PCjs Machines

Home of the original IBM PC emulator for browsers.


PC-SIG Diskette Library (Disk #452)

[PCjs Machine "ibm5170"]

Waiting for machine "ibm5170" to load....

Information about “THE AMULET OF YENDOR (HACK)”

A Dungeons and Dragons-type text adventure from the Stichting Mathematis
Centrum in Amsterdam and converted to MS-DOS by Don Kneller.

Played on more than 26 levels against slavering monsters, master
villains and very powerful magic, your job is to survive and prosper
using all the skill you can muster.  Play as an explorer, warrior,
magician, tourist, knight, or a caveman with all their associated
strength, knowledge, and powers.

This is a bonanza for the adventure-addicted enthusiast who loves to
hack and slash. Unsheath your sword, grab your amulet and follow me!
File Descriptions:

HACK     CNF  Data file.
HH            Data file.
HACK     EXE  D & D adventure the ``Amulet of Yendor''.
HACK     DOC  History and documentation for HACK.EXE.
HACK     MSG  Hints on how to get through this adventure.
DATA          List of objects and denizens of this empire.
HELP          More documentation for the game.
RECORD        Support file for HACK.EXE.
RUMORS        Support file for HACK.EXE.
README        Introduction file.
TERMCAP       Data file.
HINTS    DOC  Hints on staying alive.


Disk No:  452
Program Title:  HACK (The Amulet of Yendor) version 3.60
PC-SIG version 3

This Dungeons & Dragons type adventure comes from the Stichting
Mathematisch Centrum in Amsterdam.  Originally running on a Unix machine
it was converted to MS-DOS by Don Kneller.  This adventure game is
played on over 26 levels against many monsters and very powerful magic.
You can be an explorer, warrior, magician, tourist, knight or a caveman
with all their associated powers.  We recommend this game for the
adventure enthusiast who loves to hack and slash.

Usage:  Game/Adventure.

Special Requirements:  Two floppy disk drives.

How to Start:  Type GO (press enter).

File Descriptions:

HACK     CNF  Data file.
HH            Data file.
HACK     EXE  D & D adventure the 'Amulet of Yendor'.
HACK     DOC  History and documentation for HACK.EXE.
HACK     MSG  Hints on how to get through this adventure.
DATA          List of objects and denizens of this empire.
HELP          More documentation for the game.
RECORD        Support file for HACK.EXE.
RUMORS        Support file for HACK.EXE.
README        Introduction file.
TERMCAP       Data file.
HINTS    DOC  Hints on staying alive.

1030D E Duane Avenue
Sunnyvale Ca. 94086
(408) 730-9291
(c) Copyright 1987,88 PC-SIG, Inc.


║            <<<<  Disk #452 THE AMULET OF YENDOR (HACK)  >>>>            ║
║ To copy the documentation to your printer, type MANUAL (press enter)    ║
║                                                                         ║
║ To Start the program type HACK (press enter)                            ║


                  PC HACK version 3.6 for MSDOS(tm) computers

                             by Don Kneller
                                2 Panoramic Way #204
                                Berkeley, CA 94704
                                Oct 22, 1986


       HACK is a display oriented dungeons and dragons type game.  It is
  similar in style to ROGUE played on UNIX(tm) systems but HACK is much
  richer in character.  HACK has many more monsters and highly varied magic.
  The motivation in HACK is to descend through the dungeon to find the Amulet
  of Yendor, then return to the surface.  As you travel you will meet various
  creatures (most of them nasty), find objects (some having magical proper-
  ties), and experience many hazards in the dungeon itself.

       PC HACK is the MSDOS version of UNIX HACK which was originally written
  by Jay Fenlason (Jay the Hacker), then heavily modified by people at the
  Stichting Mathematisch Centrum in Amsterdam.  This MSDOS version is called
  PC HACK 3.6.  When you are playing PC HACK, the `v' command will display
  the version number.

       For those who have played HACK on UNIX, this is a complete version
  1.03 with a few enhancements:

       1) You can specify the characters used to draw the dungeon instead of
          the -|+#.  See the GRAPHICS variable below.

       2) If your computer is IBM BIOS compatible, the numeric keypad can be
          used for moving as well as the usual "yuhjklbn" keys.  See the
          option "IBMBIOS".

