NetHack

From Seo Wiki - Search Engine Optimization and Programming Languages

Jump to: navigation, search
NetHack
File:Nethack releasing a djinni.png
A released djinni grants the player a wish.
Developer(s) The NetHack DevTeam
License NetHack General Public License
Version 3.4.3 (8 December 2003)
3.4.1 (23 February 2003)
3.4.0 (20 March 2002)
3.3 (10 December 1999)
Platform(s) Cross-platform
Release date(s) 1.3d (July 1987)[1]
Genre(s) Roguelike
Input methods Keyboard and mouse

NetHack is a single-player roguelike video game originally released in 1987. It is a descendant of an earlier game called Hack (Template:Vgy), which is a descendant of Rogue (Template:Vgy).[2] Salon describes it as "one of the finest gaming experiences the computing world has to offer."[2]

The "net" element references that its development has been coordinated through USENET [3][4] even before the Public Internet existed. The "hack" element refers to the game it was based on, Hack. The player takes the part of a dungeon-delving character in search of the Amulet of Yendor.[5]

Contents


History and development

NetHack is open source and remains one of the oldest computer games still actively developed,[6] with bug fixes added as deemed necessary by a group of volunteers commonly called the DevTeam. The DevTeam rarely discussed versions under development in public, and released new versions without notice. However, they do maintain a list of known bugs. Since NetHack is open source, others are free to release patches to the game between official, versioned releases.[7]

Gameplay

Before playing a game, the player is asked to name his or her character and then select a race, role, gender, and alignment, or allow the game to assign them. There are traditional fantasy roles such as knight, barbarian, wizard, rogue, valkyrie, priest, monk, and samurai, but there are also unusual ones, including archaeologist, tourist, and caveman.[8] The player character's role and alignment dictate which deity the character serves in the game and "how other monsters react toward you".[9]

After the player character is created, the main objective is introduced. To win the game, the player must retrieve the Amulet of Yendor, found at the lowest level of the dungeon, and sacrifice it to his or her deity. Successful completion of this task rewards the player with the gift of immortality, and the player is said to "ascend", attaining the status of demigod. In addition, a number of sub-quests must be completed, including one class-specific quest.

The player's character is usually accompanied by a pet animal, typically a kitten or little dog, although knights begin with a saddled pony.[10] Pets grow from fighting, and they can be changed by various means. Most of the other monsters may also be tamed using magic or tempting food.

Dungeon levels

NetHack's dungeon spans about 50 levels, of which most are randomly generated when the player character first encounters them. A typical level contains a way "up" and a way "down" (these may be stairways, ladders, trapdoors etc.), along with several "rooms" joined by corridors that may contain features such as altars, shops, fountains, traps, and even sinks. Some "special" levels are of fixed design in every game session. There are several dungeon branches, including a Sokoban puzzle[11] and Vlad's Tower.[12]

Items and tools

File:Nethack-inventory.png
A player's inventory, as displayed after application of the "menucolors" patch.

NetHack features a variety of items: weapons (either ranged or melee),[13] armor to protect the player;[14] scrolls and spellbooks to read,[15] potions to quaff[16], rings[17], amulets[18], and an assortment of tools such as keys and lamps.[19]

One important aspect of NetHack's gameplay is the identification of items. For example, a newly-discovered potion may be referred to as a 'pink potion' with no other clues as to its identity. Players can perform a variety of actions and tricks to deduce, or at least narrow down, the identity of the potion.[20] The most obvious is the somewhat risky tactic of simply drinking it.

Unlike some other roguelikes, all items of a certain type will have the same description; e.g., all scrolls of enchant weapon may be labeled 'TEMOV', and once one has been identified, all scrolls of enchant weapon found will be labeled unambiguously as such. Starting a new game will scramble the items' descriptions again, so the 'silver ring' that is a ring of levitation in one game might be a ring of hunger in another.

