From 7ac64532a960ddce71c6c895e6f2bc65787ca5d4 Mon Sep 17 00:00:00 2001 From: PatR Date: Tue, 8 Dec 2015 15:15:00 -0800 Subject: [PATCH] man page updates Update the man pages and generated text copies for nethack and recover. I haven't looked at the other four (dlb, makedefs, dgn_comp, lev_comp). recover's page referred to INSURANCE as being conditional, which is no longer the case. nethack's page was missing a bunch of files to be found in the playground and also a couple of environment variables. I haven't read through the text of the page to try to see whether other updates are warranted. The generated text is wider than the previous copy (one or two space right margin instead of 5 or so). I just used 'make nethack.txt' and 'make recover.txt' so don't know why that changed. (The older, wider margin looks better, so if anyone knows how to fix this, please do. And there's got to be a better way to force a blank line inside a table than my hack.) --- doc/nethack.6 | 93 +++++++++++--- doc/nethack.txt | 317 ++++++++++++++++++++++++++---------------------- doc/recover.6 | 25 +--- doc/recover.txt | 177 ++++++++++----------------- 4 files changed, 319 insertions(+), 293 deletions(-) diff --git a/doc/nethack.6 b/doc/nethack.6 index f92703069..3803ae583 100644 --- a/doc/nethack.6 +++ b/doc/nethack.6 @@ -1,5 +1,5 @@ -.TH NETHACK 6 "6 March 2004" -.\" NetHack 3.6 nethack.6 $NHDT-Date: 1432512786 2015/05/25 00:13:06 $ $NHDT-Branch: master $:$NHDT-Revision: 1.10 $ +.TH NETHACK 6 "7 December 2015" +.\" NetHack 3.6 nethack.6 $NHDT-Date: 1449616496 2015/12/08 23:14:56 $ $NHDT-Branch: NetHack-3.6.0 $:$NHDT-Revision: 1.11 $ .SH NAME nethack \- Exploring The Mazes of Menace .SH SYNOPSIS @@ -226,10 +226,17 @@ development by the Usenet. Andries Brouwer has made this request for the distinction, as he may eventually release a new version of his own. .SH FILES .PP -All files are in the playground, normally /usr/games/lib/nethackdir. +Run-time configuration options were discussed above and use a platform +specific name for a file in a platform specific location. For Unix, the +name is '.nethackrc' in the user's home directory. + +.br +All other files are in the playground directory, +normally /usr/games/lib/nethackdir. If DLB was defined during the compile, the data files and special levels will be inside a larger file, normally nhdat, instead of being separate files. + .br .DT .ta \w'cmdhelp, opthelp, wizhelp\ \ \ 'u @@ -237,7 +244,18 @@ nethack The program itself. .br data, oracles, rumors Data files used by NetHack. .br -options, quest.dat More data files. +quest.dat, bogusmon More data files. +.br +engrave, epitaph, tribute Still more data files. +.br +symbols Data file holding sets of specifications +.br + for how to display monsters, objects, and +.br + map features. +.br +options Data file containing a description of the + build-time option settings. .br help, hh Help data files. .br @@ -253,26 +271,63 @@ license Rules governing redistribution. .br record The list of top scorers. .br -logfile An extended list of games +logfile An extended list of games played +.br + (optional). +.br +xlogfile A more detailed version of 'logfile' +.br + (also optional). +.br +paniclog Record of exceptional conditions +.br + discovered during program execution. +.br +xlock.nn Description of dungeon level 'nn' of +.br + active game 'x' if there's a limit on the .br - played. + number of simultaneously active games. .br -xlock.nnn Description of a dungeon level. +UUcccccc.nn Alternate form for dungeon level 'nn' .br -perm Lock file for xlock.dd. + of active game by user 'UU' playing .br -bonesDD.nn Descriptions of the ghost and + character named 'cccccc' when there's no .br - belongings of a deceased + limit on number of active games. .br - adventurer. +perm Lock file for xlock.0 or UUcccccc.0. .br -save A subdirectory containing the +bonesDD.nn Descriptions of the ghost and belongings .br - saved games. + of a deceased adventurer who met his +.br + or her demise on level 'nn'. +.br +.\"following line should contain + +.br +save/ A subdirectory containing saved games. +.br +.\"following line should contain + +.br +sysconf System-wide options. Required if +.br + program is built with 'SYSCF' option +.br + enabled, ignored if not. +.br + +The location of 'sysconf' is specified at build time and can't be changed +except by updating source file "config.h" and rebuilding the program. +.br + +In a perfect world, 'paniclog' would remain empty. .SH ENVIRONMENT .DT -.ta \w'HACKPAGER or PAGER\ \ \ 'u +.ta \w'NETHACKDIR or HACKDIR\ \ \ 'u USER or LOGNAME Your login name. .br HOME Your home directory. @@ -289,14 +344,20 @@ MAILREADER Replacement for default reader .br (probably /bin/mail or /usr/ucb/mail). .br -NETHACKDIR Playground. +NETHACKDIR or HACKDIR Playground. .br NETHACKOPTIONS String predefining several NetHack .br options. .br -In addition, SHOPTYPE is used in debugging (wizard) mode. +If the same option is specified in both NETHACKOPTIONS and .nethackrc, +the value assigned in NETHACKOPTIONS takes precedence. +.br + +SHOPTYPE and SPLEVTYPE can be used in debugging (wizard) mode. +.br +DEBUGFILES can be used if the program was built with 'DEBUG' enabled. .SH "SEE ALSO" .PP dgn_comp(6), lev_comp(6), recover(6) diff --git a/doc/nethack.txt b/doc/nethack.txt index e75cc93a6..9e6275edf 100644 --- a/doc/nethack.txt +++ b/doc/nethack.txt @@ -1,4 +1,4 @@ -NETHACK(6) NETHACK(6) +NETHACK(6) NETHACK(6) @@ -6,143 +6,150 @@ NAME nethack - Exploring The Mazes of Menace SYNOPSIS - nethack [ -d directory ] [ -n ] [ -p profession ] [ -r race ] [ - -[DX] ] [ -u playername ] [ -dec ] [ -ibm ] + nethack [ -d directory ] [ -n ] [ -p profession ] [ -r race ] [ -[DX] ] + [ -u playername ] [ -dec ] [ -ibm ] - nethack [ -d directory ] -s [ -v ] [ -p profession ] [ -r race ] - [ playernames ] + nethack [ -d directory ] -s [ -v ] [ -p profession ] [ -r race ] [ + playernames ] DESCRIPTION - NetHack is a display oriented Dungeons & Dragons(tm) - like game. - The standard tty display and command structure resemble rogue. - - Other, more graphical display options exist if you are using - either a PC, or an X11 interface. - - To get started you really only need to know two commands. The - command ? will give you a list of the available commands (as - well as other information) and the command / will identify the - things you see on the screen. - - To win the game (as opposed to merely playing to beat other peo- - ple's high scores) you must locate the Amulet of Yendor which is - somewhere below the 20th level of the dungeon and get it out. - Nobody has achieved this yet; anybody who does will probably go - down in history as a hero among heroes. - - When the game ends, whether by your dying, quitting, or escaping - from the caves, NetHack will give you (a fragment of) the list of - top scorers. The scoring is based on many aspects of your behav- - ior, but a rough estimate is obtained by taking the amount of - gold you've found in the cave plus four times your (real) experi- - ence. Precious stones may be worth a lot of gold when brought to - the exit. There is a 10% penalty for getting yourself killed. - - The environment variable NETHACKOPTIONS can be used to initialize - many run-time options. The ? command provides a description of - these options and syntax. (The -dec and -ibm command line - options are equivalent to the decgraphics and ibmgraphics run- - time options described there, and are provided purely for conve- - nience on systems supporting multiple types of terminals.) - - Because the option list can be very long (particularly when spec- - ifying graphics characters), options may also be included in a - configuration file. The default is located in your home direc- - tory and named .nethackrc on Unix systems. On other systems, the - default may be different, usually NetHack.cnf. On DOS or Win- - dows, the name is defaults.nh, while on the Macintosh or BeOS, it - is NetHack Defaults. The configuration file's location may be - specified by setting NETHACKOPTIONS to a string consisting of an - @ character followed by the filename. - - The -u playername option supplies the answer to the question "Who - are you?". It overrides any name from the options or configura- - tion file, USER, LOGNAME, or getlogin(), which will otherwise be - tried in order. If none of these provides a useful name, the - player will be asked for one. Player names (in conjunction with - uids) are used to identify save files, so you can have several - saved games under different names. Conversely, you must use the - appropriate player name to restore a saved game. - - A playername suffix can be used to specify the profession, race, - alignment and/or gender of the character. The full syntax of the - playername that includes a suffix is "name-ppp-rrr-aaa-ggg". - "ppp" are at least the first three letters of the profession - (this can also be specified using a separate -p profession - option). "rrr" are at least the first three letters of the char- - acter's race (this can also be specified using a separate -r race - option). "aaa" are at last the first three letters of the char- - acter's alignment, and "ggg" are at least the first three letters - of the character's gender. Any of the parts of the suffix may be - left out. - - -p profession can be used to determine the character profession, - also known as the role. You can specify either the male or female - name for the character role, or the first three characters of the - role as an abbreviation. -p @ has been retained to explicitly - request that a random role be chosen. It may need to be quoted - with a backslash (\@) if @ is the "kill" character (see "stty") - for the terminal, in order to prevent the current input line from - being cleared. - - Likewise, -r race can be used to explicitly request that a race - be chosen. - - Leaving out any of these characteristics will result in you being + NetHack is a display oriented Dungeons & Dragons(tm) - like game. The + standard tty display and command structure resemble rogue. + + Other, more graphical display options exist for most platforms. + + To get started you really only need to know two commands. The command + ? will give you a list of the available commands (as well as other + information) and the command / will identify the things you see on the + screen. + + To win the game (as opposed to merely playing to beat other people's + high scores) you must locate the Amulet of Yendor which is somewhere + below the 20th level of the dungeon and get it out. Few people achieve + this; most never do. Those who have go down in history as heros among + heroes - and then they find ways of making the game even harder. See + the Guidebook section on Conduct if this game has gotten too easy for + you. + + When the game ends, whether by your dying, quitting, or escaping from + the caves, NetHack will give you (a fragment of) the list of top scor- + ers. The scoring is based on many aspects of your behavior, but a + rough estimate is obtained by taking the amount of gold you've found in + the cave plus four times your (real) experience. Precious stones may + be worth a lot of gold when brought to the exit. There is a 10% + penalty for getting yourself killed. + + The environment variable NETHACKOPTIONS can be used to initialize many + run-time options. The ? command provides a description of these + options and syntax. (The -dec and -ibm command line options are equiv- + alent to the decgraphics and ibmgraphics run-time options described + there, and are provided purely for convenience on systems supporting + multiple types of terminals.) + + Because the option list can be very long (particularly when specifying + graphics characters), options may also be included in a configuration + file. The default is located in your home directory and named + .nethackrc on Unix systems. On other systems, the default may be dif- + ferent, usually NetHack.cnf. On DOS or Windows, the name is + defaults.nh, while on the Macintosh or BeOS, it is NetHack Defaults. + The configuration file's location may be specified by setting NETHACK- + OPTIONS to a string consisting of an @ character followed by the file- + name. + + The -u playername option supplies the answer to the question "Who are + you?". It overrides any name from the options or configuration file, + USER, LOGNAME, or getlogin(), which will otherwise be tried in order. + If none of these provides a useful name, the player will be asked for + one. Player names (in conjunction with uids) are used to identify save + files, so you can have several saved games under different names. Con- + versely, you must use the appropriate player name to restore a saved + game. + + A playername suffix can be used to specify the profession, race, align- + ment and/or gender of the character. The full syntax of the playername + that includes a suffix is "name-ppp-rrr-aaa-ggg". "ppp" are at least + the first three letters of the profession (this can also be specified + using a separate -p profession option). "rrr" are at least the first + three letters of the character's race (this can also be specified using + a separate -r race option). "aaa" are at last the first three letters + of the character's alignment, and "ggg" are at least the first three + letters of the character's gender. Any of the parts of the suffix may + be left out. + + -p profession can be used to determine the character profession, also + known as the role. You can specify either the male or female name for + the character role, or the first three characters of the role as an + abbreviation. -p @ has been retained to explicitly request that a ran- + dom role be chosen. It may need to be quoted with a backslash (\@) if + @ is the "kill" character (see "stty") for the terminal, in order to + prevent the current input line from being cleared. + + Likewise, -r race can be used to explicitly request that a race be cho- + sen. + + Leaving out any of these characteristics will result in you being prompted during the game startup for the information. - The -s option alone will print out the list of your scores on the - current version. An immediately following -v reports on all ver- - sions present in the score file. The -s may also be followed by - arguments -p and -r to print the scores of particular roles and - races only. It may also be followed by one or more player names - to print the scores of the players mentioned, by 'all' to print - out all scores, or by a number to print that many top scores. + The -s option alone will print out the list of your scores on the cur- + rent version. An immediately following -v reports on all versions + present in the score file. The -s may also be followed by arguments -p + and -r to print the scores of particular roles and races only. It may + also be followed by one or more player names to print the scores of the + players mentioned, by 'all' to print out all scores, or by a number to + print that many top scores. - The -n option suppresses printing of any news from the game - administrator. + The -n option suppresses printing of any news from the game administra- + tor. - The -D or -X option will start the game in a special non-scoring - discovery mode. -D will, if the player is the game administra- - tor, start in debugging (wizard) mode instead. + The -D or -X option will start the game in a special non-scoring dis- + covery mode. -D will, if the player is the game administrator, start + in debugging (wizard) mode instead. - The -d option, which must be the first argument if it appears, - supplies a directory which is to serve as the playground. It - overrides the value from NETHACKDIR, HACKDIR, or the directory - specified by the game administrator during compilation (usually - /usr/games/lib/nethackdir). This option is usually only useful - to the game administrator. The playground must contain several - auxiliary files such as help files, the list of top scorers, and - a subdirectory save where games are saved. + The -d option, which must be the first argument if it appears, supplies + a directory which is to serve as the playground. It overrides the + value from NETHACKDIR, HACKDIR, or the directory specified by the game + administrator during compilation (usually /usr/games/lib/nethackdir). + This option is usually only useful to the game administrator. The + playground must contain several auxiliary files such as help files, the + list of top scorers, and a subdirectory save where games are saved. AUTHORS - Jay Fenlason (+ Kenny Woodland, Mike Thome and Jon Payne) wrote - the original hack, very much like rogue (but full of bugs). + Jay Fenlason (+ Kenny Woodland, Mike Thome and Jon Payne) wrote the + original hack, very much like rogue (but full of bugs). - Andries Brouwer continuously deformed their sources into an - entirely different game. + Andries Brouwer continuously deformed their sources into an entirely + different game. - Mike Stephenson has continued the perversion of sources, adding - various warped character classes and sadistic traps with the help - of many strange people who reside in that place between the - worlds, the Usenet Zone. A number of these miscreants are immor- - talized in the historical roll of dishonor and various other - places. + Mike Stephenson has continued the perversion of sources, adding various + warped character classes and sadistic traps with the help of many + strange people who reside in that place between the worlds, the Usenet + Zone. A number of these miscreants are