LZ_ 7[?47h)0[H[2J[H[2;1HNetHack, Copyright 1985-2020
[3;1H By Stichting Mathematisch Centrum and M. Stephenson.
[4;1H Version 3.6.6-0 Unix post-release, built Sep 8 12:26:15 2020.
[5;1H See license for details.
[6;1HLZ_
LZ_ [HRestoring save file...[KLZ_ --More--LZ_~ R [H[K[H[2J[H[16;47H[1m[37m@#[m[17;40H-[m[33m+[m-----[m[33m|[m--------[m[18;40H|[m[1m[30m.....[m[1m[33m$[m[1m[37m[7md[m[m[1m[30m.......[m|[m[19;40H[33m-[m[1m[30m....[m[1m[33m$[m...[m[1m[30m......[m|[m[20;40H|[m[1m[30m.....[m...[m[1m[30m.....[m<|[m[21;40H----------------[m[16;47HLZ_ [23;1H[K[24;1H[K[A[[7m[32mASCIIPhilia the Rhizotom[m[mist ] St:11 Dx:8 Co:13 In:12 Wi:17 Ch:16 Neutral[K
[24;1HDlvl:1 $:1739 [32mHP:10[m(12) Pw:7[m(7) AC:8 Xp:1/1 T:31[K[HHello ASCIIPhilia, the gnomish Healer, welcome back to NetHack![K[23;1H[[7m[32mASCIIPhilia the Rhizotom[m[mist ] St:11 Dx:8 Co:13 In:12 Wi:17 Ch:16 Neutral
[24;1HDlvl:1 $:1739 [32mHP:10[m(12) Pw:7[m(7) AC:8 Xp:1/1 T:31[16;47HLZ_- [H[K[16;47HLZ_[ " [HUnknown command ' '.[K[16;47HLZ_
[H[K[16;47HLZ_ [1;24H[K [7mCoins[m[2;24H[K $ - 1739 gold pieces[3;24H[K [7mWeapons[m[4;24H[K a - a +0 scalpel (weapon in hand)[5;24H[K [7mArmor[m[6;24H[K b - an uncursed +1 pair of leather gloves (being worn)[7;24H[K [7mComestibles[m[8;24H[K k - 6 uncursed apples[9;24H[K [7mSpellbooks[m[10;24H[K h - [32ma blessed spellbook of healing[m[11;24H[K i - [32ma blessed spellbook of extra healing[m[12;24H[K j - [32ma blessed spellbook of stone to flesh[m[13;24H[K [7mPotions[m[14;24H[K d - 4 uncursed potions of healing[15;24H[K e - [32ma blessed potion of extra healing[m[16;24H[K f - 3 uncursed potions of extra healing[17;24H[K [7mWands[m[18;24H[K g - a wand of sleep (0:6)[19;24H[K [7mTools[m[20;24H[K c - an uncursed stethoscope[21;24H[K[C(end) MZ_
[1;23H[K[2;23H[K[3;23H[K[4;23H[K[5;23H[K[6;23H[K[7;23H[K[8;23H[K[9;23H[K[10;23H[K[11;23H[K[12;23H[K[13;23H[K[14;23H[K[15;23H[K[16;23H[K[16;47H[1m[37m@#[17;23H[K[m[17;40H-[m[33m+[m-----[m[33m|[m--------[18;23H[K[m[18;40H|[m[1m[30m.....[m[1m[33m$[m[1m[37m[7md[m[m[1m[30m.......[m|[19;23H[K[m[19;40H[33m-[m[1m[30m....[m[1m[33m$[m...[m[1m[30m......[m|[20;23H[K[m[20;40H|[m[1m[30m.....[m...[m[1m[30m.....[m<|[21;23H[K[m[21;40H----------------[22;23H[K[m
[23;1H[[7m[32mASCIIPhilia the Rhizotom[m[mist ] St:11 Dx:8 Co:13 In:12 Wi:17 Ch:16 Neutral
[24;1HDlvl:1 $:1739 [32mHP:10[m(12) Pw:7[m(7) AC:8 Xp:1/1 T:31[16;47H MZ_ڄ [1;30H[K What type of object do you want an inventory of?[2;30H[K [3;30H[K a - Coins ('$')[4;30H[K b - Weapons (')')[5;30H[K c - Armor ('[')[6;30H[K d - Comestibles ('%')[7;30H[K e - Spellbooks ('+')[8;30H[K f - Potions ('!')[9;30H[K g - Wands ('/')[10;30H[K h - Tools ('(')[11;30H[K [12;30H[K B - Items known to be Blessed[13;30H[K U - Items known to be Uncursed[14;30H[K[C(end) eNZ_H [1;29H[K[2;29H[K[3;29H[K[4;29H[K[5;29H[K[6;29H[K[7;29H[K[8;29H[K[9;29H[K[10;29H[K[11;29H[K[12;29H[K[13;29H[K[14;29H[K[15;29H[K[16;47HfNZ_ [1;24H[K [7mCoins[m[2;24H[K $ - 1739 gold pieces[3;24H[K [7mWeapons[m[4;24H[K a - a +0 scalpel (weapon in hand)[5;24H[K [7mArmor[m[6;24H[K b - an uncursed +1 pair of leather gloves (being worn)[7;24H[K [7mComestibles[m[8;24H[K k - 6 uncursed apples[9;24H[K [7mSpellbooks[m[10;24H[K h - [32ma blessed spellbook of healing[m[11;24H[K i - [32ma blessed spellbook of extra healing[m[12;24H[K j - [32ma blessed spellbook of stone to flesh[m[13;24H[K [7mPotions[m[14;24H[K d - 4 uncursed potions of healing[15;24H[K e - [32ma blessed potion of extra healing[m[16;24H[K f - 3 uncursed potions of extra healing[17;24H[K [7mWands[m[18;24H[K g - a wand of sleep (0:6)[19;24H[K [7mTools[m[20;24H[K c - an uncursed stethoscope[21;24H[K[C(end) mNZ_ [1;23H[K[2;23H[K[3;23H[K[4;23H[K[5;23H[K[6;23H[K[7;23H[K[8;23H[K[9;23H[K[10;23H[K[11;23H[K[12;23H[K[13;23H[K[14;23H[K[15;23H[K[16;23H[K[16;47H[1m[37m@#[17;23H[K[m[17;40H-[m[33m+[m-----[m[33m|[m--------[18;23H[K[m[18;40H|[m[1m[30m.....[m[1m[33m$[m[1m[37m[7md[m[m[1m[30m.......[m|[19;23H[K[m[19;40H[33m-[m[1m[30m....[m[1m[33m$[m...[m[1m[30m......[m|[20;23H[K[m[20;40H|[m[1m[30m.....[m...[m[1m[30m.....[m<|[21;23H[K[m[21;40H----------------[22;23H[K[m
[23;1H[[7m[32mASCIIPhilia the Rhizotom[m[mist ] St:11 Dx:8 Co:13 In:12 Wi:17 Ch:16 Neutral
[24;1HDlvl:1 $:1739 [32mHP:10[m(12) Pw:7[m(7) AC:8 Xp:1/1 T:31[16;47HnNZ_ş 0 [H[KWhat do you want to drink? [def or ?*] [KoNZ_
[16;47HoNZ_
[HNever mind.[K[16;47HpNZ_
> [H[K[16;47H[H[KWhat do you want to drink? [def or ?*] [KqNZ_܋ [16;47HqNZ_ [HNever mind.[K[16;47HqNZ_{I > [H[K[16;47H[H[KWhat do you want to wield? [- a or ?*] [KrNZ_z [16;47HrNZ_ [HNever mind.[K[16;47HsNZ_ > [H[K[16;47H[H[KWhat do you want to drink? [def or ?*] [KtNZ_ [H[K[1;39H[K [7mPotions ('!')[m[2;39H[K d - 4 uncursed potions of healing[3;39H[K e - [32ma blessed potion of extra healing[m[4;39H[K f - 3 uncursed potions of extra healing[5;39H[K[C(end) uNZ_
D [1;38H[K[2;38H[K[3;38H[K[4;38H[K[5;38H[K[6;38H[K[16;47HuNZ_
[HNever mind.[K[16;47HxNZ_ > [H[K[16;47H[H[KWhat do you want to drink? [def or ?*] [K~NZ_6 [16;47H~NZ_w [HNever mind.[K[16;47H~NZ_ [H[K[16;47HNZ_- 0 [H[KWhat do you want to wield? [- a or ?*] [KNZ_ [16;47HNZ_" [HNever mind.[K[16;47HNZ_BX : [H[K[16;47H[H[KWhat do you want to eat? [k or ?*] [KNZ_i
! [16;47H[HNever mind.[K[16;47HNZ_Ӱ = [H[K[16;47H[H[KWhat do you want to read? [hij or ?*] [KNZ_ [H[K[1;37H[K [7mSpellbooks ('+')[m[2;37H[K h - [32ma blessed spellbook of healing[m[3;37H[K i - [32ma blessed spellbook of extra healing[m[4;37H[K j - [32ma blessed spellbook of stone to flesh[m[5;37H[K[C(end) NZ_g5 ] [1;36H[K[2;36H[K[3;36H[K[4;36H[K[5;36H[K[6;36H[K[16;47H[HNever mind.[K[16;47HNZ_ [H[K[J[H[2J[H Set what options?
[2;1H [3;1H [7mBooleans (selecting will toggle value):[m
[4;1H blind [false]
[5;1H bones [true]
[6;1H large_font [false]
[7;1H legacy [true]
[8;1H news [false]
[9;1H nudist [false]
[10;1H selectsaved [true]
[11;1H status_updates [true]
[12;1H use_darkgray [true]
[13;1H a - acoustics [true]
[14;1H b - altmeta [false]
[15;1H c - autodescribe [true]
[16;1H d - autodig [false]
[17;1H e - autoopen [true]
[18;1H f - autopickup [true]
[19;1H g - autoquiver [true]
[20;1H h - checkpoint [true]
[21;1H i - clicklook [false]
[22;1H j - cmdassist [true]
[23;1H k - color [true]
[24;1H[K[C(1 of 5)NZ_( [13;4H+[24;10HNZ_W [13;4H-[24;10HNZ_ [13;4H+[24;10HNZ_/ [13;4H-[24;10HNZ_8 [H[2J[H[23;1H[[7m[32mASCIIPhilia the Rhizotom[m[mist ] St:11 Dx:8 Co:13 In:12 Wi:17 Ch:16 Neutral
[24;1HDlvl:1 $:1739 [32mHP:10[m(12) Pw:7[m(7) AC:8 Xp:1/1 T:31[16;47H[1m[37m@#[m[17;40H-[m[33m+[m-----[m[33m|[m--------[m[18;40H|[m[1m[30m.....[m[1m[33m$[m[1m[37m[7md[m[m[1m[30m.......[m|[m[19;40H[33m-[m[1m[30m....[m[1m[33m$[m...[m[1m[30m......[m|[m[20;40H|[m[1m[30m.....[m...[m[1m[30m.....[m<|[m[21;40H----------------[m[16;47HNZ_Sh , [H[KWhat do you want to zap? [g or ?*] [KNZ_+ ( [Hg - a wand of sleep (0:6).[K--More--NZ_l [H[K[H[K[16;47HNZ_ [HNever mind.[K[16;47HNZ_L [H[K[16;47HNZ_? , [H[KWhat do you want to zap? [g or ?*] [KNZ_M: ( [Hg - a wand of sleep (0:6).[K--More--NZ_ [H[K[H[K[16;47HNZ_ԫ [HNever mind.[K[16;47HNZ_R
[H[K[16;47HNZ_C% , [H[KWhat do you want to zap? [g or ?*] [KNZ_Mp d [H[K[1;24H[K [7mCoins ('$')[m[2;24H[K $ - 1739 gold pieces[3;24H[K [7mWeapons (')')[m[4;24H[K a - a +0 scalpel (weapon in hand)[5;24H[K [7mArmor ('[')[m[6;24H[K b - an uncursed +1 pair of leather gloves (being worn)[7;24H[K [7mComestibles ('%')[m[8;24H[K k - 6 uncursed apples[9;24H[K [7mSpellbooks ('+')[m[10;24H[K h - [32ma blessed spellbook of healing[m[11;24H[K i - [32ma blessed spellbook of extra healing[m[12;24H[K j - [32ma blessed spellbook of stone to flesh[m[13;24H[K [7mPotions ('!')[m[14;24H[K d - 4 uncursed potions of healing[15;24H[K e - [32ma blessed potion of extra healing[m[16;24H[K f - 3 uncursed potions of extra healing[17;24H[K [7mWands ('/')[m[18;24H[K g - a wand of sleep (0:6)[19;24H[K [7mTools ('(')[m[20;24H[K c - an uncursed stethoscope[21;24H[K[C(end) NZ_3 [1;23H[K[2;23H[K[3;23H[K[4;23H[K[5;23H[K[6;23H[K[7;23H[K[8;23H[K[9;23H[K[10;23H[K[11;23H[K[12;23H[K[13;23H[K[14;23H[K[15;23H[K[16;23H[K[16;47H[1m[37m@#[17;23H[K[m[17;40H-[m[33m+[m-----[m[33m|[m--------[18;23H[K[m[18;40H|[m[1m[30m.....[m[1m[33m$[m[1m[37m[7md[m[m[1m[30m.......[m|[19;23H[K[m[19;40H[33m-[m[1m[30m....[m[1m[33m$[m...[m[1m[30m......[m|[20;23H[K[m[20;40H|[m[1m[30m.....[m...[m[1m[30m.....[m<|[21;23H[K[m[21;40H----------------[22;23H[K[m
[23;1H[[7m[32mASCIIPhilia the Rhizotom[m[mist ] St:11 Dx:8 Co:13 In:12 Wi:17 Ch:16 Neutral
[24;1HDlvl:1 $:1739 [32mHP:10[m(12) Pw:7[m(7) AC:8 Xp:1/1 T:31[16;47H[HNever mind.[K[16;47HNZ_ [H[K[16;47HNZ_ v [1;32H[K Select one item:[2;32H[K [3;32H[K a - About NetHack (version information).[4;32H[K b - Long description of the game and commands.[5;32H[K c - List of game commands.[6;32H[K d - Concise history of NetHack.[7;32H[K e - Info on a character in the game display.[8;32H[K f - Info on what a given key does.[9;32H[K g - List of game options.[10;32H[K h - Longer explanation of game options.[11;32H[K i - Full list of keyboard commands[12;32H[K j - List of extended commands.[13;32H[K k - List menu control keys[14;32H[K l - The NetHack license.[15;32H[K m - Support information.[16;32H[K[C(end) NZ_{ [3;35H+[1;31H[K[2;31H[K[3;31H[K[4;31H[K[5;31H[K[6;31H[K[7;31H[K[8;31H[K[9;31H[K[10;31H[K[11;31H[K[12;31H[K[13;31H[K[14;31H[K[15;31H[K[16;31H[K[16;47H[1m[37m@#[17;31H[K[m[17;40H-[m[33m+[m-----[m[33m|[m--------[m[1;1H[KUnix NetHack Version 3.6.6-0 post-release - last build Tue Sep 8 12:26:15 2020
[2;1H[K (36ee1849b1932d72a2340233c57701b1274c90ee,branch:NetHack-3.6).
