Penguin
Blame: falconseye(6)
EditPageHistoryDiffInfoLikePages
Annotated edit history of falconseye(6) version 2, including all changes. View license author blame.
Rev Author # Line
1 perry 1 FALCONSEYE
2 !!!FALCONSEYE
3 NAME
4 SYNOPSIS
5 DESCRIPTION
6 AUTHORS
7 FILES
8 ENVIRONMENT
9 SEE ALSO
10 BUGS
11 ----
12 !!NAME
13
14
15 falconseye - Exploring The Mazes of Menace
16 !!SYNOPSIS
17
18
19 __falconseye__ [[ __-d__ ''directory'' ] [[ __-n__
20 ] [[ __-p__ ''profession (role)'' ] [[ __-r__
21 ''race'' ] [[ __-[[DX]__ ] [[ __-u__ ''playername''
22 ] [[ __-dec__ ] [[ __-ibm__ ]__
23 falconseye__ [[ __-d__ ''directory'' ] __-s__ [[
24 __-v__ ] [[ __-p__ ''profession (role)'' ] [[
25 __-r__ ''race'' ] [[ ''playernames'' ]
26 !!DESCRIPTION
27
28
2 perry 29 ''!NetHack'' is a display oriented Dungeons
1 perry 30 ''Falcon's Eye'' is a
2 perry 31 mouse-driven interface for !NetHack that enhances the
1 perry 32 visuals, audio, and accessibility of the game, yet retains
33 all the original gameplay and game features
34
35
36 Other, more graphical display options exist if you are using
37 either a PC, or an X11 interface.
38
39
40 To get started you really only need to know two commands.
41 The command __?__ will give you a list of the available
42 commands (as well as other information) and the command
43 __/__ will identify the things you see on the
44 screen.
45
46
47 To win the game (as opposed to merely playing to beat other
48 people's high scores) you must locate the Amulet of Yendor
49 which is somewhere below the 20th level of the dungeon and
50 get it out. Nobody has achieved this yet; anybody who does
51 will probably go down in history as a hero among
52 heros.
53
54
55 When the game ends, whether by your dying, quitting, or
2 perry 56 escaping from the caves, ''!NetHack'' will give you (a
1 perry 57 fragment of) the list of top scorers. The scoring is based
58 on many aspects of your behavior, but a rough estimate is
59 obtained by taking the amount of gold you've found in the
60 cave plus four times your (real) experience. Precious stones
61 may be worth a lot of gold when brought to the exit. There
62 is a 10% penalty for getting yourself killed.
63
64
65 The environment variable NETHACKOPTIONS can be used to
66 initialize many run-time options. The ? command provides a
67 description of these options and syntax. (The __-dec__
68 and __-ibm__ command line options are equivalent to the
69 __decgraphics__ and __ibmgraphics__ run-time options
70 described there, and are provided purely for convenience on
71 systems supporting multiple types of
72 terminals.)
73
74
75 Because the option list can be very long (particularly when
76 specifying graphics characters), options may also be
77 included in a configuration file. The default is located in
78 your home directory and named .nethackrc on Unix systems. On
79 other systems, the default may be different, usually
2 perry 80 !NetHack.cnf. On DOS the name is defaults.nh, while on the
81 Macintosh or BeOS, it is !NetHack Defaults. The configuration
1 perry 82 file's location may be specified by setting NETHACKOPTIONS
83 to a string consisting of an @ character followed by the
84 filename.
85
86
87 The __-u__ ''playername'' option supplies the answer
88 to the question
89 ''
90
91
92 A ''playername'' suffix or a separate option, __-p__
93 ''profession'' can be used to determine the character
94 role. You can specify either the male or female name for the
95 character role, or the first three characters of the role as
96 an abbreviation. __-p @__ has been retained to explicitly
97 request that a random role be chosen. It may need to be
98 quoted with a backslash (@) if @ is the
99 __
100
101
102 Likewise, __-r__ ''race'' can be used to explicitly
103 request that a race be chosen.
