home *** CD-ROM | disk | FTP | other *** search
-
-
-
-
-
-
- /-\
- |@| You are being digested by a mysterious monster --More--
- \-/
-
-
- Welcome to ....
-
-
- PC HACK version 1.03 for MSDOS(tm) computers
- --------------------------------------------
-
- by Don Kneller
- 2 Panoramic Way #204
- Berkeley, CA 94704
- October 30, 1985
-
-
- Introduction
- ------------
-
- HACK is a display oriented dungeons and dragons type game. It is
- similar in style to ROGUE played on UNIX(tm) systems but HACK is much
- richer in character. HACK has many more monsters and highly varied magic.
- The motivation in HACK is to descend through the dungeon to find the Amulet
- of Yendor, then return to the surface. As you travel you will meet various
- creatures (most of them nasty), find objects (some having magical proper-
- ties), and experience many hazards in the dungeon itself.
-
- PC HACK is the MSDOS version of UNIX HACK which was originally written
- by several people at the Stichting Mathematisch Centrum in Amsterdam. This
- MSDOS version is called PC HACK v1.03. To distinguish it from previous
- versions of PC HACK, the important file names have the number 103 in them.
- For example, the executable file is called HACK103.EXE.
-
- For all those who have played HACK on UNIX, this is a complete version
- 1.03 with a few enhancements:
-
- 1) You can specify the characters used to draw the dungeon instead of
- the -|+#. See the GRAPHICS variable below.
-
- 2) If your computer is IBM BIOS compatible, the numeric keypad can be
- used for moving as well as the usual "yuhjklbn" keys. Also, a
- faster screen redrawing method is used for BIOS compatible
- computers. See the option "BIOSok".
-
- 3) New options available through the 'O' command.
- "confirm" If you try to hit tame or peaceful monsters (like
- your dog) HACK asks for confirmation.
-
- "silent" You can turn off the bell for a quieter game.
-
- "sortpack" Your pack can be sorted by object class (ie. all
- weapons will be displayed together.
-
- "packorder" The order to sort your pack in can be specified.
-
-
-
-
-
- PC HACK v1.03 Page 2
-
-
-
-
- "pickup" Rather than always picking up objects you step on,
- you can change the option "pickup" so you only look
- at what is below you. Handy for scare monster
- scrolls and avoiding picking up dead cockatrices.
- Also handy for looking around in shops without
- picking items up.
-
- "BIOSok" If your computer is IBM BIOS compatible, you can use
- the numeric keypad for moving.
-
- "Confirm", "sortpack", and "pickup" are ON by default.
-
- 4) There is a more than one way to counter cockatrices -- it is no
- longer instant death when they hiss at you.
-
- 5) Floppy, HardDisk and RAMdisk support. Protection from disk full
- problems.
-
-
- Major changes from PC HACK 1.0.1E:
- ----------------------------------
-
- All PC HACK v1.03 files are incompatible with v1.0.1E. None of the
- old bones files will work. The score file has been changed also. You
- should remove all your old files. For people who have PC HACK 1.02, the
- same thing applies -- remove all your old files.
-
- Configuration -- only one environment variable is used now due to the
- severly limited size of environment space available under MSDOS. The rest
- of the configuration comes from a configuration file. See the environment
- variable HACKDIR below.
-
- This version uses the ANSI.SYS driver! You must install ANSI.SYS to use
- this version. In your CONFIG.SYS file you must have a line like:
-
- DEVICE = ANSI.SYS
-
- Actually, using ANSI makes that game look more like the UNIX version
- because of IO buffering.
-
- HACK v1.03 uses time and date information in the game. You should set
- the time and date when you boot up MSDOS.
-
-
- Commands new to HACK v1.03 (both UNIX and PC versions):
- -------------------------------------------------------
-
- e 'eat' now lets you eat something you're standing on; you no longer
- have to be able to pick something up before you eat it.
-
- I selective inventories. For example I= shows which rings you have
- in your inventory.
-
- : look at what you're standing on without picking it up.
-
-
-
-
-
-
-
- PC HACK v1.03 Page 3
-
-
-
-
- # lets you enter an extended command. The only ones are "dip" and
- "pray". Dip lets you put objects in potions. Pray doesn't do
- anything except take up some of your time.