[3;1H[K[4;1H[KOptions compiled into this edition:
[5;1H[K color, data file compression, data librarian, end-of-game dumplogs,
[6;1H[K insurance files for recovering from crashes, log file, extended log
[7;1H[K file, errors and warnings log file, mail daemon, news file, pattern
[8;1H[K matching via posixregex, pseudo random numbers generated by ISAAC64,
[9;1H[K strong PRNG seed available from /dev/urandom, screen clipping, shell
[10;1H[K command, traditional status display, status via windowport with
[11;1H[K highlighting, suspend command, terminal info library, timed wait for
[12;1H[K display effects, system configuration at run-time, save and bones files
[13;1H[K accepted from versions 3.6.0 through 3.6.6, and basic NetHack features.
[14;1H[K[15;1H[KSupported windowing systems:
[16;1H[K "tty" (traditional text with optional line-drawing) and "curses"
[17;1H[K (terminal-based graphics), with a default of "tty".
[18;1H[J[24;1H[K--More--NZ_ [H[2J[H[23;1H[[7m[32mASCIIPhilia the Rhizotom[m[mist ] St:11 Dx:8 Co:13 In:12 Wi:17 Ch:16 Neutral
[24;1HDlvl:1 $:1739 [32mHP:10[m(12) Pw:7[m(7) AC:8 Xp:1/1 T:31[16;47H[1m[37m@#[m[17;40H-[m[33m+[m-----[m[33m|[m--------[m[18;40H|[m[1m[30m.....[m[1m[33m$[m[1m[37m[7md[m[m[1m[30m.......[m|[m[19;40H[33m-[m[1m[30m....[m[1m[33m$[m...[m[1m[30m......[m|[m[20;40H|[m[1m[30m.....[m...[m[1m[30m.....[m<|[m[21;40H----------------[m[16;47HNZ_ v [1;32H[K Select one item:[2;32H[K [3;32H[K a - About NetHack (version information).[4;32H[K b - Long description of the game and commands.[5;32H[K c - List of game commands.[6;32H[K d - Concise history of NetHack.[7;32H[K e - Info on a character in the game display.[8;32H[K f - Info on what a given key does.[9;32H[K g - List of game options.[10;32H[K h - Longer explanation of game options.[11;32H[K i - Full list of keyboard commands[12;32H[K j - List of extended commands.[13;32H[K k - List menu control keys[14;32H[K l - The NetHack license.[15;32H[K m - Support information.[16;32H[K[C(end) NZ_| [3;35H+[1;31H[K[2;31H[K[3;31H[K[4;31H[K[5;31H[K[6;31H[K[7;31H[K[8;31H[K[9;31H[K[10;31H[K[11;31H[K[12;31H[K[13;31H[K[14;31H[K[15;31H[K[16;31H[K[16;47H[1m[37m@#[17;31H[K[m[17;40H-[m[33m+[m-----[m[33m|[m--------[m[1;1H[KUnix NetHack Version 3.6.6-0 post-release - last build Tue Sep 8 12:26:15 2020
[2;1H[K (36ee1849b1932d72a2340233c57701b1274c90ee,branch:NetHack-3.6).
[3;1H[K[4;1H[KOptions compiled into this edition:
[5;1H[K color, data file compression, data librarian, end-of-game dumplogs,
[6;1H[K insurance files for recovering from crashes, log file, extended log
[7;1H[K file, errors and warnings log file, mail daemon, news file, pattern
[8;1H[K matching via posixregex, pseudo random numbers generated by ISAAC64,
[9;1H[K strong PRNG seed available from /dev/urandom, screen clipping, shell
[10;1H[K command, traditional status display, status via windowport with
[11;1H[K highlighting, suspend command, terminal info library, timed wait for
[12;1H[K display effects, system configuration at run-time, save and bones files
[13;1H[K accepted from versions 3.6.0 through 3.6.6, and basic NetHack features.
[14;1H[K[15;1H[KSupported windowing systems:
[16;1H[K "tty" (traditional text with optional line-drawing) and "curses"
[17;1H[K (terminal-based graphics), with a default of "tty".
[18;1H[J[24;1H[K--More--NZ_u [H[2J[H[23;1H[[7m[32mASCIIPhilia the Rhizotom[m[mist ] St:11 Dx:8 Co:13 In:12 Wi:17 Ch:16 Neutral
[24;1HDlvl:1 $:1739 [32mHP:10[m(12) Pw:7[m(7) AC:8 Xp:1/1 T:31[16;47H[1m[37m@#[m[17;40H-[m[33m+[m-----[m[33m|[m--------[m[18;40H|[m[1m[30m.....[m[1m[33m$[m[1m[37m[7md[m[m[1m[30m.......[m|[m[19;40H[33m-[m[1m[30m....[m[1m[33m$[m...[m[1m[30m......[m|[m[20;40H|[m[1m[30m.....[m...[m[1m[30m.....[m<|[m[21;40H----------------[m[16;47HNZ_ v [1;32H[K Select one item:[2;32H[K [3;32H[K a - About NetHack (version information).[4;32H[K b - Long description of the game and commands.[5;32H[K c - List of game commands.[6;32H[K d - Concise history of NetHack.[7;32H[K e - Info on a character in the game display.[8;32H[K f - Info on what a given key does.[9;32H[K g - List of game options.[10;32H[K h - Longer explanation of game options.[11;32H[K i - Full list of keyboard commands[12;32H[K j - List of extended commands.[13;32H[K k - List menu control keys[14;32H[K l - The NetHack license.[15;32H[K m - Support information.[16;32H[K[C(end) NZ_? [4;35H+[1;31H[K[2;31H[K[3;31H[K[4;31H[K[5;31H[K[6;31H[K[7;31H[K[8;31H[K[9;31H[K[10;31H[K[11;31H[K[12;31H[K[13;31H[K[14;31H[K[15;31H[K[16;31H[K[16;47H[1m[37m@#[17;31H[K[m[17;40H-[m[33m+[m-----[m[33m|[m--------[m[1;1H[K Welcome to NetHack! ( description of version 3.6 )
[2;1H[K[3;1H[K NetHack is a Dungeons and Dragons like game where you (the adventurer)
[4;1H[Kdescend into the depths of the dungeon in search of the Amulet of Yendor,
[5;1H[Kreputed to be hidden somewhere below the twentieth level. You begin your
[6;1H[Kadventure with a pet that can help you in many ways, and can be trained
[7;1H[Kto do all sorts of things. On the way you will find useful (or useless)
[8;1H[Kitems, quite possibly with magic properties, and assorted monsters. You can
[9;1H[Kattack a monster by trying to move onto the space a monster is on (but often
[10;1H[Kit is much wiser to leave it alone).
[11;1H[K[12;1H[K Unlike most adventure games, which give you a verbal description of
[13;1H[Kyour location, NetHack gives you a visual image of the dungeon level you are
[14;1H[Kon.[15;1H[K[16;1H[K NetHack uses the following symbols:
[17;1H[K[18;1H[K - and | The walls of a room, possibly also open doors or a grave.
[19;1H[K . The floor of a room or a doorway.
[20;1H[K # A corridor, or iron bars, or a tree, or possibly a kitchen
[21;1H[K sink (if your dungeon has sinks), or a drawbridge.
[22;1H[K > Stairs down: a way to the next level.
[23;1H[K < Stairs up: a way to the previous level.
[24;1H[J[K--More--NZ_W [1;1H[K @ You (usually), or another human.
[2;1H[K ) A weapon of some sort.
[3;1H[K [ A suit or piece of armor.
[4;1H[K % Something edible (not necessarily healthy).
[5;1H[K / A wand.
[6;1H[K = A ring.
[7;1H[K ? A scroll.
[8;1H[K ! A potion.
[9;1H[K ( Some other useful object (pick-axe, key, lamp...)
[10;1H[K $ A pile of gold.
[11;1H[K * A gem or rock (possibly valuable, possibly worthless).
[12;1H[K + A closed door, or a spellbook containing a spell
[13;1H[K you can learn.
[14;1H[K ^ A trap (once you detect it).
[15;1H[K " An amulet, or a spider web.
[16;1H[K 0 An iron ball.
[17;1H[K _ An altar, or an iron chain.
[18;1H[K { A fountain.
[19;1H[K } A pool of water or moat or a pool of lava.
[20;1H[K \ An opulent throne.
[21;1H[K ` A boulder or statue.
[22;1H[K A to Z, a to z, and several others: Monsters.
[23;1H[K I Invisible or unseen monster's last known location
[24;1H[J[K--More--NZ_1@ 6 [1;1H[K[2;1H[K You can find out what a symbol represents by typing
[3;1H[K '/' and following the directions to move the cursor
[4;1H[K to the symbol in question. For instance, a 'd' may
[5;1H[K turn out to be a dog.
[6;1H[K[7;1H[K[8;1H[Ky k u 7 8 9 Move commands:
[9;1H[K \|/ \|/ yuhjklbn: go one step in specified direction
[10;1H[Kh-.-l 4-.-6 YUHJKLBN: go in specified direction until you
[11;1H[K /|\ /|\ hit a wall or run into something
[12;1H[Kb j n 1 2 3 g
: run in direction until something
[13;1H[K numberpad interesting is seen
[14;1H[K G, same, except a branching corridor isn't
[15;1H[K < up ^: considered interesting (the ^ in this
[16;1H[K case means the Control key, not a caret)
[17;1H[K > down m: move without picking up objects
[18;1H[K F: fight even if you don't sense a monster
[19;1H[K If the number_pad option is set, the number keys move instead.
[20;1H[K Depending on the platform, Shift number (on the numberpad),
[21;1H[K Meta number, or Alt number will invoke the YUHJKLBN commands.
[22;1H[K Control may or may not work when number_pad is enabled,
[23;1H[K depending on the platform's capabilities.
[24;1H[J[K--More--NZ_b [1;1H[K Digit '5' acts as 'G' prefix, unless number_pad is set to 2
[2;1H[K in which case it acts as 'g' instead.
[3;1H[K If number_pad is set to 3, the roles of 1,2,3 and 7,8,9 are
[4;1H[K reversed; when set to 4, behaves same as 3 combined with 2.
[5;1H[K If number_pad is set to -1, alphabetic movement commands are
[6;1H[K used but 'y' and 'z' are swapped.
[7;1H[K[8;1H[KCommands:
[9;1H[K NetHack knows the following commands:
[10;1H[K ? Help menu.
[11;1H[K / What-is, tell what a symbol represents. You may choose to
[12;1H[K specify a location or give a symbol argument. Enabling the
[13;1H[K autodescribe option will give information about the symbol
[14;1H[K at each location you move the cursor onto.
[15;1H[K & Tell what a command does.
[16;1H[K < Go up a staircase (if you are standing on it).
[17;1H[K > Go down a staircase (if you are standing on it).
[18;1H[K . Rest, do nothing for one turn.
[19;1H[K _ Travel via a shortest-path algorithm to a point on the map.
[20;1H[K a Apply (use) a tool (pick-axe, key, lamp...).
[21;1H[K A Remove all armor.
[22;1H[K ^A Redo the previous command.
[23;1H[K c Close a door.
[24;1H[J[K--More--NZ_ [1;1H[K C Call (name) monster, individual object, or type of object.
[2;1H[K d Drop something. d7a: drop seven items of object a.
[3;1H[K D Drop multiple items. This command is implemented in two
[4;1H[K different ways. One way is:
[5;1H[K "D" displays a list of all of your items, from which you can
[6;1H[K pick and choose what to drop. A "+" next to an item means
[7;1H[K that it will be dropped, a "-" means that it will not be
[8;1H[K dropped. Toggle an item to be selected/deselected by typing
[9;1H[K the letter adjacent to its description. Select all items
[10;1H[K with "+", deselect all items with "=". The moves
[11;1H[K you from one page of the listing to the next.
[12;1H[K The other way is:
[13;1H[K "D" will ask the question "What kinds of things do you want
[14;1H[K to drop? [!%= au]". You should type zero or more object
[15;1H[K symbols possibly followed by 'a' and/or 'u'.
[16;1H[K Da - drop all objects, without asking for confirmation.
[17;1H[K Du - drop only unpaid objects (when in a shop).
[18;1H[K D%u - drop only unpaid food.
[19;1H[K ^D Kick (for doors, usually).
