC c" as M-c, for terminals or emulators which send "ESC c" when Alt+c # is pressed. #OPTIONS=altmeta -# NetHack should display an ascii character map if it can. +# aNetHack should display an ascii character map if it can. #OPTIONS=ascii_map # Automatically describe the terrain under cursor when asked to @@ -70,7 +70,7 @@ # Automatically try to open doors when walking into them #OPTIONS=autoopen -# Let NetHack fill your quiver or make ready some suitable weapon, +# Let aNetHack fill your quiver or make ready some suitable weapon, # when firing with empty quiver or nothing at the ready. #OPTIONS=autoquiver @@ -108,7 +108,7 @@ # Controls what information the program reveals when the game ends. #OPTIONS=disclose:+i +a +v +g +c +o -# NetHack should pass eight-bit character values straight through +# aNetHack should pass eight-bit character values straight through # to your terminal (default off). #OPTIONS=eight_bit_tty @@ -195,7 +195,7 @@ # Allow use of the mouse for input and travel. #OPTIONS=mouse_support -# Read the NetHack news file, if present (default on). +# Read the aNetHack news file, if present (default on). #OPTIONS=news # Send padding nulls to the terminal (default on). @@ -282,7 +282,7 @@ # Boldface monsters and --More-- (default off). #OPTIONS=standout -# NetHack version level to suppress alert notification messages +# aNetHack version level to suppress alert notification messages # about feature changes for that and prior versions. #OPTIONS=suppress_alert:3.6.0 @@ -334,7 +334,7 @@ # Windowing system to use, such as 'tty' or 'x11'. #OPTIONS=windowtype:tty -# NetHack port should wrap long lines of text if they don't fit in +# aNetHack port should wrap long lines of text if they don't fit in # the visible area of the window. # WinCE only. #OPTIONS=wraptext @@ -369,10 +369,10 @@ # No startup splash screen. Windows GUI only. #OPTIONS=!splash_screen -# How does NetHack prompt for character creation. Windows GUI only. +# How does aNetHack prompt for character creation. Windows GUI only. #OPTIONS=player_selection:prompts -# NetHack should pop up dialog boxes for input. +# aNetHack should pop up dialog boxes for input. # Windows GUI only. #OPTIONS=popup_dialog @@ -389,28 +389,28 @@ #OPTIONS=windowcolors:status windowtext/window message windowtext/window # HACKDIR is the default location for everything. -# Note: On Windows HACKDIR defaults to the location of the NetHack.exe or -# NetHackw.exe file so setting HACKDIR below to override that is not usually +# Note: On Windows HACKDIR defaults to the location of the aNetHack.exe or +# aNetHackw.exe file so setting HACKDIR below to override that is not usually # necessary or recommended. -#HACKDIR=c:\games\nethack +#HACKDIR=c:\games\anethack # The location that level files in progress are stored # (default=HACKDIR, writeable) -#LEVELDIR=c:\nethack\levels +#LEVELDIR=c:\anethack\levels # The location where saved games are kept (default=HACKDIR, writeable) -#SAVEDIR=c:\nethack\save +#SAVEDIR=c:\anethack\save # The location that bones files are kept (default=HACKDIR, writeable) -#BONESDIR=c:\nethack\save +#BONESDIR=c:\anethack\save # The location that file synchronization locks are stored # (default=HACKDIR, writeable) -#LOCKDIR=c:\nethack\levels +#LOCKDIR=c:\anethack\levels # The location that a record of game aborts and self-diagnosed game problems # is kept (default=HACKDIR, writeable) -#TROUBLEDIR=c:\nethack\trouble +#TROUBLEDIR=c:\anethack\trouble # Finnish keyboards might need these modifications uncommented. Windows GUI. # For \, @, $, [, | @@ -514,7 +514,7 @@ # User sounds # Define the directory that contains the sound files -#SOUNDDIR=C:\nethack\sounds\ +#SOUNDDIR=C:\anethack\sounds\ # Define a sound mapping # SOUND=MESG "pattern" file volume #SOUND=MESG "KAABLAMM" explosion.wav 100 diff --git a/doc/dgn_comp.6 b/doc/dgn_comp.6 index f9ab66f2..2e8727d5 100644 --- a/doc/dgn_comp.6 +++ b/doc/dgn_comp.6 @@ -1,8 +1,8 @@ .TH DGN_COMP 6 "12 Dec 1995" -.\" NetHack 3.6 dgn_comp.6 $NHDT-Date: 1432512786 2015/05/25 00:13:06 $ $NHDT-Branch: master $:$NHDT-Revision: 1.5 $ +.\" aNetHack 0.0.1 dgn_comp.6 $ANH-Date: 1432512786 2015/05/25 00:13:06 $ $ANH-Branch: master $:$ANH-Revision: 1.5 $ .UC 4 .SH NAME -dgn_comp \- NetHack dungeon compiler +dgn_comp \- aNetHack dungeon compiler .SH SYNOPSIS .B dgn_comp [ @@ -13,11 +13,11 @@ If no arguments are given, it reads standard input. .SH DESCRIPTION .PP .I Dgn_comp -is a dungeon compiler for NetHack version 3.2 and higher. It +is a dungeon compiler for aNetHack version 3.2 and higher. It takes a description file as an argument and produces a dungeon "script" -that is to be loaded by NetHack at runtime. +that is to be loaded by aNetHack at runtime. .PP -The purpose of this tool is to provide NetHack administrators and +The purpose of this tool is to provide aNetHack administrators and implementors with a convenient way to create a custom dungeon for the game, without having to recompile the entire world. .SH GRAMMAR @@ -354,7 +354,7 @@ Here is the current syntax of the dungeon compiler's "language": .ta +8n +8n +8n # # The dungeon description file for the "standard" original -# 3.0 NetHack. +# 3.0 aNetHack. # DUNGEON: "The Dungeons of Doom" "D" (25, 5) LEVEL: "rogue" "none" @ (15, 4) @@ -397,7 +397,7 @@ it is in only applies to non-special levels within that dungeon. M. Stephenson (from the level compiler by Jean-Christophe Collet). .SH "SEE ALSO" .PP -lev_comp(6), nethack(6) +lev_comp(6), anethack(6) .SH BUGS .PP Probably infinite. diff --git a/doc/dgn_comp.txt b/doc/dgn_comp.txt index 907a4f0a..b6694a8c 100644 --- a/doc/dgn_comp.txt +++ b/doc/dgn_comp.txt @@ -6,7 +6,7 @@ DGN_COMP(6) 1995 DGN_COMP(6) NAME - dgn_comp - NetHack dungeon compiler + dgn_comp - aNetHack dungeon compiler SYNOPSIS dgn_comp [ file ] @@ -14,12 +14,12 @@ SYNOPSIS If no arguments are given, it reads standard input. DESCRIPTION - Dgn_comp is a dungeon compiler for NetHack version 3.2 and + Dgn_comp is a dungeon compiler for aNetHack version 3.2 and higher. It takes a description file as an argument and pro- - duces a dungeon "script" that is to be loaded by NetHack at + duces a dungeon "script" that is to be loaded by aNetHack at runtime. - The purpose of this tool is to provide NetHack administra- + The purpose of this tool is to provide aNetHack administra- tors and implementors with a convenient way to create a cus- tom dungeon for the game, without having to recompile the entire world. @@ -210,7 +210,7 @@ EXAMPLE # # The dungeon description file for the "standard" original - # 3.0 NetHack. + # 3.0 aNetHack. # DUNGEON: "The Dungeons of Doom" "D" (25, 5) LEVEL: "rogue" "none" @ (15, 4) @@ -252,7 +252,7 @@ AUTHOR Collet). SEE ALSO - lev_comp(6), nethack(6) + lev_comp(6), anethack(6) diff --git a/doc/dlb.6 b/doc/dlb.6 index e014d734..f9baab31 100644 --- a/doc/dlb.6 +++ b/doc/dlb.6 @@ -1,8 +1,8 @@ .TH DLB 6 "28 Oct 1993" -.\" NetHack 3.6 dlb.6 $NHDT-Date: 1432512786 2015/05/25 00:13:06 $ $NHDT-Branch: master $:$NHDT-Revision: 1.6 $ +.