-
-
- Commands new to PC HACK:
- ------------------------
-
- @ Toggles the "pickup" option so you don't have to do "O pickup" and
- "O !pickup".
-
- ! Starts up another COMMAND.COM if you have enough memory and a valid
- COMSPEC.
-
-
- System requirements
- -------------------
-
- To play PC HACK you need the following:
-
- 1) MSDOS computer running MSDOS (or PCDOS) 2.0 or greater.
-
- 2) The ANSI.SYS driver must be installed.
-
- 3) 320K ram or more
-
- 4) 2-360K floppies or a hard disk
-
-
- Configuration of HACK for your MSDOS computer.
- ----------------------------------------------
-
- The configuration of HACK is controlled by one environment variable,
- HACKDIR, and a configuration file HACK103.CNF. HACKDIR is the directory
- name of the place where all support files go. The support files are:
-
- HELP
- A description of commands and options.
-
- HH
- An abridged version of the above.
-
- DATA
- Information about monsters and objects in the game.
-
- RECORD
- The score file (it may be empty, but it should exist). The top
- score for each name and player class are saved, but only the top
- 100 scores are kept.
-
- RUMORS
- Fortune cookie messages (some are true, some are not).
-
- HACK103.CNF
- The PC HACK configuration file.
-
-
-
-
-
-
- PC HACK v1.03 Page 4
-
-
-
-
- The value of HACKDIR can be set in your AUTOEXEC.BAT file. For
- example, you could have the line:
-
- set HACKDIR=c:\games\hack
-
- then HACK would expect the above support files to be in the \games\hack
- directory on drive C: If environment variable HACKDIR is not set, HACK
- assumes all support files are in the current directory.
-
- Additional configuration comes from the HACK103.CNF file. Look at
- this file for some sample configurations for both a 2 floppy system and a
- hard disk system.
-
- The important variables in the HACK103.CNF file are:
-
-
- LEVELS
- ------
-
- This is the directory where some of the level files get left as bones
- files (a description of previous games). Also, if the RAMDISK variable is
- not set, this is the directory where temporary level files are made.
-
- example: LEVELS=C:\games\hack
- default: the HACKDIR directory
-
- This path can be absolute or relative to the HACKDIR directory.
-
-
- SAVE
- ----
-
- This is the directory where any saved games will be kept.
-
- example: SAVE=c:\games\hack
- default: the HACKDIR directory
-
- If your player name is JOE, and the SAVE variable is C:\games\hack,
- then your saved game will be in C:\games\hack\joe.sav. The path can be
- absolute or relative to the HACKDIR directory.
-
- If you append ";noprompt" or just ";n" to the name of the save path,
- the program won't prompt you to insert the diskette used for saving. This
- is useful if you have a hard disk.
-
- example: SAVE=;n
-
-
- RAMDISK
- -------
-
- This is the directory where your RAMdisk is.
-
- example: RAMDISK=D:
- default: none
-
-
-
-
-
-
- PC HACK v1.03 Page 5
-
-
-
-
- Before starting HACK, the bones files from previous games are copied from
- LEVELS to RAM. After finishing HACK, the bones files are copied back.
- Since PC HACK checks the free disk space on the RAMdisk (and on the LEVEL
- disk), and warns you when you're running out, you should play with a
- RAMdisk if you have the extra memory. Even a RAMdisk as small as 100K
- bytes is very effective in speeding up the game. To override the RAMDISK
- variable, use the -R command line option.
-
-
- GRAPHICS
- --------
-
- This is a new feature for PC HACK v1.03. Rather than use -, |, +, #
- for drawing the dungeon you can use any characters from the character set.
- The GRAPHICS variable has 9 arguments that describe the the rooms and
- corridors. The arguments are all integers in the range from 0 to 255 and
- correspond to the ASCII values of the characters you want to use. The
- order of the variables is:
-
- vertical wall, horizontal wall, top left corner, top right corner,
- bottom left corner, bottom right corner, door, floor, corridor
-
- The HACK103.CNF file has an example of the use of this variable for
- drawing the dungeon in IBM graphics characters. Check the BASIC manual
- pages G-4,5 for a complete list of the character set and their ASCII
- values.
-
- example: GRAPHICS = 179 196 218 191 192 217 206 250 176
- default: ASCII equivalents of characters: | - - - - - + . #
-
-
- OPTIONS
- -------
-
- Determines many smaller aspects of the game. There are two kinds of
- options:
-
- 1) boolean, which can be either TRUE or FALSE
- 2) compound, which has a value or several values.
-
- Options can be set before the game in the HACK103.CNF file and can be
- modified during the game with the 'O' command. You can change several
- options at a time by separating the options with commas.
-
- As an example, a boolean option is "sortpack". To turn it ON, do
- 'O sortpack' while playing or have an "OPTIONS=sortpack" line in your
- HACK103.CNF file. To turn it OFF, do 'O !sortpack' while playing or have
- "OPTIONS=!sortpack" in your HACK103.CNF file. Generally, 4 characters are
- sufficient to identify the option, so 'O sort' is the same as 'O sortpack'.
-
- An example of a compound option is "packorder". To change the
- ordering of the pack when it is displayed in an inventory, you might do
- 'O pack:%)!?'. Alternatively, have an "OPTIONS=pack:%)!?" line in your
- HACK103.CNF file. The compound option "name" can only be set in your
- HACK103.CNF file. Also, "name" should not have any spaces in it and will
- be truncated to 10 characters in the RECORD file.
-
-
-
-
-
- PC HACK v1.03 Page 6
-
-
-
-
- When playing, type 'O help<RETURN>' to get a little help on these
- options. The HELP file has a short description of all options.
-
-
- Options new to HACK v1.03 (both UNIX and PC version)
- ----------------------------------------------------
-
- fixinv
- Whenever possible, once an object has a particular inventory letter
- (ie. you've had it in your pack), it keeps that letter even if you
- put it down and pick it up again. By default, TRUE
-
-
- Options only in PC HACK v1.03
- -----------------------------
-
- confirm
- Whether you want confirmation before hitting tame monsters. This
- can be very helpful if you have the problem that you hit your dog
- and the shopkeepers by accident. If you are blind or confused,
- though, you don't get this protection! By default, TRUE.
-
- silent
- If this is TRUE, the bell doesn't ring when you make an input
- error. By default, FALSE.
-
- sortpack
- Whether your pack should be ordered by object class when listed in
- an inventory. By default, TRUE.
-
- packorder
- The order to display your inventory in. By default, ")[%?/=!(*0
- To change the order, use 'O pack:<new order>' where <new order> is
- a set of characters representing the various object types. For
- example, if you do 'O pack:)[/=' then when you do an inventory with
- the 'i' command your pack will be displayed with weapons ')' first,
- then armor '[', then wands '/' then rings '='.
-
- Note that the default packorder has more letters than the example
- given here. As in this example, if you don't give a letter for
- each object type, the other object types are automatically filled
- in. Thus the next objects in your pack will be amulets '"', then
- food '%', then scrolls '?', potions '!', etc.
-
- pickup
- Whether you pick up things you step on. If pickup is FALSE, you
- can look at things you step on without picking them up. This
- option can be toggled between TRUE and FALSE with the '@' command.
-
- By default, TRUE.
-
-
-
-
-
-
-
-
-
-
-
- PC HACK v1.03 Page 7
-
-
-
-
- BIOSok
- If TRUE, you will be able to use the numeric pad for movement. The
- translation from numeric pad keys to keyboard keys is:
-
- Numeric Pad Keyboard
- 7 8 9 - y k u m
- \ | / \ | /
- 4 -5- 6 + to h -.- l p
- / | \ / | \
- 1 2 3 b j n
- Ins Del i :
-
- The '7' on the numeric pad is translated to a 'y', which is the
- keyboard key for moving diagonally up and left. Shift and
- NumLock modify the translation like this:
-
- Numeric Pad: 7 8 9 - 4 5 6 + 1 2 3 Ins Del
- no Shift or Numlock: y k u m h @ l p b j n i :
- Numlock: y k u m h . l p b j n i :
- Shift: Y K U ^P H . L P B J N I ,
- Shift + NumLock: ^Y ^K ^U ^P ^H @ ^L P ^B ^J ^N I ,
-
- '^' means control, so '^H' is control-H. '@' means no character
- occurs. With DOS 2.0, unshifted 5 does not produce a scan code.