Blessings and curses

As in many other roguelike games, all items in NetHack are either "blessed", "uncursed", or "cursed".[21] The majority of items are found uncursed, but the "BUC" (Blessed/Uncursed/Cursed) status of an item is unknown until it is identified or detected through other means. The priest character class automatically identifies BUC status.

Generally, a blessed item will be more powerful than an uncursed item, and a cursed item will be less powerful. Regarding objects which bestow effects upon the character, a curse will generally make the effect (more) harmful. There are exceptions, however, which are usually very specific (e.g. the cursed potion of gain level will make the character rise through the ceiling to the level above).

Character death

Like roguelikes in general, NetHack features permadeath: expired characters cannot be revived without having made backup copies of the actual save files. Players sometimes use the acronyms "YAAD" and "YASD" when discussing their characters' deaths, meaning "Yet Another Annoying Death" or "Yet Another Stupid Death".[22] An "annoying" death is typically one that was the fault of misfortune more than the player (such as falling into a spiked, poisoned pit trap early in the game); a "stupid" death is when player's actions were directly responsible for their own death.

File:NetHack-ascension.png
An ascending player is asked whether she wants her possessions identified.

The prompt "Do you want your possessions identified?" (abbreviated as "DYWYPI" and used to suggest character death) is given by default at the end of any game, allowing the player to learn any unknown properties of the items found during the game.

The game sporadically saves a level on which a character has died and then integrates that level into a later game. This is done via "bones files", which are saved on the computer hosting the game. A player using a publicly-hosted copy of the game can thus encounter the remains of many other players. Players can also swap bones files via programs like Hearse.[23]

Conducts

Although NetHack can be completed by new or intermediate players without any artificial limitations, experienced players can attempt "conducts" for an additional challenge.[24] These are voluntary restrictions on actions taken, such as using no wishes, following a vegetarian or even vegan diet, or even killing no monsters. While in general conducts are tracked by the game and are displayed at death or ascension, unofficial conducts, such as the Zen conduct (in which the player's character wears a blindfold throughout the whole game), also exist within the NetHack community.

Spoilers

NetHack is largely based on discovering secrets and tricks during gameplay. It can take years for one to become well-versed in them, and even experienced players routinely discover new ones. A number of NetHack fansites and discussion forums offer lists of game secrets known as "spoilers".[25] Fans of NetHack consider an ascension without having read spoilers very prestigious; the achievement is so difficult that some question whether it has been or can be accomplished.

Interface

NetHack was originally created with only a simple ASCII graphical user interface, although the option to use something more elaborate was added later in its development. Interface elements — environment, entities, and objects — are represented by arrangements of ASCII or Extended ASCII glyphs used in plain text, "DEC graphics" or "IBM graphics" mode. In addition to the environment, the interface also displays character and situational information.

A detailed example:

 You see here a silver ring.
                                           ------------
                                         ##....._.....|
                                           |...........#          ------
                                          #...........|           |....|
                      ---------------   ###------------           |...(|
                      |..%...........|##########               ###-@...|
                      |...%...........###    #                 ## |....|
                      +.......<......|       ###              ### |..!.|
                      ---------------          #              #   ------
                                               ###          ###
                                                 #          #
                                              ---.-----   ###
                                              |.......|   #
                                              |........####
                                              |.......|
                                              |.......|
                                              ---------
 Hacker the Conjurer            St:11 Dx:13 Co:12 In:11 Wi:18 Ch:11  Lawful
 Dlvl:3  $:120 HP:39(41) Pw:36(36) AC:6  Exp:5 T:1073
File:NetHack for Windows Screenshot.png
NetHack for Microsoft Windows in "tiles mode".
File:Vultures-2.1.0 screenshot.jpg
Vulture's Eye offers an isometric perspective.
File:NeXTSTEP Nethack.png
NetHack on OPENSTEP/NeXTSTEP.

