1 .\" $FreeBSD: src/games/hack/hack.6,v 1.2.8.1 2001/07/22 11:01:22 dd Exp $
2 .\" $DragonFly: src/games/hack/hack.6,v 1.2 2003/06/17 04:25:24 dillon Exp $
3 .TH HACK 6 "31 March 1985"
6 hack \- exploring The Dungeons of Doom
35 is a display oriented dungeons & dragons - like game.
36 Both display and command structure resemble rogue.
37 (For a game with the same structure but entirely different display -
38 a real cave instead of dull rectangles - try Quest.)
40 To get started you really only need to know two commands. The command
42 will give you a list of the available commands and the command
44 will identify the things you see on the screen.
46 To win the game (as opposed to merely playing to beat other people high
47 scores) you must locate the Amulet of Yendor which is somewhere below
48 the 20th level of the dungeon and get it out. Nobody has achieved this
49 yet and if somebody does, he will probably go down in history as a hero
52 When the game ends, either by your death, when you quit, or if you escape
55 will give you (a fragment of) the list of top scorers. The scoring
56 is based on many aspects of your behavior but a rough estimate is
57 obtained by taking the amount of gold you've found in the cave plus four
58 times your (real) experience. Precious stones may be worth a lot of gold
59 when brought to the exit.
60 There is a 10% penalty for getting yourself killed.
62 The administration of the game is kept in the directory specified with the
64 option, or, if no such option is given, in the directory specified by
65 the environment variable HACKDIR, or, if no such variable exists, in
66 the current directory. This same directory contains several auxiliary
67 files such as lockfiles and the list of top scorers and a subdirectory
69 where games are saved.
70 The game administrator may however choose to install hack with a fixed
71 playing ground, usually /usr/games/lib/hackdir.
75 option suppresses printing of the news.
80 option supplies the answer to the question "Who are you?".
84 .B \-T \-S \-K \-F \-C \-W
85 then this supplies the answer to the question "What kind of character ... ?".
89 option will print out the list of your scores. It may be followed by arguments
91 where X is one of the letters C, F, K, S, T, W to print the scores of
92 Cavemen, Fighters, Knights, Speleologists, Tourists or Wizards.
93 It may also be followed by one or more player names to print the scores of the
96 Jay Fenlason (+ Kenny Woodland, Mike Thome and Jon Payne) wrote the
97 original hack, very much like rogue (but full of bugs).
99 Andries Brouwer continuously deformed their sources into the current
100 version - in fact an entirely different game.
103 .ta \w'data, rumors\ \ \ 'u
104 hack The hack program.
106 data, rumors Data files used by hack.
108 help, hh Help data files.
110 record The list of top scorers.
112 save A subdirectory containing the saved
116 bones_dd Descriptions of the ghost and
118 belongings of a deceased adventurer.
120 xlock.dd Description of a dungeon level.
122 safelock Lock file for xlock.
124 record_lock Lock file for record.
127 .ta \w'HACKPAGER, PAGER\ \ \ 'u
128 USER or LOGNAME Your login name.
130 HOME Your home directory.
134 TERM The type of your terminal.
136 HACKPAGER, PAGER Pager used instead of default pager.
140 MAILREADER Reader used instead of default.
144 HACKOPTIONS String predefining several hack options
149 Several other environment variables are used in debugging (wizard) mode,
150 like GENOCIDED, INVENT, MAGIC and SHOPTYPE.
153 Mail complaints to mcvax!aeb .