%.hn 1
\section{Preface - Version 3.6}
%.pg
-This version of the game is special in a particular way. Near the end of
-the development of 3.6, one of the significant inspirations for many of the
-humorous and fun features found in the game, author {\it Terry Pratchett},
+This version of the game is special in a particular way. Near the end of
+the development of 3.6, one of the significant inspirations for many of the
+humorous and fun features found in the game, author {\it Terry Pratchett},
passed away. We have dedicated this version of the game in his memory.
%.pg
%.pg
-Recently, you have begun to find yourself unfulfilled and distant
-in your daily occupation. Strange dreams of prospecting, stealing,
-crusading, and combat have haunted you in your sleep for many months,
-but you aren't sure of the reason. You wonder whether you have in
-fact been having those dreams all your life, and somehow managed to
+Recently, you have begun to find yourself unfulfilled and distant
+in your daily occupation. Strange dreams of prospecting, stealing,
+crusading, and combat have haunted you in your sleep for many months,
+but you aren't sure of the reason. You wonder whether you have in
+fact been having those dreams all your life, and somehow managed to
forget about them until now. Some nights you awaken suddenly
-and cry out, terrified at the vivid recollection of the strange and
-powerful creatures that seem to be lurking behind every corner of the
-dungeon in your dream. Could these details haunting your dreams be real?
-As each night passes, you feel the desire to enter the mysterious caverns
-near the ruins grow stronger. Each morning, however, you quickly put
-the idea out of your head as you recall the tales of those who entered
-the caverns before you and did not return. Eventually you can resist
-the yearning to seek out the fantastic place in your dreams no longer.
-After all, when other adventurers came back this way after spending time
-in the caverns, they usually seemed better off than when they passed
-through the first time. And who was to say that all of those who did
+and cry out, terrified at the vivid recollection of the strange and
+powerful creatures that seem to be lurking behind every corner of the
+dungeon in your dream. Could these details haunting your dreams be real?
+As each night passes, you feel the desire to enter the mysterious caverns
+near the ruins grow stronger. Each morning, however, you quickly put
+the idea out of your head as you recall the tales of those who entered
+the caverns before you and did not return. Eventually you can resist
+the yearning to seek out the fantastic place in your dreams no longer.
+After all, when other adventurers came back this way after spending time
+in the caverns, they usually seemed better off than when they passed
+through the first time. And who was to say that all of those who did
not return had not just kept going?
%.pg
told even mentioned that the one who finds the amulet will be granted
immortality by the gods. The amulet is rumored to be somewhere beyond the
Valley of Gehennom, deep within the Mazes of Menace. Upon hearing the
-legends, you immediately realize that there is some profound and
-undiscovered reason that you are to descend into the caverns and seek
-out that amulet of which they spoke. Even if the rumors of the amulet's
-powers are untrue, you decide that you should at least be able to sell the
-tales of your adventures to the local minstrels for a tidy sum, especially
-if you encounter any of the terrifying and magical creatures of
-your dreams along the way. You spend one last night fortifying yourself
-at the local inn, becoming more and more depressed as you watch the odds
-of your success being posted on the inn's walls getting lower and lower.
-
-%.pg
-\nd In the morning you awake, collect your belongings, and
-set off for the dungeon. After several days of uneventful
-travel, you see the ancient ruins that mark the entrance to the
-Mazes of Menace. It is late at night, so you make camp at the entrance
-and spend the night sleeping under the open skies. In the morning, you
-gather your gear, eat what may be your last meal outside, and enter the
+legends, you immediately realize that there is some profound and
+undiscovered reason that you are to descend into the caverns and seek
+out that amulet of which they spoke. Even if the rumors of the amulet's
+powers are untrue, you decide that you should at least be able to sell the
+tales of your adventures to the local minstrels for a tidy sum, especially
+if you encounter any of the terrifying and magical creatures of
+your dreams along the way. You spend one last night fortifying yourself
+at the local inn, becoming more and more depressed as you watch the odds
+of your success being posted on the inn's walls getting lower and lower.
+
+%.pg
+\nd In the morning you awake, collect your belongings, and
+set off for the dungeon. After several days of uneventful
+travel, you see the ancient ruins that mark the entrance to the
+Mazes of Menace. It is late at night, so you make camp at the entrance
+and spend the night sleeping under the open skies. In the morning, you
+gather your gear, eat what may be your last meal outside, and enter the
dungeon\ldots
%.hn 1
%.pg
You have just begun a game of {\it NetHack}. Your goal is to grab as much
treasure as you can, retrieve the Amulet of Yendor, and escape the
-Mazes of Menace alive.
+Mazes of Menace alive.
%.pg
Your abilities and strengths for dealing with the hazards of adventure
%.hn 1
\section{What do all those things on the screen mean?}
%.pg
-On the screen is kept a map of where you have been and what you have
-seen on the current dungeon level; as you explore more of the level,
+On the screen is kept a map of where you have been and what you have
+seen on the current dungeon level; as you explore more of the level,
it appears on the screen in front of you.
%.pg
like ``{\tt search}'', do not require that any more information be collected
by {\it NetHack\/}. Other commands might require additional information, for
example a direction, or an object to be used. For those commands that
-require additional information, {\it NetHack\/} will present you with either
-a menu of choices, or with a command line prompt requesting information. Which
-you are presented with will depend chiefly on how you have set the
+require additional information, {\it NetHack\/} will present you with either
+a menu of choices, or with a command line prompt requesting information.
+Which you are presented with will depend chiefly on how you have set the
`{\it menustyle\/}'
option.
The shortest path
is computed over map locations the hero knows about (e.g. seen or
previously traversed). If there is no known path, a guess is made instead.
-Stops on most of
+Stops on most of
the same conditions as the `G' command, but without picking up
-objects, similar to the `M' command. For ports with mouse
-support, the command is also invoked when a mouse-click takes place on a
+objects, similar to the `M' command. For ports with mouse
+support, the command is also invoked when a mouse-click takes place on a
location other than the current position.
%.lp
\item[\tb{.}]
\item[\tb{A}]
Remove one or more worn items, such as armor.\\
%.lp ""
-Use `{\tt T}' (take off) to take off only one piece of armor
+Use `{\tt T}' (take off) to take off only one piece of armor
or `{\tt R}' (remove) to take off only one accessory.
%.lp
\item[\tb{\^{}A}]
Look at what is here, under you. Default key is '{\tt :}'.
%.lp
\item[\tb{\#loot}]
-Loot a box or bag on the floor beneath you, or the saddle
+Loot a box or bag on the floor beneath you, or the saddle
from a steed standing next to you. Autocompletes.
Default key is '{\tt M-l}', and '{\tt l}' if {\it number\verb+_+pad\/} is on.
Precede with the `{\tt m}' prefix to skip containers at your location
followed by the other key, you may set the {\it altmeta\/}
option to have {\it NetHack\/} combine them into meta\+key.
\blist{}
-%.lp
+%.lp
\item[\tb{M-?}]
{\tt\#?} (not supported by all platforms)
%.lp
\nd If the {\it number\verb+_+pad\/} option is on, some additional letter commands
are available:
\blist{}
-%.lp
+%.lp
\item[\tb{h}]
{\tt\#help}
%.lp
%.pg
Rooms and corridors in the dungeon are either lit or dark.
Any lit areas within your line of sight will be displayed;
-dark areas are only displayed if they are within one space of you.
+dark areas are only displayed if they are within one space of you.
Walls and corridors remain on the map as you explore them.
%.pg
%.pg
In most circumstances, if you attempt to attack a peaceful monster by
-moving into its location, you'll be asked to confirm your intent. By
+moving into its location, you'll be asked to confirm your intent. By
default an answer of `{\tt y}' acknowledges that intent,
which can be error prone if you're using `{\tt y}' to move. You can set the
{\it paranoid\verb+_+confirmation\/}
But first you need to have a weapon in each hand.
(Note that your two weapons are not fully equal; the one in the
hand you normally wield with is considered primary and the other
-one is considered secondary. The most noticeable difference is
+one is considered secondary. The most noticeable difference is
after you stop--or before you begin, for that matter--wielding
two weapons at once. The primary is your wielded weapon and the
secondary is just an item in your inventory that's been designated
You can also set options automatically by placing them in a configuration
file, or in the ``NETHACKOPTIONS'' environment variable.