- If you enable NumLock, you will be able to use an unshifted-5 to do
- a '.' (the wait command). If you use the numeric pad for moving
- around, you will probably want to enable NumLock.
-
- As well, if BIOSok is TRUE a faster method for redrawing the screen
- will be used. The faster method uses a BIOS interrupt so may not
- be work with all MSDOS machines. It certainly works for IBMs.
-
- By default, FALSE.
-
- To play the "exact" UNIX version your options should be:
- OPTIONS=!confirm,!sortpack
-
-
- Sample configurations
- ---------------------
-
- Hard disk system:
- SAVE=;n (;n -- no prompt required)
- RAMDISK=d:
- OPTIONS=name:Bert-C, silent
- - notice that no LEVELS variable was set. PC HACK will then
- default to the same directory as HACKDIR. Bert-C means your name
- is "Bert" and you'll play as a cave-person.
-
- Two floppy systems:
- SAVE=a:\
- LEVELS=b:\
- RAMDISK=c:
- OPTIONS=name:Gerty-T, female, silent, time
-
-
-
-
-
-
-
- PC HACK v1.03 Page 8
-
-
-
-
- If you make a bootable disk (by using format /s) and put HACK103.EXE
- and its support files on it, then use it in drive A whenever you want to
- play HACK. The savefile will then also be on drive A and the level files
- will be on drive B. You will be prompted to put in the disk with the
- savefile on it at the appropriate moments. When the game starts, it will
- copy the bones files from drive B (the LEVELS directory) onto the RAMdisk,
- then use the RAMdisk for the temporary level files.
-
- It is possible to use the same diskette for storing bones files and
- for saving games since PC HACK checks if there is enough room in the SAVE
- directory before trying to write out the saved game. If there is not
- enough room, you can change diskettes. However, if you have to change
- diskettes, the diskette you're removing MUST NOT have the level files on
- it! In order to save a game, PC HACK must have access to the save file and
- all the level files at the same time.
-
- This means that if you are using a RAMdisk for the level files it is
- safe for you to use the same diskette for both bones and saved games since
- even if the saved game would be too big for this diskette you can change to
- another diskette. The advantage of using the same diskette is that you
- won't have to keep swapping diskettes whenever HACK tries to find a save
- file. If you want to try this, your HACK103.CNF file should look something
- like:
-
- LEVELS=b:\
- SAVE=b:\ (perhaps with ;n for no prompting)
- RAMDISK=c: (You MUST have a RAMdisk)
- OPTIONS=whatever
-
- If you don't have enough extra memory for a RAMdisk, or you want to
- keep several saved games on several floppies, please use separate floppies
- for the game diskette (HACK103.EXE and support files), for the levels and
- bones diskette, and for the save diskette. Start with:
-
- GAME DISK: COMMAND.COM, HACK103.EXE, HACK103.CNF,
- RUMORS, DATA, HELP, HH, RECORD
- others (autoexec.bat, config.sys, etc)
- LEVELS DISK: empty (or with previous bones files)
- SAVE DISK: empty
-
-
- NOTES for all systems:
- ----------------------
-
- The environment variable HACKDIR is the directory that HACK103.CNF
- must be found in. If there is no value for HACKDIR, it is assumed
- HACK103.CNF will be found in the current directory.
-
- Games are saved in the SAVE directory with filename NAME.sav where
- NAME refers to name you are using to play. Thus it is possible to have
- several games saved under different names provided you have enough disk
- space.
-
- You can put HACK103.EXE anywhere, preferable on your PATH so you don't
- have to change directories to play. When PC HACK starts up, it uses
- HACKDIR to find the files it needs.
-
-
-
-
-
- PC HACK v1.03 Page 9
-
-
-
-
- Since PC HACK checks how much memory is available on a disk before
- trying to write to it, even a relatively small RAMdisk can be used to
- greatly speed up the game. A reasonable size might be:
-
- (size of all bones files) + about 60K
-
- This will let you get to about level 10 in the dungeon. PC HACK will warn
- you when it's running out of disk space (which happens if you get deep into
- the dungeon). At this time you should save the game, then restart with the
- -R command line option which tells PC HACK not to use the RAMdisk.
