📄 hack.6
字号:
.TH HACK 6 "31 March 1985".UC 4.SH NAMEhack \- exploring The Dungeons of Doom.SH SYNOPSIS.B /usr/games/hack[.B \-d.I directory][.B \-n][.B \-u.I playername].br.B /usr/games/hack[.B \-d.I directory].B \-s[.B \-X][.I playernames].SH DESCRIPTION.PP.I Hackis a display oriented dungeons & dragons - like game.Both display and command structure resemble rogue.(For a game with the same structure but entirely different display -a real cave instead of dull rectangles - try Quest.).PPTo get started you really only need to know two commands. The command.B ?will give you a list of the available commands and the command.B /will identify the things you see on the screen..PPTo win the game (as opposed to merely playing to beat other people highscores) you must locate the Amulet of Yendor which is somewhere belowthe 20th level of the dungeon and get it out. Nobody has achieved thisyet and if somebody does, he will probably go down in history as a heroamong heroes..PPWhen the game ends, either by your death, when you quit, or if you escapefrom the caves,.I hackwill give you (a fragment of) the list of top scorers. The scoringis based on many aspects of your behavior but a rough estimate isobtained by taking the amount of gold you've found in the cave plus fourtimes your (real) experience. Precious stones may be worth a lot of goldwhen brought to the exit.There is a 10% penalty for getting yourself killed..PPThe administration of the game is kept in the directory specified with the.B \-doption, or, if no such option is given, in the directory specified bythe environment variable HACKDIR, or, if no such variable exists, inthe current directory. This same directory contains several auxiliaryfiles such as lockfiles and the list of top scorers and a subdirectory.I savewhere games are saved.The game administrator may however choose to install hack with a fixedplaying ground, usually /usr/games/lib/hackdir..PPThe.B \-noption suppresses printing of the news..PPThe.B \-u.I playernameoption supplies the answer to the question "Who are you?".When.I playernamehas as suffix one of.B \-T \-S \-K \-F \-C \-Wthen this supplies the answer to the question "What kind of character ... ?"..PPThe.B \-soption will print out the list of your scores. It may be followed by arguments.B \-Xwhere X is one of the letters C, F, K, S, T, W to print the scores ofCavemen, Fighters, Knights, Speleologists, Tourists or Wizards.It may also be followed by one or more player names to print the scores of theplayers mentioned..SH AUTHORSJay Fenlason (+ Kenny Woodland, Mike Thome and Jon Payne) wrote theoriginal hack, very much like rogue (but full of bugs)..brAndries Brouwer continuously deformed their sources into the currentversion - in fact an entirely different game..SH FILES.DT.ta \w'data, rumors\ \ \ 'uhack The hack program..brdata, rumors Data files used by hack..brhelp, hh Help data files..brrecord The list of top scorers..brsave A subdirectory containing the saved.br games..brbones_dd Descriptions of the ghost and.br belongings of a deceased adventurer..brxlock.dd Description of a dungeon level..brsafelock Lock file for xlock..brrecord_lock Lock file for record..SH ENVIRONMENT.DT.ta \w'HACKPAGER, PAGER\ \ \ 'uUSER or LOGNAME Your login name..brHOME Your home directory..brSHELL Your shell..brTERM The type of your terminal..brHACKPAGER, PAGER Pager used instead of default pager..brMAIL Mailbox file..brMAILREADER Reader used instead of default.br (probably /bin/mail or /usr/ucb/mail)..brHACKDIR Playground..brHACKOPTIONS String predefining several hack options.br (see help file)..brSeveral other environment variables are used in debugging (wizard) mode,like GENOCIDED, INVENT, MAGIC and SHOPTYPE..SH BUGS.PPProbably infinite.Mail complaints to mcvax!aeb .
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -