as well as tracking and stealthy movement.
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
played.
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
I This marks the last known location of an invisible or other-
wise unseen monster. Note that the monster could have
- moved. The 'f' and 'm' commands may be useful here.
+ moved. The 'F' and 'm' commands may be useful here.
You need not memorize all these symbols; you can ask the
game what any symbol represents with the `/' command (see the
ed. Typing a `*' lists your entire inventory, so you can see the
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
sidered interesting.
_ Travel to a map location via a shortest-path algorithm.
- Stops on most of the same conditions as the `G' command
- does. For ports with mouse support, the command is also
- invoked when a mouse-click takes place on a location further
+ Stops on most of the same conditions as the `G' command
+ does. For ports with mouse support, the command is also in-
+ voked when a mouse-click takes place on a location further
than 1 cell away from the current position.
. Rest, do nothing for one turn.
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
(R)UNIX is a registered trademark of AT&T.
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
suitable weapons for this type of combat, or it will be
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
doors are not restricted in this fashion.
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
sionally one of these creatures will displace you during the
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
monster has moved and you don't wish to fight, you can use the
`m' command to move without fighting; likewise, if you don't re-
member a monster but want to try fighting anyway, you can use the
- `f' command.
+ `F' command.
6.2. Your pet
worried about it or want to train it, you can feed it, too, by
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
will add the object(s) to your pack and tell you what you just
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
better or more beneficially than normal uncursed items. For
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
the ``two weapon combat'' skill, you may wield both primary and
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
NetHack choose another item to automatically fill your quiver
when the inventory slot used for `Q' runs out.
- Some characters have the ability fire a volley of multiple
- items in a single turn. Knowing how to load several rounds of
- ammunition at once -- or hold several missiles in your hand --
+ Some characters have the ability to fire a volley of multi-
+ ple items in a single turn. Knowing how to load several rounds
+ of ammunition at once -- or hold several missiles in your hand --
and still hit a target is not an easy task. Rangers are among
those who are adept at this task, as are those with a high level
of proficiency in the relevant weapon skill (in bow skill if
`t' or `f' command. For example, ``2f'' (or ``n2f'' if using
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
two rings, one on each ring finger.
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
example, lamps burn out after a while. Other tools are
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
monster while polymorphed is treated as if you ate the creature's
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
any object into another object of the same type (``polypiling'')
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
NETHACKOPTIONS. Any line starting with ``DUNGEON='',
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
fault ``|-\\/*!)(0#@*/-\\||\\-//-\\| |\\-/''). The effects
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
with the `/' command, ask if you want to see it (default
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
Menu character accelerator to deselect all items in a menu.
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
VWXYZ@ '&;:~]''). This string is subjected to the same
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
value is examined; `r' is an exception with ``Rogue'',
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
config file, and if the window port is capable of adjusting to
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
port.
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
A lot of speech access programs use the number-pad to review
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
Day, Timo Hakulinen, Steve Linhart, Dean Luick, Pat Rankin, Eric
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
wick Allison improved the spell casting system with the Wizard
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
Version 3.3 offered many firsts. It was the first version to
separate race and profession. The Elf class was removed in pref-
- erence to an Elf Race, and the races of Dwarves, Gnomes, and Orcs
+ erence to an elf race, and the races of dwarves, gnomes, and orcs
made their first appearance in the game alongside the familiar
- Human race. Monk and Ranger roles joined Archeologists, Barbar-
- ians, Cavemen, Healers, Knights, Priests, Rogues, Tourists,
- Valkyries and of course, Wizards. It was also the first version
- to allow you to ride a steed, and was the first version to have a
- publicly available web-site listing all the bugs that had been
- discovered. Despite that constantly growing bug list, 3.3 proved
- stable enough to last for more than a year and a half.
-
- The 3.4 development team initially consisted of Michael Al-
- lison, Ken Arromdee, David Cohrs, Jessie Collet, Kevin Hugo, Ken
- Lorber, Dean Luick, Pat Rankin, Mike Stephenson, Janet Walz, and
- Paul Winner, with Warwick Allison joining just before the re-
+ human race. Monk and Ranger roles joined Archeologists, Barbar-
+ ians, Cavemen, Healers, Knights, Priests, Rogues, Samurai,
+ Tourists, Valkyries and of course, Wizards. It was also the
+ first version to allow you to ride a steed, and was the first
+ version to have a publicly available web-site listing all the
+ bugs that had been discovered. Despite that constantly growing
+ bug list, 3.3 proved stable enough to last for more than a year
+ and a half.
+
+ The 3.4 development team initially consisted of Michael Al-
+ lison, Ken Arromdee, David Cohrs, Jessie Collet, Kevin Hugo, Ken
+ Lorber, Dean Luick, Pat Rankin, Mike Stephenson, Janet Walz, and
+ Paul Winner, with Warwick Allison joining just before the re-
lease of NetHack 3.4.0 in March 2002.
- As with version 3.2, various people contributed to the game
+ As with version 3.3, various people contributed to the game
as a whole as well as supporting ports on the different platforms
that NetHack runs on:
Pat Rankin maintained 3.4 for VMS.
- Michael Allison maintained NetHack 3.4 for the MS-DOS plat-
+ Michael Allison maintained NetHack 3.4 for the MS-DOS plat-
form. Paul Winner and Yitzhak Sapir provided encouragement.
- Dean Luick, Mark Modrall, and Kevin Hugo maintained and en-
+ Dean Luick, Mark Modrall, and Kevin Hugo maintained and en-
hanced the Macintosh port of 3.4.
- Michael Allison, David Cohrs, Alex Kompel, Dion Nicolaas,
- and Yitzhak Sapir maintained and enhanced 3.4 for the Microsoft
+ Michael Allison, David Cohrs, Alex Kompel, Dion Nicolaas,
+ and Yitzhak Sapir maintained and enhanced 3.4 for the Microsoft
Windows platform. Alex Kompel contributed a new graphical inter-
face for the Windows port.
-
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
Ron Van Iwaarden maintained 3.4 for OS/2.
- Janne Salmijarvi and Teemu Suikki maintained and enhanced
- the Amiga port of 3.4 after Janne Salmijarvi resurrected it for
+ Janne Salmijarvi and Teemu Suikki maintained and enhanced
+ the Amiga port of 3.4 after Janne Salmijarvi resurrected it for
3.3.1.
- Christian ``Marvin'' Bressler maintained 3.4 for the Atari
+ Christian ``Marvin'' Bressler maintained 3.4 for the Atari
after he resurrected it for 3.3.1.
- There is a NetHack web site maintained by Ken Lorber at
+ There is a NetHack web site maintained by Ken Lorber at
http://www.nethack.org/.
- - - - - - - - - -
- From time to time, some depraved individual out there in
- netland sends a particularly intriguing modification to help out
- with the game. The Gods of the Dungeon sometimes make note of
- the names of the worst of these miscreants in this, the list of
+ From time to time, some depraved individual out there in
+ netland sends a particularly intriguing modification to help out
+ with the game. The Gods of the Dungeon sometimes make note of
+ the names of the worst of these miscreants in this, the list of
Dungeoneers:
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002
Gregg Wonderly Michael Hamel Warwick Allison
Hao-yang Wang Michael Sokolov Yitzhak Sapir
- Brand and product names are trademarks or registered trademarks
+ Brand and product names are trademarks or registered trademarks
of their respective holders.
- NetHack 3.4 March 17, 2002
+ NetHack 3.4 March 20, 2002