immortalized in the historical + roll of dishonor and various other places. - The resulting mess is now called NetHack, to denote its develop- - ment by the Usenet. Andries Brouwer has made this request for - the distinction, as he may eventually release a new version of - his own. + The resulting mess is now called NetHack, to denote its development by + the Usenet. Andries Brouwer has made this request for the distinction, + as he may eventually release a new version of his own. FILES - All files are in the playground, normally - /usr/games/lib/nethackdir. If DLB was defined during the com- - pile, the data files and special levels will be inside a larger - file, normally nhdat, instead of being separate files. + Run-time configuration options were discussed above and use a platform + specific name for a file in a platform specific location. For Unix, + the name is '.nethackrc' in the user's home directory. + + All other files are in the playground directory, normally + /usr/games/lib/nethackdir. If DLB was defined during the compile, the + data files and special levels will be inside a larger file, normally + nhdat, instead of being separate files. + nethack The program itself. data, oracles, rumors Data files used by NetHack. - options, quest.dat More data files. + quest.dat, bogusmon More data files. + engrave, epitaph, tribute Still more data files. + symbols Data file holding sets of specifications + for how to display monsters, objects, and + map features. + options Data file containing a description of the + build-time option settings. help, hh Help data files. cmdhelp, opthelp, wizhelp More help data files. *.lev Predefined special levels. @@ -150,30 +157,54 @@ FILES history A short history of NetHack. license Rules governing redistribution. record The list of top scorers. - logfile An extended list of games - played. - xlock.nnn Description of a dungeon level. - perm Lock file for xlock.dd. - bonesDD.nn Descriptions of the ghost and - belongings of a deceased - adventurer. - save A subdirectory containing the - saved games. + logfile An extended list of games played + (optional). + xlogfile A more detailed version of 'logfile' + (also optional). + paniclog Record of exceptional conditions + discovered during program execution. + xlock.nn Description of dungeon level 'nn' of + active game 'x' if there's a limit on the + number of simultaneously active games. + UUcccccc.nn Alternate form for dungeon level 'nn' + of active game by user 'UU' playing + character named 'cccccc' when there's no + limit on number of active games. + perm Lock file for xlock.0 or UUcccccc.0. + bonesDD.nn Descriptions of the ghost and belongings + of a deceased adventurer who met his + or her demise on level 'nn'. + + save/ A subdirectory containing saved games. + + sysconf System-wide options. Required if + program is built with 'SYSCF' option + enabled, ignored if not. + + The location of 'sysconf' is specified at build time and can't be + changed except by updating source file "config.h" and rebuilding the + program. + + In a perfect world, 'paniclog' would remain empty. ENVIRONMENT - USER or LOGNAME Your login name. - HOME Your home directory. - SHELL Your shell. - TERM The type of your terminal. - HACKPAGER or PAGER Replacement for default pager. - MAIL Mailbox file. - MAILREADER Replacement for default reader - (probably /bin/mail or /usr/ucb/mail). - NETHACKDIR Playground. - NETHACKOPTIONS String predefining several NetHack - options. - - In addition, SHOPTYPE is used in debugging (wizard) mode. + USER or LOGNAME Your login name. + HOME Your home directory. + SHELL Your shell. + TERM The type of your terminal. + HACKPAGER or PAGER Replacement for default pager. + MAIL Mailbox file. + MAILREADER Replacement for default reader + (probably /bin/mail or /usr/ucb/mail). + NETHACKDIR or HACKDIR Playground. + NETHACKOPTIONS String predefining several NetHack + options. + + If the same option is specified in both NETHACKOPTIONS and .nethackrc, + the value assigned in NETHACKOPTIONS takes precedence. + + SHOPTYPE and SPLEVTYPE can be used in debugging (wizard) mode. + DEBUGFILES can be used if the program was built with 'DEBUG' enabled. SEE ALSO dgn_comp(6), lev_comp(6), recover(6) @@ -187,4 +218,4 @@ BUGS - 6 March 2004 NETHACK(6) + 7 December 2015 NETHACK(6) diff --git a/doc/recover.6 b/doc/recover.6 index 4c9f50956..12ddcfc24 100644 --- a/doc/recover.6 +++ b/doc/recover.6 @@ -1,5 +1,5 @@ -.TH RECOVER 6 "9 January 1993" -.