[20;1H[K e Eat food.
[21;1H[K E Engrave a message on the floor.
[22;1H[K E- - write in the dust with your fingers.
[23;1H[K f Fire ammunition from quiver.
[24;1H[J[K--More--NZ_o 2 [1;1H[K F Followed by direction, fight a monster (even if you don't
[2;1H[K sense it).
[3;1H[K i Display your inventory.
[4;1H[K I Display selected parts of your inventory, as in
[5;1H[K I* - list all gems in inventory.
[6;1H[K Iu - list all unpaid items.
[7;1H[K Ix - list all used up items that are on your shopping bill.
[8;1H[K I$ - count your money.
[9;1H[K o Open a door.
[10;1H[K O Review current options and possibly change them.
[11;1H[K A menu displaying the option settings will be displayed
[12;1H[K and most can be changed by simply selecting their entry.
[13;1H[K Options are usually set before the game with NETHACKOPTIONS
[14;1H[K environment variable or via a configuration file (defaults.nh,
[15;1H[K NetHack Defaults, nethack.cnf, ~/.nethackrc, etc.) rather
[16;1H[K than with the 'O' command.
[17;1H[K p Pay your shopping bill.
[18;1H[K P Put on an accessory (ring, amulet, etc).
[19;1H[K ^P Repeat last message (subsequent ^P's repeat earlier messages).
[20;1H[K The behavior can be varied via the msg_window option.
[21;1H[K q Drink (quaff) something (potion, water, etc).
[22;1H[K Q Select ammunition for quiver.
[23;1H[K #quit Exit the program without saving the current game.
[24;1H[J[K--More--NZ_ [1;1H[K r Read a scroll or spellbook.
[2;1H[K R Remove an accessory (ring, amulet, etc).
[3;1H[K ^R Redraw the screen.
[4;1H[K s Search for secret doors and traps around you.
[5;1H[K S Save the game. Also exits the program.
[6;1H[K [To restore, just play again and use the same character name.]
[7;1H[K [There is no "save current data but keep playing" capability.]
[8;1H[K t Throw an object or shoot a projectile.
[9;1H[K T Take off armor.
[10;1H[K ^T Teleport, if you are able.
[11;1H[K v Displays the version number.
[12;1H[K V Display a longer identification of the version, including the
[13;1H[K history of the game.
[14;1H[K w Wield weapon. w- means wield nothing, use bare hands.
[15;1H[K W Wear armor.
[16;1H[K x Swap wielded and secondary weapons.
[17;1H[K X Toggle two-weapon combat.
[18;1H[K ^X Show your attributes.
[19;1H[K #explore Switch to Explore Mode (aka Discovery Mode) where dying and
[20;1H[K deleting the save file during restore can both be overridden.
[21;1H[K z Zap a wand. (Use y instead of z if number_pad is -1.)
[22;1H[K Z Cast a spell. (Use Y instead of Z if number_pad is -1.)
[23;1H[K ^Z Suspend the game. (^Y instead of ^Z if number_pad is -1.)
[24;1H[J[K--More--NZ_, ] [1;1H[K [To resume, use the shell command 'fg'.]
[2;1H[K : Look at what is here.
[3;1H[K ; Look at what is somewhere else.
[4;1H[K , Pick up some things.
[5;1H[K @ Toggle the pickup option.
[6;1H[K ^ Ask for the type of a trap you found earlier.
[7;1H[K ) Tell what weapon you are wielding.
[8;1H[K [ Tell what armor you are wearing.
[9;1H[K = Tell what rings you are wearing.
[10;1H[K " Tell what amulet you are wearing.
[11;1H[K ( Tell what tools you are using.
[12;1H[K * Tell what equipment you are using; combines the preceding five.
[13;1H[K $ Count your gold pieces.
[14;1H[K + List the spells you know; also rearrange them if desired.
[15;1H[K \ Show what types of objects have been discovered.
[16;1H[K ` Show discovered types for one class of objects.
[17;1H[K ! Escape to a shell, if supported in your version and OS.
[18;1H[K [To resume play, terminate the shell subprocess via 'exit'.]
[19;1H[K # Introduces one of the "extended" commands. To get a list of
[20;1H[K the commands you can use with "#" type "#?". The extended
[21;1H[K commands you can use depends upon what options the game was
[22;1H[K compiled with, along with your class and what type of monster
[23;1H[K you most closely resemble at a given moment. If your keyboard
[24;1H[J[K--More--NZ_.
e [1;1H[K has a meta key (which, when pressed in combination with another
[2;1H[K key, modifies it by setting the 'meta' (8th, or 'high') bit),
[3;1H[K these extended commands can be invoked by meta-ing the first
[4;1H[K letter of the command. An alt key may have a similar effect.
[5;1H[K[6;1H[K If the "number_pad" option is on, some additional letter commands
[7;1H[K are available:
[8;1H[K[9;1H[K h displays the help menu, like '?'
[10;1H[K j Jump to another location.
[11;1H[K k Kick (for doors, usually).
[12;1H[K l Loot a box on the floor.
[13;1H[K n followed by number of times to repeat the next command.
[14;1H[K N Name a monster, an individual object, or a type of object.
[15;1H[K u Untrap a trapped object or door.
[16;1H[K[17;1H[K You can put a number before a command to repeat it that many times,
[18;1H[K as in "40." or "20s". If you have the number_pad option set, you
[19;1H[K must type 'n' to prefix the count, as in "n40." or "n20s".
[20;1H[K[21;1H[K[22;1H[K Some information is displayed on the bottom line or perhaps in a
[23;1H[K box, depending on the platform you are using. You see your
[24;1H[J[K--More--NZ_
[1;1H[K attributes, your alignment, what dungeon level you are on, how many
[2;1H[K hit points you have now (and will have when fully recovered), what
[3;1H[K your armor class is (the lower the better), your experience level,
[4;1H[K and the state of your stomach. Optionally, you may or may not see
[5;1H[K other information such as spell points, how much gold you have, etc.
[6;1H[K[7;1H[K Have Fun, and Happy Hacking!
[8;1H[J[24;1H[K--More--NZ_WU [H[2J[H[23;1H[[7m[32mASCIIPhilia the Rhizotom[m[mist ] St:11 Dx:8 Co:13 In:12 Wi:17 Ch:16 Neutral
[24;1HDlvl:1 $:1739 [32mHP:10[m(12) Pw:7[m(7) AC:8 Xp:1/1 T:31[16;47H[1m[37m@#[m[17;40H-[m[33m+[m-----[m[33m|[m--------[m[18;40H|[m[1m[30m.....[m[1m[33m$[m[1m[37m[7md[m[m[1m[30m.......[m|[m[19;40H[33m-[m[1m[30m....[m[1m[33m$[m...[m[1m[30m......[m|[m[20;40H|[m[1m[30m.....[m...[m[1m[30m.....[m<|[m[21;40H----------------[m[16;47HNZ_ " [HUnknown command ' '.[K[16;47HNZ_O [H[K[16;47HNZ_q v [1;32H[K Select one item:[2;32H[K [3;32H[K a - About NetHack (version information).[4;32H[K b - Long description of the game and commands.[5;32H[K c - List of game commands.[6;32H[K d - Concise history of NetHack.[7;32H[K e - Info on a character in the game display.[8;32H[K f - Info on what a given key does.[9;32H[K g - List of game options.[10;32H[K h - Longer explanation of game options.[11;32H[K i - Full list of keyboard commands[12;32H[K j - List of extended commands.[13;32H[K k - List menu control keys[14;32H[K l - The NetHack license.[15;32H[K m - Support information.[16;32H[K[C(end) NZ_ [6;35H+[1;31H[K[2;31H[K[3;31H[K[4;31H[K[5;31H[K[6;31H[K[7;31H[K[8;31H[K[9;31H[K[10;31H[K[11;31H[K[12;31H[K[13;31H[K[14;31H[K[15;31H[K[16;31H[K[16;47H[1m[37m@#[17;31H[K[m[17;40H-[m[33m+[m-----[m[33m|[m--------[m[1;1H[KNetHack History file for release 3.6
[2;1H[K[3;1H[KBehold, mortal, the origins of NetHack...
[4;1H[K[5;1H[KJay Fenlason wrote the original Hack with help from Kenny Woodland,
[6;1H[KMike Thome, and Jon Payne.
[7;1H[K[8;1H[KAndries Brouwer did a major re-write, transforming Hack into a very different
[9;1H[Kgame, and published (at least) three versions (1.0.1, 1.0.2, and 1.0.3) for
[10;1H[KUNIX(tm) machines to the Usenet.
[11;1H[K[12;1H[KDon G. Kneller ported Hack 1.0.3 to Microsoft(tm) C and MS-DOS(tm), producing
[13;1H[KPC HACK 1.01e, added support for DEC Rainbow graphics in version 1.03g, and
[14;1H[Kwent on to produce at least four more versions (3.0, 3.2, 3.51, and 3.6;
[15;1H[Knote that these are old Hack version numbers, not contemporary NetHack ones).
[16;1H[K[17;1H[KR. Black ported PC HACK 3.51 to Lattice(tm) C and the Atari 520/1040ST,
[18;1H[Kproducing ST Hack 1.03.
[19;1H[K[20;1H[KMike Stephenson merged these various versions back together, incorporating
[21;1H[Kmany of the added features, and produced NetHack version 1.4 in 1987. He
[22;1H[Kthen coordinated a cast of thousands in enhancing and debugging NetHack 1.4
[23;1H[Kand released NetHack versions 2.2 and 2.3.
[24;1H[J[K--More--NZ_ڰ [1;1H[K[2;1H[KLater, Mike coordinated a major rewrite of the game, heading a team which
[3;1H[Kincluded Ken Arromdee, Jean-Christophe Collet, Steve Creps, Eric Hendrickson,
[4;1H[KIzchak Miller, Eric S. Raymond, John Rupley, Mike Threepoint, and Janet Walz,
[5;1H[Kto produce NetHack 3.0c. The same group subsequently released ten patch-
[6;1H[Klevel revisions and updates of 3.0.
[7;1H[K[8;1H[KNetHack 3.0 was ported to the Atari by Eric R. Smith, to OS/2 by Timo
[9;1H[KHakulinen, and to VMS by David Gentzel. The three of them and Kevin Darcy
[10;1H[Klater joined the main NetHack Development Team to produce subsequent
[11;1H[Krevisions of 3.0.
[12;1H[K[13;1H[KOlaf Seibert ported NetHack 2.3 and 3.0 to the Amiga. Norm Meluch, Stephen
[14;1H[KSpackman and Pierre Martineau designed overlay code for PC NetHack 3.0.
[15;1H[KJohnny Lee ported NetHack 3.0 to the Macintosh. Along with various other
[16;1H[KDungeoneers, they continued to enhance the PC, Macintosh, and Amiga ports
[17;1H[Kthrough the later revisions of 3.0.
[18;1H[K[19;1H[KHeaded by Mike Stephenson and coordinated by Izchak Miller and Janet Walz,
[20;1H[Kthe NetHack Development Team which now included Ken Arromdee, David Cohrs,
[21;1H[KJean-Christophe Collet, Kevin Darcy, Matt Day, Timo Hakulinen, Steve Linhart,
[22;1H[KDean Luick, Pat Rankin, Eric Raymond, and Eric Smith undertook a radical
[23;1H[Krevision of 3.0. They re-structured the game's design, and re-wrote major
[24;1H[J[K--More--NZ_ [1;1H[Kparts of the code. They added multiple dungeons, a new display, special
[2;1H[Kindividual character quests, a new endgame and many other new features, and
[3;1H[Kproduced NetHack 3.1.
[4;1H[K[5;1H[KKen Lorber, Gregg Wonderly and Greg Olson, with help from Richard Addison,
[6;1H[KMike Passaretti, and Olaf Seibert, developed NetHack 3.1 for the Amiga.
[7;1H[K[8;1H[KNorm Meluch and Kevin Smolkowski, with help from Carl Schelin, Stephen
[9;1H[KSpackman, Steve VanDevender, and Paul Winner, ported NetHack 3.1 to the PC.
[10;1H[K[11;1H[KJon W{tte and Hao-yang Wang, with help from Ross Brown, Mike Engber, David
[12;1H[KHairston, Michael Hamel, Jonathan Handler, Johnny Lee, Tim Lennan, Rob Menke,
[13;1H[Kand Andy Swanson developed NetHack 3.1 for the Macintosh, porting it for
[14;1H[KMPW. Building on their development, Bart House added a Think C port.
[15;1H[K[16;1H[KTimo Hakulinen ported NetHack 3.1 to OS/2. Eric Smith ported NetHack 3.1
[17;1H[Kto the Atari. Pat Rankin, with help from Joshua Delahunty, is responsible
[18;1H[Kfor the VMS version of NetHack 3.1. Michael Allison ported NetHack 3.1 to
[19;1H[KWindows NT.
[20;1H[K[21;1H[KDean Luick, with help from David Cohrs, developed NetHack 3.1 for X11.
[22;1H[KWarwick Allison wrote a tiled version of NetHack for the Atari;
[23;1H[Khe later contributed the tiles to the NetHack Development Team and tile
[24;1H[J[K--More--NZ_b ^ [1;1H[Ksupport was then added to other platforms.
[2;1H[K[3;1H[KThe 3.2 NetHack Development Team, comprised of Michael Allison, Ken Arromdee,
[4;1H[KDavid Cohrs, Jessie Collet, Steve Creps, Kevin Darcy, Timo Hakulinen, Steve
[5;1H[KLinhart, Dean Luick, Pat Rankin, Eric Smith, Mike Stephenson, Janet Walz,
[6;1H[Kand Paul Winner, released version 3.2 in April of 1996.
