as well as tracking and stealthy movement.
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
played.
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
ed. Typing a `*' lists your entire inventory, so you can see the
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
ing the menu entry for the given option (ie, by typing its
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
P Put on a ring or other accessory (amulet, blindfold).
- ^P Repeat previous message (subsequent ^P's repeat earlier mes-
- sages).
+ ^P Repeat previous message. Subsequent ^P's repeat earlier
+ messages. The behavior can be varied via the msg_window op-
+ tion.
q Quaff (drink) a potion.
- Q Select an object for your quiver. You can then throw this
- using the `f' command. (In versions prior to 3.3 this was
- the command to quit the game, which has now been moved to
+ Q Select an object for your quiver. You can then throw this
+ using the `f' command. (In versions prior to 3.3 this was
+ the command to quit the game, which has now been moved to
`#quit'.)
r Read a scroll or spellbook.
^R Redraw the screen.
- s Search for secret doors and traps around you. It usually
+ s Search for secret doors and traps around you. It usually
takes several tries to find something.
- S Save (and suspend) the game. The game will be restored au-
+ S Save (and suspend) the game. The game will be restored au-
tomatically the next time you play.
t Throw an object or shoot a projectile.
W Wear armor.
x Exchange your wielded weapon with the item in your alternate
- weapon slot. The latter is used as your secondary weapon
- when engaging in two-weapon combat. Note that if one of
+ weapon slot. The latter is used as your secondary weapon
+ when engaging in two-weapon combat. Note that if one of
these slots is empty, the exchange still takes place.
-
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
^X Display your name, role, race, gender, and alignment as well
as the various deities in your game.
- z Zap a wand. To aim at yourself, use `.' for the direction.
+ z Zap a wand. To aim at yourself, use `.' for the direction.
- Z Zap (cast) a spell. To cast at yourself, use `.' for the
+ Z Zap (cast) a spell. To cast at yourself, use `.' for the
direction.
^Z Suspend the game (UNIX(R) versions with job control only).
; Show what type of thing a visible symbol corresponds to.
- , Pick up some things.
+ , Pick up some things. May be preceded by `m' to force a se-
+ lection menu.
@ Toggle the autopickup option on and off.
! Escape to a shell.
- # Perform an extended command. As you can see, the authors of
- NetHack used up all the letters, so this is a way to
+
__________
(R)UNIX is a registered trademark of AT&T.
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
- introduce the less frequently used commands. What extended
- commands are available depends on what features the game was
+ # Perform an extended command. As you can see, the authors of
+ NetHack used up all the letters, so this is a way to intro-
+ duce the less frequently used commands. What extended com-
+ mands are available depends on what features the game was
compiled with.
#adjust
#ride
Ride (or stop riding) a monster.
- #rub Rub a lamp or a stone.
-
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
+ #rub Rub a lamp or a stone.
+
#sit Sit down.
#turn
M-n #name
- M-o #offer
-
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
+ M-o #offer
+
M-p #pray
M-q #quit
Doorways connect rooms and corridors. Some doorways have no
doors; you can walk right through. Others have doors in them,
which may be open, closed, or locked. To open a closed door, use
- the `o' (open) command; to close it again, use the `c' (close)
- command.
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
+ the `o' (open) command; to close it again, use the `c' (close)
+ command.
+
You can get through a locked door by using a tool to pick
the lock with the `a' (apply) command, or by kicking it open with
the `^D' (kick) command.
previously visited level, it will be loaded from its file on disk
and reactivated. If you're moving to a level which has not yet
been visited, it will be created (from scratch for most random
- levels, from a template for some ``special'' levels, or loaded
- from the remains of an earlier game for a ``bones'' level as
- briefly described below). Monsters are only active on the
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
- current level; those on other levels are essentially placed into
+ levels, from a template for some ``special'' levels, or loaded
+ from the remains of an earlier game for a ``bones'' level as
+ briefly described below). Monsters are only active on the cur-
+ rent level; those on other levels are essentially placed into
stasis.