\" NetHack 3.6 recover.6 $NHDT-Date: 1432512786 2015/05/25 00:13:06 $ $NHDT-Branch: master $:$NHDT-Revision: 1.6 $ +.TH RECOVER 6 "7 December 2015" +.\" NetHack 3.6 recover.6 $NHDT-Date: 1449616497 2015/12/08 23:14:57 $ $NHDT-Branch: NetHack-3.6.0 $:$NHDT-Revision: 1.7 $ .UC 4 .SH NAME recover \- recover a NetHack game interrupted by disaster @@ -34,26 +34,11 @@ It overrides the value from NETHACKDIR, HACKDIR, or the directory specified by the game administrator during compilation (usually /usr/games/lib/nethackdir). .PP -^?ALLDOCS For recovery to be possible, -.I nethack -must have been compiled with the INSURANCE option, and the run-time option -.I checkpoint -must also have been on. -^: -^?INSURANCE -For recovery to be possible, -.I nethack -must have been compiled with the INSURANCE option (this configuration was), -and the run-time option +the run-time option .I checkpoint -must also have been on. -^: -This configuration of -.I nethack -was created without support for recovery. -^. -^. +must have been on. +.PP NetHack normally writes out files for levels as the player leaves them, so they will be ready for return visits. When checkpointing, NetHack also writes out the level entered and diff --git a/doc/recover.txt b/doc/recover.txt index 80eeadb51..484a6fe56 100644 --- a/doc/recover.txt +++ b/doc/recover.txt @@ -1,132 +1,81 @@ - - - -RECOVER(6) 1993 RECOVER(6) +RECOVER(6) RECOVER(6) NAME - recover - recover a NetHack game interrupted by disaster + recover - recover a NetHack game interrupted by disaster SYNOPSIS - recover [ -d directory ] base1 base2 ... + recover [ -d directory ] base1 base2 ... DESCRIPTION - Occasionally, a NetHack game will be interrupted by disaster - when the game or the system crashes. Prior to NetHack v3.1, - these games were lost because various information like the - player's inventory was kept only in memory. Now, all per- - tinent information can be written out to disk, so such games - can be recovered at the point of the last level change. - - The base options tell recover which files to process. Each - base option specifies recovery of a separate game. - - The -d option, which must be the first argument if it - appears, supplies a directory which is the NetHack play- - ground. It overrides the value from NETHACKDIR, HACKDIR, or - the directory specified by the game administrator during - compilation (usually /usr/games/lib/nethackdir). - - For recovery to be possible, nethack must have been compiled - with the INSURANCE option, and the run-time option check- - point must also have been on. NetHack normally writes out - files for levels as the player leaves them, so they will be - ready for return visits. When checkpointing, NetHack also - writes out the level entered and the current game state on - every level change. This naturally slows level changes down - somewhat. - - The level file names are of the form base.nn, where nn is an - internal bookkeeping number for the level. The file base.0 - is used for game identity, locking, and, when checkpointing, - for the game state. Various OSes use different strategies - for constructing the base name. Microcomputers use the - character name, possibly truncated and modified to be a - legal filename on that system. Multi-user systems use the - (modified) character name prefixed by a user number to avoid - conflicts, or "xlock" if the number of concurrent players is - being limited. It may be necessary to look in the play- - ground to find the correct base name of the interrupted - game. recover will transform these level files into a save - file of the same name as nethack would have used. - - Since recover must be able to read and delete files from the - playground and create files in the save directory, it has - interesting interactions with game security. Giving ordi- - nary players access to recover through setuid or setgid is - tantamount to leaving the playground world-writable, with - respect to both cheating and messing up other players. For - - - -January Last change: 9 1 - - - - - - -RECOVER(6) 1993 RECOVER(6) - - - - a single-user system, this of course does not change any- - thing, so some of the microcomputer ports install recover by - default. - - For a multi-user system, the game administrator may want to - arrange for all .0 files in the