[7;1H[K[8;1H[KVersion 3.2 marked the tenth anniversary of the formation of the development
[9;1H[Kteam. In a testament to their dedication to the game, all thirteen members
[10;1H[Kof the original NetHack Development Team remained on the team at the start of
[11;1H[Kwork on that release. During the interval between the release of 3.1.3 and
[12;1H[K3.2, one of the founding members of the NetHack Development Team,
[13;1H[KDr. Izchak Miller, passed away. That release of the game was dedicated to
[14;1H[Khim by the development and porting teams.
[15;1H[K[16;1H[KVersion 3.2 proved to be more stable than previous versions. Many bugs
[17;1H[Kwere fixed, abuses eliminated, and game features tuned for better game
[18;1H[Kplay.
[19;1H[K[20;1H[KDuring the lifespan of NetHack 3.1 and 3.2, several enthusiasts of the game
[21;1H[Kadded their own modifications to the game and made these "variants" publicly
[22;1H[Kavailable:
[23;1H[K[24;1H[J[K--More--NZ_< [1;1H[KTom Proudfoot and Yuval Oren created NetHack++, which was quickly renamed
[2;1H[KNetHack--. Working independently, Stephen White wrote NetHack Plus.
[3;1H[KTom Proudfoot later merged NetHack Plus and his own NetHack-- to produce
[4;1H[KSLASH. Larry Stewart-Zerba and Warwick Allison improved the spellcasting
[5;1H[Ksystem with the Wizard Patch. Warwick Allison also ported NetHack to use
[6;1H[Kthe Qt interface.
[7;1H[K[8;1H[KWarren Cheung combined SLASH with the Wizard Patch to produce Slash'em, and
[9;1H[Kwith the help of Kevin Hugo, added more features. Kevin later joined the
[10;1H[KNetHack Development Team and incorporated the best of these ideas in
[11;1H[KNetHack 3.3.
[12;1H[K[13;1H[KThe final update to 3.2 was the bug fix release 3.2.3, which was released
[14;1H[Ksimultaneously with 3.3.0 in December 1999 just in time for the Year 2000.
[15;1H[K[16;1H[KThe 3.3 NetHack Development Team, consisting of Michael Allison, Ken Arromdee,
[17;1H[KDavid Cohrs, Jessie Collet, Steve Creps, Kevin Darcy, Timo Hakulinen,
[18;1H[KKevin Hugo, Steve Linhart, Ken Lorber, Dean Luick, Pat Rankin, Eric Smith,
[19;1H[KMike Stephenson, Janet Walz, and Paul Winner, released 3.3.0 in
[20;1H[KDecember 1999 and 3.3.1 in August of 2000.
[21;1H[K[22;1H[KVersion 3.3 offered many firsts. It was the first version to separate race
[23;1H[Kand profession. The Elf class was removed in preference to an elf race,
[24;1H[J[K--More--NZ_ [1;1H[Kand the races of dwarves, gnomes, and orcs made their first appearance in
[2;1H[Kthe game alongside the familiar human race. Monk and Ranger roles joined
[3;1H[KArcheologists, Barbarians, Cavemen, Healers, Knights, Priests, Rogues,
[4;1H[KSamurai, Tourists, Valkyries and of course, Wizards. It was also the first
[5;1H[Kversion to allow you to ride a steed, and was the first version to have a
[6;1H[Kpublicly available web-site listing all the bugs that had been discovered.
[7;1H[KDespite that constantly growing bug list, 3.3 proved stable enough to last
[8;1H[Kfor more than a year and a half.
[9;1H[K[10;1H[KThe 3.4 NetHack Development Team initially consisted of Michael Allison,
[11;1H[KKen Arromdee, David Cohrs, Jessie Collet, Kevin Hugo, Ken Lorber, Dean Luick,
[12;1H[KPat Rankin, Mike Stephenson, Janet Walz, and Paul Winner, with Warwick Allison
[13;1H[Kjoining just before the release of NetHack 3.4.0 in March 2002.
[14;1H[K[15;1H[KAs with version 3.3, various people contributed to the game as a whole as
[16;1H[Kwell as supporting ports on the different platforms that NetHack runs on:
[17;1H[K[18;1H[KPat Rankin maintained 3.4 for VMS.
[19;1H[K[20;1H[KMichael Allison maintained NetHack 3.4 for the MS-DOS platform.
[21;1H[KPaul Winner and Yitzhak Sapir provided encouragement.
[22;1H[K[23;1H[KDean Luick, Mark Modrall, and Kevin Hugo maintained and enhanced the
[24;1H[J[K--More--NZ_ 3 [1;1H[KMacintosh port of 3.4.
[2;1H[K[3;1H[KMichael Allison, David Cohrs, Alex Kompel, Dion Nicolaas, and Yitzhak Sapir
[4;1H[Kmaintained and enhanced 3.4 for the Microsoft Windows platform. Alex Kompel
[5;1H[Kcontributed a new graphical interface for the Windows port. Alex Kompel also
[6;1H[Kcontributed a Windows CE port for 3.4.1.
[7;1H[K[8;1H[KRon Van Iwaarden maintained 3.4 for OS/2.
[9;1H[K[10;1H[KJanne Salmijarvi and Teemu Suikki maintained and enhanced the
[11;1H[KAmiga port of 3.4 after Janne Salmijarvi resurrected it for 3.3.1.
[12;1H[K[13;1H[KChristian `Marvin' Bressler maintained 3.4 for the Atari after he
[14;1H[Kresurrected it for 3.3.1.
[15;1H[K[16;1H[KThe release of NetHack 3.4.3 in December 2003 marked the beginning of a
[17;1H[Klong release hiatus. 3.4.3 proved to be a remarkably stable version that
[18;1H[Kprovided continued enjoyment by the community for more than a decade. The
[19;1H[KNetHack Development Team slowly and quietly continued to work on the game
[20;1H[Kbehind the scenes
[21;1H[Kduring the tenure of 3.4.3. It was during that same period that several
[22;1H[Knew variants emerged within the NetHack community. Notably sporkhack by
[23;1H[KDerek S. Ray, unnethack by Patric Mueller, nitrohack and its successors
[24;1H[J[K--More--NZ_>O [1;1H[Koriginally by Daniel Thaler and then by Alex Smith, and
[2;1H[KDynahack by Tung Nguyen. Some of those variants continue to be developed,
[3;1H[Kmaintained, and enjoyed by the community to this day.
[4;1H[K[5;1H[KIn September 2014, an interim snapshot of the code under development was
[6;1H[Kreleased publicly by other parties. Since that code was a work-in-progress
[7;1H[Kand had not gone through a period of debugging, it was decided that the
[8;1H[Kversion numbers present on that code snapshot would be retired and never
[9;1H[Kused in an official NetHack release. An announcement was posted on the
[10;1H[KNetHack Development Team's official nethack.org website to that effect,
[11;1H[Kstating that there would never be a 3.4.4, 3.5, or 3.5.0 official release
[12;1H[Kversion.
[13;1H[K[14;1H[KIn January 2015, preparation began for the release of NetHack 3.6.
[15;1H[K[16;1H[KAt the beginning of development for what would eventually get released
[17;1H[Kas 3.6.0, the NetHack Development Team consisted of Warwick Allison,
[18;1H[KMichael Allison, Ken Arromdee, David Cohrs, Jessie Collet, Ken Lorber,
[19;1H[KDean Luick, Pat Rankin, Mike Stephenson, Janet Walz, and Paul Winner.
[20;1H[KLeading up to the release of 3.6.0 in early 2015, new members Sean Hunt,
[21;1H[KPasi Kallinen, and Derek S. Ray joined the NetHack Development Team.
[22;1H[K[23;1H[KNear the end of the development of 3.6.0, one of the significant inspirations
[24;1H[J[K--More--NZ_ + [1;1H[Kfor many of the humorous and fun features found in the game, author
[2;1H[KTerry Pratchett, passed away. NetHack 3.6.0 introduced a tribute to him.
[3;1H[K[4;1H[K3.6.0 was released in December 2015, and merged work done by the development
[5;1H[Kteam since the release of 3.4.3 with some of the beloved community patches.
[6;1H[KMany bugs were fixed and some code was restructured.
[7;1H[K[8;1H[KThe NetHack Development Team, as well as Steve VanDevender and
[9;1H[KKevin Smolkowski ensured that NetHack 3.6 continued to operate on various
[10;1H[KUnix flavors as well as maintaining the X11 interface.
[11;1H[K[12;1H[KKen Lorber, Haoyang Wang, Pat Rankin, and Dean Luick maintained the port
[13;1H[Kof NetHack 3.6.1 for Mac OSX.
[14;1H[K[15;1H[KMichael Allison, David Cohrs, Bart House, Pasi Kallinen, Alex Kompel,
[16;1H[KDion Nicolaas, Derek S. Ray and Yitzhak Sapir maintained the port of
[17;1H[KNetHack 3.6 for Microsoft Windows.
[18;1H[K[19;1H[KPat Rankin attempted to keep the VMS port running for NetHack 3.6,
[20;1H[Khindered by limited access. Kevin Smolkowski has updated and tested it
[21;1H[Kfor the most recent version of OpenVMS (V8.4 as of this writing) on Alpha
[22;1H[Kand Integrity (aka Itanium aka IA64) but not VAX.
[23;1H[K[24;1H[J[K--More--NZ_ [1;1H[KRay Chason resurrected the msdos port for 3.6 and contributed the
[2;1H[Knecessary updates to the community at large.
[3;1H[K[4;1H[KIn late April 2018, several hundred bug fixes for 3.6.0 and some new
[5;1H[Kfeatures were assembled and released as NetHack 3.6.1.
[6;1H[KThe NetHack Development Team at the time of release of 3.6.1 consisted of
[7;1H[KWarwick Allison, Michael Allison, Ken Arromdee, David Cohrs, Jessie Collet,
[8;1H[KPasi Kallinen, Ken Lorber, Dean Luick, Patric Mueller, Pat Rankin,
[9;1H[KDerek S. Ray, Alex Smith, Mike Stephenson, Janet Walz and Paul Winner.
[10;1H[K[11;1H[KIn early May 2019, another 320 bug fixes along with some enhancements and
[12;1H[Kthe adopted curses window port, were released as 3.6.2.
[13;1H[K[14;1H[KBart House, who had contributed to the game as a porting team participant
[15;1H[Kfor decades, joined the NetHack Development Team in late May 2019.
[16;1H[K[17;1H[KNetHack 3.6.3 was released on December 5, 2019 containing over 190 bug
[18;1H[Kfixes to NetHack 3.6.2.
[19;1H[K[20;1H[KNetHack 3.6.4 was released on December 18, 2019 containing a security
[21;1H[Kfix and a few bug fixes.
[22;1H[K[23;1H[KNetHack 3.6.5 was released on January 27, 2020 containing some security fixes
[24;1H[J[K--More--NZ_ [1;1H[Kand a small number of bug fixes.
[2;1H[K[3;1H[KNetHack 3.6.6 was released on March 8, 2020 containing a security fix and
[4;1H[Ksome bug fixes.
[5;1H[K[6;1H[KThe official NetHack web site is maintained by Ken Lorber at
[7;1H[Khttp://www.nethack.org/.
[8;1H[K[9;1H[KOn behalf of the NetHack community, thank you very much once again to
[10;1H[KM. Drew Streib and Pasi Kallinen for providing a public NetHack server
[11;1H[Kat nethack.alt.org. Thanks to Keith Simpson and Andy Thomson for
[12;1H[Khardfought.org. Thanks to all those unnamed dungeoneers who invest their
[13;1H[Ktime and effort into annual NetHack tournaments such as Junethack
[14;1H[Kand in days past, devnull.net (gone for now, but not forgotten).
