


›1mHACK(6)             UNIX Programmer's Manual              HACK(6)›0m



›1mNAME›0m
     hack - Exploring The Dungeons of Doom

›1mSYNOPSIS›0m
     /usr/games/hack [ -d ›4mdirectory›0m ] [ -n ] [ -u ›4mplayername›0m ]

›1mDESCRIPTION›0m
     ›4mHack›0m is a display oriented dungeons & dragons - like game.
     Both display and command structure resemble rogue.  (For a
     game with the same structure but entirely different display
     - a real cave instead of dull rectangles - try Quest.)

     To get started you really only need to know two commands.
     The command ? will give you a list of the available commands
     and the command / will identify the things you see on the
     screen.

     To win the game (as opposed to merely playing to beat other
     people high scores) you must locate the Amulet of Yendor
     which is somewhere below the 20th level of the dungeon and
     get it out.

     When the game ends, either by your death, when you quit, or
     if you escape from the caves, ›4mhack›0m will give you (a fragment
     of) the list of top scorers.  The scoring is based on many
     aspects of your behaviour but a rough estimate is obtained
     by taking the amount of gold you've found in the cave plus
     four times your (real) experience. Precious stones may be
     worth a lot of gold when brought to the exit.  There is a
     10% penalty for getting yourself killed.

     The administration of the game is kept in the directory
     specified with the -d option, or, if no such option is
     given, in the directory specified by the environment vari-
     able ›1mHACKDIR,›0m or, if no such variable exists, in the current
     directory. This same directory contains several auxiliary
     files such as lockfiles and the list of topscorers and a
     subdirectory ›4msave›0m where games are saved.

     The -n option suppresses printing of the news.

     The -u ›4mplayername›0m option supplies the answer to the question
     "Who are you?".  When ›4mplayername›0m has as suffix one of -T -S
     -K -F -C -W then this supplies the answer to the question
     "What kind of character ... ?".

›1mAUTHORS›0m
     Jay Fenlason (+ Kenny Woodland, Mike Thome and Jon Payne)
     wrote the original hack, very much like rogue (but full of bugs).
     Andries Brouwer continuously deformed their sources into the
     current version - in fact an entirely different game.
     John Toebes ported this version to the Amiga.



›1mPrinted 02/23/86        23 February 1986                        1›0m






›1mHACK(6)             UNIX Programmer's Manual              HACK(6)›0m





›1mFILES›0m
     hack                 The hack program
     data, help, rumors   Data files used by hack.
     record               The list of topscorers.
     Saved Games          A subdirectory containing the saved games.
     bones_dd             Descriptions of the ghost and
                          belongings of a deceased adventurer.

›1mBUGS›0m
     Probably infinite.  Mail complaints to:
         John A. Toebes, VIII
         120 H Northington Place
         Cary, NC 27511








































›1mPrinted 02/23/86        23 February 1986                        1›0m
