home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Fatal Distractions!
/
fataldistractions.bin
/
chap02
/
hacklite
/
hack.man
< prev
next >
Wrap
Text File
|
1992-12-19
|
4KB
|
130 lines
¢1mHACKLITE(6) UNIX Programmer's Manual HACKLITE(6)¢0m
¢1mNAME¢0m
hacklite - Exploring The Dungeons of Doom
¢1mSYNOPSIS¢0m
hacklite2 [ -u ¢4mplayername¢0m ]
[ -¢4mclass¢0m ] [ -Z[B][¢4mseed¢0m] ]
[ -I ] [ -n ] [ -s ¢4mplayername¢0m ]
¢1mDESCRIPTION¢0m
¢4mHackLite¢0m is a display-oriented dungeon adventure
game. Both display and command structure resemble rogue.
To get started you really only need to know two commands.
The command ? will give you a list of the available commands
and the command / will identify the things you see on the
screen.
To win the game (as opposed to merely playing to beat other
people's high scores) you must locate the Amulet of Yendor
which is somewhere below the 30th level of the dungeon and
get it out.
When the game ends, either by your death, when you quit, or
if you escape from the caves, ¢4mHackLite¢0m will give you (a
fragment of) the list of top scorers. The scoring is based on
many aspects of your behavior but a rough estimate is obtained
by taking the amount of gold you've found in the cave plus
four times your (real) experience. Precious stones may be
worth a lot of gold when brought to the exit. There is a
10% penalty for getting yourself killed.
The -u ¢4mplayername¢0m option supplies the answer to the question
"Who are you?". -¢4mclass¢0m may be specified (one of -A, -B, -C,
-E, -G, -H, -K, -N, -P, -S, -T, -V or -W) to answer to the question
"What kind of character are you?". -? selects a random character
class.
The -Z ¢4mseed¢0m option specifies "tournament mode", where the
specified seed is used to control the generation of levels,
producing a similar game each time. You can leave out the seed,
in which case the game selects a seed and displays it, so you can
play the game again. If you specify -ZB[¢4mseed¢0m], the use
of "bones" files is suppressed for this game.
The -I options starts a game in "immortal mode", in which you can
(usually) recover from being killed. There is a substantial score
penalty for each death, and the number of times you have died is
recorded in the score file.
¢1mPrinted 11/28/92 28 November 1992 1¢0m
¢1mHACKLITE(6) UNIX Programmer's Manual HACKLITE(6)¢0m
The -n option suppresses printing of the news.
The -s ¢4mplayername¢0m option requests a list of the player's high
scores. To see everyone's scores, specify -s all.
¢1mAUTHORS¢0m
Jay Fenlason (+ Kenny Woodland, Mike Thome and Jon Payne)
wrote the original Hack, very much like rogue (but full of bugs).
Andries Brouwer continuously deformed their sources into the
current version - in fact an entirely different game. Don
Kneller performed the first port to a microcomputer (the IBM PC).
Alan Beale and John Toebes are responsible for Amiga HackLite,
which was developed under the auspices of the Software Distillery.
HackLite has also been influenced by NetHack; use the V command
to obtain a list of pertinent NetHack authors.
¢1mFILES¢0m
hacklite2 The hack program.
hacklite.cnf Player configuration file.
data, help, hh, ho, objs, rumors
Data files used by hack.
record The list of topscorers.
bones.dd Descriptions of the ghost and
belongings of a deceased adventurer.
¢1mBUGS¢0m
Giant ants, giant beetles and killer bees. Report any others to:
Mage of Yendor
3750 Jamestown Circle
Raleigh NC 27609
E-mail: ponds!squink!biljir@dg-rtp.dg.com
¢1mPrinted 11/28/92 28 November 1992 1¢0m