[15;1H[K[16;1H[K - - - - - - - - - -
[17;1H[K[18;1H[KFrom time to time, some depraved individual out there in netland sends a
[19;1H[Kparticularly intriguing modification to help out with the game. The
[20;1H[KNetHack Development Team sometimes makes note of the names of the worst
[21;1H[Kof these miscreants in this, the list of Dungeoneers:
[22;1H[K[23;1H[K Adam Aronow J. Ali Harlow Mikko Juola
[24;1H[J[K--More--NZ_ 8 [1;1H[K Alex Kompel Janet Walz Nathan Eady
[2;1H[K Alex Smith Janne Salmijarvi Norm Meluch
[3;1H[K Andreas Dorn Jean-Christophe Collet Olaf Seibert
[4;1H[K Andy Church Jeff Bailey Pasi Kallinen
[5;1H[K Andy Swanson Jochen Erwied Pat Rankin
[6;1H[K Andy Thomson John Kallen Patric Mueller
[7;1H[K Ari Huttunen John Rupley Paul Winner
[8;1H[K Bart House John S. Bien Pierre Martineau
[9;1H[K Benson I. Margulies Johnny Lee Ralf Brown
[10;1H[K Bill Dyer Jon W{tte Ray Chason
[11;1H[K Boudewijn Waijers Jonathan Handler Richard Addison
[12;1H[K Bruce Cox Joshua Delahunty Richard Beigel
[13;1H[K Bruce Holloway Karl Garrison Richard P. Hughey
[14;1H[K Bruce Mewborne Keizo Yamamoto Rob Menke
[15;1H[K Carl Schelin Keith Simpson Robin Bandy
[16;1H[K Chris Russo Ken Arnold Robin Johnson
[17;1H[K David Cohrs Ken Arromdee Roderick Schertler
[18;1H[K David Damerell Ken Lorber Roland McGrath
[19;1H[K David Gentzel Ken Washikita Ron Van Iwaarden
[20;1H[K David Hairston Kevin Darcy Ronnen Miller
[21;1H[K Dean Luick Kevin Hugo Ross Brown
[22;1H[K Del Lamb Kevin Sitze Sascha Wostmann
[23;1H[K Derek S. Ray Kevin Smolkowski Scott Bigham
[24;1H[J[K--More--NZ_ [1;1H[K Deron Meranda Kevin Sweet Scott R. Turner
[2;1H[K Dion Nicolaas Lars Huttar Sean Hunt
[3;1H[K Dylan O'Donnell Leon Arnott Stephen Spackman
[4;1H[K Eric Backus M. Drew Streib Stefan Thielscher
[5;1H[K Eric Hendrickson Malcolm Ryan Stephen White
[6;1H[K Eric R. Smith Mark Gooderum Steve Creps
[7;1H[K Eric S. Raymond Mark Modrall Steve Linhart
[8;1H[K Erik Andersen Marvin Bressler Steve VanDevender
[9;1H[K Fredrik Ljungdahl Matthew Day Teemu Suikki
[10;1H[K Frederick Roeber Merlyn LeRoy Tim Lennan
[11;1H[K Gil Neiger Michael Allison Timo Hakulinen
[12;1H[K Greg Laskin Michael Feir Tom Almy
[13;1H[K Greg Olson Michael Hamel Tom West
[14;1H[K Gregg Wonderly Michael Sokolov Warren Cheung
[15;1H[K Hao-yang Wang Mike Engber Warwick Allison
[16;1H[K Helge Hafting Mike Gallop Yitzhak Sapir
[17;1H[K Irina Rempt-Drijfhout Mike Passaretti
[18;1H[K Izchak Miller Mike Stephenson
[19;1H[J[24;1H[K--More--NZ_#- [H[2J[H[23;1H[[7m[32mASCIIPhilia the Rhizotom[m[mist ] St:11 Dx:8 Co:13 In:12 Wi:17 Ch:16 Neutral
[24;1HDlvl:1 $:1739 [32mHP:10[m(12) Pw:7[m(7) AC:8 Xp:1/1 T:31[16;47H[1m[37m@#[m[17;40H-[m[33m+[m-----[m[33m|[m--------[m[18;40H|[m[1m[30m.....[m[1m[33m$[m[1m[37m[7md[m[m[1m[30m.......[m|[m[19;40H[33m-[m[1m[30m....[m[1m[33m$[m...[m[1m[30m......[m|[m[20;40H|[m[1m[30m.....[m...[m[1m[30m.....[m<|[m[21;40H----------------[m[16;47HNZ_ [H[KIn what direction? [KNZ_4
[H[K[16;47HNZ_v , [H[KWhat do you want to zap? [g or ?*] [KNZ_/U ! [16;47H[HNever mind.[K[16;47HNZ_6L [H[K[16;47HNZ_{ 6 [H[KWhat do you want to use or apply? [cg or ?*] [KNZ_
[H[K[1;41H[K [7mWands ('/')[m[2;41H[K g - a wand of sleep (0:6)[3;41H[K [7mTools ('(')[m[4;41H[K c - an uncursed stethoscope[5;41H[K[C(end) NZ_ ] [1;40H[K[2;40H[K[3;40H[K[4;40H[K[5;40H[K[6;40H[K[16;47H[HNever mind.[K[16;47HNZ_[* [H[K[16;47HNZ_ [H[KIn what direction? [KNZ_^ [H[K[16;47HNZ_ 6 [H[KWhat do you want to use or apply? [cg or ?*] [KNZ_ [H[K[1;41H[K [7mWands ('/')[m[2;41H[K g - a wand of sleep (0:6)[3;41H[K [7mTools ('(')[m[4;41H[K c - an uncursed stethoscope[5;41H[K[C(end) NZ_, D [1;40H[K[2;40H[K[3;40H[K[4;40H[K[5;40H[K[6;40H[K[16;47HNZ_, [HNever mind.[K[16;47HNZ_ ( [H[K[16;47H[HIt's a wall.[K[16;47HNZ_6 | [H[K[1;32H[K Select one item:[2;32H[K [3;32H[K a - About NetHack (version information).[4;32H[K b - Long description of the game and commands.[5;32H[K c - List of game commands.[6;32H[K d - Concise history of NetHack.[7;32H[K e - Info on a character in the game display.[8;32H[K f - Info on what a given key does.[9;32H[K g - List of game options.[10;32H[K h - Longer explanation of game options.[11;32H[K i - Full list of keyboard commands[12;32H[K j - List of extended commands.[13;32H[K k - List menu control keys[14;32H[K l - The NetHack license.[15;32H[K m - Support information.[16;32H[K[C(end) NZ_ [6;35H+[1;31H[K[2;31H[K[3;31H[K[4;31H[K[5;31H[K[6;31H[K[7;31H[K[8;31H[K[9;31H[K[10;31H[K[11;31H[K[12;31H[K[13;31H[K[14;31H[K[15;31H[K[16;31H[K[16;47H[1m[37m@#[17;31H[K[m[17;40H-[m[33m+[m-----[m[33m|[m--------[m[1;1H[KNetHack History file for release 3.6
[2;1H[K[3;1H[KBehold, mortal, the origins of NetHack...
[4;1H[K[5;1H[KJay Fenlason wrote the original Hack with help from Kenny Woodland,
[6;1H[KMike Thome, and Jon Payne.
[7;1H[K[8;1H[KAndries Brouwer did a major re-write, transforming Hack into a very different
[9;1H[Kgame, and published (at least) three versions (1.0.1, 1.0.2, and 1.0.3) for
[10;1H[KUNIX(tm) machines to the Usenet.
[11;1H[K[12;1H[KDon G. Kneller ported Hack 1.0.3 to Microsoft(tm) C and MS-DOS(tm), producing
[13;1H[KPC HACK 1.01e, added support for DEC Rainbow graphics in version 1.03g, and
[14;1H[Kwent on to produce at least four more versions (3.0, 3.2, 3.51, and 3.6;
[15;1H[Knote that these are old Hack version numbers, not contemporary NetHack ones).
[16;1H[K[17;1H[KR. Black ported PC HACK 3.51 to Lattice(tm) C and the Atari 520/1040ST,
[18;1H[Kproducing ST Hack 1.03.
[19;1H[K[20;1H[KMike Stephenson merged these various versions back together, incorporating
[21;1H[Kmany of the added features, and produced NetHack version 1.4 in 1987. He
[22;1H[Kthen coordinated a cast of thousands in enhancing and debugging NetHack 1.4
[23;1H[Kand released NetHack versions 2.2 and 2.3.
[24;1H[J[K--More--NZ_ [1;1H[K[2;1H[KLater, Mike coordinated a major rewrite of the game, heading a team which
[3;1H[Kincluded Ken Arromdee, Jean-Christophe Collet, Steve Creps, Eric Hendrickson,
[4;1H[KIzchak Miller, Eric S. Raymond, John Rupley, Mike Threepoint, and Janet Walz,
[5;1H[Kto produce NetHack 3.0c. The same group subsequently released ten patch-
[6;1H[Klevel revisions and updates of 3.0.
[7;1H[K[8;1H[KNetHack 3.0 was ported to the Atari by Eric R. Smith, to OS/2 by Timo
[9;1H[KHakulinen, and to VMS by David Gentzel. The three of them and Kevin Darcy
[10;1H[Klater joined the main NetHack Development Team to produce subsequent
[11;1H[Krevisions of 3.0.
[12;1H[K[13;1H[KOlaf Seibert ported NetHack 2.3 and 3.0 to the Amiga. Norm Meluch, Stephen
[14;1H[KSpackman and Pierre Martineau designed overlay code for PC NetHack 3.0.
[15;1H[KJohnny Lee ported NetHack 3.0 to the Macintosh. Along with various other
[16;1H[KDungeoneers, they continued to enhance the PC, Macintosh, and Amiga ports
[17;1H[Kthrough the later revisions of 3.0.
[18;1H[K[19;1H[KHeaded by Mike Stephenson and coordinated by Izchak Miller and Janet Walz,
[20;1H[Kthe NetHack Development Team which now included Ken Arromdee, David Cohrs,
[21;1H[KJean-Christophe Collet, Kevin Darcy, Matt Day, Timo Hakulinen, Steve Linhart,
[22;1H[KDean Luick, Pat Rankin, Eric Raymond, and Eric Smith undertook a radical
[23;1H[Krevision of 3.0. They re-structured the game's design, and re-wrote major
[24;1H[J[K--More--NZ_ [1;1H[Kparts of the code. They added multiple dungeons, a new display, special
[2;1H[Kindividual character quests, a new endgame and many other new features, and
[3;1H[Kproduced NetHack 3.1.
[4;1H[K[5;1H[KKen Lorber, Gregg Wonderly and Greg Olson, with help from Richard Addison,
[6;1H[KMike Passaretti, and Olaf Seibert, developed NetHack 3.1 for the Amiga.
[7;1H[K[8;1H[KNorm Meluch and Kevin Smolkowski, with help from Carl Schelin, Stephen
[9;1H[KSpackman, Steve VanDevender, and Paul Winner, ported NetHack 3.1 to the PC.
[10;1H[K[11;1H[KJon W{tte and Hao-yang Wang, with help from Ross Brown, Mike Engber, David
[12;1H[KHairston, Michael Hamel, Jonathan Handler, Johnny Lee, Tim Lennan, Rob Menke,
[13;1H[Kand Andy Swanson developed NetHack 3.1 for the Macintosh, porting it for
[14;1H[KMPW. Building on their development, Bart House added a Think C port.
[15;1H[K[16;1H[KTimo Hakulinen ported NetHack 3.1 to OS/2. Eric Smith ported NetHack 3.1
[17;1H[Kto the Atari. Pat Rankin, with help from Joshua Delahunty, is responsible
[18;1H[Kfor the VMS version of NetHack 3.1. Michael Allison ported NetHack 3.1 to
[19;1H[KWindows NT.
[20;1H[K[21;1H[KDean Luick, with help from David Cohrs, developed NetHack 3.1 for X11.
[22;1H[KWarwick Allison wrote a tiled version of NetHack for the Atari;
[23;1H[Khe later contributed the tiles to the NetHack Development Team and tile
[24;1H[J[K--More--NZ_ ^ [1;1H[Ksupport was then added to other platforms.
[2;1H[K[3;1H[KThe 3.2 NetHack Development Team, comprised of Michael Allison, Ken Arromdee,
[4;1H[KDavid Cohrs, Jessie Collet, Steve Creps, Kevin Darcy, Timo Hakulinen, Steve
[5;1H[KLinhart, Dean Luick, Pat Rankin, Eric Smith, Mike Stephenson, Janet Walz,
[6;1H[Kand Paul Winner, released version 3.2 in April of 1996.
[7;1H[K[8;1H[KVersion 3.2 marked the tenth anniversary of the formation of the development
[9;1H[Kteam. In a testament to their dedication to the game, all thirteen members
[10;1H[Kof the original NetHack Development Team remained on the team at the start of
[11;1H[Kwork on that release. During the interval between the release of 3.1.3 and
[12;1H[K3.2, one of the founding members of the NetHack Development Team,
[13;1H[KDr. Izchak Miller, passed away. That release of the game was dedicated to
[14;1H[Khim by the development and porting teams.
[15;1H[K[16;1H[KVersion 3.2 proved to be more stable than previous versions. Many bugs
[17;1H[Kwere fixed, abuses eliminated, and game features tuned for better game
[18;1H[Kplay.
[19;1H[K[20;1H[KDuring the lifespan of NetHack 3.1 and 3.2, several enthusiasts of the game
[21;1H[Kadded their own modifications to the game and made these "variants" publicly
[22;1H[Kavailable:
[23;1H[K[24;1H[J[K--More--NZ_ [1;1H[KTom Proudfoot and Yuval Oren created NetHack++, which was quickly renamed
[2;1H[KNetHack--. Working independently, Stephen White wrote NetHack Plus.
[3;1H[KTom Proudfoot later merged NetHack Plus and his own NetHack-- to produce
[4;1H[KSLASH. Larry Stewart-Zerba and Warwick Allison improved the spellcasting
[5;1H[Ksystem with the Wizard Patch. Warwick Allison also ported NetHack to use
[6;1H[Kthe Qt interface.
[7;1H[K[8;1H[KWarren Cheung combined SLASH with the Wizard Patch to produce Slash'em, and
[9;1H[Kwith the help of Kevin Hugo, added more features. Kevin later joined the
[10;1H[KNetHack Development Team and incorporated the best of these ideas in
[11;1H[KNetHack 3.3.
[12;1H[K[13;1H[KThe final update to 3.2 was the bug fix release 3.2.3, which was released
[14;1H[Ksimultaneously with 3.3.0 in December 1999 just in time for the Year 2000.
[15;1H[K[16;1H[KThe 3.3 NetHack Development Team, consisting of Michael Allison, Ken Arromdee,
[17;1H[KDavid Cohrs, Jessie Collet, Steve Creps, Kevin Darcy, Timo Hakulinen,
[18;1H[KKevin Hugo, Steve Linhart, Ken Lorber, Dean Luick, Pat Rankin, Eric Smith,
[19;1H[KMike Stephenson, Janet Walz, and Paul Winner, released 3.3.0 in
[20;1H[KDecember 1999 and 3.3.1 in August of 2000.
[21;1H[K[22;1H[KVersion 3.3 offered many firsts. It was the first version to separate race
[23;1H[Kand profession. The Elf class was removed in preference to an elf race,
[24;1H[J[K--More--NZ_ [1;1H[Kand the races of dwarves, gnomes, and orcs made their first appearance in
[2;1H[Kthe game alongside the familiar human race. Monk and Ranger roles joined
[3;1H[KArcheologists, Barbarians, Cavemen, Healers, Knights, Priests, Rogues,
[4;1H[KSamurai, Tourists, Valkyries and of course, Wizards. It was also the first
[5;1H[Kversion to allow you to ride a steed, and was the first version to have a
[6;1H[Kpublicly available web-site listing all the bugs that had been discovered.