Ordinarily when you climb a set of stairs, you will arrive
it just like a monster that you can see; of course, if the mon-
ster has moved, you will attack empty air. If you guess that the
monster has moved and you don't wish to fight, you can use the
- `m' command to move without fighting; likewise, if you don't re-
- member a monster but want to try fighting anyway, you can use the
- `F' command.
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
+ `m' command to move without fighting; likewise, if you don't re-
+ member a monster but want to try fighting anyway, you can use the
+ `F' command.
+
6.2. Your pet
You start the game with a little dog (`d'), cat (`f'), or
lurking around, gloating over its last victory.
- 7. Objects
-
- When you find something in the dungeon, it is common to want
- to pick it up. In NetHack, this is accomplished automatically by
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
+ 7. Objects
+
+ When you find something in the dungeon, it is common to want
+ to pick it up. In NetHack, this is accomplished automatically by
walking over the object (unless you turn off the autopickup op-
tion (see below), or move with the `m' prefix (see above)), or
manually by using the `,' command.
specifying a space as the value will remove the prior name in-
stead of assigning a new one.
- 7.1. Curses and Blessings
- Any object that you find may be cursed, even if the object
- is otherwise helpful. The most common effect of a curse is being
- stuck with (and to) the item. Cursed weapons weld themselves to
- your hand when wielded, so you cannot unwield them. Any cursed
- NetHack 3.4 September 3, 2002
+
+ NetHack 3.4 February 12, 2003
+ 7.1. Curses and Blessings
+
+ Any object that you find may be cursed, even if the object
+ is otherwise helpful. The most common effect of a curse is being
+ stuck with (and to) the item. Cursed weapons weld themselves to
+ your hand when wielded, so you cannot unwield them. Any cursed
item you wear is not removable by ordinary means. In addition,
cursed arms and armor usually, but not always, bear negative en-
chantments that make them less effective in combat. Other cursed
The chance that an attack will successfully hit a monster,
and the amount of damage such a hit will do, depends upon many
- factors. Among them are: type of weapon, quality of weapon (en-
- chantment and/or erosion), experience level, strength, dexterity,
- encumbrance, and proficiency (see below). The monster's armor
- class - a general defense rating, not necessarily due to wearing
- of armor - is a factor too; also, some monsters are particularly
- vulnerable to certain types of weapons.
+ factors. Among them are: type of weapon, quality of weapon
-
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
+ (enchantment and/or erosion), experience level, strength, dexter-
+ ity, encumbrance, and proficiency (see below). The monster's ar-
+ mor class - a general defense rating, not necessarily due to
+ wearing of armor - is a factor too; also, some monsters are par-
+ ticularly vulnerable to certain types of weapons.
+
Many weapons can be wielded in one hand; some require both
hands. When wielding a two-handed weapon, you can not wear a
shield, and vice versa. When wielding a one-handed weapon, you
NetHack choose another item to automatically fill your quiver
when the inventory slot used for `Q' runs out.
- Some characters have the ability to fire a volley of multi-
- ple items in a single turn. Knowing how to load several rounds
- of ammunition at once -- or hold several missiles in your hand --
- and still hit a target is not an easy task. Rangers are among
- those who are adept at this task, as are those with a high level
-
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
+ Some characters have the ability to fire a volley of multi-
+ ple items in a single turn. Knowing how to load several rounds
+ of ammunition at once -- or hold several missiles in your hand --
+ and still hit a target is not an easy task. Rangers are among
+ those who are adept at this task, as are those with a high level
of proficiency in the relevant weapon skill (in bow skill if
you're wielding one to shoot arrows, in crossbow skill if you're
wielding one to shoot bolts, or in sling skill if you're wielding
is no penalty or bonus; at skilled level, you receive a modest
bonus in the chance to hit and amount of damage done; at expert
level, the bonus is higher. A successful hit has a chance to
- boost your training towards the next skill level (unless you've
- already reached the limit for this skill). Once such training
- reaches the threshold for that next level, you'll be told that
- you feel more confident in your skills. At that point you can
- use `#enhance' to increase one or more skills. Such skills are
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
+ boost your training towards the next skill level (unless you've
+ already reached the limit for this skill). Once such training
+ reaches the threshold for that next level, you'll be told that
+ you feel more confident in your skills. At that point you can
+ use `#enhance' to increase one or more skills. Such skills are
not increased automatically because there is a limit to your to-
tal overall skills, so you need to actively choose which skills
to enhance and which to ignore.