The player (The '@' sign, a wizard in this case) has entered the level via the stairs (the '<' sign) and killed a few monsters, leaving their corpses (the '%' signs) behind. Exploring, the wizard has uncovered three rooms joined by corridors (the '#' signs): one with an altar (the '_' sign), another empty, and the final one (that the wizard is currently in) containing a potion (the '!' sign), chest (the '(' sign), and has just moved onto a square containing a silver ring. Large parts of the level remain unexplored (probably to the west through the door (the '+' sign)) and the player has yet to find the down-stairs (a '>' sign) to the next level.

Apart from the original termcap interface shown above, there are interfaces that replace standard screen representations with two-dimensional images, or tiles, collectively known as "tiles mode". Graphic interfaces of this kind utilize the X Window System, the similar Microsoft Windows GUI, the Qt toolkit, or the GNOME libraries.

Enhanced graphical options also exist, such as the isometric perspective of Falcon's Eye and Vulture's Eye, or the three-dimensional rendering that noegnud offers. Vulture's Eye is a fork of the now defunct Falcon's Eye project. Vulture's Eye adds additional graphics, sounds, bugfixes and performance enhancements and is under active development in an open collaborative environment.

Online

Bugs, humorous messages, stories, experiences, and ideas for the next version are discussed on the Usenet newsgroup rec.games.roguelike.nethack.[26]

A public server at nethack.alt.org, commonly known as NAO, gives access to NetHack through a Telnet interface. Ebonhack connects to NAO with a graphical tiles-based interface.[27]

NetHack also has an IRC channel, #nethack, on the Freenode network. Many people discuss the game there, and the resident announcer bot, "Rodney", notifies of every death and ascension that occurs on the NAO server. Rodney can also announce full and new moons, as well as providing a substantial database of information which players can access with commands.

Ports and variants

Unofficial ports exist for the Nintendo DS,[28][29] PlayStation Portable,[30] Tapwave Zodiac,[31] GP2X,[32] Windows Mobile,[33] Android,[34], Nokia Internet Tablets 770, N800 and up [35][36] and iPhone.[37] NetHack is acknowledged by Blizzard as an inspiration for Diablo.[38]

Slash'EM[39], SporkHack[40] and UnNetHack[41] are actively developed variants.