       3) New options available through the 'O' command.
            "confirm"   If you try to hit tame or peaceful monsters (like
                        your dog) PC HACK asks for confirmation.

            "silent"    You can turn off the bell for a quieter game.

            "sortpack"  Your pack can be sorted by object class (ie. all
                        weapons will be displayed together).

            "packorder" The order to sort your pack in.

            "pickup"    You can change the option "pickup" so you look at
                        what is below you rather than pick it up.  Handy for
                        scare monster scrolls and avoiding picking up dead
                        cockatrices.  Also handy for browsing in shops.

            "rawio"     If you can use this option on your computer you will
                        get faster screen output and better input control.
                        ========  WARNING ========
                        This option may hang your computer !!  If this option
                        causes your computer to hang, do not use it!  It is
                        known that DEC Rainbows will hang with this option.

            "IBMBIOS"   If your computer is IBM BIOS compatible, you can use
                        the numeric keypad for moving.

            "DECRainbow" If your computer is a DEC Rainbow, you *must*
                        specify this option for character graphics to work!!

       4) Floppy, HardDisk and RAMdisk support.  *Complete* (I hope)
          protection from disk full problems.  Version 3.6 is much smarter
          about handling disks than previous PC HACK versions -- if your
          RAMdisk gets filled, the old levels get swapped out.

       5) Configuration comes from a file instead of environment variables.
          See HACK.CNF below.

       6) PC HACK uses the ANSI.SYS driver, making it quite portable between
          MSDOS machines.

       7) Save files are portable between MSDOS machines.

       8) A few monsters have been changed slightly to test new features.  A
          few commands have been added.

  System requirements

       To play PC HACK you need the following:

       1) MSDOS computer running MSDOS (or PCDOS) 2.0 or newer.

       2) The ANSI.SYS driver must be installed.  Your CONFIG.SYS file must
          have a line like:
               DEVICE = ANSI.SYS

       3) 320K ram or more.  Extra memory can be used as a RAMdisk.

       4) 2 or more 360K floppies or a HardDisk.

  Changes from *all* previous versions of PC HACK:

       1) All PC HACK 3.6 bones and save files are incompatible with versions
          older than 3.2 (this includes 1.01E, 1.03G and 3.0).  You should
          remove your old files.

       2) PC HACK uses time and date information in the game.  You should set
          the time and date when you boot up MSDOS.

  Changes from PC HACK 3.4

       Rest_on_space was restored.  A bug in the object descriptions was
  fixed.  A copy of COMMAND.COM must always be available where COMSPEC says
  it is so PC HACK can copy bones files and do the shell escape.  A bug in
  restoring the hell hound from save games was fixed.  TERMCAP is now used so
  it is possible to set your own colors and other character attributes.


       HACK now uses the UNIX "termcap" to select escape sequences to be sent
  to the terminal driver (either ANSI.SYS or NANSI.SYS) to change video
  modes.  When HACK starts up, it checks in the environment for the variable
  called "TERM".  The DOS command:
       set TERM=ibmpc-ega
  will give the environment variable "TERM" the value "ibmpc-ega".  By
  default, HACK assumes the value of TERM is "ibmpc-mono".

       Then HACK looks in the file called "TERMCAP" for a terminal definition
  with the same name as the value of TERM.  HACK first looks for TERMCAP in
  the current directory, then in directory "\ETC" (the normal UNIX place),
  then in directories along your PATH.

       The TERMCAP file uses 2 letter codes to describe each escape sequence
  and \E to mean ESC (the escape character is decimal 27).  Each entry is
  enclosed in colons.  For example, to start underscore mode on a monochrome
  display, we want to send the sequence "ESC[4m".  This looks like
  ":us=\E4m:" as a termcap entry.

       The following sequences are used by HACK and can be changed:

       ti   terminal initialization.  You could have something like:
            which would mean to select blue background and white foreground.

       te   terminal end.  To reset your terminal to white on black:

       so   stand out.  Select red forground, keeping the blue background:
            This is used for displaying highlighted text.

       se   standout end.  Back to white on blue:

       us,ue  underscore start; underscore end.  Used for highlighting the
            titles in the inventory.