negative enchantments (minuses) in addition to being unremovable.
Many types of armor are subject to some kind of damage like
- rust. Such damage can be repaired. Some types of armor may in-
- hibit spell casting.
-
- The commands to use armor are `W' (wear) and `T' (take off).
- The `A' command can also be used to take off armor as well as
- other worn items.
+ rust. Such damage can be repaired. Some types of armor may
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
+ inhibit spell casting.
+
+ The commands to use armor are `W' (wear) and `T' (take off).
+ The `A' command can also be used to take off armor as well as
+ other worn items.
+
7.4. Food (`%')
Food is necessary to survive. If you go too long without
when you read the scroll. On versions of NetHack where mail is
randomly generated internal to the game, these environment vari-
ables are ignored. You can disable the mail daemon by turning
- off the mail option.
-
- The command to read a scroll is `r'.
-
+ NetHack 3.4 February 12, 2003
- NetHack 3.4 September 3, 2002
+ NetHack Guidebook 26
- NetHack Guidebook 26
+ off the mail option.
+ The command to read a scroll is `r'.
7.6. Potions (`!')
Rings are very useful items, since they are relatively per-
manent magic, unlike the usually fleeting effects of potions,
- scrolls, and wands.
-
- Putting on a ring activates its magic. You can wear only
- two rings, one on each ring finger.
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
+ scrolls, and wands.
+
+ Putting on a ring activates its magic. You can wear only
+ two rings, one on each ring finger.
+
Most rings also cause you to grow hungry more rapidly, the
rate varying with the type of ring.
levels, categories, and chances for failure. The `Z' (cast) com-
mand casts a spell.
- 7.10. Tools (`(')
-
- Tools are miscellaneous objects with various purposes. Some
- tools have a limited number of uses, akin to wand charges. For
- example, lamps burn out after a while. Other tools are
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
- containers, which objects can be placed into or taken out of.
+ 7.10. Tools (`(')
+
+ Tools are miscellaneous objects with various purposes. Some
+ tools have a limited number of uses, akin to wand charges. For
+ example, lamps burn out after a while. Other tools are contain-
+ ers, which objects can be placed into or taken out of.
The command to use tools is `a' (apply).
generally heavy. It is rumored that some statues are not what
they seem.
- Very large humanoids (giants and their ilk) have been known
- to use boulders as weapons.
-
-
-
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
+ Very large humanoids (giants and their ilk) have been known
+ to use boulders as weapons.
+
7.14. Gold (`$')
Gold adds to your score, and you can buy things in shops
Eating any kind of meat violates the vegetarian, vegan, and
foodless conducts. This includes tripe rations, the corpses or
- tins of any monsters not mentioned above, and the various other
- chunks of meat found in the dungeon. Swallowing and digesting a
- monster while polymorphed is treated as if you ate the creature's
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
+ tins of any monsters not mentioned above, and the various other
+ chunks of meat found in the dungeon. Swallowing and digesting a
+ monster while polymorphed is treated as if you ate the creature's
corpse. Eating leather, dragon hide, or bone items while poly-
morphed into a creature that can digest it, or eating monster
brains while polymorphed into a mind flayer, is considered eating
starting inventory is assumed to be learned from your teachers
prior to the start of the game and isn't counted.
- There are several other challenges tracked by the game. It
- is possible to eliminate one or more species of monsters by geno-
- cide; playing without this feature is considered a challenge.
- When you game offers you an opportunity to genocide monsters, you
- NetHack 3.4 September 3, 2002
+
+ NetHack 3.4 February 12, 2003
+ There are several other challenges tracked by the game. It
+ is possible to eliminate one or more species of monsters by geno-
+ cide; playing without this feature is considered a challenge.
+ When you game offers you an opportunity to genocide monsters, you
may respond with the monster type ``none'' if you want to de-
cline. You can change the form of an item into another item of
the same type (``polypiling'') or the form of your own body into
in csh (note the need to escape the ! since it's special to the
shell), or
- $ NETHACKOPTIONS="autoquiver,!autopickup,name:Blue Meanie,fruit:papaya"
- $ export NETHACKOPTIONS
-
- in sh or ksh.
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
+ $ NETHACKOPTIONS="autoquiver,!autopickup,name:Blue Meanie,fruit:papaya"
+ $ export NETHACKOPTIONS
+
+ in sh or ksh.
+
9.3. Using a configuration file
Any line in the configuration file starting with ``OP-
tus, enchantment, damage, or quality of the weapon; you are
free to manually fill your quiver with the `Q' command in-
stead. If no weapon is found or the option is false, the
- `t' (throw) command is executed instead. (default false)
-
- boulder
- Set the character used to display boulders (default is rock
- class symbol).
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
+ `t' (throw) command is executed instead. (default false)
+
+ boulder
+ Set the character used to display boulders (default is rock
+ class symbol).
+
catname
Name your starting cat (ex. ``catname:Morris''). Cannot be
set with the `O' command.
game ends (defaults to all possibilities being disclosed).
The possibilities are:
- i - disclose your inventory.
- a - disclose your attributes.
- v - summarize monsters that have been vanquished.
- g - list monster species that have been genocided.
- c - display your conduct.
- Each disclosure possibility can optionally be preceded by a
- prefix which let you refine how it behaves. Here are the
- valid prefixes:
- NetHack 3.4 September 3, 2002
+
+
+ NetHack 3.4 February 12, 2003
+ i - disclose your inventory.
+ a - disclose your attributes.
+ v - summarize monsters that have been vanquished.
+ g - list monster species that have been genocided.
+ c - display your conduct.
+
+ Each disclosure possibility can optionally be preceded by a
+ prefix which let you refine how it behaves. Here are the
+ valid prefixes:
+
y - prompt you and default to yes on the prompt.
n - prompt you and default to no on the prompt.
+ - disclose it without prompting.
closed door, horizontal closed door, iron bars, tree, floor
of a room, dark corridor, lit corridor, stairs up, stairs
down, ladder up, ladder down, altar, grave, throne, kitchen
- sink, fountain, pool or moat, ice, lava, vertical lowered
- drawbridge, horizontal lowered drawbridge, vertical raised
- drawbridge, horizontal raised drawbridge, air, cloud, under
- water.
- You might want to use `+' for the corners and T walls for a
- more aesthetic, boxier display. Note that in the next re-
- lease, new symbols may be added, or the present ones rear-
- ranged.
+ NetHack 3.4 February 12, 2003
- NetHack 3.4 September 3, 2002
+ NetHack Guidebook 35
- NetHack Guidebook 35
+ sink, fountain, pool or moat, ice, lava, vertical lowered
+ drawbridge, horizontal lowered drawbridge, vertical raised
+ drawbridge, horizontal raised drawbridge, air, cloud, under
+ water.
+ You might want to use `+' for the corners and T walls for a
+ more aesthetic, boxier display. Note that in the next re-
+ lease, new symbols may be added, or the present ones rear-
+ ranged.
Cannot be set with the `O' command.
fruit
Name a fruit after something you enjoy eating (ex.