Some versions of {\it NetHack\/} also have front-end programs that allow
-you to set options before starting the game or a global configuration
+you to set options before starting the game or a global configuration
for system administrators.
%.hn 2
over them and clicking the right mouse button (default off).
%.lp
\item[\ib{cmdassist}]
-Have the game provide some additional command assistance for new
+Have the game provide some additional command assistance for new
players if it detects some anticipated mistakes (default on).
%.lp
\item[\ib{confirm}]
%.lp ""
Note that the vanquished monsters list includes all monsters killed by
-traps and each other as well as by you.
+traps and each other as well as by you.
And the dungeon overview shows all levels you had visited but does not
reveal things about them that you hadn't discovered.
%.lp
\item[\ib{extmenu}]
Changes the extended commands interface to pop-up a menu of available commands.
It is keystroke compatible with the traditional interface except that it does
-not require that you hit Enter. It is implemented only by the tty port
+not require that you hit Enter. It is implemented only by the tty port
(default off), when the game has been compiled to support tty graphics.
%.lp
\item[\ib{female}]
options, the ``{\tt gender}'' option will take precedence.
The default is to randomly pick an appropriate gender.
If you prefix the value with `{\tt !}' or ``{\tt no}'', you will
-exclude that gender from being picked randomly.
+exclude that gender from being picked randomly.
Cannot be set with the `{\tt O}' command. Persistent.
%.lp
\item[\ib{goldX}]
For backward compatibility, no value needs to be specified (which
defaults to {\it full\/}), or it can be negated (which defaults
-to {\it single\/}).
+to {\it single\/}).
%.lp
\item[\ib{name}]
Set your character's name (defaults to your user name). You can also
%.lp
\item[\ib{pickup\verb+_+thrown}]
If this option is on and ``{\it autopickup\/}'' is also on, try to pick up
-things that you threw, even if they aren't in ``{\it pickup\verb+_+types\/}'' or
+things that you threw, even if they aren't in
+``{\it pickup\verb+_+types\/}'' or
match an autopickup exception. Default is on. Persistent.
%.lp
\item[\ib{pickup\verb+_+types}]
-Specify the object types to be picked up when ``{\it autopickup\/}''
-is on. Default is all types. You can use ``{\it autopickup\verb+_+exception\/}''
+Specify the object types to be picked up when ``{\it autopickup\/}''
+is on. Default is all types. You can use
+``{\it autopickup\verb+_+exception\/}''
configuration file lines to further refine ``{\it autopickup\/}'' behavior.
Persistent.
%.lp
\item[\ib{race}]
Selects your race (for example, ``{\tt race:human}''). Default is random.
If you prefix the value with `{\tt !}' or ``{\tt no}'', you will
-exclude that race from being picked randomly.
+exclude that race from being picked randomly.
Cannot be set with the `{\tt O}' command. Persistent.
%.lp
\item[\ib{rest\verb+_+on\verb+_+space}]
%.ed
This option only affects the game's screen display, not the actual
-results of moving. The default is {\it run\/}; versions prior to 3.4.1
+results of moving. The default is {\it run\/}; versions prior to 3.4.1
used {\it teleport\/} only. Whether or not the effect is noticeable will
depend upon the window port used or on the type of terminal. Persistent.
%.lp
%.lp
\item[\ib{suppress\verb+_+alert}]
This option may be set to a {\it NetHack\/} version level to suppress
-alert notification messages about feature changes for that
+alert notification messages about feature changes for that
and prior versions (ex.\ ``{\tt suppress\verb+_+alert:3.3.1}'')
%.lp
\item[\ib{symset}]
Cannot be set with the `{\tt O}' command.
%.lp
\item[\ib{zerocomp}]
-When writing out a save file, perform zero-comp compression of the
-contents. Not all ports support zero-comp compression. It has no effect
+When writing out a save file, perform zero-comp compression of the
+contents. Not all ports support zero-comp compression. It has no effect
on reading an existing save file.
\elist
windowtype that you have chosen.
Character strings that are too long may be truncated.