\" aNetHack 0.0.1 dlb.6 $ANH-Date: 1432512786 2015/05/25 00:13:06 $ $ANH-Branch: master $:$ANH-Revision: 1.6 $ .UC 4 .SH NAME -dlb \- NetHack data librarian +dlb \- aNetHack data librarian .SH SYNOPSIS .B dlb { @@ -19,21 +19,21 @@ arguments... .PP .I Dlb is a file archiving tool in the spirit (and tradition) of tar for -NetHack version 3.1 and higher. It is used to maintain the -archive files from which NetHack reads special level files and other +aNetHack version 3.1 and higher. It is used to maintain the +archive files from which aNetHack reads special level files and other read-only information. Note that like tar the command and option specifiers are specified as a continuous string and are followed by any arguments required in the same order as the option specifiers. .PP ^?ALLDOCS -This facility is optional and may be excluded during NetHack +This facility is optional and may be excluded during aNetHack configuration. ^: ^?DLB -This facility is optional but is included in this NetHack +This facility is optional but is included in this aNetHack configuration. ^: -This facility is optional and was excluded from this NetHack +This facility is optional and was excluded from this aNetHack configuration. ^. ^. @@ -60,7 +60,7 @@ v verbose output .br .sp 1 f archive specify the archive. Default if f not specified is -LIBFILE (usually the nhdat file in the playground). +LIBFILE (usually the anhdat file in the playground). .br .sp 1 I lfile specify the file containing the list of files to @@ -85,10 +85,10 @@ List the contents of the archive 'foo': Kenneth Lorber .SH "SEE ALSO" .PP -nethack(6), tar(1) +anethack(6), tar(1) .SH BUGS .PP Not a good tar emulation; - does not mean stdin or stdout. Should include an optional compression facility. -Not all read-only files for NetHack can be read out of an archive; +Not all read-only files for aNetHack can be read out of an archive; examining the source is the only way to know which files can be. diff --git a/doc/dlb.txt b/doc/dlb.txt index afc09c2d..d198cf50 100644 --- a/doc/dlb.txt +++ b/doc/dlb.txt @@ -6,21 +6,21 @@ DLB(6) 1993 DLB(6) NAME - dlb - NetHack data librarian + dlb - aNetHack data librarian SYNOPSIS dlb { xct } [ vfIC ] arguments... [ files... ] DESCRIPTION Dlb is a file archiving tool in the spirit (and tradition) - of tar for NetHack version 3.1 and higher. It is used to - maintain the archive files from which NetHack reads special + of tar for aNetHack version 3.1 and higher. It is used to + maintain the archive files from which aNetHack reads special level files and other read-only information. Note that like tar the command and option specifiers are specified as a continuous string and are followed by any arguments required in the same order as the option specifiers. - This facility is optional and may be excluded during NetHack + This facility is optional and may be excluded during aNetHack configuration. COMMANDS @@ -36,7 +36,7 @@ OPTIONS AND ARGUMENTS v verbose output f archive specify the archive. Default if f not specified - is LIBFILE (usually the nhdat file in the playground). + is LIBFILE (usually the anhdat file in the playground). I lfile specify the file containing the list of files to put in to or extract from the archive if no files are listed @@ -72,12 +72,12 @@ DLB(6) 1993 DLB(6) SEE ALSO - nethack(6), tar(1) + anethack(6), tar(1) BUGS Not a good tar emulation; - does not mean stdin or stdout. Should include an optional compression facility. Not all - read-only files for NetHack can be read out of an archive; + read-only files for aNetHack can be read out of an archive; examining the source is the only way to know which files can be. diff --git a/doc/fixes22.0 b/doc/fixes22.0 index decc0b92..1db23621 100644 --- a/doc/fixes22.0 +++ b/doc/fixes22.0 @@ -1,4 +1,4 @@ - NetHack Fixes List Revision 2.2 + aNetHack Fixes List Revision 2.2 Fixes and Modified Features --------------------------- @@ -7,7 +7,7 @@ Guidebook A file for preparation using the "mn" macros supplied with the 2.11 news release, as well as an ascii version of the same. -NetHack.cnf Sample configuration file for the PC. (creps@silver) +aNetHack.cnf Sample configuration file for the PC. (creps@silver) Makefiles Corrected problem in which the linking was done on build and (unix/xenix) on install. (Contributed by Janet Walz - walz@mimsy) @@ -248,7 +248,7 @@ New Features note: because of past problems, I ran the formatted version through "col -b" before passing it on to remove ^H's, etc. -br] - - A copy of "HACK.CNF" which has been renamed "NetHack.cnf" was + - A copy of "HACK.CNF" which has been renamed "aNetHack.cnf" was supplied by Steve Creps. The file decl.c has been updated to reflect this change. diff --git a/doc/fixes30.0 b/doc/fixes30.0 index a0171788..9076af09 100644 --- a/doc/fixes30.0 +++ b/doc/fixes30.0 @@ -1,4 +1,4 @@ -$NHDT-Branch$:$NHDT-Revision$ $NHDT-Date$ +$ANH-Branch$:$ANH-Revision$ $ANH-Date$ [This is a partial list supplied by Ken Arromdee long after the fact] diff --git a/doc/fixes31.1 b/doc/fixes31.1 index 402166f7..f794eb0b 100644 --- a/doc/fixes31.1 +++ b/doc/fixes31.1 @@ -88,8 +88,8 @@ interrupting dosinkring() allowed free ring identification killing some hostile humans (like Croesus and priests) lost telepathy, etc. tty specific: long input lines and improved interrupt handling -X11: NetHack.ad: "*map*grey" should be "*map*gray" -X11: NetHack.ad: remove excess quotes +X11: aNetHack.ad: "*map*grey" should be "*map*gray" +X11: aNetHack.ad: remove excess quotes HPs and X (SYSV conflict caused by X11 headers) Handle WM_DELETE_WINDOW protocol in X11 window-port. X11 popups are now positioned so that the cursor is bottom center. diff --git a/doc/fixes31.2 b/doc/fixes31.2 index 8a790f46..94936a9c 100644 --- a/doc/fixes31.2 +++ b/doc/fixes31.2 @@ -86,7 +86,7 @@ don't create doors over pits and trap doors when using a wand of locking fix mapping when you drop objects while following the guard out of a vault X11: some status didn't show up after restore -UNIX: fix potential security hole accessing file through NETHACKOPTIONS setuid +UNIX: fix potential security hole accessing file through ANETHACKOPTIONS setuid VMS: disable installed privileges when assigning i/o channel to terminal, opening termcap, or accessing user-specified config file Amiga: invalid showscore and numberpad options inserted by frontend diff --git a/doc/fixes32.1 b/doc/fixes32.1 index f30afefa..f73ccb33 100644 --- a/doc/fixes32.1 +++ b/doc/fixes32.1 @@ -78,7 +78,7 @@ oilskin cloaks allow defender to slip away from grabbing attacker make reading the cursed Book of the Dead riskier enchanting stat-affecting armor now identifies it fix crash caused by specifying "pickup_types" without a value in config file - or NETHACKOPTIONS (avoid attempt to use menu prior to interface init) + or ANETHACKOPTIONS (avoid attempt to use menu prior to interface init) kicking at empty lit corridor with lit_corridor enabled doesn't redraw as unlit when starting out with an oil lamp, make pre-discovered potions of oil show up in the discoveries list so that their varying description is available diff --git a/doc/fixes32.3 b/doc/fixes32.3 index 9a336552..0852bc83 100644 --- a/doc/fixes32.3 +++ b/doc/fixes32.3 @@ -25,6 +25,6 @@ drum of earthquake can't destroy the high altars Platform- and/or Interface-Specific Fixes ----------------------------------------- micro (assorted): readmail()--don't show fake mail text when blind; also, - update the "report bugs to" message to specify + update the "report bugs to" message to specify msdos: fix missing $(INCL) in dependency in djgpp Makefile mac: Will only dispatch events if the window system is initialized diff --git a/doc/fixes33.0 b/doc/fixes33.0 index 119de07b..1126a8eb 100644 --- a/doc/fixes33.0 +++ b/doc/fixes33.0 @@ -7,7 +7,7 @@ do match statue entry when looking up "statue of a " when foo happens to precede statue in the database; likewise for figurines initialize random number generator before processing user configuration file (random role selection always selected tourist) -support "character:X" and "role:X" in NETHACKOPTIONS as well as in config file +support "character:X" and "role:X" in ANETHACKOPTIONS as well as in config file allow colon as an alternative to equals sign for `OPTIONS:whatever' and equals sign as an alternative to colon for `pickup_types=?!