- ``fruit:mango'') (default ``slime mold''). Basically a nos-
- talgic whimsy that NetHack uses from time to time. You
- should set this to something you find more appetizing than
- slime mold. Apples, oranges, pears, bananas, and melons al-
- ready exist in NetHack, so don't use those.
-
- gender
- Your starting gender (gender:male or gender:female). You
- may specify just the first letter. Although you can still
- denote your gender using the ``male'' and ``female'' op-
- tions, the ``gender'' option will take precedence. The
+ ``fruit:mango'') (default ``slime mold''). Basically a
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
- default is to randomly pick an appropriate gender. Cannot
- be set with the `O' command.
+ nostalgic whimsy that NetHack uses from time to time. You
+ should set this to something you find more appetizing than
+ slime mold. Apples, oranges, pears, bananas, and melons al-
+ ready exist in NetHack, so don't use those.
+
+ gender
+ Your starting gender (gender:male or gender:female). You
+ may specify just the first letter. Although you can still
+ denote your gender using the ``male'' and ``female'' op-
+ tions, the ``gender'' option will take precedence. The de-
+ fault is to randomly pick an appropriate gender. Cannot be
+ set with the `O' command.
help If more information is available for an object looked at
with the `/' command, ask if you want to see it (default
male
An obsolete synonym for ``gender:male''. Cannot be set with
- the `O' command.
-
- menustyle
- Controls the interface used when you need to choose various
- objects (in response to the Drop command, for instance).
- The value specified should be the first letter of one of the
- following: traditional, combination, partial, or full.
- Traditional was the only interface available for earlier
- versions; it consists of a prompt for object class charac-
- ters, followed by an object-by-object prompt for all items
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003
+ the `O' command.
+
+ menustyle
+ Controls the interface used when you need to choose various
+ objects (in response to the Drop command, for instance).
+ The value specified should be the first letter of one of the
+ following: traditional, combination, partial, or full.
+ Traditional was the only interface available for earlier
+ versions; it consists of a prompt for object class charac-
+ ters, followed by an object-by-object prompt for all items
matching the selected object class(es). Combination starts
with a prompt for object class(es) of interest, but then
displays a menu of matching objects rather than prompting
menu_previous_page
Menu character accelerator to goto the previous menu page.
- Implemented by the Amiga, Gem and tty ports. Default '<'.
- menu_search
- Menu character accelerator to search for a menu item. Im-
- plemented by the Amiga, Gem and X11 ports. Default ':'.
- menu_select_all
- Menu character accelerator to select all items in a menu.
- Implemented by the Amiga, Gem, X11 and tty ports. Default
- '.'.
+ NetHack 3.4 February 12, 2003
+
- NetHack 3.4 September 3, 2002
+ NetHack Guidebook 38
- NetHack Guidebook 38
+ Implemented by the Amiga, Gem and tty ports. Default '<'.
+ menu_search
+ Menu character accelerator to search for a menu item. Im-
+ plemented by the Amiga, Gem and X11 ports. Default ':'.
+ menu_select_all
+ Menu character accelerator to select all items in a menu.
+ Implemented by the Amiga, Gem, X11 and tty ports. Default
+ '.'.
menu_select_page
Menu character accelerator to select all items on this page
ant or other insect, blob, cockatrice, dog or other canine,
eye or sphere, feline, gremlin, humanoid, imp or minor de-
mon, jelly, kobold, leprechaun, mimic, nymph, orc, piercer,
- quadruped, rodent, spider, trapper or lurker above, horse or
- unicorn, vortex, worm, xan or other mythical/fantastic in-
- sect, light, zruty, angelic being, bat or bird, centaur,
- dragon, elemental, fungus or mold, gnome, giant humanoid,
- invisible monster, jabberwock, Keystone Kop, lich, mummy,
- naga, ogre, pudding or ooze, quantum mechanic, rust monster,
- snake, troll, umber hulk, vampire, wraith, xorn, apelike
- creature, zombie, human, ghost, golem, demon, sea monster,
- lizard, long worm tail, and mimic. Cannot be set with the
- `O' command.