-
-
- How to play HACK -- command line options
- ----------------------------------------
-
- PC HACK v1.03 has several command line options:
-
- -u name
- Specifies the name to use other than the value of the OPTIONS name.
-
- ex: A> hack103 -uTerminator
- or A> hack103 -u Terminator
-
- You can append -C, -W, -S, -F, -K, or -T to the name to select the
- type of character you want to be.
-
- ex: A> hack103 -uTerminator-T
-
- This means you will play with the name Terminator and you will be a
- Knight.
-
- -C, -W, -S, -F, -K, or -T
- Select the character you will be playing as. This option can be
- lower or upper case (except for -S which must be upper). Thus:
-
- A> hack103 -T
-
- means get your name from the OPTIONS line in the HACK103.CNF file,
- and play as a tourist. If PC HACK can't get your name from the
- HACK103.CNF file, you will be asked "Who are you?".
-
- -s [name]
- List the scores of the person with this name. If the name is not
- given, uses the value of the OPTIONS name. If the name is "all",
- list all scores in the record file. You can erase the contents of
- the record file if you wish, but there must be a record file in
- your HACKDIR directory if you want PC HACK to keep track of scores.
-
- -R
- This tells PC HACK to ignore the RAMDISK variable in HACK103.CNF.
- This option is useful for restarting a saved game after PC HACK
- warned you it was running out of disk space and you saved the game.
-
- ex: A> hack103 -uFuzzy -R
-
- means let my name be "Fuzzy" and play without using a RAMdisk.
-
-
-
-
-
- PC HACK v1.03 Page 10
-
-
-
-
- Once you have started PC HACK, type a '?' to get help on the
- available commands. Long help will show you the HELP file, short help will
- show you the HH file. You can also print the HELP file and keep it for a
- handy reference. Other useful commands are '/' which describes the things
- you see on the screen, and '\' which shows you which objects have been
- discovered so far.
-
-
- Scoring
- -------
-
- When the game ends, either by your death, when you quit, or if you
- escape from the caves, HACK will give you (a fragment of) the list of top
- scorers. The scoring is based on many aspects of your behavior but a rough
- estimate is obtained by taking the amount of gold you've found in the cave
- plus four times your (real) experience. Precious gems may be worth a lot
- of gold when brought to the exit. There is a 10% penalty for getting
- yourself killed.
-
-
- Hints for beginner HACKERS
- --------------------------
-
- HACK is a Dungeons and Dragons like game where the object is to
- descend into a dungeon to retrieve the Amulet of Yendor and return to the
- surface. Along the way you will find many items and monsters and you will
- have to learn how to deal with each thing.
-
-
- Your character
-
- You can be one of several character classes when you start the game.
- Each character starts with different attributes (strength, hit points) and
- a different inventory of items (armor, weapons, etc). You should try the
- differect classes to see which is best for you. The class most likely to
- survive the first few dungeon levels is probably the cave-person. However,
- each class has its strong and weak points so you should try them all.
-
-
- The status line
-
- At the bottom of the screen is displayed information about your state
- of being. You see the dungeon level you are on, how many hit points you
- have now (and will have when fully recovered), what your armor class is
- (the lower the better), your strength, experience level and the state of
- your stomach. If you have the "time" option ON, you will also see the
- number of moves you have taken.
-
-
- The little dog
-
- You start out being accompanied by a little dog (nameable with the 'C'
- command) who can be very useful to you -- try not to kill him! Your dog
- will follow you to some extent -- if you carry tripe rations, he will
- follow you even better. Sometimes he gets in your way. Either move around
- him, or wait (with the '.' command) until he moves. If you want him to
-
-
-
-
-
- PC HACK v1.03 Page 11
-
-
-
-
- follow you to the next dungeon level, he must be on a square next to you
- when you descend or ascend the stairs. Sometimes he gets hungry and
- confused and hits you. You can feed him by throwing food at him with the
- 't' command.
-
- Your dog may get mad at you if you move to a different dungeon level
- without taking him with you. Although he may not hit you, he won't help
- you either. You'll have to appease him somehow.
-
- Your dog is useful for his fighting ability and because he can pick up
- and carry objects. Of course, your dog might be a female, so change all
- "he" and "him" to "she" and "her".
