home *** CD-ROM | disk | FTP | other *** search
-
-
-
- ¢1mHACKLITE(6) UNIX Programmer's Manual HACKLITE(6)¢0m
-
-
-
- ¢1mNAME¢0m
- hacklite - Exploring The Dungeons of Doom
-
- ¢1mSYNOPSIS¢0m
- hacklite2 [ -u ¢4mplayername¢0m ]
- [ -¢4mclass¢0m ] [ -Z[B][¢4mseed¢0m] ]
- [ -I ] [ -n ] [ -s ¢4mplayername¢0m ]
-
- ¢1mDESCRIPTION¢0m
- ¢4mHackLite¢0m is a display-oriented dungeon adventure
- game. Both display and command structure resemble rogue.
-
- To get started you really only need to know two commands.
- The command ? will give you a list of the available commands
- and the command / will identify the things you see on the
- screen.
-
- To win the game (as opposed to merely playing to beat other
- people's high scores) you must locate the Amulet of Yendor
- which is somewhere below the 30th level of the dungeon and
- get it out.
-
- When the game ends, either by your death, when you quit, or
- if you escape from the caves, ¢4mHackLite¢0m will give you (a
- fragment of) the list of top scorers. The scoring is based on
- many aspects of your behavior but a rough estimate is obtained
- by taking the amount of gold you've found in the cave plus
- four times your (real) experience. Precious stones may be
- worth a lot of gold when brought to the exit. There is a
- 10% penalty for getting yourself killed.
-
- The -u ¢4mplayername¢0m option supplies the answer to the question
- "Who are you?". -¢4mclass¢0m may be specified (one of -A, -B, -C,
- -E, -G, -H, -K, -N, -P, -S, -T, -V or -W) to answer to the question
- "What kind of character are you?". -? selects a random character
- class.
-
- The -Z ¢4mseed¢0m option specifies "tournament mode", where the
- specified seed is used to control the generation of levels,
- producing a similar game each time. You can leave out the seed,
- in which case the game selects a seed and displays it, so you can
- play the game again. If you specify -ZB[¢4mseed¢0m], the use
- of "bones" files is suppressed for this game.
-
- The -I options starts a game in "immortal mode", in which you can
- (usually) recover from being killed. There is a substantial score
- penalty for each death, and the number of times you have died is
- recorded in the score file.
-
-
-
-
-
-
-
- ¢1mPrinted 11/28/92 28 November 1992 1¢0m
-
-
-
-
-
-
- ¢1mHACKLITE(6) UNIX Programmer's Manual HACKLITE(6)¢0m
-
-
-
-
-
- The -n option suppresses printing of the news.
-
- The -s ¢4mplayername¢0m option requests a list of the player's high
- scores. To see everyone's scores, specify -s all.
-
- ¢1mAUTHORS¢0m
- Jay Fenlason (+ Kenny Woodland, Mike Thome and Jon Payne)
- wrote the original Hack, very much like rogue (but full of bugs).
- Andries Brouwer continuously deformed their sources into the
- current version - in fact an entirely different game. Don
- Kneller performed the first port to a microcomputer (the IBM PC).
- Alan Beale and John Toebes are responsible for Amiga HackLite,
- which was developed under the auspices of the Software Distillery.
- HackLite has also been influenced by NetHack; use the V command
- to obtain a list of pertinent NetHack authors.
-
- ¢1mFILES¢0m
- hacklite2 The hack program.
- hacklite.cnf Player configuration file.
- data, help, hh, ho, objs, rumors
- Data files used by hack.
- record The list of topscorers.
- bones.dd Descriptions of the ghost and
- belongings of a deceased adventurer.
-
-
-
- ¢1mBUGS¢0m
- Giant ants, giant beetles and killer bees. Report any others to:
-
- Mage of Yendor
- 3750 Jamestown Circle
- Raleigh NC 27609
-
- E-mail: ponds!squink!biljir@dg-rtp.dg.com
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- ¢1mPrinted 11/28/92 28 November 1992 1¢0m
-