+ quadruped, rodent, arachnid or centipede, trapper or lurker
+ above, horse or unicorn, vortex, worm, xan or other mythi-
+ cal/fantastic insect, light, zruty, angelic being, bat or
+ bird, centaur, dragon, elemental, fungus or mold, gnome, gi-
+ ant humanoid, invisible monster, jabberwock, Keystone Kop,
+ lich, mummy, naga, ogre, pudding or ooze, quantum mechanic,
+ rust monster, snake, troll, umber hulk, vampire, wraith,
+ xorn, apelike creature, zombie, human, ghost, golem, demon,
+ sea monster, lizard, long worm tail, and mimic. Cannot be
+ set with the `O' command.
msghistory
The number of top line messages to save (and recall with ^P)
played. (It is currently implemented for tty only.) The
possible values are:
- s - single message (the default prior to 3.4.0).
+ s - single message (default, this was the behavior before 3.4.0).
c - combination, two messages as `single', then as `full'.
f - full window, oldest message first.
r - full window, newest message first.
(which defaults to `full'), or it can be negated (which de-
faults to `single').
+
+
+
+ NetHack 3.4 February 12, 2003
+
+
+
+
+
+ NetHack Guidebook 39
+
+
+
name
Set your character's name (defaults to your user name). You
can also set your character's role by appending a dash and
the news is shown at the beginning of the game, there's no
point in setting this with the `O' command.
-
- NetHack 3.4 September 3, 2002
-
-
-
-
-
- NetHack Guidebook 39
-
-
-
null
Send padding nulls to the terminal (default off).
or overLoaded), you will be asked if you want to continue.
(Default `S').
+
+
+
+ NetHack 3.4 February 12, 2003
+
+
+
+
+
+ NetHack Guidebook 40
+
+
+
pickup_types
Specify the object types to be picked up when autopickup is
on. Default is all types.
race Selects your race (for example, ``race:human''). Default is
random. Cannot be set with the `O' command.
-
- NetHack 3.4 September 3, 2002
-
-
-
-
-
- NetHack Guidebook 40
-
-
-
rest_on_space
Make the space bar a synonym for the `.' (rest) command (de-
fault off).
scores''). Only the first letter of each category (`t',
`a', or `o') is necessary.
+
+
+
+ NetHack 3.4 February 12, 2003
+
+
+
+
+
+ NetHack Guidebook 41
+
+
+
showexp
Show your accumulated experience points on bottom line (de-
fault off).
silent
Suppress terminal beeps (default on).
-
- NetHack 3.4 September 3, 2002
-
-
-
-
-
- NetHack Guidebook 41
-
-
-
sortpack
Sort the pack contents by type when displaying inventory
(default on).
+ sound
+ Enable messages about what your character hears (default
+ on). Note that this has nothing to do with your computer's
+ audio capabilities. This option is only partly under player
+ control. The game toggles it off and on during and after
+ sleep, for example.
+
sparkle
Display a sparkly effect when a monster (including yourself)
is hit by an attack to which it is resistant (default on).
tombstone
Draw a tombstone graphic upon your death (default on).
+
+
+ NetHack 3.4 February 12, 2003
+
+
+
+
+
+ NetHack Guidebook 42
+
+
+
toptenwin
Put the ending display in a NetHack window instead of on
stdout (default off). Setting this option makes the score
Cannot be set with the `O' command.
-
-
- NetHack 3.4 September 3, 2002
-
-
-
-
-
- NetHack Guidebook 42
-
-
-
travel
Allow the travel command (default on). Turning this option
off will prevent the game from attempting unintended moves
align_message
Where to align or place the message window (top, bottom,
+
+
+ NetHack 3.4 February 12, 2003
+
+
+
+
+
+ NetHack Guidebook 43
+
+
+
left, or right)
align_status
window.
font_menu
- NetHack should use a font by the chosen name for menu
-
-
- NetHack 3.4 September 3, 2002
-
-
-
-
-
- NetHack Guidebook 43
-
-
-
- windows.