="$' make rndexp (blessed gain level) be safe for 16 bit integer configurations @@ -257,13 +257,13 @@ Platform- and/or Interface-Specific Fixes ----------------------------------------- micro: -uwizard-{class} counts as -uwizard when allowing debug mode micro (assorted): readmail()--don't show fake mail text when blind; also, - update the "report bugs to" message to specify devteam@nethack.org + update the "report bugs to" message to specify devteam@anethack.org msdos: fix overlay separations in weapon.c msdos: fix problem breaking compile without REINCARNATION msdos: fix dependency in djgpp Makefile (wintty.c -> hack.h) tty: try to use terminfo sgr0 (aka termcap me) attribute to turn off all text attributes, instead of just using "rmso" (aka "se") attribute. -tty: change name of nethack's termcap.h to be tcap.h +tty: change name of anethack's termcap.h to be tcap.h tty: ^P at a long prompt printed an extra newline (and then wrapped oddly) tty: get repeat to work properly on extended commands tty/ASCIIGRAPH: rogue level uses PC Rogue colors and symbols @@ -288,7 +288,7 @@ mac: Increased the maximum number of menu items, so the inventory mac: Changed the behavior of Cmd-Q so it uses the new #quit command. mac: Will only dispatch events if the window system is initialized. This fixes a bug that would crash the system if the user had an - invalid option in the NetHack Defaults file. + invalid option in the aNetHack Defaults file. mac: Added an appropriate message when eating an apple. mac: Change the askname dialog for the new role patch. mac: Add a gray background to all dialogs. diff --git a/doc/fixes33.1 b/doc/fixes33.1 index 4b4a1c3e..d63daf0e 100644 --- a/doc/fixes33.1 +++ b/doc/fixes33.1 @@ -1,7 +1,7 @@ General Fixes and Modified Features ----------------------------------- discarding a tin without eating should not count towards food conduct -expand 'nethack.cnf' in dat/help to include new names on some platforms +expand 'anethack.cnf' in dat/help to include new names on some platforms using 'C' to name a steed produces a "pony tail" stopping reading a spellbook when "too much to comprehend" left in_use set conduct: eating meat{ball,stick,ring,huge chunk} counts as eating meat @@ -295,7 +295,7 @@ eating brains as a mind flayer should be nonvegetarian eating eggs should be nonvegan but vegetarian eating tripe, meat sticks, chunks of meat should be nonvegetarian headstones now implemented through engraving -luck penalty for the remaining forms of "creative NetHacking" in sokoban +luck penalty for the remaining forms of "creative aNetHacking" in sokoban don't penalize a turn if player cancels #ride direction Ranger quest is no longer a rip-off of the old Elf quest several Hello() messages were inappropriate for various monsters @@ -349,7 +349,7 @@ MFLOPPY: add checkspace option to avoid problems with >2GB free space MSDOS: fix clearlocks() to look for the right file names, and not LEVELS.* (MFLOPPY only) MSDOS: remove djgpp stuff from the Microsoft C Makefile -MSDOS: change NetHack.cnf to defaults.nh in NHAccess.nh comments +MSDOS: change aNetHack.cnf to defaults.nh in NHAccess.nh comments MSDOS: add missing files to gcc 'make spotless' NT: WIN32 specific code in tty_nh_poskey() was missing the necessary code to clear window flags so after hitting ESC @@ -379,7 +379,7 @@ Amiga: changed default colors in tilemode to those of gfxfile Amiga: window backfill works Amiga: playerselection adopted from tty-port Amiga: linesplitting in msg/inv/menu windows fixed -Amiga: obey user configured pens in nethack.cnf +Amiga: obey user configured pens in anethack.cnf Atari: tty port rescued from oblivion, Gem windowing added diff --git a/doc/fixes34.0 b/doc/fixes34.0 index ea3fb770..86fda1e5 100644 --- a/doc/fixes34.0 +++ b/doc/fixes34.0 @@ -124,7 +124,7 @@ avoid messages like "the silver bell" after being drained by mind flayer after polymorph, actually drop both weapons when a message says this happened curb unicorn horn creation abuse by limiting the chance of a unicorn leaving one if it has been revived -accept -p and -r options with nethack -s, as documented +accept -p and -r options with anethack -s, as documented avoid printing "spellbook of" Book of the Dead in list of discoveries eating non-food items made of leather or other animal parts now violates vegan/vegetarian conduct diff --git a/doc/fixes34.1 b/doc/fixes34.1 index 72ad612b..964dc309 100644 --- a/doc/fixes34.1 +++ b/doc/fixes34.1 @@ -1,4 +1,4 @@ -$NHDT-Branch$:$NHDT-Revision$ $NHDT-Date$ +$ANH-Branch$:$ANH-Revision$ $ANH-Date$ General Fixes and Modified Features ----------------------------------- @@ -405,8 +405,8 @@ win32: win32 build no longer defines MICRO win32: allow error save files to be generated win32: strip illegal file name characters from plname and replace with '_' win32: don't let recover build a save file out of level files belonging - to an active NetHack.exe or NetHackw.exe process -win32,winCE: SELF_RECOVER to let NetHack itself recover aborted games + to an active aNetHack.exe or aNetHackw.exe process +win32,winCE: SELF_RECOVER to let aNetHack itself recover aborted games win32gui: make error() work; it was essentially non-operative in 3.4.0 win32gui: fix alignment of columns in menu windows win32gui: Window menu File|Save worked during #quit disclosure processing diff --git a/doc/fixes34.2 b/doc/fixes34.2 index a618d4b5..fe8d0597 100644 --- a/doc/fixes34.2 +++ b/doc/fixes34.2 @@ -1,4 +1,4 @@ -$NHDT-Branch$:$NHDT-Revision$ $NHDT-Date$ +$ANH-Branch$:$ANH-Revision$ $ANH-Date$ General Fixes and Modified Features ----------------------------------- @@ -160,7 +160,7 @@ linux: add example use of nroff on recent Linux distros linux: use random() by default instead of lrand48() OpenBSD: time() prototype and correct default Mail program Gnome: compilation problems on Solaris -unix: better error message for .nethackrc access problems +unix: better error message for .anethackrc access problems vms: during installation, warn if dlb file creation or non-dlb playground setup is missing expected data files @@ -176,5 +176,5 @@ win32tty: keystroke handlers can be dynamically loaded to assist in resolving internationalization issues win32tty: add Ray Chason's code for international keyboard handling Solaris (and other SystemV variants): TIMED_DELAY support -X11: NetHack.ad is now installed and used w/o user intervention +X11: aNetHack.ad is now installed and used w/o user intervention diff --git a/doc/fixes34.3 b/doc/fixes34.3 index 1c9edf83..25f72401 100644 --- a/doc/fixes34.3 +++ b/doc/fixes34.3 @@ -1,4 +1,4 @@ -$NHDT-Branch$:$NHDT-Revision$ $NHDT-Date$ +$ANH-Branch$:$ANH-Revision$ $ANH-Date$ General Fixes and Modified Features ----------------------------------- diff --git a/doc/fixes35.0 b/doc/fixes35.0 index 30119b13..351fe291 100644 --- a/doc/fixes35.0 +++ b/doc/fixes35.0 @@ -1,3 +1,3 @@ -$NHDT-Branch$:$NHDT-Revision$ $NHDT-Date$ +$ANH-Branch$:$ANH-Revision$ $ANH-Date$ -There was no NetHack 3.5.x release +There was no aNetHack 3.5.x release diff --git a/doc/fixes36.0 b/doc/fixes36.0 index 036bc444..448a476e 100644 --- a/doc/fixes36.0 +++ b/doc/fixes36.0 @@ -1,4 +1,4 @@ -$NHDT-Branch$:$NHDT-Revision$ $NHDT-Date$ +$ANH-Branch$:$ANH-Revision$ $ANH-Date$ General Fixes and Modified Features ----------------------------------- @@ -366,7 +366,7 @@ don't exercise wisdom twice for each minor oracle consultation don't welcome the hero to Delphi if the Oracle was angered before first entry create_object() created lizard corpses without timers and troll corpses with their revive timers, then changed the corpsenm field -when a potion of acid was dropped into water and exploded, nethack would +when a potion of acid was dropped into water and exploded, anethack would continue to use already freed memory and later might panic or crash when jumping over an already seen trap, use an() to get appropriate grammar fix bad grammar when putting on not-yet-seen Eyes of the Overworld while blind @@ -379,7 +379,7 @@ fix message handling when multiple shopkeepers are present at end of game when "of " is intentionally being suppressed, an aligned or high priestess would be described as an aligned or high priest specifying role and/or race along with an invalid alignment for it/them in - NETHACKOPTIONS or config file would yield a prompt which misleadingly + ANETHACKOPTIONS or config file would yield a prompt which misleadingly mentioned the rejected alignment when asking player to pick alignment temple donation can recover protection previously stolen by attrcurse attack even when protection amount is so big that no increment would be given @@ -525,7 +525,7 @@ hero's sleep resistance shouldn't protect steed from sleeping gas trap dropped wielded, in use leash should remain in inventory, since it's in-use wielded, in use leash can't be snatched by whip-wielding monster when using two weapons at once, whip-wielding monster can target either one -if normal game save file is restored via `nethack -X', restore in normal +if normal game save file is restored via `anethack -X', restore in normal mode--with save file deletion--and require confirmation ala 'X' command to make deferred switch into explore mode can't #force floor item while engulfed, levitating, or unskilled riding @@ -948,7 +948,7 @@ smartphone: do not translate input when command helper is hidden (fixes Motorola Q keyboard bug) smartphone: new keypad layouts smartphone: wizard mode command layout -smartphone: option to feed arbitrary text as a command to nethack core +smartphone: option to feed arbitrary text as a command to anethack core tty: when loading user's run-time configuration, explicitly negating one of {DEC,IBM,MAC}graphics options after enabling another of them switched to regular ASCII and left the earlier option inaccurately set to "on" @@ -959,18 +959,18 @@ tty: fix segfault when MD termcap is not defined tty: do not cut off statuslines at 80 characters for wider term tty: prevent accidental escapes from string entries tty: hilight object piles -unix: remove use of parentheses in nethack man page usage that confused a +unix: remove use of parentheses in anethack man page usage that confused a man page conversion tool unix: new -wwindowtype option unix: don't clobber old level files if 2nd hangup/disconnect occurs while reconnected user is responding to the "destroy old game?" prompt -unix/Qt: saved games were not found if nethack was built with prefixes in use +unix/Qt: saved games were not found if anethack was built with prefixes in use unix,vms: allow digits after first character in name at "Who are you?" prompt unix: implement fcntl(2) locking on systems that can handle it vms: the DLB configuration could fail to build if a file without a dot in its name happened to match a logical name -Windows: starting a game with nethack.exe (tty) and saving, then restoring - and finishing with nethackW.exe (win32) would display the high scores +Windows: starting a game with anethack.exe (tty) and saving, then restoring + and finishing with anethackW.exe (win32) would display the high scores output in a series of popup windows, one for each line of text Windows, probably MSDOS and OS/2: attempting to use very first false rumor for cookie fortune or random engraving could produce garbled text @@ -1135,7 +1135,7 @@ flexibility for specifying "detect " vs " detection" when wishing when a sokoban puzzle has been completed (last pit or hole filled in), stop assessing luck penalties and lift most movement restrictions '`' command to show discoveries for one class of objects -add "about nethack" to '?' menu as an alternate way to view 'v'+'#version' +add "about anethack" to '?' menu as an alternate way to view 'v'+'#version' display version and build information at startup repeatedly setting the fruit option will check to see if fruits have been created, so the user can't easily overflow the maximum this way @@ -1204,7 +1204,7 @@ tty,win32gui,win32tty: add menucolors MSVC: send debugpline output to 'debug' window to declutter game screen -NetHack Community Patches (or Variation) Included +aNetHack Community Patches (or Variation) Included ------------------------------------------------- Roderick Schertler's pickup_thrown patch adopt/adapt/extend Malcolm Ryan's Statue Glyphs patch to work for tty and tiles diff --git a/doc/fixes36.1 b/doc/fixes36.1 index f0986f9a..6cf14922 100644 --- a/doc/fixes36.1 +++ b/doc/fixes36.1 @@ -1,4 +1,4 @@ -$NHDT-Branch$:$NHDT-Revision$ $NHDT-Date$ +$ANH-Branch$:$ANH-Revision$ $ANH-Date$ General Fixes and Modified Features ----------------------------------- @@ -541,19 +541,19 @@ tty: compile-time option to output escape codes for tile data hints unix: compile-time option MSGHANDLER to pass messages to external program unix: add CHECK_PLNAME-option to sysconf to make WIZARDS, EXPLORERS, and SHELLERS check player's character name instead of login name -X11: new NetHack*highlight_prompt resource to control whether the persistent - prompt line between the map and message windows for the NetHack*slow +X11: new aNetHack*highlight_prompt resource to control whether the persistent + prompt line between the map and message windows for the aNetHack*slow configuration will be highlighted when it's expecting input -X11: NetHack*extcmd_height_delta resource can be used to adjust initial size +X11: aNetHack*extcmd_height_delta resource can be used to adjust initial size of the extended commands menu X11: status display split into three columns to accomodate Stone/Deaf/Lev/&c; - NetHack*status_condition.foreground, .background, and .showGrip + aNetHack*status_condition.foreground, .background, and .showGrip resources replaced by status_condition[1-3].* X11: more terminal-like default resources win32gui: save and load map colors from registry -NetHack Community Patches (or Variation) Included +aNetHack Community Patches (or Variation) Included ------------------------------------------------- Malcolm Ryan's improved tin opener Ray Chason's keyboard may stop responding after locking or unlocking a door diff --git a/doc/lev_comp.6 b/doc/lev_comp.6 index 757cbe58..7f14ae42 100644 --- a/doc/lev_comp.6 +++ b/doc/lev_comp.6 @@ -1,8 +1,8 @@ .TH LEV_COMP 6 "16 May 1996" -.\" NetHack 3.6 lev_comp.6 $NHDT-Date: 1432512786 2015/05/25 00:13:06 $ $NHDT-Branch: master $:$NHDT-Revision: 1.5 $ +.