playground to be fed to - recover when the host machine boots, and handle game crashes - individually. If the user population is sufficiently - trustworthy, recover can be installed with the same permis- - sions the nethack executable has. In either case, recover - is easily compiled from the distribution utility directory. + Occasionally, a NetHack game will be interrupted by disaster when the + game or the system crashes. Prior to NetHack v3.1, these games were + lost because various information like the player's inventory was kept + only in memory. Now, all pertinent information can be written out to + disk, so such games can be recovered at the point of the last level + change. + + The base options tell recover which files to process. Each base option + specifies recovery of a separate game. + + The -d option, which must be the first argument if it appears, supplies + a directory which is the NetHack playground. It overrides the value + from NETHACKDIR, HACKDIR, or the directory specified by the game admin- + istrator during compilation (usually /usr/games/lib/nethackdir). + + For recovery to be possible, the run-time option checkpoint must have + been on. + + NetHack normally writes out files for levels as the player leaves them, + so they will be ready for return visits. When checkpointing, NetHack + also writes out the level entered and the current game state on every + level change. This naturally slows level changes down somewhat. + + The level file names are of the form base.nn, where nn is an internal + bookkeeping number for the level. The file base.0 is used for game + identity, locking, and, when checkpointing, for the game state. Vari- + ous OSes use different strategies for constructing the base name. + Microcomputers use the character name, possibly truncated and modified + to be a legal filename on that system. Multi-user systems use the + (modified) character name prefixed by a user number to avoid conflicts, + or "xlock" if the number of concurrent players is being limited. It + may be necessary to look in the playground to find the correct base + name of the interrupted game. recover will transform these level files + into a save file of the same name as nethack would have used. + + Since recover must be able to read and delete files from the playground + and create files in the save directory, it has interesting interactions + with game security. Giving ordinary players access to recover through + setuid or setgid is tantamount to leaving the playground world- + writable, with respect to both cheating and messing up other players. + For a single-user system, this of course does not change anything, so + some of the microcomputer ports install recover by default. + + For a multi-user system, the game administrator may want to arrange for + all .0 files in the playground to be fed to recover when the host + machine boots, and handle game crashes individually. If the user popu- + lation is sufficiently trustworthy, recover can be installed with the + same permissions the nethack executable has. In either case, recover + is easily compiled from the distribution utility directory. NOTES - Like nethack itself, recover will overwrite existing save- - files of the same name. Savefiles created by recover are - uncompressed; they may be compressed afterwards if desired, - but even a compression-using nethack will find them in the - uncompressed form. + Like nethack itself, recover will overwrite existing savefiles of the + same name. Savefiles created by recover are uncompressed; they may be + compressed afterwards if desired, but even a compression-using nethack + will find them in the uncompressed form. SEE ALSO - nethack(6) + nethack(6) BUGS - recover makes no attempt to find out if a base name speci- - fies a game in progress. If multiple machines share a play- - ground, this would be impossible to determine. - - recover should be taught to use the nethack playground lock- - ing mechanism to avoid conflicts. - - - - - - - - - - - - - - - - - - - - - - - - - + recover makes no attempt to find out if a base name specifies a game in + progress. If multiple machines share a playground, this would be + impossible to determine. -January Last change: 9 2 + recover should be taught to use the nethack playground locking mecha- + nism to avoid conflicts. +4th Berkeley Distribution 7 December 2015 RECOVER(6) -- 2.40.0