Not all window ports will adjust for all settings listed
-here. You can safely add any of these options to your
-config file, and if the window port is capable of adjusting
+here. You can safely add any of these options to your
+config file, and if the window port is capable of adjusting
to suit your preferences, it will attempt to do so. If it
-can't it will silently ignore it. You can find out if an
+can't it will silently ignore it. You can find out if an
option is supported by the window port that you are currently
using by checking to see if it shows up in the Options list.
Some options are dynamic and can be specified during the game
If {\it NetHack\/} can, it should display an ascii map.
%.lp
\item[\ib{color}]
-If {\it NetHack\/} can, it should display color for different monsters objects, and dungeon features.
+If {\it NetHack\/} can, it should display color for different monsters,
+objects, and dungeon features.
%.lp
\item[\ib{eight\verb+_+bit\verb+_+tty}]
-Pass eight-bit character values (for example, specified with the {\it
-traps \/} option) straight through to your terminal (default off).
+Pass eight-bit character values (for example, specified with the
+{\it traps \/} option) straight through to your terminal (default off).
%.lp
\item[\ib{font\verb+_+map}]
-If {\it NetHack\/} can, it should use a font by the chosen name for the map window.
+If {\it NetHack\/} can, it should use a font by the chosen name for the
+map window.
%.lp
\item[\ib{font\verb+_+menu}]
-If {\it NetHack\/} can, it should use a font by the chosen name for menu windows.
+If {\it NetHack\/} can, it should use a font by the chosen name for menu
+windows.
%.lp
\item[\ib{font\verb+_+message}]
If {\it NetHack\/} can, it should use a font by the chosen name for the message window.
If {\it NetHack\/} can, it should display inverse when the game specifies it.
%.lp
\item[\ib{vary\verb+_+msgcount}]
-If {\it NetHack\/} can, it should display this number of messages at a time in the message window.
+If {\it NetHack\/} can, it should display this number of messages at a time
+in the message window.
%.lp
\item[\ib{windowcolors}]
-If {\it NetHack\/} can, it should display windows with the specified foreground/background
-colors if it can.
+If {\it NetHack\/} can, it should display windows with the specified
+foreground/background colors if it can.
%.lp
\item[\ib{wraptext}]
-If {\it NetHack\/} can, it should wrap long lines of text if they don't fit in
-the visible area of the window.
+If {\it NetHack\/} can, it should wrap long lines of text if they don't fit
+in the visible area of the window.
\elist
%.hn 2
\subsection*{Platform-specific Customization options}
%.pg
-Here are explanations of options that are used by specific platforms
+Here are explanations of options that are used by specific platforms
or ports to customize and change the port behavior.
\blist{}
Use BIOS calls to update the screen display quickly and to read the keyboard
(allowing the use of arrow keys to move) on machines with an IBM PC
compatible BIOS ROM (default off, {\it OS/2, PC\/ {\rm and} ST NetHack\/} only).
-%.lp
+%.lp
\item[\ib{flush}]
(default off, {\it Amiga NetHack \/} only).
-%.lp
+%.lp
\item[\ib{Macgraphics}]
(default on, {\it Mac NetHack \/} only).
-%.lp
+%.lp
\item[\ib{page\verb+_+wait}]
(default off, {\it Mac NetHack \/} only).
%.lp
\item[\ib{rawio}]
Force raw (non-cbreak) mode for faster output and more
bulletproof input (MS-DOS sometimes treats `{\tt \^{}P}' as a printer toggle
-without it) (default off, {\it OS/2, PC\/ {\rm and} ST NetHack\/} only).
+without it) (default off, {\it OS/2, PC\/ {\rm and} ST NetHack\/} only).
Note: DEC Rainbows hang if this is turned on.
Cannot be set with the `{\tt O}' command.
%.lp
\item[\ib{subkeyvalue}]
({\it Win32 tty NetHack \/} only).
May be used to alter the value of keystrokes that the operating system
-returns to {\it NetHack\/} to help compensate for international keyboard issues.
+returns to {\it NetHack\/} to help compensate for international keyboard
+issues.
OPTIONS=subkeyvalue:171/92
will return 92 to {\it NetHack\/}, if 171 was originally going to be returned.
You can use multiple subkeyvalue statements in the config file if needed.
%.lp
\item[\ib{video}]
Set the video mode used ({\it PC\/ NetHack\/} only).
-Values are {\it autodetect\/}, {\it default\/}, or {\it vga\/}.
-Setting {\it vga\/} (or {\it autodetect\/} with vga hardware present) will cause
-the game to display tiles.
+Values are {\it autodetect\/}, {\it default\/}, or {\it vga\/}.
+Setting {\it vga\/} (or {\it autodetect\/} with vga hardware present) will
+cause the game to display tiles.
Cannot be set with the `{\tt O}' command.
%.lp
\item[\ib{videocolors}]
expression to be used as a pattern to match against the singular form of the
description of an object at your location.
-In addition, some characters are treated specially if they occur as the first
+In addition, some characters are treated specially if they occur as the first
character in the pattern, specifically:
%.sd
\subsection*{Configuring User Sounds}
%.pg
-Some platforms allow you to define sound files to be played when a message
+Some platforms allow you to define sound files to be played when a message
that matches a user-defined pattern is delivered to the message window.
At this time the Qt port and the win32tty and win32gui ports support the
use of user sounds.
%.pg
Your copy of {\it NetHack\/} may have been compiled with support for {\it Status Hilites}.
-If so, you can customize your game display by setting thresholds to
+If so, you can customize your game display by setting thresholds to
change the color or appearance of fields in the status display.
%.pg
The format for defining status colors is:
wants.
%.lp ""
-The in-game options menu can help you determine the correct syntax for a
+The in-game options menu can help you determine the correct syntax for a
config file.
%.lp ""
{\it NetHack\/} can load entire symbol sets from the symbol file.
%.pg
-The options that are used to select a particular symbol set from the
+The options that are used to select a particular symbol set from the
symbol file are:
\blist{}
%.lp
\item[\ib{roguesymset}]
-Set the name of the symbol set that you want to load for display
+Set the name of the symbol set that you want to load for display
on the rogue level.
\elist
-You can also override one or more symbols using the {\it SYMBOLS\/} config
-file option. Symbols are specified as {\it name:value\/} pairs. Note that
+You can also override one or more symbols using the {\it SYMBOLS\/} config
+file option. Symbols are specified as {\it name:value\/} pairs. Note that
{\it NetHack\/} escape-processes the {\it value\/} string in conventional C
fashion. This means that `\verb+\+' is a prefix to take the following
character literally. Thus `\verb+\+' needs to be represented as `\verb+\\+'.
%.pg
{\it NetHack\/} can be set up to use only standard ASCII characters for making
-maps of the dungeons. This makes the MS-DOS versions of {\it NetHack\/} completely
+maps of the dungeons. This makes the MS-DOS versions of {\it NetHack\/}
+completely
accessible to the blind who use speech and/or Braille access technologies.
Players will require a good working knowledge of their screen-reader's
review features, and will have to know how to navigate horizontally and
%.pg
While it is not difficult for experienced users to edit the {\it defaults.nh\/}
file to accomplish this, novices may find this task somewhat daunting.
-Included within the symbol file of all official distributions of {\it NetHack\/}
+Included within the symbol file of all official distributions of {\it NetHack\/}
is a symset called {\it NHAccess\/}. Selecting that symset in your
-configuration file will cause the game to run in a manner accessible
-to the blind. After you have gained some experience with the game
-and with editing files, you may want to alter settings via {\it SYMBOLS=\/}
-in your configuration file to better suit your preferences.
+configuration file will cause the game to run in a manner accessible
+to the blind. After you have gained some experience with the game
+and with editing files, you may want to alter settings via {\it SYMBOLS=\/}
+in your configuration file to better suit your preferences.
The most crucial settings to make the game accessible are:
%.pg
\blist{}
Load a symbol set appropriate for use by blind players.
%.lp
\item[\ib{roguesymset:NHAccess}]
-Load a symbol set for the rogue level that is appropriate for
+Load a symbol set for the rogue level that is appropriate for
use by blind players.
%.lp
\item[\ib{menustyle:traditional}]
%.lp
\item[\ib{number\verb+_+pad}]
A lot of speech access programs use the number-pad to review the screen.
-If this is the case, disable the number\verb+_+pad option and use the traditional
-Rogue-like commands.
+If this is the case, disable the number\verb+_+pad option and use the
+traditional Rogue-like commands.
%.lp
\item[\ib{autodescribe}]
Automatically describe the terrain under the cursor when targeting.
%.pg
If {\it NetHack\/} is compiled with the SYSCF option, a system administrator
-should set up a global configuration; this is a file in the
+should set up a global configuration; this is a file in the
same format as the traditional per-user configuration file (see above).
This file should be named sysconf and placed in the same directory as
%.pg
\medskip
-The 3.3 development team, consisting of {\it Michael Allison}, {\it Ken Arromdee},
-{\it David Cohrs}, {\it Jessie Collet}, {\it Steve Creps}, {\it Kevin Darcy},
-{\it Timo Hakulinen}, {\it Kevin Hugo}, {\it Steve Linhart}, {\it Ken Lorber},
-{\it Dean Luick}, {\it Pat Rankin}, {\it Eric Smith}, {\it Mike Stephenson},
-{\it Janet Walz}, and {\it Paul Winner}, released 3.3.0 in
+The 3.3 development team, consisting of {\it Michael Allison}, {\it Ken Arromdee},
+{\it David Cohrs}, {\it Jessie Collet}, {\it Steve Creps}, {\it Kevin Darcy},
+{\it Timo Hakulinen}, {\it Kevin Hugo}, {\it Steve Linhart}, {\it Ken Lorber},
+{\it Dean Luick}, {\it Pat Rankin}, {\it Eric Smith}, {\it Mike Stephenson},
+{\it Janet Walz}, and {\it Paul Winner}, released 3.3.0 in
December 1999 and 3.3.1 in August of 2000.
%.pg
\medskip
-Version 3.3 offered many firsts. It was the first version to separate race
-and profession. The Elf class was removed in preference to an elf race,
-and the races of dwarves, gnomes, and orcs made their first appearance in
-the game alongside the familiar human race. Monk and Ranger roles joined
-Archeologists, Barbarians, Cavemen, Healers, Knights, Priests, Rogues, Samurai,
+Version 3.3 offered many firsts. It was the first version to separate race
+and profession. The Elf class was removed in preference to an elf race,
+and the races of dwarves, gnomes, and orcs made their first appearance in
+the game alongside the familiar human race. Monk and Ranger roles joined
+Archeologists, Barbarians, Cavemen, Healers, Knights, Priests, Rogues, Samurai,
Tourists, Valkyries and of course, Wizards. It was also the first version
-to allow you to ride a steed, and was the first version to have a publicly
-available web-site listing all the bugs that had been discovered. Despite
+to allow you to ride a steed, and was the first version to have a publicly
+available web-site listing all the bugs that had been discovered. Despite
that constantly growing bug list, 3.3 proved stable enough to last for
more than a year and a half.
%.pg
\medskip
-The 3.4 development team initially consisted of
+The 3.4 development team initially consisted of
{\it Michael Allison}, {\it Ken Arromdee},
{\it David Cohrs}, {\it Jessie Collet}, {\it Kevin Hugo}, {\it Ken Lorber},
-{\it Dean Luick}, {\it Pat Rankin}, {\it Mike Stephenson},
-{\it Janet Walz}, and {\it Paul Winner}, with {\it Warwick Allison} joining
+{\it Dean Luick}, {\it Pat Rankin}, {\it Mike Stephenson},
+{\it Janet Walz}, and {\it Paul Winner}, with {\it Warwick Allison} joining
just before the release of {\it NetHack\/} 3.4.0 in March 2002.
%.pg
%.pg
\medskip
-\nd {\it Michael Allison} maintained {\it NetHack\/} 3.4 for the MS-DOS platform.
+\nd {\it Michael Allison} maintained {\it NetHack\/} 3.4 for the MS-DOS
+platform.
{\it Paul Winner} and {\it Yitzhak Sapir} provided encouragement.
%.pg
%.pg
\medskip
-\nd {\it Michael Allison}, {\it David Cohrs}, {\it Alex Kompel}, {\it Dion Nicolaas}, and
-{\it Yitzhak Sapir} maintained and enhanced 3.4 for the Microsoft Windows platform.