\" aNetHack 0.0.1 lev_comp.6 $ANH-Date: 1432512786 2015/05/25 00:13:06 $ $ANH-Branch: master $:$ANH-Revision: 1.5 $ .UC 4 .SH NAME -lev_comp \- NetHack special levels compiler +lev_comp \- aNetHack special levels compiler .SH SYNOPSIS .B lev_comp [ @@ -16,11 +16,11 @@ If no arguments are given, it reads standard input. .SH DESCRIPTION .PP .I Lev_comp -is a special level compiler for NetHack version 3.2 and higher. It +is a special level compiler for aNetHack version 3.2 and higher. It takes description files as arguments and produces level files that can -be loaded by NetHack at runtime. +be loaded by aNetHack at runtime. .PP -The purpose of this tool is to provide NetHack administrators and +The purpose of this tool is to provide aNetHack administrators and implementors with a convenient way for adding special levels to the game, or modifying existing ones, without having to recompile the entire world. @@ -566,7 +566,7 @@ level, regardless of the placement of the current MAP in the level. Jean-Christophe Collet, David Cohrs. .SH "SEE ALSO" .PP -dgn_comp(6), nethack(6) +dgn_comp(6), anethack(6) .SH BUGS .PP Probably infinite. diff --git a/doc/lev_comp.txt b/doc/lev_comp.txt index 4a28fcea..6aecd6db 100644 --- a/doc/lev_comp.txt +++ b/doc/lev_comp.txt @@ -6,7 +6,7 @@ LEV_COMP(6) 1996 LEV_COMP(6) NAME - lev_comp - NetHack special levels compiler + lev_comp - aNetHack special levels compiler SYNOPSIS lev_comp [ -w ] [ files ] @@ -14,12 +14,12 @@ SYNOPSIS If no arguments are given, it reads standard input. DESCRIPTION - Lev_comp is a special level compiler for NetHack version 3.2 + Lev_comp is a special level compiler for aNetHack version 3.2 and higher. It takes description files as arguments and - produces level files that can be loaded by NetHack at run- + produces level files that can be loaded by aNetHack at run- time. - The purpose of this tool is to provide NetHack administra- + The purpose of this tool is to provide aNetHack administra- tors and implementors with a convenient way for adding spe- cial levels to the game, or modifying existing ones, without having to recompile the entire world. @@ -692,7 +692,7 @@ AUTHOR Jean-Christophe Collet, David Cohrs. SEE ALSO - dgn_comp(6), nethack(6) + dgn_comp(6), anethack(6) BUGS Probably infinite. Most importantly, still needs additional diff --git a/doc/makedefs.6 b/doc/makedefs.6 index 7b55de3e..d303546d 100644 --- a/doc/makedefs.6 +++ b/doc/makedefs.6 @@ -1,8 +1,8 @@ .TH MAKEDEFS 6 "29 Apr 2010" -.\" NetHack 3.6 makedefs.6 $NHDT-Date: 1432512786 2015/05/25 00:13:06 $ $NHDT-Branch: master $:$NHDT-Revision: 1.7 $ +.\" aNetHack 0.0.1 makedefs.6 $ANH-Date: 1432512786 2015/05/25 00:13:06 $ $ANH-Branch: master $:$ANH-Revision: 1.7 $ .UC 4 .SH NAME -makedefs \- NetHack miscellaneous build-time functions +makedefs \- aNetHack miscellaneous build-time functions .SH SYNOPSIS .B makedefs { @@ -36,7 +36,7 @@ makedefs \- NetHack miscellaneous build-time functions .PP .B Makedefs is a build-time tool used for a variety of -.BR NetHack (6) +.BR aNetHack (6) source file creation and modification tasks. For historical reasons, .B makedefs takes two types of command lines. When invoked with a short option, the @@ -194,7 +194,7 @@ The command (and certain other commands) filter their input, on a line-by-line basis, according to control lines embedded in the input and on information gleaned from the -.BR NetHack (6) +.BR aNetHack (6) configuration. This allows certain changes such as embedding platform-specific documentation into the master documentation files. .P @@ -221,7 +221,7 @@ continue (if it can) to allow as many errors as possible to be detected. Unknown identifiers are treated as both TRUE and as an error. Note that .BR --undef " or " #undef in the -.BR NetHack (6) +.BR aNetHack (6) configuration are different from unknown. .RE .P @@ -246,7 +246,7 @@ end the most recent conditional .RE .\".SH EXAMPLES .SH AUTHOR -The NetHack Development Team +The aNetHack Development Team .SH "SEE ALSO" .PP .BR dgn_comp (6) diff --git a/doc/makedefs.txt b/doc/makedefs.txt index 8c2edb3c..ffbb1e8c 100644 --- a/doc/makedefs.txt +++ b/doc/makedefs.txt @@ -3,7 +3,7 @@ MAKEDEFS(6) MAKEDEFS(6) NAME - makedefs - NetHack miscellaneous build-time functions + makedefs - aNetHack miscellaneous build-time functions SYNOPSIS makedefs { -o | -d | -e | -m | -v | -p | -q | -r | -h | -z } @@ -11,7 +11,7 @@ SYNOPSIS makedefs --input file --output file --command DESCRIPTION - Makedefs is a build-time tool used for a variety of NetHack(6) source + Makedefs is a build-time tool used for a variety of aNetHack(6) source file creation and modification tasks. For historical reasons, makedefs takes two types of command lines. When invoked with a short option, the files operated on are determined when makedefs is compiled. When @@ -81,7 +81,7 @@ LONG COMMANDS MDGREP FUNCTIONS The --grep command (and certain other commands) filter their input, on a line-by-line basis, according to control lines embedded in the input - and on information gleaned from the NetHack(6) configuration. This + and on information gleaned from the aNetHack(6) configuration. This allows certain changes such as embedding platform-specific documenta tion into the master documentation files. @@ -105,7 +105,7 @@ MDGREP FUNCTIONS many errors as possible to be detected. - Unknown identifiers are treated as both TRUE and as an - error. Note that --undef or #undef in the NetHack(6) con + error. Note that --undef or #undef in the aNetHack(6) con figuration are different from unknown. Control lines: @@ -125,7 +125,7 @@ MDGREP FUNCTIONS ^. end the most recent conditional AUTHOR - The NetHack Development Team + The aNetHack Development Team SEE ALSO dgn_comp(6) diff --git a/doc/recover.6 b/doc/recover.6 index 4d6bcb36..5be20e55 100644 --- a/doc/recover.6 +++ b/doc/recover.6 @@ -1,8 +1,8 @@ .TH RECOVER 6 "9 January 1993" -.\" NetHack 3.6 recover.6 $NHDT-Date: 1450129883 2015/12/14 21:51:23 $ $NHDT-Branch: NetHack-3.6.0 $:$NHDT-Revision: 1.8 $ +.\" aNetHack 0.0.1 recover.6 $ANH-Date: 1450129883 2015/12/14 21:51:23 $ $ANH-Branch: aNetHack-3.6.0 $:$ANH-Revision: 1.8 $ .UC 4 .SH NAME -recover \- recover a NetHack game interrupted by disaster +recover \- recover a aNetHack game interrupted by disaster .SH SYNOPSIS .B recover [ @@ -12,9 +12,9 @@ recover \- recover a NetHack game interrupted by disaster .I "base1 base2" ... .SH DESCRIPTION .PP -Occasionally, a NetHack game will be interrupted by disaster +Occasionally, a aNetHack game will be interrupted by disaster when the game or the system crashes. -Prior to NetHack v3.1, these games were lost because various information +Prior to aNetHack v3.1, these games were lost because various information like the player's inventory was kept only in memory. Now, all pertinent information can be written out to disk, so such games can be recovered at the point of the last level change. @@ -29,34 +29,34 @@ Each base option specifies recovery of a separate game. The .B \-d option, which must be the first argument if it appears, -supplies a directory which is the NetHack playground. -It overrides the value from NETHACKDIR, HACKDIR, or the directory +supplies a directory which is the aNetHack playground. +It overrides the value from ANETHACKDIR, HACKDIR, or the directory specified by the game administrator during compilation -(usually /usr/games/lib/nethackdir). +(usually /usr/games/lib/anethackdir). .PP ^?ALLDOCS For recovery to be possible, -.I nethack +.I anethack must have been compiled with the INSURANCE option, and the run-time option .I checkpoint must also have been on. ^: ^?INSURANCE For recovery to be possible, -.I nethack +.I anethack must have been compiled with the INSURANCE option (this configuration was), and the run-time option .I checkpoint must also have been on. ^: This configuration of -.I nethack +.I anethack was created without support for recovery. ^. ^. -NetHack normally writes out files for levels as the player leaves them, +aNetHack normally writes out files for levels as the player leaves them, so they will be ready for return visits. -When checkpointing, NetHack