[7;1H[KDespite that constantly growing bug list, 3.3 proved stable enough to last
[8;1H[Kfor more than a year and a half.
[9;1H[K[10;1H[KThe 3.4 NetHack Development Team initially consisted of Michael Allison,
[11;1H[KKen Arromdee, David Cohrs, Jessie Collet, Kevin Hugo, Ken Lorber, Dean Luick,
[12;1H[KPat Rankin, Mike Stephenson, Janet Walz, and Paul Winner, with Warwick Allison
[13;1H[Kjoining just before the release of NetHack 3.4.0 in March 2002.
[14;1H[K[15;1H[KAs with version 3.3, various people contributed to the game as a whole as
[16;1H[Kwell as supporting ports on the different platforms that NetHack runs on:
[17;1H[K[18;1H[KPat Rankin maintained 3.4 for VMS.
[19;1H[K[20;1H[KMichael Allison maintained NetHack 3.4 for the MS-DOS platform.
[21;1H[KPaul Winner and Yitzhak Sapir provided encouragement.
[22;1H[K[23;1H[KDean Luick, Mark Modrall, and Kevin Hugo maintained and enhanced the
[24;1H[J[K--More--NZ_ 3 [1;1H[KMacintosh port of 3.4.
[2;1H[K[3;1H[KMichael Allison, David Cohrs, Alex Kompel, Dion Nicolaas, and Yitzhak Sapir
[4;1H[Kmaintained and enhanced 3.4 for the Microsoft Windows platform. Alex Kompel
[5;1H[Kcontributed a new graphical interface for the Windows port. Alex Kompel also
[6;1H[Kcontributed a Windows CE port for 3.4.1.
[7;1H[K[8;1H[KRon Van Iwaarden maintained 3.4 for OS/2.
[9;1H[K[10;1H[KJanne Salmijarvi and Teemu Suikki maintained and enhanced the
[11;1H[KAmiga port of 3.4 after Janne Salmijarvi resurrected it for 3.3.1.
[12;1H[K[13;1H[KChristian `Marvin' Bressler maintained 3.4 for the Atari after he
[14;1H[Kresurrected it for 3.3.1.
[15;1H[K[16;1H[KThe release of NetHack 3.4.3 in December 2003 marked the beginning of a
[17;1H[Klong release hiatus. 3.4.3 proved to be a remarkably stable version that
[18;1H[Kprovided continued enjoyment by the community for more than a decade. The
[19;1H[KNetHack Development Team slowly and quietly continued to work on the game
[20;1H[Kbehind the scenes
[21;1H[Kduring the tenure of 3.4.3. It was during that same period that several
[22;1H[Knew variants emerged within the NetHack community. Notably sporkhack by
[23;1H[KDerek S. Ray, unnethack by Patric Mueller, nitrohack and its successors
[24;1H[J[K--More--NZ_Q [1;1H[Koriginally by Daniel Thaler and then by Alex Smith, and
[2;1H[KDynahack by Tung Nguyen. Some of those variants continue to be developed,
[3;1H[Kmaintained, and enjoyed by the community to this day.
[4;1H[K[5;1H[KIn September 2014, an interim snapshot of the code under development was
[6;1H[Kreleased publicly by other parties. Since that code was a work-in-progress
[7;1H[Kand had not gone through a period of debugging, it was decided that the
[8;1H[Kversion numbers present on that code snapshot would be retired and never
[9;1H[Kused in an official NetHack release. An announcement was posted on the
[10;1H[KNetHack Development Team's official nethack.org website to that effect,
[11;1H[Kstating that there would never be a 3.4.4, 3.5, or 3.5.0 official release
[12;1H[Kversion.
[13;1H[K[14;1H[KIn January 2015, preparation began for the release of NetHack 3.6.
[15;1H[K[16;1H[KAt the beginning of development for what would eventually get released
[17;1H[Kas 3.6.0, the NetHack Development Team consisted of Warwick Allison,
[18;1H[KMichael Allison, Ken Arromdee, David Cohrs, Jessie Collet, Ken Lorber,
[19;1H[KDean Luick, Pat Rankin, Mike Stephenson, Janet Walz, and Paul Winner.
[20;1H[KLeading up to the release of 3.6.0 in early 2015, new members Sean Hunt,
[21;1H[KPasi Kallinen, and Derek S. Ray joined the NetHack Development Team.
[22;1H[K[23;1H[KNear the end of the development of 3.6.0, one of the significant inspirations
[24;1H[J[K--More--NZ_J + [1;1H[Kfor many of the humorous and fun features found in the game, author
[2;1H[KTerry Pratchett, passed away. NetHack 3.6.0 introduced a tribute to him.
[3;1H[K[4;1H[K3.6.0 was released in December 2015, and merged work done by the development
[5;1H[Kteam since the release of 3.4.3 with some of the beloved community patches.
[6;1H[KMany bugs were fixed and some code was restructured.
[7;1H[K[8;1H[KThe NetHack Development Team, as well as Steve VanDevender and
[9;1H[KKevin Smolkowski ensured that NetHack 3.6 continued to operate on various
[10;1H[KUnix flavors as well as maintaining the X11 interface.
[11;1H[K[12;1H[KKen Lorber, Haoyang Wang, Pat Rankin, and Dean Luick maintained the port
[13;1H[Kof NetHack 3.6.1 for Mac OSX.
[14;1H[K[15;1H[KMichael Allison, David Cohrs, Bart House, Pasi Kallinen, Alex Kompel,
[16;1H[KDion Nicolaas, Derek S. Ray and Yitzhak Sapir maintained the port of
[17;1H[KNetHack 3.6 for Microsoft Windows.
[18;1H[K[19;1H[KPat Rankin attempted to keep the VMS port running for NetHack 3.6,
[20;1H[Khindered by limited access. Kevin Smolkowski has updated and tested it
[21;1H[Kfor the most recent version of OpenVMS (V8.4 as of this writing) on Alpha
[22;1H[Kand Integrity (aka Itanium aka IA64) but not VAX.
[23;1H[K[24;1H[J[K--More--NZ_C [1;1H[KRay Chason resurrected the msdos port for 3.6 and contributed the
[2;1H[Knecessary updates to the community at large.
[3;1H[K[4;1H[KIn late April 2018, several hundred bug fixes for 3.6.0 and some new
[5;1H[Kfeatures were assembled and released as NetHack 3.6.1.
[6;1H[KThe NetHack Development Team at the time of release of 3.6.1 consisted of
[7;1H[KWarwick Allison, Michael Allison, Ken Arromdee, David Cohrs, Jessie Collet,
[8;1H[KPasi Kallinen, Ken Lorber, Dean Luick, Patric Mueller, Pat Rankin,
[9;1H[KDerek S. Ray, Alex Smith, Mike Stephenson, Janet Walz and Paul Winner.
[10;1H[K[11;1H[KIn early May 2019, another 320 bug fixes along with some enhancements and
[12;1H[Kthe adopted curses window port, were released as 3.6.2.
[13;1H[K[14;1H[KBart House, who had contributed to the game as a porting team participant
[15;1H[Kfor decades, joined the NetHack Development Team in late May 2019.
[16;1H[K[17;1H[KNetHack 3.6.3 was released on December 5, 2019 containing over 190 bug
[18;1H[Kfixes to NetHack 3.6.2.
[19;1H[K[20;1H[KNetHack 3.6.4 was released on December 18, 2019 containing a security
[21;1H[Kfix and a few bug fixes.
[22;1H[K[23;1H[KNetHack 3.6.5 was released on January 27, 2020 containing some security fixes
[24;1H[J[K--More--NZ_2 [1;1H[Kand a small number of bug fixes.
[2;1H[K[3;1H[KNetHack 3.6.6 was released on March 8, 2020 containing a security fix and
[4;1H[Ksome bug fixes.
[5;1H[K[6;1H[KThe official NetHack web site is maintained by Ken Lorber at
[7;1H[Khttp://www.nethack.org/.
[8;1H[K[9;1H[KOn behalf of the NetHack community, thank you very much once again to
[10;1H[KM. Drew Streib and Pasi Kallinen for providing a public NetHack server
[11;1H[Kat nethack.alt.org. Thanks to Keith Simpson and Andy Thomson for
[12;1H[Khardfought.org. Thanks to all those unnamed dungeoneers who invest their
[13;1H[Ktime and effort into annual NetHack tournaments such as Junethack
[14;1H[Kand in days past, devnull.net (gone for now, but not forgotten).
[15;1H[K[16;1H[K - - - - - - - - - -
[17;1H[K[18;1H[KFrom time to time, some depraved individual out there in netland sends a
[19;1H[Kparticularly intriguing modification to help out with the game. The
[20;1H[KNetHack Development Team sometimes makes note of the names of the worst
[21;1H[Kof these miscreants in this, the list of Dungeoneers:
[22;1H[K[23;1H[K Adam Aronow J. Ali Harlow Mikko Juola
[24;1H[J[K--More--NZ_d 8 [1;1H[K Alex Kompel Janet Walz Nathan Eady
[2;1H[K Alex Smith Janne Salmijarvi Norm Meluch
[3;1H[K Andreas Dorn Jean-Christophe Collet Olaf Seibert
[4;1H[K Andy Church Jeff Bailey Pasi Kallinen
[5;1H[K Andy Swanson Jochen Erwied Pat Rankin
[6;1H[K Andy Thomson John Kallen Patric Mueller
[7;1H[K Ari Huttunen John Rupley Paul Winner
[8;1H[K Bart House John S. Bien Pierre Martineau
[9;1H[K Benson I. Margulies Johnny Lee Ralf Brown
[10;1H[K Bill Dyer Jon W{tte Ray Chason
[11;1H[K Boudewijn Waijers Jonathan Handler Richard Addison
[12;1H[K Bruce Cox Joshua Delahunty Richard Beigel
[13;1H[K Bruce Holloway Karl Garrison Richard P. Hughey
[14;1H[K Bruce Mewborne Keizo Yamamoto Rob Menke
[15;1H[K Carl Schelin Keith Simpson Robin Bandy
[16;1H[K Chris Russo Ken Arnold Robin Johnson
[17;1H[K David Cohrs Ken Arromdee Roderick Schertler
[18;1H[K David Damerell Ken Lorber Roland McGrath
[19;1H[K David Gentzel Ken Washikita Ron Van Iwaarden
[20;1H[K David Hairston Kevin Darcy Ronnen Miller
[21;1H[K Dean Luick Kevin Hugo Ross Brown
[22;1H[K Del Lamb Kevin Sitze Sascha Wostmann
[23;1H[K Derek S. Ray Kevin Smolkowski Scott Bigham
[24;1H[J[K--More--NZ_YY [1;1H[K Deron Meranda Kevin Sweet Scott R. Turner
[2;1H[K Dion Nicolaas Lars Huttar Sean Hunt
[3;1H[K Dylan O'Donnell Leon Arnott Stephen Spackman
[4;1H[K Eric Backus M. Drew Streib Stefan Thielscher
[5;1H[K Eric Hendrickson Malcolm Ryan Stephen White
[6;1H[K Eric R. Smith Mark Gooderum Steve Creps
[7;1H[K Eric S. Raymond Mark Modrall Steve Linhart
[8;1H[K Erik Andersen Marvin Bressler Steve VanDevender
[9;1H[K Fredrik Ljungdahl Matthew Day Teemu Suikki
[10;1H[K Frederick Roeber Merlyn LeRoy Tim Lennan
[11;1H[K Gil Neiger Michael Allison Timo Hakulinen
[12;1H[K Greg Laskin Michael Feir Tom Almy
[13;1H[K Greg Olson Michael Hamel Tom West
[14;1H[K Gregg Wonderly Michael Sokolov Warren Cheung
[15;1H[K Hao-yang Wang Mike Engber Warwick Allison
[16;1H[K Helge Hafting Mike Gallop Yitzhak Sapir
[17;1H[K Irina Rempt-Drijfhout Mike Passaretti
[18;1H[K Izchak Miller Mike Stephenson
[19;1H[J[24;1H[K--More--NZ_ [H[2J[H[23;1H[[7m[32mASCIIPhilia the Rhizotom[m[mist ] St:11 Dx:8 Co:13 In:12 Wi:17 Ch:16 Neutral
[24;1HDlvl:1 $:1739 [32mHP:10[m(12) Pw:7[m(7) AC:8 Xp:1/1 T:31[16;47H[1m[37m@#[m[17;40H-[m[33m+[m-----[m[33m|[m--------[m[18;40H|[m[1m[30m.....[m[1m[33m$[m[1m[37m[7md[m[m[1m[30m.......[m|[m[19;40H[33m-[m[1m[30m....[m[1m[33m$[m...[m[1m[30m......[m|[m[20;40H|[m[1m[30m.....[m...[m[1m[30m.....[m<|[m[21;40H----------------[m[16;47HNZ_- " [HUnknown command ' '.[K[16;47HNZ_h | [H[K[1;32H[K Select one item:[2;32H[K [3;32H[K a - About NetHack (version information).[4;32H[K b - Long description of the game and commands.[5;32H[K c - List of game commands.[6;32H[K d - Concise history of NetHack.[7;32H[K e - Info on a character in the game display.[8;32H[K f - Info on what a given key does.[9;32H[K g - List of game options.[10;32H[K h - Longer explanation of game options.[11;32H[K i - Full list of keyboard commands[12;32H[K j - List of extended commands.[13;32H[K k - List menu control keys[14;32H[K l - The NetHack license.[15;32H[K m - Support information.[16;32H[K[C(end) NZ_ [3;35H+[1;31H[K[2;31H[K[3;31H[K[4;31H[K[5;31H[K[6;31H[K[7;31H[K[8;31H[K[9;31H[K[10;31H[K[11;31H[K[12;31H[K[13;31H[K[14;31H[K[15;31H[K[16;31H[K[16;47H[1m[37m@#[17;31H[K[m[17;40H-[m[33m+[m-----[m[33m|[m--------[m[1;1H[KUnix NetHack Version 3.6.6-0 post-release - last build Tue Sep 8 12:26:15 2020
[2;1H[K (36ee1849b1932d72a2340233c57701b1274c90ee,branch:NetHack-3.6).