104
105
106 Leaving out either of these will result in you being
107 prompted during the game startup for the
108 information.
109
110
111 The __-s__ option alone will print out the list of your
112 scores on the current version. An immediately following
113 __-v__ reports on all versions present in the score file.
114 The __-s__ may also be followed by arguments __-p__
115 and __-r__ to print the scores of particular roles and
116 races only. It may also be followed by one or more player
117 names to print the scores of the players mentioned, by 'all'
118 to print out all scores, or by a number to print that many
119 top scores.
120
121
122 The __-n__ option suppresses printing of any news from
123 the game administrator.
124
125
126 The __-D__ or __-X__ option will start the game in a
127 special non-scoring discovery mode. __-D__ will, if the
128 player is the game administrator, start in debugging
129 (wizard) mode instead.
130
131
132 The __-d__ option, which must be the first argument if it
133 appears, supplies a directory which is to serve as the
134 playground. It overrides the value from NETHACKDIR, HACKDIR,
135 or the directory specified by the game administrator during
136 compilation (usually /usr/share/games/falconseye). This
137 option is usually only useful to the game administrator. The
138 playground must contain several auxiliary files such as help
139 files, the list of top scorers, and a subdirectory
140 ''save'' where games are saved.
141 !!AUTHORS
142
143
144 Jay Fenlason (+ Kenny Woodland, Mike Thome and Jon Payne)
145 wrote the original hack, very much like rogue (but full of
146 bugs).
147
148
149 Andries Brouwer continuously deformed their sources into an
150 entirely different game.
151
152
153 Mike Stephenson has continued the perversion of sources,
154 adding various warped character classes and sadistic traps
155 with the help of many strange people who reside in that
156 place between the worlds, the Usenet Zone. A number of these
157 miscreants are immortalized in the historical roll of
158 dishonor and various other places.
159
160
2 perry 161 The resulting mess is now called !NetHack, to denote its
1 perry 162 development by the Usenet. Andries Brouwer has made this
163 request for the distinction, as he may eventually release a
164 new version of his own.
165 !!FILES
166
167
168 All files are in the playground, normally
169 /usr/share/games/falconseye. If DLB was defined during the
170 compile, the data files and special levels will be inside a
171 larger file, normally nhdat, instead of being separate
172 files.
173 falconseye The program itself.
2 perry 174 data, oracles, rumors Data files used by !NetHack.
1 perry 175 options, quest.dat More data files.
176 help, hh Help data files.
177 cmdhelp, opthelp, wizhelp More help data files.
178 *.lev Predefined special levels.
179 dungeon Control file for special levels.
2 perry 180 history A short history of !NetHack.
1 perry 181 license Rules governing redistribution.
182 record The list of top scorers.
183 logfile An extended list of games
184 played.
185 xlock.nnn Description of a dungeon level.
186 perm Lock file for xlock.dd.
187 bonesDD.nn Descriptions of the ghost and
188 belongings of a deceased
189 adventurer.
190 save A subdirectory containing the
191 saved games.
192 !!ENVIRONMENT
193
194
195 USER or LOGNAME Your login name.
196 HOME Your home directory.
197 SHELL Your shell.
198 TERM The type of your terminal.
199 HACKPAGER or PAGER Replacement for default pager.
200 MAIL Mailbox file.
201 MAILREADER Replacement for default reader
202 NETHACKDIR Playground.
2 perry 203 NETHACKOPTIONS String predefining several !NetHack
1 perry 204 options.
205
206
207 In addition, SHOPTYPE is used in debugging (wizard)
208 mode.
209 !!SEE ALSO
210
211
212 dgn_comp(6), lev_comp(6), recover(6)
213 !!BUGS
214
215
216 Probably infinite.
217
218
219 Dungeons
220 ----
This page is a man page (or other imported legacy content). We are unable to automatically determine the license status of this page.