-
-
- The dungeon
-
- The dungeon is an interconnected system of rooms and corridors. The
- rooms have doors that lead to the corridors. You must walk straight
- through a door -- no diagonals allowed. Some doors (and some corridors)
- are hidden and you must search for them (with the 's' command). Usually
- you must search several times, so use a repeat count (eg '5s'). Some rooms
- are special and have no doors or connecting corridors. There is a way to
- get in, though, but you will have to experiment.
-
- Some rooms have special contents -- some are shops (but be aware that
- the shopkeeper expects payment (the 'p' command) for the items you get
- there) and some are zoos, full of interesting monsters. Some rooms are lit
- and you can see the entire room, and some rooms are dark so you can see
- only the floor near you.
-
-
- Monsters
-
- To fight monsters, move to occupy the same square they are in. You
- can also throw things at them, or zap them with wands. It is best to leave
- some monsters alone.
-
-
- Objects
-
- The objects you find may be enchanted (that's good) or cursed (that's
- bad) or normal. Cursed items are generally less effective than normal and
- also, once you have them on your body they are impossible to remove unless
- you remove their curse. You use different objects in different ways:
-
- ) WEAPONS are wielded ('w') or thrown ('t')
- Some weapons are more effective when used together. For example,
- you get more effect by wielding a bow before throwing arrows.
- 'w-' means to wield nothing; ie. be barehanded
-
- [ ARMOR is worn ('W') and taken off ('T')
- You can wear more than 1 piece of armor, but there are some
- restrictions on the combinations. For example, you can only wear 1
- SUIT of armor, but you can always wear an elven cloak.
-
- ! POTIONS are quaffed ('q')
-
-
-
-
-
- PC HACK v1.03 Page 12
-
-
-
-
- = RINGS are put on ('P') and removed ('R')
- You only can only wear 2 rings at a time, one on each hand. Also,
- wearing rings makes you to use up more food, so use them sparingly.
-
- / WANDS are zapped ('z')
- Some wands need a direction to be zapped in, but others do not.
-
- ? SCROLLS are read ('r')
-
- ( TOOLS are applied ('a')
- For example, to use a whistle, you apply it.
-
- Initially you will not know what the potions, rings, wands or scrolls
- do until you use them. They will have names like "XIXIXI". Some of these
- objects are identified as soon as you use them (for example, a scroll of
- light causes a dark room to be lit).
-
- Other objects have no noticeable effect. If it's not immediately
- obvious what a scroll or potion does the first time you use it, you may be
- asked to give it a name. HACK does this so that if you have an idea about
- what the object does you can name it something appropriate so the next time
- you find it you will know something about it. Whenever HACK asks for a
- name it is possible to use ^H or back-arrow to erase the previous
- character, ^U to erase the entire line, and <Esc> to quit without supplying
- a name.
-
- Using some objects gives a message like "You have a strange feeling
- for a moment, but it passes". This means the object would have done
- something but couldn't do it now (for example, some scrolls affect your
- weapon, but if you're not wielding a weapon you'll get this message).
-
- The call command 'c' can be used to name individual objects, or all
- objects of a certain type. When you do a 'c', HACK asks if you want to
- name an individual object. Answer 'y' if you do and 'n' if you want to
- name all objects of the same type. Then HACK will prompt you for the
- inventory letter of the object you want to name. For example, if you put
- on a silver ring that has inventory letter 's' and notice your strength
- increases by two then you do:
-
- 'c' 'n' 's' 'strength<return>'
- (call all objects with the same type as item 's' "strength").
-
- then 'c' 'y' 's' '+2<return>'
- (call individual inventory item 's' "+2")
-
- When you do an inventory you will see
-
- s) a ring called strength named +2
-
- The next time you pick up a silver ring it will be called strength so you
- will know what it does. However, you will not know if it will increase or
- decrease your strength! You will have to put it on to find out or you will
- have to identify it.