also writes out the level entered and +When checkpointing, aNetHack also writes out the level entered and the current game state on every level change. This naturally slows level changes down somewhat. .PP @@ -74,7 +74,7 @@ It may be necessary to look in the playground to find the correct base name of the interrupted game. .I recover will transform these level files into a save file of the same name as -.I nethack +.I anethack would have used. .PP Since @@ -99,7 +99,7 @@ and handle game crashes individually. If the user population is sufficiently trustworthy, .I recover can be installed with the same permissions the -.I nethack +.I anethack executable has. In either case, .I recover @@ -107,7 +107,7 @@ is easily compiled from the distribution utility directory. .SH NOTES .PP Like -.I nethack +.I anethack itself, .I recover will overwrite existing savefiles of the same name. @@ -116,10 +116,10 @@ Savefiles created by are uncompressed; they may be compressed afterwards if desired, but even a compression-using -.I nethack +.I anethack will find them in the uncompressed form. .SH "SEE ALSO" -nethack(6) +anethack(6) .SH BUGS .PP .I recover @@ -128,5 +128,5 @@ If multiple machines share a playground, this would be impossible to determine. .PP .I recover -should be taught to use the nethack playground locking mechanism to +should be taught to use the anethack playground locking mechanism to avoid conflicts. diff --git a/doc/recover.txt b/doc/recover.txt index 80eeadb5..db4e3dff 100644 --- a/doc/recover.txt +++ b/doc/recover.txt @@ -6,14 +6,14 @@ RECOVER(6) 1993 RECOVER(6) NAME - recover - recover a NetHack game interrupted by disaster + recover - recover a aNetHack game interrupted by disaster SYNOPSIS recover [ -d directory ] base1 base2 ... DESCRIPTION - Occasionally, a NetHack game will be interrupted by disaster - when the game or the system crashes. Prior to NetHack v3.1, + Occasionally, a aNetHack game will be interrupted by disaster + when the game or the system crashes. Prior to aNetHack v3.1, these games were lost because various information like the player's inventory was kept only in memory. Now, all per- tinent information can be written out to disk, so such games @@ -23,16 +23,16 @@ DESCRIPTION base option specifies recovery of a separate game. The -d option, which must be the first argument if it - appears, supplies a directory which is the NetHack play- - ground. It overrides the value from NETHACKDIR, HACKDIR, or + appears, supplies a directory which is the aNetHack play- + ground. It overrides the value from ANETHACKDIR, HACKDIR, or the directory specified by the game administrator during - compilation (usually /usr/games/lib/nethackdir). + compilation (usually /usr/games/lib/anethackdir). - For recovery to be possible, nethack must have been compiled + For recovery to be possible, anethack must have been compiled with the INSURANCE option, and the run-time option check- - point must also have been on. NetHack normally writes out + point must also have been on. aNetHack normally writes out files for levels as the player leaves them, so they will be - ready for return visits. When checkpointing, NetHack also + ready for return visits. When checkpointing, aNetHack also writes out the level entered and the current game state on every level change. This naturally slows level changes down somewhat. @@ -49,7 +49,7 @@ DESCRIPTION being limited. It may be necessary to look in the play- ground to find the correct base name of the interrupted game. recover will transform these level files into a save - file of the same name as nethack would have used. + file of the same name as anethack would have used. Since recover must be able to read and delete files from the playground and create files in the save directory, it has @@ -80,25 +80,25 @@ RECOVER(6) 1993 RECOVER(6) recover when the host machine boots, and handle game crashes individually. If the user population is sufficiently trustworthy, recover can be installed with the same permis- - sions the nethack executable has. In either case, recover + sions the anethack executable has. In either case, recover is easily compiled from the distribution utility directory. NOTES - Like nethack itself, recover will overwrite existing save- + Like anethack itself, recover will overwrite existing save- files of the same name. Savefiles created by recover are uncompressed; they may be compressed afterwards if desired, - but even a compression-using nethack will find them in the + but even a compression-using anethack will find them in the uncompressed form. SEE ALSO - nethack(6) + anethack(6) BUGS recover makes no attempt to find out if a base name speci- fies a game in progress. If multiple machines share a play- ground, this would be impossible to determine. - recover should be taught to use the nethack playground lock- + recover should be taught to use the anethack playground lock- ing mechanism to avoid conflicts. diff --git a/doc/window.doc b/doc/window.doc index 2ebf9f8b..27db4163 100644 --- a/doc/window.doc +++ b/doc/window.doc @@ -1,16 +1,16 @@ -NetHack 3.6 window.doc $NHDT-Date: 1433901374 2015/06/10 01:56:14 $ $NHDT-Branch: master $:$NHDT-Revision: 1.42 $ +aNetHack 0.0.1 window.doc $ANH-Date: 1433901374 2015/06/10 01:56:14 $ $ANH-Branch: master $:$ANH-Revision: 1.42 $ Introduction This file documents the support for various windowing systems in -NetHack. The support is through a standard interface, separating the -main NetHack code from window-system specific code. The implementation +aNetHack. The support is through a standard interface, separating the +main aNetHack code from window-system specific code. The implementation supports multiple window systems in the same binary. Even if you only wish to support one window-port on your port, you will need to follow the instructions in Section IX to get a compilable binary. Copyright 2003, David Cohrs -NetHack may be freely redistributed. See license for details. +aNetHack may be freely redistributed. See license for details. Contents: I. Window Types and Terminology @@ -272,7 +272,7 @@ update_positionbar(char *features) C. Window Utility Routines init_nhwindows(int* argcp, char** argv) - -- Initialize the windows used by NetHack. This can also + -- Initialize the windows used by aNetHack. This can also create the standard windows listed at the top, but does not display them. -- Any commandline arguments relevant to the windowport @@ -513,7 +513,7 @@ outrip(winid, int, time_t) preference_update(preference) -- The player has just changed one of the wincap preference - settings, and the NetHack core is notifying your window + settings, and the aNetHack core is notifying your window port of that change. If your window-port is capable of dynamically adjusting to the change then it should do so. Your window-port will only be notified of a particular @@ -552,7 +552,7 @@ putmsghistory(msg) III. Global variables The following global variables are defined in decl.c and must be used by -the window interface to the rest of NetHack. +the window interface to the rest of aNetHack. char toplines[BUFSZ] Contains the last message printed to the WIN_MESSAGE window, used by Norep(). @@ -582,7 +582,7 @@ struct wc_Opt wc_options[]; IV. WINCAP preferences support -Starting with NetHack 3.4.0, the window interface was enhanced to provide +Starting with aNetHack 3.4.0, the window interface was enhanced to provide a common way of setting window port user preferences from the config file, and from the command line for some settings. @@ -603,7 +603,7 @@ Two