References

  1. "NetHack 1.3d". Wikihack. http://nethack.wikia.com/wiki/NetHack_1.3d. Retrieved 2008-12-15. 
  2. 2.0 2.1 Au, Wagner James (2000-01-26). "The best game ever". Salon.com. Salon Media Group. Archived from the original on 2008-01-13. http://web.archive.org/web/20080113042211/http://archive.salon.com/tech/feature/2000/01/27/nethack/. Retrieved 2009-07-13. 
  3. "NETHACK(6) Manpage". nethack.sourceforge.net. http://nethack.sourceforge.net/docs/nh340/nethack.txt. Retrieved 2009-12-08. 
  4. "NetHack 1.3d - Wikihack, the NetHack wiki - Wishing, royal jelly, artifacts, and more". nethack.wikia.com. http://nethack.wikia.com/wiki/NetHack_1.3d. Retrieved 2009-12-08. 
  5. Au, Wagner James (August 1997), "Back to the Dungeon", Wired, http://www.wired.com/wired/archive/5.08/streetcred.html?pg=3 
  6. Eli (2006-07-16). "NetHack". Jay Is Games. http://jayisgames.com/archives/2006/07/nethack.php. Retrieved 2008-12-15. 
  7. http://www.nethack.org/common/license.html
  8. http://www.nethack.org/v343/Guidebook.html#_TOCentry_2
  9. http://www.nethack.org/v343/Guidebook.html#_TOCentry_4
  10. http://www.nethack.org/v343/Guidebook.html#_TOCentry_17
  11. http://nethack.wikia.com/wiki/Sokoban
  12. http://nethack.wikia.com/wiki/Vlad%27s_Tower
  13. http://www.nethack.org/v343/Guidebook.html#_TOCentry_22
  14. http://www.nethack.org/v343/Guidebook.html#_TOCentry_25
  15. http://www.nethack.org/v343/Guidebook.html#_TOCentry_27
  16. http://www.nethack.org/v343/Guidebook.html#_TOCentry_28
  17. http://www.nethack.org/v343/Guidebook.html#_TOCentry_30
  18. http://www.nethack.org/v343/Guidebook.html#_TOCentry_34
  19. http://www.nethack.org/v343/Guidebook.html#_TOCentry_32
  20. http://www.nethack.org/v343/Guidebook.html#_TOCentry_51
  21. http://www.nethack.org/v343/Guidebook.html#_TOCentry_21
  22. http://nethack.wikia.com/wiki/Yet_Another_Stupid_Death
  23. "Hearse". http://hearse.krollmark.com/. Retrieved 2008-12-15. 
  24. http://www.nethack.org/v343/Guidebook.html#_TOCentry_38
  25. http://www.statslab.cam.ac.uk/~eva/nethack/spoilerlist.html
  26. "rec.games.roguelike.nethack". Wikihack. http://nethack.wikia.com/wiki/rec.games.roguelike.nethack. Retrieved 2008-12-15. 
  27. "Linux Games". http://www.linuxgames.com/archives/14395. 
  28. Pernsteiner, Stuart (2007-03-17). "NetHack for the Nintendo DS". Stuart Pernsteiner's Website. http://stuartp.commixus.com/nhds/. Retrieved 2008-12-15. 
  29. Kosinski, Brett (2008-10-19). "NetHackDS". The "B" Ark. http://frodo.dyn.gno.org/~brettk/NetHackDS. Retrieved 2008-12-15. 
  30. "Porting NetHack to the PSP - Latest news". 2007-03-22. http://www.feelthepawa.com/PSP/NetHack/. Retrieved 2008-12-15. 
  31. "NetHack and SlashEM for Palm OS". Retrobits.net. http://www.retrobits.net/palmos/nethack.shtml. Retrieved 2008-12-15. 
  32. "Nethack (graphical)". GP2X Wiki. 2008-07-12. http://wiki.gp2x.org/wiki/Nethack_(graphical). Retrieved 2008-12-15. 
  33. "Download NetHack 3.4.3 for Windows Mobile PocketPC - Softpedia". Softpedia. 2006-04-16. http://handheld.softpedia.com/get/Games/Adventure/NetHack-9837.shtml. Retrieved 2008-12-13. 
  34. "NetHack v1.1.3 Game for Android". AndroLib.com. http://www.androlib.com/android.application.com-nethackff-zzxC.aspx. Retrieved 2009-11-14. 
  35. Caron, Frank (2007-05-24). "The N800 surfs nicely, but how does it game?". Ars Technica. http://arstechnica.com/journals/thumbs.ars/2007/05/24/n800-gaming-overview. Retrieved 2008-12-15. 
  36. "Nethack ported to Maemo on Nokia 770". http://www.rengels.de/computer/nethack/. 
  37. "iNetHack (NetHack iPhone port)". http://code.google.com/p/inethack/. Retrieved 2009-11-23. 
  38. "Blue's News Feb 7-13, 1998". 1998-02-13. http://www.bluesnews.com/archives/feb98-1.html#f.plans. Retrieved 2009-09-09. 
  39. "The Slash'EM Homepage". http://slashem.sourceforge.net/. 
  40. "SporkHack". http://www.sporkhack.com. 
  41. "UnNetHack". http://apps.sf.net/trac/unnethack. 

External links

Wikis

cs:NetHack de:NetHack et:NetHack es:NetHack fr:NetHack ko:넷핵 it:NetHack ja:NetHack no:NetHack pl:NetHack pt:NetHack ru:NetHack fi:NetHack sv:NetHack th:เน็ตแฮ็ก zh:NetHack

Personal tools

Served in 1.059 secs.