-{\it Alex Kompel} contributed a new graphical interface for the Windows port.
+\nd {\it Michael Allison}, {\it David Cohrs}, {\it Alex Kompel},
+{\it Dion Nicolaas}, and
+{\it Yitzhak Sapir} maintained and enhanced 3.4 for the Microsoft Windows
+platform.
+{\it Alex Kompel} contributed a new graphical interface for the Windows port.
{\it Alex Kompel} also contributed a Windows CE port for 3.4.1.
%.pg
\medskip
-\nd {\it Ron Van Iwaarden} was the sole maintainer of {\it NetHack\/} for OS/2 the past
+\nd {\it Ron Van Iwaarden} was the sole maintainer of {\it NetHack\/} for
+OS/2 the past
several releases. Unfortunately Ron's last OS/2 machine stopped working in
-early 2006. A great many thanks to Ron for keeping {\it NetHack\/} alive on OS/2
-all these years.
+early 2006. A great many thanks to Ron for keeping {\it NetHack\/} alive on
+OS/2 all these years.
%.pg
\medskip
%.pg
\medskip
-The release of {\it NetHack\/} 3.4.3 in December 2003 marked the beginning of a
-long release hiatus. 3.4.3 proved to be a remarkably stable version that
-provided continued enjoyment by the community for more than a decade. The
-devteam slowly and quietly continued to work on the game behind the scenes
-during the tenure of 3.4.3. It was during that same period that several new
-variants emerged within the {\it NetHack\/} community. Notably sporkhack by
-Derek S. Ray, {\it unnethack\/} by Patric Mueller, {\it nitrohack\/} and its successors
-originally by Daniel Thaler and then by Alex Smith, and
-{\it Dynahack\/} by Tung Nguyen. Some of those variants continue to be developed,
-maintained, and enjoyed by the community to this day.
+The release of {\it NetHack\/} 3.4.3 in December 2003 marked the beginning of
+a long release hiatus. 3.4.3 proved to be a remarkably stable version that
+provided continued enjoyment by the community for more than a decade. The
+devteam slowly and quietly continued to work on the game behind the scenes
+during the tenure of 3.4.3. It was during that same period that several new
+variants emerged within the {\it NetHack\/} community. Notably sporkhack by
+Derek S. Ray, {\it unnethack\/} by Patric Mueller, {\it nitrohack\/} and its
+successors originally by Daniel Thaler and then by Alex Smith, and
+{\it Dynahack\/} by Tung Nguyen. Some of those variants continue to be
+developed, maintained, and enjoyed by the community to this day.
%.pg
\medskip
-In September 2014, an interim snapshot of the code under development was
-released publicly by other parties. Since that code was a work-in-progress
+In September 2014, an interim snapshot of the code under development was
+released publicly by other parties. Since that code was a work-in-progress
and had not gone through the process of debugging it as a suitable release,
-it was decided that the version numbers present on that code snapshot would
-be retired and never used in an official {\it NetHack\/} release. An announcement
-was posted on the devteam's official {\it nethack.org\/} website to that effect,
-stating that there would never be a 3.4.4, 3.5, or 3.5.0 official release
-version.
+it was decided that the version numbers present on that code snapshot would
+be retired and never used in an official {\it NetHack\/} release. An
+announcement was posted on the devteam's official {\it nethack.org\/} website
+to that effect, stating that there would never be a 3.4.4, 3.5, or 3.5.0
+official release version.
%.pg
\medskip
%.pg
\medskip
At the beginning of development for what would eventually get released
-as 3.6.0, the development team consisted of {\it Warwick Allison},
+as 3.6.0, the development team consisted of {\it Warwick Allison},
{\it Michael Allison}, {\it Ken Arromdee},
-{\it David Cohrs}, {\it Jessie Collet},
-{\it Ken Lorber}, {\it Dean Luick}, {\it Pat Rankin},
+{\it David Cohrs}, {\it Jessie Collet},
+{\it Ken Lorber}, {\it Dean Luick}, {\it Pat Rankin},
{\it Mike Stephenson}, {\it Janet Walz}, and {\it Paul Winner}.
