xref: /dragonfly/games/hack/hack.6 (revision c03f08f3)
1.\" $FreeBSD: src/games/hack/hack.6,v 1.2.8.1 2001/07/22 11:01:22 dd Exp $
2.\" $DragonFly: src/games/hack/hack.6,v 1.3 2007/03/11 19:05:31 swildner Exp $
3.Dd March 31, 1985
4.Dt HACK 6
5.Os
6.Sh NAME
7.Nm hack
8.Nd exploring The Dungeons of Doom
9.Sh SYNOPSIS
10.Nm
11.Op Fl d Ar directory
12.Op Fl n
13.Op Fl u Ar playername
14.Nm
15.Op Fl d Ar directory
16.Op Fl s
17.Op Fl X
18.Op Ar playername ...
19.Sh DESCRIPTION
20.Nm
21is a display oriented dungeons \*[Am] dragons-like game.
22Both display and command structure resemble rogue.
23(For a game with the same structure but entirely different display -
24a real cave instead of dull rectangles - try Quest.)
25.Pp
26To get started you really only need to know two commands.
27The command
28.Ic \&?
29will give you a list of the available commands and the command
30.Ic /
31will identify the things you see on the screen.
32.Pp
33To win the game (as opposed to merely playing to beat other people's high
34scores) you must locate the Amulet of Yendor which is somewhere below
35the 20th level of the dungeon and get it out.
36Nobody has achieved this yet and if somebody does, he will probably go
37down in history as a hero among heroes.
38.Pp
39When the game ends, either by your death, when you quit, or if you escape
40from the caves,
41.Nm
42will give you (a fragment of) the list of top scorers.
43The scoring is based on many aspects of your behavior but a rough estimate
44is obtained by taking the amount of gold you've found in the cave plus four
45times your (real) experience.
46Precious stones may be worth a lot of gold when brought to the exit.
47There is a 10% penalty for getting yourself killed.
48.Pp
49The administration of the game is kept in the directory specified with the
50.Fl d
51option, or, if no such option is given, in the directory specified by
52the environment variable
53.Ev HACKDIR ,
54or, if no such variable exists, in the current directory.
55This same directory contains several auxiliary files such as lockfiles and
56the list of topscorers and a subdirectory
57.Pa save
58where games are saved.
59The game administrator may however choose to install hack with a fixed
60playing ground, usually
61.Pa /var/games/hackdir .
62.Pp
63The
64.Fl n
65option suppresses printing of the news.
66.Pp
67The
68.Fl u Ar playername
69option supplies the answer to the question "Who are you?".
70When
71.Ar playername
72has as suffix one of
73.Em -T ,
74.Em -S ,
75.Em -K ,
76.Em -F ,
77.Em -C ,
78or
79.Em -W ,
80then this supplies the answer to the question "What kind of character ... ?".
81.Pp
82The
83.Fl s
84option will print out the list of your scores.
85It may be followed by arguments
86.Fl X
87where X is one of the letters C, F, K, S, T, W to print the scores of
88Cavemen, Fighters, Knights, Speleologists, Tourists or Wizards.
89It may also be followed by one or more player names to print the scores of the
90players mentioned.
91.Sh ENVIRONMENT
92.Bl -tag -width 24n -compact
93.It Ev USER No or Ev LOGNAME
94Your login name.
95.It Ev HOME
96Your home directory.
97.It Ev SHELL
98Your shell.
99.It Ev TERM
100The type of your terminal.
101.It Ev HACKPAGER, PAGER
102Pager used instead of default pager.
103.It Ev MAIL
104Mailbox file.
105.It Ev MAILREADER
106Reader used instead of default (probably
107.Pa /usr/bin/mail ) .
108.It Ev HACKDIR
109Playground.
110.It Ev HACKOPTIONS
111String predefining several hack options (see help file).
112.El
113.Pp
114Several other environment variables are used in debugging (wizard) mode,
115like
116.Ev GENOCIDED ,
117.Ev INVENT ,
118.Ev MAGIC
119and
120.Ev SHOPTYPE .
121.Sh FILES
122.Bl -tag -width 24n -compact
123.It Pa hack
124The hack program.
125.It Pa data, rumors
126Data files used by hack.
127.It Pa help, hh
128Help data files.
129.It Pa record
130The list of topscorers.
131.It Pa save
132A subdirectory containing the saved games.
133.It Pa bones_dd
134Descriptions of the ghost and belongings of a deceased adventurer.
135.It Pa xlock.dd
136Description of a dungeon level.
137.It Pa safelock
138Lock file for xlock.
139.It Pa record_lock
140Lock file for record.
141.El
142.Sh AUTHORS
143Jay Fenlason (+ Kenny Woodland, Mike Thome and Jon Payne) wrote the
144original hack, very much like rogue (but full of bugs).
145.Pp
146Andries Brouwer continuously deformed their sources into the current
147version - in fact an entirely different game.
148.Sh BUGS
149Probably infinite.
150Mail complaints to mcvax!aeb .
151