-
-
-
-
-
-
-
-
- PC HACK v1.03 Page 13
-
-
-
-
- Cursed objects
-
- Rings, armor, and weapons can be cursed -- if you put them on or wield
- them, you will not be able to take them off or wield something else. If
- you enchant an object, it will be better than it was before. Enchanting
- armor changes your armor class by 1 (eg. you could go from an armor class
- of 7 to a class of 6 -- the less positive the number, the better the armor
- class, as in Dungeons and Dragons). For weapons, the more positive the
- number, the better. Thus a +2 mace is better than a +1 mace. Some armor
- is better than others -- normal plate mail is better than normal ring mail.
-
- Cursed rings can be a severe problem because it is not possible to
- remove them and they cause you to use up food faster.
-
-
- Identifying objects
-
- The scroll of identify will help you to identify many objects, but
- generally you just have to use them and see what happens. Occasionally a
- scroll of identify will have the ability to identify several objects. So
- it is to your advantage to have several unidentified objects before you use
- an identify scroll. When you read a scroll of identify HACK will ask you
- which classes of objects you want identified. If, for example, you answer
- '=/' then for each ring in your pack you will be asked if you want to
- identify it. After going through all rings, you will be asked about the
- wands. If you do not identify any of these objects you will get back to
- the question about which classes of objects you want identified.
-
- Since it is difficult to determine what rings do because their effect
- may not be obvious, and because cursed rings can't be removed unless you
- remove their curse, scrolls of identify are probably best used to identify
- rings.
-
-
- What is "--More--"?
- -------------------
-
- Whenever there is a lot of information for you to see, HACK waits for
- you to read it all by giving you a "--More--". If the "--More--" is
- displayed on the normal response line (the top line that most messages are
- shown on), then HACK is waiting for you to enter ' ' (the space character)
- or <return> (the ENTER key).
-
- If HACK has printed out a list of information (eg. you did an 'i'
- command), then HACK will accept ' ' or <return> as well as the inventory
- letter of anything in the list. Where is this useful? An example is when
- you want to quaff a potion but you can't remember the letter of the potion
- you want. You do 'q' then '?' and HACK gives you the list of all your
- potions followed by a "--More--" message. If you type ' ' or <return> you
- get back to the prompt about which potion you want to quaff. If you type
- the inventory letter of the potion, you immediately quaff that potion.
-
- If the screen is completely cleared to give you information (eg.
- you're looking at the help documentation with the '?' command), then there
- will be more than one screen full of information. In this case, ' ' or
- <return> mean "show the next screen" and 'q' or ESC mean "stop".
-
-
-
-
-
- PC HACK v1.03 Page 14
-
-
-
-
- Finally
-
- Of course, there is much about HACK to discover yourself. The RUMORS
- file provides helpful clues for playing. Also, saved games have no special
- protection so you can save a game and make a copy of the savefile. Then if
- you die trying something risky you can use the copy to restart your game
- from the same place.
-
-
- If the dungeon collapses ....
- -----------------------------
-
- On rare occasions HACK gets an error and quits with a collapsing
- dungeon. This is usually due to a disk error or lack of enough memory
- (or, perhaps even a program bug!). Even though there may be "level.*"
- files left behind, the game cannot be recovered because the information
- that was in ram is lost. You can delete the old level.* files before
- playing a new game, or HACK will do it for you next game. However, if you
- do leave the level.* files behind, HACK will void the next game you play,
- then remove the old files. You will then be able to play again.
-
-
- Pitch
- -----
-
- In order to improve your luck when playing PC HACK you should throw
- some '$' or '*' to:
-
- Don Kneller
- 2 Panoramic Way #204
- Berkeley, CA 94704
-
- Your contribution would be much appreciated and provide encouragement
- to maintain and update PC HACK.
-
-
-
- With that aside, you are encouraged to copy this program and give it
- to your friends and post it to BBS's. You can send me mail on FIDOnet at
- node 125/84 (SCI-Fido 415-655-0667 300/1200 baud, 24 hours, 7 days).
- People on USENET or ARPANET can reach me at:
- UUCP: ucbvax!ucsfcgl!kneller
- ARPA: ucsfcgl!kneller@Berkeley.arpa
-
- If you find a bug in PC HACK, or you just want to drop me a line with
- a comment or improvement suggestion, please let me know at any of the above
- locations.
-
- Good Luck and Happy Hacking!!!!!!!
-
-
-
-
-
-
-
-
-
-
-
-
-