       HACK also uses some sequences which you should not change: ho (home),
  cl (clear screen), bs (backspace), co (# of columns), li (# of lines), ce
  (clear to end of line), cm (cursor motion), xd (cursor down), nd (cursor
  forward), up (cursor up), bc (cursor back).

       If you want to make your own TERMCAP entry, copy the "ibmpc-mono"
  entry, replace the name (eg use "ibmpc-color" or "ibmpc-ega" or whatever),
  then replace the sequences with whatever you please.  The possible escape
  sequences are listed in Chapter 13 of the DOS 2.0 manual.  The NANSI.DOC
  file has a table of character attributes that you can use with NANSI.SYS.
  They are the same as used by ANSI.SYS.

       Remember to change the environment variable "TERM" to reflect which
  TERMCAP entry you want!  You should probably put a "set TERM=..." line in
  your AUTOEXEC.BAT file.  Also, make sure you put the TERMCAP file somewhere
  on your PATH.

  Commands new to PC HACK 3.4

       ^A `abort'.  Certain commands like waiting, searching, opening a tin,
          and digging can now be aborted.  Eg. if you do `20.' then see a
          monster appear in the doorway, you can use ^A (control-A) to stop
          your waiting.

       a  `again'.  Do the previous command again.  The apply command has
          been moved to `A' to accommodate `again'.

       gG `g' takes the place of `f' which will be "fight until wounded".
          Similarily, `G' takes the place of `F' which will be "fight to the
          death".  Neither of the `fight' commands have been installed yet.

  Commands new to PC HACK 3.0

       e  'eat' now lets you eat something you're standing on; you no longer
          have to be able to pick something up before you can eat it.

       I  selective inventories.  For example I= shows which rings you have
          in your inventory.

       :  look at what you're standing on without picking it up.

       #  lets you enter an extended command.  The only ones are "dip" and
          "pray".  Dip lets you put objects in potions.

       @  Toggles the "pickup" option so you don't have to do "O pickup" and
          "O !pickup".

       !  Starts up another COMMAND.COM if you have enough memory.

  Configuration of PC HACK for your MSDOS computer

       The configuration of PC HACK is controlled by a configuration file
  HACK.CNF.  This configuration file should be in the directory you are
  playing from, or somewhere on the PATH.  When PC HACK starts up, it uses
  the PATH to find HACK.CNF.  You must also put the TERMCAP file on the PATH.

       The HACK.CNF file contains variables for configuring PC HACK to your
  system.  The variables are:


  HACKDIR is the directory name of the place where all support files go.

       example:       HACKDIR=c:\games\hack

  The support files are:

       HELP       - A description of commands and options.
       HH         - An abridged version of the above.
       DATA       - Information about monsters and objects in the game.

       RECORD     - The score file (it may start out empty, but it must
                    exist).  The top score for each name and class are saved,
                    but only the top 100 scores are kept.
       RUMORS     - Fortune cookie hints (some are true, some are not).
       Put all these files in the directory HACKDIR.  If HACKDIR is not set,
  the support files are assumed to be in the current directory.  If you don't
  have enough disk space, the only file you're required to have is RECORD,
  but try to have RUMORS and DATA on your disk also.


  If the RAMDISK variable is not set, this is where the temporary dungeon
  levels get made.  Also, this is the directory where some temporary dungeon
  levels get left as bones files (a description of previous games).
       example:       LEVELS=C:\games\hack
       default:       the HACKDIR directory
  This path can be absolute or relative to the HACKDIR directory.


  The directory where any saved games will be kept.
            example:       SAVE=save;n
            default:       the HACKDIR directory

  If your player name is JOE, and the SAVE variable is save, then your saved
  game will be in HACKDIR\save\joe.sav.  Normally, HACK will prompt you to
  put in the SAVE disk if it can't find a save file when you first start the
  game.  Appending ";n" to the save path results in *no* prompt for diskette
  insertion.  This is useful if you have a HardDisk (eg SAVE=;n means save
  the game in the HACKDIR directory and don't prompt).

  After restoring your saved game, HACK will prompt you to put the GAME disk
  in only if it can't find RECORD and COMSPEC.