things control whether any preference setting appears in the to be able to set the option, or marked DISP_IN_GAME if you just want to reveal what the option is set to. Both conditions must be true to be able to see or set the option from -within NetHack. +within aNetHack. The default values for the optflag field for all the options are hard-coded into the option in options.c. The default value for @@ -614,7 +614,7 @@ The default value for the wc2_ options can be altered by calling In each case, set the option modification status to one of SET_IN_FILE, DISP_IN_GAME, or SET_IN_GAME. -The setting of any wincap or wincap2 option is handled by the NetHack +The setting of any wincap or wincap2 option is handled by the aNetHack core option processing code. You do not have to provide a parser in your window port, nor should you set the values for the iflags.wc_* and iflags.wc2_* fields directly within the port code. @@ -741,7 +741,7 @@ tile_height -- port should display tiles with this height or round to closest if it can. tile_file -- open this alternative tile file. The file name is likely to be window-port or platform specific. -use_inverse -- port should display inverse when NetHack asks for it. +use_inverse -- port should display inverse when aNetHack asks for it. vary_msgcount -- port should display this number of messages at a time in the message window. windowcolors @@ -834,7 +834,7 @@ window port routines to perform the desired task, instead of duplicating the necessary code in each window port. int mapglyph(int glyph, int *ochar, int *ocolor, unsigned *special, int x, int y) - -- Maps glyph at x,y to NetHack ascii character and color. + -- Maps glyph at x,y to aNetHack ascii character and color. The return value is an index into the showsyms[] array, in case a port wants to index into its own alternative set of display symbols (such as a unicode set) instead of @@ -897,7 +897,7 @@ init_nhwindows() is expected to display a gee-whiz banner window, including the Copyright message. It is recommended that the COPYRIGHT_BANNER_A, COPYRIGHT_BANNER_B, COPYRIGHT_BANNER_C, and COPYRIGHT_BANNER_D macros from patchlevel.h and date.h be used for constructing the Copyright message. -COPYRIGHT_BANNER_A is a quoted string that has the NetHack copyright declaration, +COPYRIGHT_BANNER_A is a quoted string that has the aNetHack copyright declaration, COPYRIGHT_BANNER_B is a quoted string that states who the copyright belongs to, COPYRIGHT_BANNER_C is a quoted string generated by makedefs that includes version and build information. and COPYRIGHT_BANNER_D simply says "See License for details." @@ -919,7 +919,7 @@ and may be replaced completely by other window ports. IX. Implementation and Multi-window support -NetHack 3.2 and higher support multiple window systems in the same binary. +aNetHack 3.2 and higher support multiple window systems in the same binary. When writing a new window-port, you need to follow the following guidelines: 1) Pick a unique prefix to identify your window-port. For example, the tty @@ -993,7 +993,7 @@ When writing a new window-port, you need to follow the following guidelines: Makefile.src for the style to use. If you don't use Makefile.src, we suggest using a similar convention for the make-equivalent used on your system. Also add your new source and binaries to WINSRC and - WINOBJ (if you want the NetHack binary to include them, that is). + WINOBJ (if you want the aNetHack binary to include them, that is). 9) Look at your port's portmain.c (the file containing main()) and make sure that all of the calls match the the requirements laid out in @@ -1005,7 +1005,7 @@ window-ports you want in your binary, the default window-port to use, and the .o's needed to build a valid game. One caveat. Unfortunately, if you incorrectly specify the -DEFAULT_WINDOW_SYS, NetHack will dump core (or whatever) without +DEFAULT_WINDOW_SYS, aNetHack will dump core (or whatever) without printing any message, because raw_print() cannot function without first setting the window-port. @@ -1022,9 +1022,9 @@ required and is part of the name of the processor (this distinguishes processors from window ports; in addition the '-' character is reserved for WINCHAIN internals). -If WINCHAIN is not compiled into the NetHack binary, there is no overhead. +If WINCHAIN is not compiled into the aNetHack binary, there is no overhead. -If WINCHAIN is compiled into the NetHack binary but not used, overhead is +If WINCHAIN is compiled into the aNetHack binary but not used, overhead is limited to one function call during game setup and a trivial amount of data. Note that raw_print* calls will not go through the chain until initialization diff --git a/include/align.h b/include/align.h index dd086910..5468599c 100644 --- a/include/align.h +++ b/include/align.h @@ -1,6 +1,6 @@ -/* NetHack 3.6 align.h $ANH-Date: 1432512779 2015/05/25 00:12:59 $ $ANH-Branch: master $:$ANH-Revision: 1.8 $ */ +/* aNetHack 0.0.1 align.h $ANH-Date: 1432512779 2015/05/25 00:12:59 $ $ANH-Branch: master $:$ANH-Revision: 1.8 $ */ /* Copyright (c) Mike Stephenson, Izchak Miller 1991. */ -/* NetHack may be freely redistributed. See license for details. */ +/* aNetHack may be freely redistributed. See license for details. */ #ifndef ALIGN_H #define ALIGN_H diff --git a/include/amiconf.h b/include/amiconf.h index 3eb6b674..978e7f9e 100644 --- a/include/amiconf.h +++ b/include/amiconf.h @@ -1,7 +1,7 @@ -/* NetHack 3.6 amiconf.h $ANH-Date: 1432512775 2015/05/25 00:12:55 $ $ANH-Branch: master $:$ANH-Revision: 1.12 $ */ +/* aNetHack 0.0.1 amiconf.h $ANH-Date: 1432512775 2015/05/25 00:12:55 $ $ANH-Branch: master $:$ANH-Revision: 1.12 $ */ /* Copyright (c) Kenneth Lorber, Bethesda, Maryland, 1990, 1991, 1992, 1993. */ -/* NetHack may be freely redistributed. See license for details. */ +/* aNetHack may be freely redistributed. See license for details. */ #ifndef AMICONF_H #define AMICONF_H @@ -43,10 +43,10 @@ typedef long off_t; /* data librarian defs */ #ifndef NOCWD_ASSUMPTIONS -#define DLBFILE "NetHack:nhdat" /* main library */ -#define DLBFILE2 "NetHack:nhsdat" /* sound library */ +#define DLBFILE "aNetHack:aanhdat" /* main library */ +#define DLBFILE2 "aNetHack:anhsdat" /* sound library */ #else -#define DLBFILE "nhdat" /* main library */ +#define DLBFILE "anhdat" /* main library */ #define DLBFILE2 "nhsdat" /* sound library */ #endif @@ -70,7 +70,7 @@ typedef long off_t; /* ### amidos.c ### */ -extern void FDECL(nethack_exit, (int)); +extern void FDECL(anethack_exit, (int)); /* ### amiwbench.c ### */ @@ -141,7 +141,7 @@ extern char *FDECL(gets, (char *)); #define HACKFONT /* Use special hack.font */ #define SHELL /* Have a shell escape command (!) */ #define MAIL /* Get mail at unexpected occasions */ -#define DEFAULT_ICON "NetHack:default.icon" /* private icon */ +#define DEFAULT_ICON "aNetHack:default.icon" /* private icon */ #define AMIFLUSH /* toss typeahead (select flush in .cnf) */ /* #define OPT_DISPMAP /* enable fast_map option */ @@ -162,7 +162,7 @@ extern char *FDECL(gets, (char *)); #define AMII_MAXCOLORS (1L << DEPTH) typedef unsigned short AMII_COLOR_TYPE; -#define PORT_HELP "nethack:amii.hlp" +#define PORT_HELP "anethack:amii.hlp" #undef TERMLIB diff --git a/include/artifact.h b/include/artifact.h index b8848027..9271f623 100644 --- a/include/artifact.h +++ b/include/artifact.h @@ -1,6 +1,6 @@ -/* NetHack 3.6 artifact.h $ANH-Date: 1433050871 2015/05/31 05:41:11 $ $ANH-Branch: master $:$ANH-Revision: 1.11 $ */ +/* aNetHack 0.0.1 artifact.h $ANH-Date: 1433050871 2015/05/31 05:41:11 $ $ANH-Branch: master $:$ANH-Revision: 1.11 $ */ /* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */ -/* NetHack may be freely redistributed. See license for details. */ +/* aNetHack may be freely redistributed. See license for details. */ #ifndef ARTIFACT_H #define ARTIFACT_H diff --git a/include/artilist.h b/include/artilist.h index 57190f6c..b500befe 100644 --- a/include/artilist.h +++ b/include/artilist.h @@ -1,6 +1,6 @@ -/* NetHack 3.6 artilist.h $ANH-Date: 1433050874 2015/05/31 05:41:14 $ $ANH-Branch: master $:$ANH-Revision: 1.16 $ */ +/* aNetHack 0.0.1 artilist.h $ANH-Date: 1433050874 2015/05/31 05:41:14 $ $ANH-Branch: master $:$ANH-Revision: 1.16 $ */ /* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */ -/* NetHack may be freely redistributed. See license for details. */ +/* aNetHack may be freely redistributed. See license for details. */ #ifdef MAKEDEFS_C /* in makedefs.c, all we care about is the list of names */ diff --git a/include/attrib.h b/include/attrib.h index 9513e651..533fc831 100644 --- a/include/attrib.h +++ b/include/attrib.h @@ -1,6 +1,6 @@ -/* NetHack 3.6 attrib.h $ANH-Date: 1432512779 2015/05/25 00:12:59 $ $ANH-Branch: master $:$ANH-Revision: 1.8 $ */ +/* aNetHack 0.0.1 attrib.h $ANH-Date: 1432512779 2015/05/25 00:12:59 $ $ANH-Branch: master $:$ANH-Revision: 1.8 $ */ /* Copyright 1988, Mike Stephenson */ -/* NetHack may be freely redistributed. See license for details. */ +/* aNetHack may be freely redistributed. See license for details. */ /* attrib.h - Header file for character class processing. */ diff --git a/include/beconf.h b/include/beconf.h index 8b2479c5..e05e5f31 100644 --- a/include/beconf.h +++ b/include/beconf.h @@ -1,6 +1,6 @@ -/* NetHack 3.6 beconf.h $ANH-Date: 1432512783 2015/05/25 00:13:03 $ $ANH-Branch: master $:$ANH-Revision: 1.8 $ */ +/* aNetHack 0.0.1 beconf.h $ANH-Date: 1432512783 2015/05/25 00:13:03 $ $ANH-Branch: master $:$ANH-Revision: 1.8 $ */ /* Copyright (c) Dean Luick 1996. */ -/* NetHack may be freely redistributed. See license for details. */ +/* aNetHack may be freely redistributed. See license for details. */ /* Configuration for Be Inc.'s BeOS */ diff --git a/include/botl.h b/include/botl.h index a24e78c0..14fcbdc4 100644 --- a/include/botl.h +++ b/include/botl.h @@ -1,6 +1,6 @@ -/* NetHack 3.6 botl.h $ANH-Date: 1452660165 2016/01/13 04:42:45 $ $ANH-Branch: master $:$ANH-Revision: 1.15 $ */ +/* aNetHack 0.0.1 botl.h $ANH-Date: 1452660165 2016/01/13 04:42:45 $ $ANH-Branch: master $:$ANH-Revision: 1.15 $ */ /* Copyright (c) Michael Allison, 2003 */ -/* NetHack may be freely redistributed. See license for details. */ +/* aNetHack may be freely redistributed. See license for details. */ #ifndef BOTL_H #define BOTL_H diff --git a/include/color.h b/include/color.h index d46e268e..f7969916 100644 --- a/include/color.h +++ b/include/color.h @@ -1,6 +1,6 @@ -/* NetHack 3.6 color.h $ANH-Date: 1432512776 2015/05/25 00:12:56 $ $ANH-Branch: master $:$ANH-Revision: 1.13 $ */ +/* aNetHack 0.0.1 color.h $ANH-Date: 1432512776 2015/05/25 00:12:56 $ $ANH-Branch: master $:$ANH-Revision: 1.13 $ */ /* Copyright (c) Steve Linhart, Eric Raymond, 1989. */ -/* NetHack may be freely redistributed. See license for details. */ +/* aNetHack may be freely redistributed. See license for details. */ #ifndef COLOR_H #define COLOR_H diff --git a/include/config.h b/include/config.h index e091dcd7..b913563c 100644 --- a/include/config.h +++ b/include/config.h @@ -1,6 +1,6 @@ -/* NetHack 3.6 config.h $ANH-Date: 1447728911 2015/11/17 02:55:11 $ $ANH-Branch: master $:$ANH-Revision: 1.91 $ */ +/* aNetHack 0.0.1 config.h $ANH-Date: 1447728911 2015/11/17 02:55:11 $ $ANH-Branch: master $:$ANH-Revision: 1.91 $ */ /* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */ -/* NetHack may be freely redistributed. See license for details. */ +/* aNetHack may be freely redistributed. See license for details. */ #ifndef CONFIG_H /* make sure the compiler does not see the typedefs twice */ #define CONFIG_H @@ -79,7 +79,7 @@ #define BEOS_GRAPHICS /* (optional) */ #define DEFAULT_WINDOW_SYS "BeOS" /* "tty" */ #ifndef HACKDIR /* override the default hackdir below */ -#define HACKDIR "/boot/apps/NetHack" +#define HACKDIR "/boot/apps/aNetHack" #endif #endif @@ -110,7 +110,7 @@ #ifndef DEFAULT_WINDOW_SYS #define DEFAULT_WINDOW_SYS "mswin" #endif -#define HACKDIR "\\nethack" +#define HACKDIR "\\anethack" #endif #ifndef DEFAULT_WINDOW_SYS @@ -120,7 +120,7 @@ #ifdef X11_GRAPHICS /* * There are two ways that X11 tiles may be defined. (1) using a custom - * format loaded by NetHack code, or (2) using the XPM format loaded by + * format loaded by aNetHack code, or (2) using the XPM format loaded by * the free XPM library. The second option allows you to then use other * programs to generate tiles files. For example, the PBMPlus tools * would allow: @@ -157,7 +157,7 @@ * this does NOT default to compiled-in value) * EXPLORERS (who can use explore mode, aka discover mode) * SHELLERS (who can use ! to execute a shell subprocess) - * MAXPLAYERS (see MAX_NR_OF_PLAYERS below and nethack.sh) + * MAXPLAYERS (see MAX_NR_OF_PLAYERS below and anethack.sh) * SUPPORT (how to get local support) [no default] * RECOVER (how to recover a game at your site) [no default] * For the record file (see topten.c): @@ -170,9 +170,9 @@ * The following options pertain to crash reporting: * GREPPATH (the path to the system grep(1) utility) * GDBPATH (the path to the system gdb(1) program) - * Regular nethack options can also be specified in order to + * Regular anethack options can also be specified in order to * provide system-wide default values local to your system: - * OPTIONS (same as in users' .nethackrc or defaults.nh) + * OPTIONS (same as in users' .anethackrc or defaults.nh) * * In the future there may be other ways to supply SYSCF * information (Windows registry, Apple resource forks, etc) @@ -181,7 +181,7 @@ * exist and be readable, otherwise the game will complain and * refuse to start. * SYSCF_FILE: file containing the SYSCF options shown above; - * default is 'sysconf' in nethack's playground. + * default is 'sysconf' in anethack's playground. */ #ifndef WIZARD_NAME /* allow for compile-time or Makefile changes */ @@ -270,9 +270,9 @@ * Internal Compression Options * * Internal compression options RLECOMP and ZEROCOMP alter the data - * that gets written to the save file by NetHack, in contrast + * that gets written to the save file by aNetHack, in contrast * to COMPRESS or ZLIB_COMP which compress the entire file after - * the NetHack data is written out. + * the aNetHack data is written out. * * Defining RLECOMP builds in support for internal run-length * compression of level structures. If RLECOMP support is included @@ -287,7 +287,7 @@ * COMPRESS or ZLIB_COMP support is included. One reason for doing * so would be to provide savefile read compatibility with a savefile * where those options were in effect. With RLECOMP and/or ZEROCOMP - * defined, NetHack can read an rlecomp or zerocomp savefile in, yet + * defined, aNetHack can read an rlecomp or zerocomp savefile in, yet * re-save without them. * * Using any compression option will create smaller bones/level/save @@ -307,7 +307,7 @@ /* * Defining REPRODUCIBLE_BUILD causes 'util/makedefs -v' to construct - * date+time in include/date.h (to be shown by nethack's 'v' command) + * date+time in include/date.h (to be shown by anethack's 'v' command) * from SOURCE_DATE_EPOCH in the build environment rather than use * current date+time when makedefs is run. * @@ -315,7 +315,7 @@ * of "last build