+ NetHack should use a font by the chosen name for menu win-
+ dows.
font_message
NetHack should use a font by the chosen name for the message
font_size_text
NetHack should use this size font for text windows.
+
+
+
+ NetHack 3.4 February 12, 2003
+
+
+
+
+
+ NetHack Guidebook 44
+
+
+
hilite_pet
Visually distinguish pets from similar animals (default
off). The behavior of this option depends on the type of
preload_tiles
NetHack should preload tiles into memory. For example, in
-
-
- NetHack 3.4 September 3, 2002
-
-
-
-
-
- NetHack Guidebook 44
-
-
-
the protected mode MSDOS version, control whether tiles get
pre-loaded into RAM at the start of the game. Doing so en-
hances performance of the tile graphics, but uses more memo-
Specify the preferred height of each tile in a tile capable
port.
+
+
+
+ NetHack 3.4 February 12, 2003
+
+
+
+
+
+ NetHack Guidebook 45
+
+
+
tile_width
Specify the preferred width of each tile in a tile capable
port
BIOS
Use BIOS calls to update the screen display quickly and to
read the keyboard (allowing the use of arrow keys to move)
-
-
- NetHack 3.4 September 3, 2002
-
-
-
-
-
- NetHack Guidebook 45
-
-
-
on machines with an IBM PC compatible BIOS ROM (default off,
OS/2, PC, and ST NetHack only).
tect' with vga hardware present) will cause the game to dis-
play tiles. Cannot be set with the `O' command.
+
+ NetHack 3.4 February 12, 2003
+
+
+
+
+
+ NetHack Guidebook 46
+
+
+
videocolors
Set the color palette for PC systems using NO_TERMS (default
4-2-6-1-5-3-15-12-10-14-9-13-11, (PC NetHack only). The or-
to the message window. At this time the Qt port and the win32tty
and win32gui ports support the use of user sounds.
- The following config file options are relevant to mapping
+ The following config file entries are relevant to mapping
user sounds to messages:
-
-
- NetHack 3.4 September 3, 2002
-
-
-
-
-
- NetHack Guidebook 46
-
-
-
- soundir
+ SOUNDDIR
The directory that houses the sound files to be played.
- sound
+ SOUND
An entry that maps a sound file to a user-specified message
pattern. Each SOUND entry is broken down into the following
parts:
*--- matches 0 or more characters.
?--- matches any single character.
+
+
+
+ NetHack 3.4 February 12, 2003
+
+
+
+
+
+ NetHack Guidebook 47
+
+
+
Here's an example of a sound mapping using NetHack's inter-
nal pattern matching facility:
ter since there are other humanoids represented by the same sign.
Your screen-reader should also have a function which gives you
the row and column of your review cursor and the PC cursor.
-
-
- NetHack 3.4 September 3, 2002
-
-
-
-
-
- NetHack Guidebook 47
-
-
-
These co-ordinates are often useful in giving players a better
sense of the overall location of items on the screen.
Character graphics
Comment out all character graphics sets found near the bot-
tom of the defaults.nh file. Most of these replace
+
+
+ NetHack 3.4 February 12, 2003
+
+
+
+
+
+ NetHack Guidebook 48
+
+
+
NetHack's default representation of the dungeon using stan-
dard ASCII characters with fancier characters from extended
character sets, and these fancier characters can annoy
whatever you have. If you quit, you keep all your gold, but if
you swing and live, you might find more.
-
-
- NetHack 3.4 September 3, 2002
-
-
-
-
-
- NetHack Guidebook 48
-
-
-
If you just want to see what the current top players/games
list is, you can type nethack -s all on most versions.
and Kenneth C. R. C. Arnold. Small portions were adapted from
Further Exploration of the Dungeons of Doom, by Ken Arromdee.