  The drive and directory where your RAMdisk is.  This is where PC HACK
  creates its temporary dungeon files.

       example:       RAMDISK=D:
       default:       none

  When PC HACK runs out of storage on the RAMdisk it swaps the oldest files
  out to your LEVELS directory.  A RAMdisk is very effective in speeding up
  the game, especially for floppy-only systems.  To override the RAMDISK
  variable, use the -R command line option (see below).


  Rather than use -, |, +, # for drawing the dungeon you can use any
  characters from the character set.  The GRAPHICS variable has 9 arguments
  that describe the the rooms and corridors.  The arguments are all integers
  in the range from 0 to 255 and correspond to the ASCII values of the
  characters you want to use.  The order of the variables is:

       vertical wall, horizontal wall, top left corner, top right corner,
       bottom left corner, bottom right corner, door, floor, corridor.

  The HACK.CNF file has examples of the use of this variable for both IBM
  graphics characters and DEC Rainbow line-drawing characters.

       example:  GRAPHICS = 179 196 218 191 192 217 206 250 176
       default:  decimal equivalents of:   | - - - - - + . #

  If you have a DEC Rainbow, you can use any characters from the ASCII
  character set and from the "line-drawing character set".  To use the line-
  drawing characters, take the decimal value of the character and add 128 to
  it.  This makes the value of the line-drawing characters lie between
  decimal 128 and 255 and tells PC HACK you want a line-drawing character.
  See HACK.CNF for a GRAPHICS variable suitable for DECs.

  DEC Rainbow users must also have the DECRainbow option (see below) in the
  OPTIONS line or the graphics characters will not be drawn correctly.

  Determines many smaller aspects of the game.  Options can be set before the
  game in the HACK.CNF file and most can be modified during the game with the
  'O' command.  You can change several options at a time by separating the
  options with commas.  Generally, 4 characters are sufficient to identify
  the option, so 'O sort' is the same as 'O sortpack'.

  There are two kinds of options:

       1) BOOLEAN, which can be either TRUE or FALSE.
          For example, "sortpack".  To turn it ON, do 'O sortpack' while
          playing or have an "OPTIONS=sortpack" line in your HACK.CNF file.
          To turn it OFF, do 'O !sortpack' or have "OPTIONS=!sortpack" in
          your HACK.CNF file.

       2) COMPOUND, which have one or more values.
          For example, "packorder".  To change the displayed ordering of the
          pack you might have an "OPTIONS=pack:%)!?" line in your HACK.CNF
          file.  The compound option "name" can only be set in HACK.CNF.
          Also, "name" should only be made up of characters A-Z, 0-9, and _
          and "name" will be truncated to 10 characters in the RECORD file.

  When playing, type 'O help<RETURN>' to get a little help on these options.
  The HELP file has a short description of all options.

  Options new to PC HACK 3.0

          Whether you want confirmation before hitting tame monsters.  This
          can be very helpful if you have the problem that you hit your dog
          and the shopkeepers by accident.  If you are blind or confused,
          though, you don't get this protection!  By default, TRUE.

          If TRUE, the bell is silent on input errors.  By default, FALSE.

          Whether your pack should be ordered by object class when listed in
          an inventory.  Otherwise your pack is listed alphabetically by
          inventory letter.  By default, TRUE.

          The order to display your inventory in.  By default, ")[%?/=!(*0
          To change the order, use 'O pack:<new order>' where <new order> is
          a set of characters representing the various object types.  If you
          don't give a character for each object type, the unspecified object
          classes are put at the end of the <new order>.

          If FALSE, you look at things you step on without picking them up.
          You always pick up gold if it is the only thing there.  Pickup is
          toggled between TRUE and FALSE with the '@' key.  By default, TRUE.

          ==========  WARNING ==========
          Some computers (notably DEC Rainbows) will hang if rawio is TRUE.
          If this happens to your computer, remove the OPTIONS=rawio line in
          the HACK.CNF file.  This option can only be set in HACK.CNF.
          If TRUE, the input and output of your computer will be switched to
          "raw" mode.  The advantage of this is faster output and better
          handling of the special characters ^S and ^P.
          If FALSE, PC HACK will *not* put your terminal into "raw" mode.
          This causes a problem with the ^P command.  When ^P is held until
          it repeats, MSDOS may see a ^P in the input buffer and toggle
          `output to printer'.  However, if the printer is not ready, you'll
          get a DOS error about your printer.  If you get this error, type a
          ^PrtSc, then `I' (ignore) the error.  You may have to repeat this
          several times then use ^R to redraw the screen.  The "solution" is
          not to hold down the ^P key.
          By default, FALSE.

