nethack man page on IRIX

Man page or keyword search:  
man Server   31559 pages
apropos Keyword Search (all sections)
Output format
IRIX logo
[printable version]

NETHACK(6)					       NETHACK(6)

NAME
       nethack - Exploring The Mazes of Menace

SYNOPSIS
       nethack [ -d directory ] [ -n ] [ -p profession (role) ] [
       -r race ] [ -[DX] ] [ -u playername ] [ -dec ] [ -ibm ]

       nethack [ -d directory ] -s [ -v ] [ -p profession (role)
       ] [ -r race ] [ playernames ]

DESCRIPTION
       NetHack	is  a  display	oriented Dungeons & Dragons(tm) -
       like game.  The standard tty display and command structure
       resemble rogue.

       Other,  more  graphical	display	 options exist if you are
       using either a PC, or an X11 interface.

       To get started you really only need to know two	commands.
       The  command ?  will give you a list of the available com-
       mands (as well as other information)  and  the  command	/
       will identify the things you see on the screen.

       To  win	the  game  (as	opposed to merely playing to beat
       other people's high scores) you must locate the Amulet  of
       Yendor which is somewhere below the 20th level of the dun-
       geon and get it out.  Nobody has achieved this  yet;  any-
       body  who  does will probably go down in history as a hero
       among heros.

       When the game ends, whether by your  dying,  quitting,  or
       escaping from the caves, NetHack will give you (a fragment
       of) the list of top scorers.  The scoring is based on many
       aspects of your behavior, but a rough estimate is obtained
       by taking the amount of gold you've found in the cave plus
       four times your (real) experience.  Precious stones may be
       worth a lot of gold when brought to the exit.  There is	a
       10% penalty for getting yourself killed.

       The  environment	 variable  NETHACKOPTIONS  can be used to
       initialize many run-time options.  The ? command	 provides
       a  description of these options and syntax.  (The -dec and
       -ibm command line options are equivalent to the	decgraph-
       ics  and ibmgraphics run-time options described there, and
       are provided purely for convenience on systems  supporting
       multiple types of terminals.)

       Because	the  option  list  can be very long (particularly
       when specifying graphics characters), options may also  be
       included	 in a configuration file.  The default is located
       in your home directory and named .nethackrc on  Unix  sys-
       tems.   On  other  systems,  the default may be different,
       usually NetHack.cnf.  On	 DOS  or  Windows,  the	 name  is
       defaults.nh, while on the Macintosh or BeOS, it is NetHack
       Defaults.  The configuration file's location may be speci-
       fied  by	 setting NETHACKOPTIONS to a string consisting of
       an @ character followed by the filename.

       The -u playername option supplies the answer to the  ques-
       tion  "Who  are	you?".	 It  overrides	any name from the
       options or configuration file, USER,  LOGNAME,  or  getlo-
       gin(), which will otherwise be tried in order.  If none of
       these provides a useful name, the player will be asked for
       one.   Player names (in conjunction with uids) are used to
       identify save files, so you can have several  saved  games
       under  different	 names.	  Conversely,  you  must  use the
       appropriate player name to restore a saved game.

       A playername suffix can be used to specify the profession,
       race,  alignment and/or gender of the character.	 The full
       syntax of the playername that includes a suffix is  "name-
       ppp-rrr-aaa-ggg".  "ppp" are at least the first three let-
       ters of the profession (this can also be specified using a
       separate	 -p  profession	 option).  "rrr" are at least the
       first three letters of the character's race (this can also
       be  specified using a separate -r race option).	"aaa" are
       at last the first three letters of the character's  align-
       ment,  and  "ggg"  are at least the first three letters of
       the character's gender.	Any of the parts  of  the  suffix
       may be left out.

       -p profession can be used to determine the character role.
       You can specify either the male or  female  name	 for  the
       character  role, or the first three characters of the role
       as an abbreviation.  -p @ has been retained to  explicitly
       request	that  a random role be chosen.	It may need to be
       quoted with a backslash (\@) if @ is the "kill"	character
       (see  "stty")  for  the	terminal, in order to prevent the
       current input line from being cleared.