In early 2015, ahead of the release of 3.6.0, new members
{\it Sean Hunt}, {\it Pasi Kallinen}, and {\it Derek S. Ray}
%.pg
\medskip
3.6.0 was released in December 2015, and merged work done by the development
-team since the release of 3.4.3 with some of the beloved community
+team since the release of 3.4.3 with some of the beloved community
patches. Many bugs were fixed and some code was restructured.
%.pg
\medskip
-In 2018, several hundred bug fixes for 3.6.0 and some new features
-were assembled and released as NetHack 3.6.1. The development team at
-the time of release of 3.6.1 consisted of {\it Michael Allison}, {\it Ken Arromdee},
-{\it David Cohrs}, {\it Jessie Collet}, {\it Pasi Kallinen}, {\it Ken Lorber},
-{\it Dean Luick}, {\it Patric Mueller}, {\it Pat Rankin}, {\it Derek S. Ray},
-{\it Alex Smith}, {\it Mike Stephenson}, {\it Janet Walz}, and {\it Paul Winner}.
+In 2018, several hundred bug fixes for 3.6.0 and some new features
+were assembled and released as NetHack 3.6.1. The development team at
+the time of release of 3.6.1 consisted of {\it Michael Allison},
+{\it Ken Arromdee}, {\it David Cohrs}, {\it Jessie Collet},
+{\it Pasi Kallinen}, {\it Ken Lorber}, {\it Dean Luick},
+{\it Patric Mueller}, {\it Pat Rankin}, {\it Derek S. Ray},
+{\it Alex Smith}, {\it Mike Stephenson}, {\it Janet Walz}, and
+{\it Paul Winner}.
%.pg
\medskip
-The development team, as well as {\it Steve VanDevender} and
-{\it Kevin Smolkowski}, ensured that {\it NetHack\/} 3.6 continued to operate on
-various Unix flavors and maintained the X11 interface.
+The development team, as well as {\it Steve VanDevender} and
+{\it Kevin Smolkowski}, ensured that {\it NetHack\/} 3.6 continued to
+operate on various Unix flavors and maintained the X11 interface.
%.pg
-{\it Ken Lorber}, {\it Haoyang Wang}, {\it Pat Rankin}, and {\it Dean Luick}
+{\it Ken Lorber}, {\it Haoyang Wang}, {\it Pat Rankin}, and {\it Dean Luick}
maintained the port of {\it NetHack\/} 3.6 for Mac OSX.
%.pg
\medskip
-{\it Michael Allison}, {\it David Cohrs}, {\it Barton House}, {\it Pasi Kallinen},
-{\it Alex Kompel}, {\it Dion Nicolaas}, {\it Derek S. Ray} and {\it Yitzhak Sapir}
+{\it Michael Allison}, {\it David Cohrs}, {\it Barton House},
+{\it Pasi Kallinen}, {\it Alex Kompel}, {\it Dion Nicolaas},
+{\it Derek S. Ray} and {\it Yitzhak Sapir}
maintained the port of {\it NetHack\/} 3.6 for Microsoft Windows.
%.pg
%.pg
\medskip
-\nd The official {\it NetHack\/} web site is maintained by {\it Ken Lorber} at
+\nd The official {\it NetHack\/} web site is maintained by {\it Ken Lorber} at
{\catcode`\#=11
\special{html:<a href="http://www.nethack.org/">}}
http:{\tt /}{\tt /}www.nethack.org{\tt /}.
%.hn 2
\subsection*{Special Thanks}
-\nd On behalf ot the {\it NetHack\/} community, thank you very much once
+\nd On behalf ot the {\it NetHack\/} community, thank you very much once
again to {\it M. Drew Streib}, {\it Pasi Kallinen} and {\it Robin Bandy} for
-providing public {\it NetHack\/} servers at {\it nethack.alt.org\/} and {\it devnull.net\/}
-and/or for hosting annual {\it NetHack\/} tournaments.
+providing public {\it NetHack\/} servers at {\it nethack.alt.org\/} and
+{\it devnull.net\/} and/or for hosting annual {\it NetHack\/} tournaments.
\clearpage
%.hn