       IBMBIOS  (only for very IBM compatible computers)
          As HACK had its origins as a ROGUE-like game, the keys for movement
          are the same (keys yuhjklbn).  Some people may prefer to use the
          arrow keys on the numeric keypad.  Setting the IBMBIOS option TRUE
          tells PC HACK it can use BIOS calls to access the numeric keypad.

          With Numlock *ENABLED* the translation from numeric pad keys to
          game commands is:
               Numeric Pad               Command
                 7  8  9  -        u+l(y)   up(k)    u+r(u)  move(m)
                  \ | /                  \    |    /
                 4 -5- 6  +       left(h)   go(g)  right(l)  pay(p)
                  / | \                  /    |    \
                 1  2  3           d+l(b)   down(j)  d+r(n)
               Ins    Del      inventory(i)     wait(.)

          The letter in () is the corresponding game command letter. 'u+l'
          means up and left.  The numeric pad '7' is translated to the game
          command for moving one space up and left.  From the keyboard, you
          would enter the command ^H (control-H) to run left until you see
          something interesting.  From the keypad, doing `gh' (the keys 5
          then 4) has the same effect.  With Shift the commands become:

                       u+l(Y)  up(K)    u+r(U)    previous message(^P)
                             \    |   /
                      left(H)  nothing  right(L)  put on a ring (P)
                             /    |   \
                       d+l(B)  down(J)  d+r(N)
          selective inventory(I)      look(;)

          Capital `H' means run left until you hit something.
          With NumLock *DISABLED*, shifted '5' does the go(g) and unshifted
          '5' does nothing.  All other keys are translated the same.
          By default, FALSE.

          This option must be set if your computer is a DEC Rainbow and you
          want to use characters from the line-drawing character set to draw
          the dungeon.  By default, FALSE.

  Sample configurations

  Hard disk system:

       # Lines that start with `#' are comments.
       # HACKDIR is where all the support files go.
       # The `;n' means to not prompt for insertion of the save diskette.
       OPTIONS=name:Bert-C, silent

  Notice that in this example, no LEVELS variable was set.  PC HACK will then
  default to the same directory as HACKDIR.  Bert-C means your name is "Bert"
  and you'll play as a cave-person.

  Two floppy systems:

  Make a bootable GAME disk (by using format /s) and set up your disks as:
                      RECORD, TERMCAP
                      (optionally) RUMORS, DATA, HELP, HH, AUTOEXEC.BAT
       LEVELS DISK:   empty (or with previous bones files)

  And your variables as:

       RAMDISK=c:     (optional)
       OPTIONS=name:Gerty-T, silent, time

  Boot from the GAME disk in drive A whenever you want to play PC HACK.  The
  LEVELS disk will be on drive B.  If there is no save file you will be
  prompted to put in the disk with the save file on it.  This is necessary
  because the save file may get too large to store on the LEVELS disk.  When
  this happens you can give an alternative file name for the save file.  For
  this example, you could answer "A:GERTY.SAV" at the prompt and PC HACK will
  look for "A:GERTY.SAV" rather than "B:\GERTY.SAV".

  *IMPORTANT NOTES*  In order to save a game, PC HACK must have access to the
  save file and all the level files at the same time.  When restoring, only
  after your save file has been properly restored will PC HACK remove it.  PC
  HACK will prevent you from saving the game if there is insufficient room.