+
+
+
+ NetHack 3.4 February 12, 2003
+
+
+
+
+
+ NetHack Guidebook 49
+
+
+
NetHack is the product of literally dozens of people's work.
Main events in the course of the game development are described
below:
Later, Mike coordinated a major rewrite of the game, heading
a team which included Ken Arromdee, Jean-Christophe Collet, Steve
-
-
- NetHack 3.4 September 3, 2002
-
-
-
-
-
- NetHack Guidebook 49
-
-
-
Creps, Eric Hendrickson, Izchak Miller, John Rupley, Mike Threep-
oint, and Janet Walz, to produce NetHack 3.0c.
Ken Lorber, Gregg Wonderly and Greg Olson, with help from
Richard Addison, Mike Passaretti, and Olaf Seibert, developed
+
+
+ NetHack 3.4 February 12, 2003
+
+
+
+
+
+ NetHack Guidebook 50
+
+
+
NetHack 3.1 for the Amiga.
Norm Meluch and Kevin Smolkowski, with help from Carl Sche-
Smith, Mike Stephenson, Janet Walz, and Paul Winner, released
version 3.2 in April of 1996.
-
- NetHack 3.4 September 3, 2002
-
-
-
-
-
- NetHack Guidebook 50
-
-
-
Version 3.2 marked the tenth anniversary of the formation of
the development team. In a testament to their dedication to the
game, all thirteen members of the original development team re-
tures. Kevin later joined the DevTeam and incorporated the best
of these ideas in NetHack 3.3.
+
+
+ NetHack 3.4 February 12, 2003
+
+
+
+
+
+ NetHack Guidebook 51
+
+
+
The final update to 3.2 was the bug fix release 3.2.3, which
was released simultaneously with 3.3.0 in December 1999 just in
time for the Year 2000.
The 3.4 development team initially consisted of Michael Al-
lison, Ken Arromdee, David Cohrs, Jessie Collet, Kevin Hugo, Ken
Lorber, Dean Luick, Pat Rankin, Mike Stephenson, Janet Walz, and
- Paul Winner, with Warwick Allison joining just before the
-
-
- NetHack 3.4 September 3, 2002
-
-
-
-
-
- NetHack Guidebook 51
-
-
-
- release of NetHack 3.4.0 in March 2002.
+ Paul Winner, with Warwick Allison joining just before the re-
+ lease of NetHack 3.4.0 in March 2002.
As with version 3.3, various people contributed to the game
as a whole as well as supporting ports on the different platforms
the Amiga port of 3.4 after Janne Salmijarvi resurrected it for
3.3.1.
- Christian ``Marvin'' Bressler maintained 3.4 for the Atari
- after he resurrected it for 3.3.1.
-
- There is a NetHack web site maintained by Ken Lorber at
- http://www.nethack.org/.
-
- - - - - - - - - - -
-
- From time to time, some depraved individual out there in
- netland sends a particularly intriguing modification to help out
- with the game. The Gods of the Dungeon sometimes make note of
- the names of the worst of these miscreants in this, the list of
- Dungeoneers:
-
-
-
-
-
-
-
+ NetHack 3.4 February 12, 2003
+ NetHack Guidebook 52
- NetHack 3.4 September 3, 2002
-
-
-
+ Christian ``Marvin'' Bressler maintained 3.4 for the Atari
+ after he resurrected it for 3.3.1.
+ There is a NetHack web site maintained by Ken Lorber at
+ http://www.nethack.org/.
- NetHack Guidebook 52
+ - - - - - - - - - -
+ From time to time, some depraved individual out there in
+ netland sends a particularly intriguing modification to help out
+ with the game. The Gods of the Dungeon sometimes make note of
+ the names of the worst of these miscreants in this, the list of
+ Dungeoneers:
Adam Aronow Irina Rempt-Drijfhout Mike Gallop
of their respective holders.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- NetHack 3.4 September 3, 2002
+ NetHack 3.4 February 12, 2003