[3;1H[K[4;1H[KOptions compiled into this edition:
[5;1H[K color, data file compression, data librarian, end-of-game dumplogs,
[6;1H[K insurance files for recovering from crashes, log file, extended log
[7;1H[K file, errors and warnings log file, mail daemon, news file, pattern
[8;1H[K matching via posixregex, pseudo random numbers generated by ISAAC64,
[9;1H[K strong PRNG seed available from /dev/urandom, screen clipping, shell
[10;1H[K command, traditional status display, status via windowport with
[11;1H[K highlighting, suspend command, terminal info library, timed wait for
[12;1H[K display effects, system configuration at run-time, save and bones files
[13;1H[K accepted from versions 3.6.0 through 3.6.6, and basic NetHack features.
[14;1H[K[15;1H[KSupported windowing systems:
[16;1H[K "tty" (traditional text with optional line-drawing) and "curses"
[17;1H[K (terminal-based graphics), with a default of "tty".
[18;1H[J[24;1H[K--More--NZ_ [H[2J[H[23;1H[[7m[32mASCIIPhilia the Rhizotom[m[mist ] St:11 Dx:8 Co:13 In:12 Wi:17 Ch:16 Neutral
[24;1HDlvl:1 $:1739 [32mHP:10[m(12) Pw:7[m(7) AC:8 Xp:1/1 T:31[16;47H[1m[37m@#[m[17;40H-[m[33m+[m-----[m[33m|[m--------[m[18;40H|[m[1m[30m.....[m[1m[33m$[m[1m[37m[7md[m[m[1m[30m.......[m|[m[19;40H[33m-[m[1m[30m....[m[1m[33m$[m...[m[1m[30m......[m|[m[20;40H|[m[1m[30m.....[m...[m[1m[30m.....[m<|[m[21;40H----------------[m[16;47HNZ_
6 [H[KWhat do you want to use or apply? [cg or ?*] [KNZ_Aj
[H[K[1;41H[K [7mWands ('/')[m[2;41H[K g - a wand of sleep (0:6)[3;41H[K [7mTools ('(')[m[4;41H[K c - an uncursed stethoscope[5;41H[K[C(end) NZ_s ] [1;40H[K[2;40H[K[3;40H[K[4;40H[K[5;40H[K[6;40H[K[16;47H[HNever mind.[K[16;47HNZ_
[H[K[16;47HNZ_dU v [1;32H[K Select one item:[2;32H[K [3;32H[K a - About NetHack (version information).[4;32H[K b - Long description of the game and commands.[5;32H[K c - List of game commands.[6;32H[K d - Concise history of NetHack.[7;32H[K e - Info on a character in the game display.[8;32H[K f - Info on what a given key does.[9;32H[K g - List of game options.[10;32H[K h - Longer explanation of game options.[11;32H[K i - Full list of keyboard commands[12;32H[K j - List of extended commands.[13;32H[K k - List menu control keys[14;32H[K l - The NetHack license.[15;32H[K m - Support information.[16;32H[K[C(end) NZ_z8 a [14;35H+[1;31H[K[2;31H[K[3;31H[K[4;31H[K[5;31H[K[6;31H[K[7;31H[K[8;31H[K[9;31H[K[10;31H[K[11;31H[K[12;31H[K[13;31H[K[14;31H[K[15;31H[K[16;31H[K[16;47H[1m[37m@#[17;31H[K[m[17;40H-[m[33m+[m-----[m[33m|[m--------[m[1;1H[K NETHACK GENERAL PUBLIC LICENSE
[2;1H[K (Copyright 1989 M. Stephenson)
[3;1H[K[4;1H[K (Based on the BISON general public license,
[5;1H[K copyright 1988 Richard M. Stallman)
[6;1H[K[7;1H[K Everyone is permitted to copy and distribute verbatim copies of this
[8;1H[K license, but changing it is not allowed. You can also use this wording to
[9;1H[K make the terms for other programs.
[10;1H[K[11;1H[K The license agreements of most software companies keep you at the mercy of
[12;1H[Kthose companies. By contrast, our general public license is intended to give
[13;1H[Keveryone the right to share NetHack. To make sure that you get the rights we
[14;1H[Kwant you to have, we need to make restrictions that forbid anyone to deny you
[15;1H[Kthese rights or to ask you to surrender the rights. Hence this license
[16;1H[Kagreement.
[17;1H[K[18;1H[K Specifically, we want to make sure that you have the right to give away
[19;1H[Kcopies of NetHack, that you receive source code or else can get it if you
[20;1H[Kwant it, that you can change NetHack or use pieces of it in new free
[21;1H[Kprograms, and that you know you can do these things.
[22;1H[K[23;1H[K To make sure that everyone has such rights, we have to forbid you to
[24;1H[J[K--More--NZ_9 * [1;1H[Kdeprive anyone else of these rights. For example, if you distribute copies
[2;1H[Kof NetHack, you must give the recipients all the rights that you have. You
[3;1H[Kmust make sure that they, too, receive or can get the source code. And you
[4;1H[Kmust tell them their rights.
[5;1H[K[6;1H[K Also, for our own protection, we must make certain that everyone finds out
[7;1H[Kthat there is no warranty for NetHack. If NetHack is modified by someone
[8;1H[Kelse and passed on, we want its recipients to know that what they have is
[9;1H[Knot what we distributed.
[10;1H[K[11;1H[K Therefore we (Mike Stephenson and other holders of NetHack copyrights) make
[12;1H[Kthe following terms which say what you must do to be allowed to distribute or
[13;1H[Kchange NetHack.
[14;1H[K[15;1H[K[16;1H[K COPYING POLICIES
[17;1H[K[18;1H[K 1. You may copy and distribute verbatim copies of NetHack source code as
[19;1H[Kyou receive it, in any medium, provided that you keep intact the notices on
[20;1H[Kall files that refer to copyrights, to this License Agreement, and to the
[21;1H[Kabsence of any warranty; and give any other recipients of the NetHack
[22;1H[Kprogram a copy of this License Agreement along with the program.
[23;1H[K[24;1H[J[K--More-- OZ_\ [1;1H[K 2. You may modify your copy or copies of NetHack or any portion of it, and
[2;1H[Kcopy and distribute such modifications under the terms of Paragraph 1 above
[3;1H[K(including distributing this License Agreement), provided that you also do the
[4;1H[Kfollowing:
[5;1H[K[6;1H[K a) cause the modified files to carry prominent notices stating that you
[7;1H[K changed the files and the date of any change; and
[8;1H[K[9;1H[K b) cause the whole of any work that you distribute or publish, that in
[10;1H[K whole or in part contains or is a derivative of NetHack or any part
[11;1H[K thereof, to be licensed at no charge to all third parties on terms
[12;1H[K identical to those contained in this License Agreement (except that you
[13;1H[K may choose to grant more extensive warranty protection to some or all
[14;1H[K third parties, at your option)
[15;1H[K[16;1H[K c) You may charge a distribution fee for the physical act of
[17;1H[K transferring a copy, and you may at your option offer warranty protection
[18;1H[K in exchange for a fee.
[19;1H[K[20;1H[K 3. You may copy and distribute NetHack (or a portion or derivative of it,
[21;1H[Kunder Paragraph 2) in object code or executable form under the terms of
[22;1H[KParagraphs 1 and 2 above provided that you also do one of the following:
[23;1H[K[24;1H[J[K--More-- OZ_ [1;1H[K a) accompany it with the complete machine-readable source code, which
[2;1H[K must be distributed under the terms of Paragraphs 1 and 2 above; or,
[3;1H[K[4;1H[K b) accompany it with full information as to how to obtain the complete
[5;1H[K machine-readable source code from an appropriate archive site. (This
[6;1H[K alternative is allowed only for noncommercial distribution.)
[7;1H[K[8;1H[KFor these purposes, complete source code means either the full source
[9;1H[Kdistribution as originally released over Usenet or updated copies of the
[10;1H[Kfiles in this distribution used to create the object code or executable.
[11;1H[K[12;1H[K 4. You may not copy, sublicense, distribute or transfer NetHack except as
[13;1H[Kexpressly provided under this License Agreement. Any attempt otherwise to
[14;1H[Kcopy, sublicense, distribute or transfer NetHack is void and your rights to
[15;1H[Kuse the program under this License agreement shall be automatically
[16;1H[Kterminated. However, parties who have received computer software programs
[17;1H[Kfrom you with this License Agreement will not have their licenses terminated
[18;1H[Kso long as such parties remain in full compliance.
[19;1H[K[20;1H[K[21;1H[KStated plainly: You are permitted to modify NetHack, or otherwise use parts
[22;1H[Kof NetHack, provided that you comply with the conditions specified above;
[23;1H[Kin particular, your modified NetHack or program containing parts of NetHack
[24;1H[J[K--More-- OZ_| [1;1H[Kmust remain freely available as provided in this License Agreement. In
[2;1H[Kother words, go ahead and share NetHack, but don't try to stop anyone else
[3;1H[Kfrom sharing it farther.
[4;1H[J[24;1H[K--More--OZ_Z [H[2J[H[23;1H[[7m[32mASCIIPhilia the Rhizotom[m[mist ] St:11 Dx:8 Co:13 In:12 Wi:17 Ch:16 Neutral
[24;1HDlvl:1 $:1739 [32mHP:10[m(12) Pw:7[m(7) AC:8 Xp:1/1 T:31[16;47H[1m[37m@#[m[17;40H-[m[33m+[m-----[m[33m|[m--------[m[18;40H|[m[1m[30m.....[m[1m[33m$[m[1m[37m[7md[m[m[1m[30m.......[m|[m[19;40H[33m-[m[1m[30m....[m[1m[33m$[m...[m[1m[30m......[m|[m[20;40H|[m[1m[30m.....[m...[m[1m[30m.....[m<|[m[21;40H----------------[m[16;47HOZ_ v [1;32H[K Select one item:[2;32H[K [3;32H[K a - About NetHack (version information).[4;32H[K b - Long description of the game and commands.[5;32H[K c - List of game commands.[6;32H[K d - Concise history of NetHack.[7;32H[K e - Info on a character in the game display.[8;32H[K f - Info on what a given key does.[9;32H[K g - List of game options.[10;32H[K h - Longer explanation of game options.[11;32H[K i - Full list of keyboard commands[12;32H[K j - List of extended commands.[13;32H[K k - List menu control keys[14;32H[K l - The NetHack license.[15;32H[K m - Support information.[16;32H[K[C(end) OZ_ [3;35H+[1;31H[K[2;31H[K[3;31H[K[4;31H[K[5;31H[K[6;31H[K[7;31H[K[8;31H[K[9;31H[K[10;31H[K[11;31H[K[12;31H[K[13;31H[K[14;31H[K[15;31H[K[16;31H[K[16;47H[1m[37m@#[17;31H[K[m[17;40H-[m[33m+[m-----[m[33m|[m--------[m[1;1H[KUnix NetHack Version 3.6.6-0 post-release - last build Tue Sep 8 12:26:15 2020
[2;1H[K (36ee1849b1932d72a2340233c57701b1274c90ee,branch:NetHack-3.6).
[3;1H[K[4;1H[KOptions compiled into this edition:
[5;1H[K color, data file compression, data librarian, end-of-game dumplogs,
[6;1H[K insurance files for recovering from crashes, log file, extended log
[7;1H[K file, errors and warnings log file, mail daemon, news file, pattern
[8;1H[K matching via posixregex, pseudo random numbers generated by ISAAC64,
[9;1H[K strong PRNG seed available from /dev/urandom, screen clipping, shell
[10;1H[K command, traditional status display, status via windowport with
[11;1H[K highlighting, suspend command, terminal info library, timed wait for
[12;1H[K display effects, system configuration at run-time, save and bones files
[13;1H[K accepted from versions 3.6.0 through 3.6.6, and basic NetHack features.
[14;1H[K[15;1H[KSupported windowing systems:
[16;1H[K "tty" (traditional text with optional line-drawing) and "curses"
[17;1H[K (terminal-based graphics), with a default of "tty".
[18;1H[J[24;1H[K--More--OZ_
[H[2J[H[23;1H[[7m[32mASCIIPhilia the Rhizotom[m[mist ] St:11 Dx:8 Co:13 In:12 Wi:17 Ch:16 Neutral
[24;1HDlvl:1 $:1739 [32mHP:10[m(12) Pw:7[m(7) AC:8 Xp:1/1 T:31[16;47H[1m[37m@#[m[17;40H-[m[33m+[m-----[m[33m|[m--------[m[18;40H|[m[1m[30m.....[m[1m[33m$[m[1m[37m[7md[m[m[1m[30m.......[m|[m[19;40H[33m-[m[1m[30m....[m[1m[33m$[m...[m[1m[30m......[m|[m[20;40H|[m[1m[30m.....[m...[m[1m[30m.....[m<|[m[21;40H----------------[m[16;47HOZ_ v [1;32H[K Select one item:[2;32H[K [3;32H[K a - About NetHack (version information).[4;32H[K b - Long description of the game and commands.[5;32H[K c - List of game commands.[6;32H[K d - Concise history of NetHack.[7;32H[K e - Info on a character in the game display.[8;32H[K f - Info on what a given key does.[9;32H[K g - List of game options.[10;32H[K h - Longer explanation of game options.[11;32H[K i - Full list of keyboard commands[12;32H[K j - List of extended commands.[13;32H[K k - List menu control keys[14;32H[K l - The NetHack license.[15;32H[K m - Support information.[16;32H[K[C(end)
OZ_z [4;35H+[1;31H[K[2;31H[K[3;31H[K[4;31H[K[5;31H[K[6;31H[K[7;31H[K[8;31H[K[9;31H[K[10;31H[K[11;31H[K[12;31H[K[13;31H[K[14;31H[K[15;31H[K[16;31H[K[16;47H[1m[37m@#[17;31H[K[m[17;40H-[m[33m+[m-----[m[33m|[m--------[m[1;1H[K Welcome to NetHack! ( description of version 3.6 )
[2;1H[K[3;1H[K NetHack is a Dungeons and Dragons like game where you (the adventurer)
[4;1H[Kdescend into the depths of the dungeon in search of the Amulet of Yendor,
[5;1H[Kreputed to be hidden somewhere below the twentieth level. You begin your
[6;1H[Kadventure with a pet that can help you in many ways, and can be trained
[7;1H[Kto do all sorts of things. On the way you will find useful (or useless)
[8;1H[Kitems, quite possibly with magic properties, and assorted monsters. You can
[9;1H[Kattack a monster by trying to move onto the space a monster is on (but often
[10;1H[Kit is much wiser to leave it alone).