  If you want to keep saved games on different floppies (perhaps for several
  players), one method is to make a bootable GAME disk (by using format /s)
  for each person and set up your diskettes as:
                      HACK.CNF (personalized for each player),
                      (optionally) AUTOEXEC.BAT
                      (optionally) RUMORS, DATA, HELP, HH
                      previous bones files
       SAVE DISK(S):  COMMAND.COM, save games

  And your variables as:

       # LEVELS defaults to the same directory as HACKDIR
       RAMDISK=c:     (optional)
       OPTIONS=name:Gerty-T, silent, time

  Boot from the GAME disk in drive A whenever you want to play PC HACK.  The
  LEVELS disk will stay in drive B.  You will be prompted to put in the SAVE
  disk (into drive A).  The copy of COMMAND.COM on the SAVE disks satisfies
  the COMSPEC requirement, since COMSPEC is still A:\COMMAND.COM.

  Command line options

       -u name or -uname
          Specifies the name to use other than the value of the OPTIONS name.
          If you wish, you can append -C, -W, -S, -F, -K, or -T to the name
          to select the type of character you want to be.
                 or: A> hack -u Terminator-T
          This means you will play as a Tourist with the name Terminator.

       -C, -W, -S, -F, -K, or -T
          Select the character you will be playing as.  Choices are:
               Cave-person, Wizard, Spelunker, Fighter, Knight, or Tourist.
          This option can be lower or upper case (except for -S).  Thus:
                 A> hack -T
          means get your name from the OPTIONS line in the HACK.CNF file, and
          play as a tourist.  If PC HACK can't get your name from the
          HACK.CNF file, you will be asked "Who are you?".

       -s [name]
          List the scores of the person with this name.  If the name is not
          given, uses the value of the OPTIONS name.  If the name is "all",
          list all scores in the record file.  You can erase the contents of
          the record file if you wish, but it should exist.

          This tells PC HACK to ignore the RAMDISK variable in HACK.CNF.
          This command is a hold-over from a previous version.

       Once you have started PC HACK, type a '?' to get help on the available
  commands.  Long help will show you the HELP file, short help will show you
  the HH file.  You can also print the HELP file and keep it as a reference.
  Other useful commands are `/' to describe things you see on the screen
  (uses the DATA file), and `\' to list the objects thus far discovered.

  If the dungeon collapses ....

       On rare occasions PC HACK gets an error and quits with a collapsing
  dungeon.  This may be due to a disk error or lack of enough memory (or,
  perhaps a program bug).  Even though there may be "level.*" files left
  behind, the game cannot be recovered because the information that was in
  RAM is lost.  You can delete the old level.* files before playing a new
  game, or PC HACK will do it for you next game.  However, if you do leave
  the level.* files behind, PC HACK will void the next game you play, then
  remove the old files.  You will then be able to play again.

       If you can find a way to consistently repeat the error, please let me
  know so I fix it.



       You are encouraged to copy this program and give it to your friends
  and post it to BBS's.  If you repost PC HACK, please use the archiving
  program `ARC' to put all the PC HACK files in an archive called
  PCHACK36.ARC.  If you want to report a bug in PC HACK, or you just want to
  drop me a line with a suggestion, please let me know at any of the
  following locations.  Make sure you mention which version you are playing!

       UUCP:     ...ucbvax!ucsfcgl!kneller
       ARPANET:  kneller@ucsfcgl.ARPA
       BITNET:   kneller@ucsfcgl.BITNET
       US MAIL:  D. G. Kneller
                 2 Panoramic Way #204
                 Berkeley, CA 94704

       Good Luck and Happy Hacking !!


  Hints for beginner HACKERS

       HACK is a Dungeons and Dragons like game where the object is to
  descend into a dungeon to retrieve the Amulet of Yendor and return to the
  surface with it.  The Amulet is harder to retrieve in PC HACK 3.x because
  it's in the possession of the Wizard of Yendor (more on this later).

  Your character

       You can be one of several character classes when you start the game.
  Each character starts with different attributes (strength, hit points) and
  a different inventory of items (armor, weapons, etc).  You should try the
  different classes to see which is best for you.  The class most likely to
  survive the first few dungeon levels is probably the cave-person.  However,
  each class has its strong and weak points so you should try them all.

  The status line

       At the bottom of the screen is displayed information about your state
  of being.  You see the dungeon level you are on, how many hit points you
  have now (and will have when fully recovered), what your armor class is
  (the lower the better), your strength, experience level and the state of
  your stomach.  If you have the "time" option ON, you will also see the
  number of moves you have taken.