       Likewise, -r race can be used to explicitly request that a
       race be chosen.

       Leaving	out  any  of these characteristics will result in
       you being prompted during the game startup for the  infor-
       mation.

       The -s option alone will print out the list of your scores
       on the  current	version.   An  immediately  following  -v
       reports on all versions present in the score file.  The -s
       may also be followed by arguments -p and -r to  print  the
       scores of particular roles and races only.  It may also be
       followed by one or more player names to print  the  scores
       of  the	players	 mentioned,  by	 'all'	to  print out all
       scores, or by a number to print that many top scores.

       The -n option suppresses printing of  any  news	from  the
       game administrator.

       The  -D or -X option will start the game in a special non-
       scoring discovery mode.	-D will, if  the  player  is  the
       game  administrator,  start  in	debugging  (wizard)  mode
       instead.

       The -d option, which must be  the  first	 argument  if  it
       appears,	 supplies  a  directory	 which is to serve as the
       playground.  It overrides the value from NETHACKDIR, HACK-
       DIR,  or the directory specified by the game administrator
       during  compilation  (usually  /usr/games/lib/nethackdir).
       This option is usually only useful to the game administra-
       tor.  The playground must contain several auxiliary  files
       such  as help files, the list of top scorers, and a subdi-
       rectory save where games are saved.

AUTHORS
       Jay Fenlason (+ Kenny Woodland, Mike Thome and Jon  Payne)
       wrote the original hack, very much like rogue (but full of
       bugs).

       Andries Brouwer continuously deformed their  sources  into
       an entirely different game.

       Mike  Stephenson	 has continued the perversion of sources,
       adding various warped character classes and sadistic traps
       with  the  help	of many strange people who reside in that
       place between the worlds, the Usenet Zone.   A  number  of
       these  miscreants  are immortalized in the historical roll
       of dishonor and various other places.

       The resulting mess is now called NetHack,  to  denote  its
       development  by the Usenet.  Andries Brouwer has made this
       request for the distinction, as he may eventually  release
       a new version of his own.

FILES
       All    files    are    in    the	   playground,	 normally
       /usr/games/lib/nethackdir.  If DLB was defined during  the
       compile,	 the data files and special levels will be inside
       a larger file, normally nhdat, instead of  being	 separate
       files.
       nethack			   The program itself.
       data, oracles, rumors	   Data files used by NetHack.
       options, quest.dat	   More data files.
       help, hh			   Help data files.
       cmdhelp, opthelp, wizhelp   More help data files.
       *.lev			   Predefined special levels.
       dungeon			   Control  file for special lev-
       els.
       history			   A short history of NetHack.
       license			   Rules  governing   redistribu-
       tion.
       record			   The list of top scorers.
       logfile			   An extended list of games
				   played.
       xlock.nnn		   Description	 of   a	  dungeon
       level.
       perm			   Lock file for xlock.dd.
       bonesDD.nn		   Descriptions of the ghost and
				   belongings of a deceased
				   adventurer.
       save			   A subdirectory containing the
				   saved games.

ENVIRONMENT
       USER or LOGNAME	    Your login name.
       HOME		    Your home directory.
       SHELL		    Your shell.
       TERM		    The type of your terminal.
       HACKPAGER or PAGER   Replacement for default pager.
       MAIL		    Mailbox file.
       MAILREADER	    Replacement for default reader
			    (probably	     /bin/mail	       or
       /usr/ucb/mail).
       NETHACKDIR	    Playground.
       NETHACKOPTIONS	    String predefining several NetHack
			    options.

       In  addition, SHOPTYPE is used in debugging (wizard) mode.

SEE ALSO
       dgn_comp(6), lev_comp(6), recover(6)

BUGS
       Probably infinite.

       Dungeons & Dragons is a Trademark of Wizards of the Coast,
       Inc.

			  9 August 2002		       NETHACK(6)
[top]

List of man pages available for IRIX

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net