[11;1H[K[12;1H[K Unlike most adventure games, which give you a verbal description of
[13;1H[Kyour location, NetHack gives you a visual image of the dungeon level you are
[14;1H[Kon.[15;1H[K[16;1H[K NetHack uses the following symbols:
[17;1H[K[18;1H[K - and | The walls of a room, possibly also open doors or a grave.
[19;1H[K . The floor of a room or a doorway.
[20;1H[K # A corridor, or iron bars, or a tree, or possibly a kitchen
[21;1H[K sink (if your dungeon has sinks), or a drawbridge.
[22;1H[K > Stairs down: a way to the next level.
[23;1H[K < Stairs up: a way to the previous level.
[24;1H[J[K--More--OZ_Z [1;1H[K @ You (usually), or another human.
[2;1H[K ) A weapon of some sort.
[3;1H[K [ A suit or piece of armor.
[4;1H[K % Something edible (not necessarily healthy).
[5;1H[K / A wand.
[6;1H[K = A ring.
[7;1H[K ? A scroll.
[8;1H[K ! A potion.
[9;1H[K ( Some other useful object (pick-axe, key, lamp...)
[10;1H[K $ A pile of gold.
[11;1H[K * A gem or rock (possibly valuable, possibly worthless).
[12;1H[K + A closed door, or a spellbook containing a spell
[13;1H[K you can learn.
[14;1H[K ^ A trap (once you detect it).
[15;1H[K " An amulet, or a spider web.
[16;1H[K 0 An iron ball.
[17;1H[K _ An altar, or an iron chain.
[18;1H[K { A fountain.
[19;1H[K } A pool of water or moat or a pool of lava.
[20;1H[K \ An opulent throne.
[21;1H[K ` A boulder or statue.
[22;1H[K A to Z, a to z, and several others: Monsters.
[23;1H[K I Invisible or unseen monster's last known location
[24;1H[J[K--More--OZ_S 6 [1;1H[K[2;1H[K You can find out what a symbol represents by typing
[3;1H[K '/' and following the directions to move the cursor
[4;1H[K to the symbol in question. For instance, a 'd' may
[5;1H[K turn out to be a dog.
[6;1H[K[7;1H[K[8;1H[Ky k u 7 8 9 Move commands:
[9;1H[K \|/ \|/ yuhjklbn: go one step in specified direction
[10;1H[Kh-.-l 4-.-6 YUHJKLBN: go in specified direction until you
[11;1H[K /|\ /|\ hit a wall or run into something
[12;1H[Kb j n 1 2 3 g: run in direction until something
[13;1H[K numberpad interesting is seen
[14;1H[K G, same, except a branching corridor isn't
[15;1H[K < up ^: considered interesting (the ^ in this
[16;1H[K case means the Control key, not a caret)
[17;1H[K > down m: move without picking up objects
[18;1H[K F: fight even if you don't sense a monster
[19;1H[K If the number_pad option is set, the number keys move instead.
[20;1H[K Depending on the platform, Shift number (on the numberpad),
[21;1H[K Meta number, or Alt number will invoke the YUHJKLBN commands.
[22;1H[K Control may or may not work when number_pad is enabled,
[23;1H[K depending on the platform's capabilities.
[24;1H[J[K--More--OZ_z5
[1;1H[K Digit '5' acts as 'G' prefix, unless number_pad is set to 2
[2;1H[K in which case it acts as 'g' instead.
[3;1H[K If number_pad is set to 3, the roles of 1,2,3 and 7,8,9 are
[4;1H[K reversed; when set to 4, behaves same as 3 combined with 2.
[5;1H[K If number_pad is set to -1, alphabetic movement commands are
[6;1H[K used but 'y' and 'z' are swapped.
[7;1H[K[8;1H[KCommands:
[9;1H[K NetHack knows the following commands:
[10;1H[K ? Help menu.
[11;1H[K / What-is, tell what a symbol represents. You may choose to
[12;1H[K specify a location or give a symbol argument. Enabling the
[13;1H[K autodescribe option will give information about the symbol
[14;1H[K at each location you move the cursor onto.
[15;1H[K & Tell what a command does.
[16;1H[K < Go up a staircase (if you are standing on it).
[17;1H[K > Go down a staircase (if you are standing on it).
[18;1H[K . Rest, do nothing for one turn.
[19;1H[K _ Travel via a shortest-path algorithm to a point on the map.
[20;1H[K a Apply (use) a tool (pick-axe, key, lamp...).
[21;1H[K A Remove all armor.
[22;1H[K ^A Redo the previous command.
[23;1H[K c Close a door.
[24;1H[J[K--More--OZ_
[1;1H[K C Call (name) monster, individual object, or type of object.
[2;1H[K d Drop something. d7a: drop seven items of object a.
[3;1H[K D Drop multiple items. This command is implemented in two
[4;1H[K different ways. One way is:
[5;1H[K "D" displays a list of all of your items, from which you can
[6;1H[K pick and choose what to drop. A "+" next to an item means
[7;1H[K that it will be dropped, a "-" means that it will not be
[8;1H[K dropped. Toggle an item to be selected/deselected by typing
[9;1H[K the letter adjacent to its description. Select all items
[10;1H[K with "+", deselect all items with "=". The moves
[11;1H[K you from one page of the listing to the next.
[12;1H[K The other way is:
[13;1H[K "D" will ask the question "What kinds of things do you want
[14;1H[K to drop? [!%= au]". You should type zero or more object
[15;1H[K symbols possibly followed by 'a' and/or 'u'.
[16;1H[K Da - drop all objects, without asking for confirmation.
[17;1H[K Du - drop only unpaid objects (when in a shop).
[18;1H[K D%u - drop only unpaid food.
[19;1H[K ^D Kick (for doors, usually).
[20;1H[K e Eat food.
[21;1H[K E Engrave a message on the floor.
[22;1H[K E- - write in the dust with your fingers.
[23;1H[K f Fire ammunition from quiver.
[24;1H[J[K--More--OZ_ 2 [1;1H[K F Followed by direction, fight a monster (even if you don't
[2;1H[K sense it).
[3;1H[K i Display your inventory.
[4;1H[K I Display selected parts of your inventory, as in
[5;1H[K I* - list all gems in inventory.
[6;1H[K Iu - list all unpaid items.
[7;1H[K Ix - list all used up items that are on your shopping bill.
[8;1H[K I$ - count your money.
[9;1H[K o Open a door.
[10;1H[K O Review current options and possibly change them.
[11;1H[K A menu displaying the option settings will be displayed
[12;1H[K and most can be changed by simply selecting their entry.
[13;1H[K Options are usually set before the game with NETHACKOPTIONS
[14;1H[K environment variable or via a configuration file (defaults.nh,
[15;1H[K NetHack Defaults, nethack.cnf, ~/.nethackrc, etc.) rather
[16;1H[K than with the 'O' command.
[17;1H[K p Pay your shopping bill.
[18;1H[K P Put on an accessory (ring, amulet, etc).
[19;1H[K ^P Repeat last message (subsequent ^P's repeat earlier messages).
[20;1H[K The behavior can be varied via the msg_window option.
[21;1H[K q Drink (quaff) something (potion, water, etc).
[22;1H[K Q Select ammunition for quiver.
[23;1H[K #quit Exit the program without saving the current game.
[24;1H[J[K--More--OZ_T [1;1H[K r Read a scroll or spellbook.
[2;1H[K R Remove an accessory (ring, amulet, etc).
[3;1H[K ^R Redraw the screen.
[4;1H[K s Search for secret doors and traps around you.
[5;1H[K S Save the game. Also exits the program.
[6;1H[K [To restore, just play again and use the same character name.]
[7;1H[K [There is no "save current data but keep playing" capability.]
[8;1H[K t Throw an object or shoot a projectile.
[9;1H[K T Take off armor.
[10;1H[K ^T Teleport, if you are able.
[11;1H[K v Displays the version number.
[12;1H[K V Display a longer identification of the version, including the
[13;1H[K history of the game.
[14;1H[K w Wield weapon. w- means wield nothing, use bare hands.
[15;1H[K W Wear armor.
[16;1H[K x Swap wielded and secondary weapons.
[17;1H[K X Toggle two-weapon combat.
[18;1H[K ^X Show your attributes.
[19;1H[K #explore Switch to Explore Mode (aka Discovery Mode) where dying and
[20;1H[K deleting the save file during restore can both be overridden.
[21;1H[K z Zap a wand. (Use y instead of z if number_pad is -1.)
[22;1H[K Z Cast a spell. (Use Y instead of Z if number_pad is -1.)
[23;1H[K ^Z Suspend the game. (^Y instead of ^Z if number_pad is -1.)
[24;1H[J[K--More--OZ_:a ] [1;1H[K [To resume, use the shell command 'fg'.]
[2;1H[K : Look at what is here.
[3;1H[K ; Look at what is somewhere else.
[4;1H[K , Pick up some things.
[5;1H[K @ Toggle the pickup option.
[6;1H[K ^ Ask for the type of a trap you found earlier.
[7;1H[K ) Tell what weapon you are wielding.
[8;1H[K [ Tell what armor you are wearing.
[9;1H[K = Tell what rings you are wearing.
[10;1H[K " Tell what amulet you are wearing.
[11;1H[K ( Tell what tools you are using.
[12;1H[K * Tell what equipment you are using; combines the preceding five.
[13;1H[K $ Count your gold pieces.
[14;1H[K + List the spells you know; also rearrange them if desired.
[15;1H[K \ Show what types of objects have been discovered.
[16;1H[K ` Show discovered types for one class of objects.
[17;1H[K ! Escape to a shell, if supported in your version and OS.
[18;1H[K [To resume play, terminate the shell subprocess via 'exit'.]
[19;1H[K # Introduces one of the "extended" commands. To get a list of
[20;1H[K the commands you can use with "#" type "#?". The extended
[21;1H[K commands you can use depends upon what options the game was
[22;1H[K compiled with, along with your class and what type of monster
[23;1H[K you most closely resemble at a given moment. If your keyboard
[24;1H[J[K--More--OZ_wn e [1;1H[K has a meta key (which, when pressed in combination with another
[2;1H[K key, modifies it by setting the 'meta' (8th, or 'high') bit),
[3;1H[K these extended commands can be invoked by meta-ing the first
[4;1H[K letter of the command. An alt key may have a similar effect.
[5;1H[K[6;1H[K If the "number_pad" option is on, some additional letter commands
[7;1H[K are available:
[8;1H[K[9;1H[K h displays the help menu, like '?'
[10;1H[K j Jump to another location.
[11;1H[K k Kick (for doors, usually).
[12;1H[K l Loot a box on the floor.
[13;1H[K n followed by number of times to repeat the next command.
[14;1H[K N Name a monster, an individual object, or a type of object.
[15;1H[K u Untrap a trapped object or door.
[16;1H[K[17;1H[K You can put a number before a command to repeat it that many times,
[18;1H[K as in "40." or "20s". If you have the number_pad option set, you
[19;1H[K must type 'n' to prefix the count, as in "n40." or "n20s".
[20;1H[K[21;1H[K[22;1H[K Some information is displayed on the bottom line or perhaps in a
[23;1H[K box, depending on the platform you are using. You see your
[24;1H[J[K--More--
OZ_2 [1;1H[K attributes, your alignment, what dungeon level you are on, how many
[2;1H[K hit points you have now (and will have when fully recovered), what
[3;1H[K your armor class is (the lower the better), your experience level,
[4;1H[K and the state of your stomach. Optionally, you may or may not see
[5;1H[K other information such as spell points, how much gold you have, etc.
[6;1H[K[7;1H[K Have Fun, and Happy Hacking!
[8;1H[J[24;1H[K--More--
OZ_/B [H[2J[H[23;1H[[7m[32mASCIIPhilia the Rhizotom[m[mist ] St:11 Dx:8 Co:13 In:12 Wi:17 Ch:16 Neutral
[24;1HDlvl:1 $:1739 [32mHP:10[m(12) Pw:7[m(7) AC:8 Xp:1/1 T:31[16;47H[1m[37m@#[m[17;40H-[m[33m+[m-----[m[33m|[m--------[m[18;40H|[m[1m[30m.....[m[1m[33m$[m[1m[37m[7md[m[m[1m[30m.......[m|[m[19;40H[33m-[m[1m[30m....[m[1m[33m$[m...[m[1m[30m......[m|[m[20;40H|[m[1m[30m.....[m...[m[1m[30m.....[m<|[m[21;40H----------------[m[16;47H^eZ_(