  The little dog

       You start HACK accompanied by a little dog (nameable with the 'C'
  command) who can be very useful to you -- try not to kill him!  Your dog
  will follow you -- if you carry tripe rations, he will follow you even
  better.  Sometimes he gets in your way.  Either move around him, or wait
  (with the '.' command) until he moves.  If you want him to follow you to
  the next dungeon level, he must be on a square next to you when you descend
  or ascend the stairs.  Sometimes he gets hungry and confused and hits you.
  You can feed him by throwing food at him with the 't' command.

       Your dog may get mad at you if you move to a different dungeon level
  without taking him with you.  Although he may not hit you, he won't help
  you either.  You'll have to appease him somehow.

       Your dog is useful for his ability to fight and to pick up and carry
  objects.  Of course, your dog might be a female, so change all "he" and
  "him" to "she" and "her".

  The dungeon

       The dungeon is a set of levels connected through stairways and
  trapdoors.  Each level is an interconnected system of rooms and corridors.
  The rooms have doors that lead to the corridors.  You must walk straight
  through a door -- no diagonals allowed.  Some doors (and some corridors)
  are hidden and you must search for them (with the 's' command).  Usually
  you must search several times, so use a repeat count (eg '5s').  Some rooms
  are special and have no doors or connecting corridors.  There is a way to
  get in, though, but you will have to experiment.

       The Wizard resides below the normal dungeon levels and can't be
  reached by only taking the stairs.

       Some rooms have special contents -- some are shops (but be aware that
  the shopkeeper expects payment (the 'p' command) for the items you get
  there) and some are zoos, full of interesting monsters.  Some rooms are lit
  and you can see the entire room, and some rooms are dark so you can see
  only the floor near you.


       To fight monsters, move to occupy the same square they are in.  You
  can also throw things at them, or zap them with wands.  It is best to leave
  some monsters alone.


       The objects you find may be enchanted (that's good) or cursed (that's
  bad) or normal.  Cursed items are generally less effective than normal and
  also, once you have them on your body they are impossible to remove unless
  you remove their curse.

       You use different objects in different ways:

       )  WEAPONS are wielded ('w') or thrown ('t')
          Some weapons are more effective when used together.  For example,
          you get more effect by wielding a bow before throwing arrows.
          'w-' means to wield nothing; ie. be barehanded

       [  ARMOR is worn ('W') and taken off ('T')
          You can wear more than 1 piece of armor, but there are some
          restrictions on the combinations.  For example, you can only wear 1
          SUIT of armor, but you can always wear an elven cloak.

       !  POTIONS are quaffed ('q')

       =  RINGS are put on ('P') and removed ('R')
          You only can only wear 2 rings at a time, one on each hand.  Also,
          wearing rings makes you to use up more food, so use them sparingly.

       /  WANDS are zapped ('z')
          Some wands need a direction to be zapped in, but others do not.

       ?  SCROLLS are read ('r')

       (  TOOLS are applied ('A')
          For example, to use a whistle, you apply it.

       Initially you will not know what the potions, rings, wands or scrolls
  do until you use them.  They will have names like "XIXIXI".  Some of these
  objects are identified as soon as you use them (for example, a scroll of
  light causes a dark room to be lit).

       Other objects have no noticeable effect.  If it's not immediately
  obvious what a scroll or potion does the first time you use it, you may be
  asked to give it a name.  HACK does this so that if you have an idea about
  what the object does you can name it something appropriate so the next time
  you find it you will know something about it.  Whenever HACK asks for a

  name it is possible to use ^H or back-arrow to erase the previous
  character, ^U to erase the entire line, and <Esc> to quit without supplying
  a name.

       Using some objects gives a message like "You have a strange feeling
  for a moment, but it passes".  This means the object would have done
  something but couldn't do it now (for example, some scrolls affect your
  weapon, but if you're not wielding a weapon you'll get this message).

       The call command 'c' can be used to name individual objects, or all
  objects of a certain type.  When you do a 'c', HACK asks if you want to
  name an individual object.  Answer 'y' if you do and 'n' if you want to
  name all objects of the same type.  Then HACK will prompt you for the
  inventory letter of the object you want to name.  For example, if you put
  on a silver ring that has inventory letter 's' and notice your strength
  increases by two then you do:
       'c' 'n' 's' 'strength<return>'
            (call all objects with the same type as item 's' "strength").
       then 'c' 'y' 's' '+2<return>'
            (call individual inventory item 's' "+2")
  When you do an inventory you will see
       s) a ring called strength named +2
  The next time you pick up a silver ring it will be called strength so you
  will know what it does.  However, you will not know if it will increase or
  decrease your strength!  You will have to put it on to find out or you will
  have to identify it.

  Enchanting objects

         If you enchant an object, it will be better than it was before.
  Enchanting armor changes your armor class by 1 (eg. you could go from class
  7 to class 6 -- the less positive the number, the better the armor class,
  as in Dungeons and Dragons).  For weapons, the more positive the number,
  the better.  Thus a +2 mace is better than a +1 mace.  Some armor is better
  than others -- normal plate mail is better than normal ring mail.  Some
  weapons are better than others, but factors such as experience and luck
  determine whether you can effectively use the better weapons.

  Identifying objects

       The scroll of identify will help you to identify many objects, but
  generally you just have to use them and see what happens.  Occasionally a
  scroll of identify will have the ability to identify several objects.  So
  it is to your advantage to have several unidentified objects before you use
  an identify scroll.  When you read a scroll of identify HACK will ask you
  which classes of objects you want identified.  If, for example, you answer
  '=/' then for each ring in your pack you will be asked if you want to
  identify it.  After going through all rings, you will be asked about the
  wands.  If you do not identify any of these objects you will get back to
  the question about which classes of objects you want identified.

       The effect of rings may not be obvious, and cursed rings can't be
  removed unless you remove their curse.  Thus scrolls of identify are
  probably best used to identify rings.


       When the game ends, either by your death, when you quit, or if you
  escape from the caves, HACK will give you (a fragment of) the list of top
  scorers.  The scoring is based on many aspects of your behavior but a rough
  estimate is obtained by taking the amount of gold you've found in the cave
  plus four times your (real) experience.  Precious gems may be worth a lot
  of gold when brought to the exit.  There is a 10% penalty for dying.

  What is "--More--"?

       Whenever there is a lot of information for you to see, HACK waits for
  you to read it all by giving you a "--More--".  If the "--More--" is
  displayed on the normal response line (the top line that most messages are
  shown on), then HACK is waiting for you to enter ' ' (the space character)
  or <return> (the ENTER key).

       If HACK has printed out a list of information (eg. you did an 'i'
  command), then HACK will accept ' ' or <return> as well as the inventory
  letter of anything in the list.  Where is this useful?  An example is when
  you want to quaff a potion but you can't remember the letter of the potion
  you want.  You do 'q' then '?' and HACK gives you the list of all your
  potions followed by a "--More--" message.  If you type ' ' or <return> you
  get back to the prompt about which potion you want to quaff.  If you type
  the inventory letter of the potion, you immediately quaff that potion.

       If the screen is completely cleared to give you information (eg.
  you're looking at the help documentation with the '?' command), then there
  will be more than one screen full of information.  In this case, ' ' or
  <return> mean "show the next screen" and 'q' or ESC mean "stop".


       Of course, there is much about HACK to discover yourself.  The RUMORS
  file provides helpful clues for playing.  Also, saved games have no special
  protection so you can save a game and make a copy of the savefile.  Then if
  you die trying something risky you can use the copy to restart your game
  from the same place.

Directory of PC-SIG Library Disk #0452

 Volume in drive A has no label
 Directory of A:\

DATA             10035  12-18-86
FILES452 TXT      1327  11-21-88   8:49a
GO       BAT        38   6-05-87   8:50a
GO       TXT       540  11-02-88   1:30p
HACK     CNF      1852  12-18-86
HACK     DOC     26402  12-18-86
HACK     EXE    253143  12-18-86
HELP              6992  12-18-86
HH                3267  12-18-86
HINTS    DOC     10861  12-18-86
MANUAL   BAT       147  11-02-88   1:30p
README            6374  12-18-86
RECORD              53  10-27-88   9:35a
RUMORS           25585  12-18-86
TERMCAP            984   3-07-87   6:56p
       15 file(s)     347600 bytes
                        7168 bytes free