1 $NetBSD: Original_READ_ME,v 1.2 1995/03/23 08:29:10 cgd Exp $
3 This is export hack, my first semester programming project.
5 To set it up for your system, you will have to do the following:
6 1: create a hack uid, to own the top ten list, etc.
7 2: create a hack directory "/usr/lib/game/hack" is the default.
8 2.5: make the directory 700 mode. /* sav files go in there...*/
9 3: modify hack.main.c to use the new directory.
10 4: modify hack.main.c so it uses the new hack gid. Gid accounts can
11 go into magic mode without the password, can get cores with ^G, etc.
12 (make sure gid isn't checked anywhere else...)
14 6: put it in games after making it set-uid hack.
15 8: fix the bugs I undobtedly left in it.
16 9: tell me what you think of it.
18 Hack uses the UCB file /etc/termcap to get your terminal escape codes.
19 If you don't use it, you will have to make extensive changes to hack.pri.c
21 If you find any bugs (That you think I don't know about), or have any
22 awesome new changes (Like a better save (One that works!)), or have ANY
29 or call me at (617) 443-5036. Since I have both a modem and a teen-age
33 Hack is split (roughly) into several source files that do different things.
34 I have tried to fit all the procedures having to do with a certain segment
35 of the game into a single file, but the job is not the best in the world.
38 hack.c General random stuff and things I never got around to moving.
39 hack.main.c main() and other random procedures, also the lock file stuff.
40 hack.mon.c Monsters, moving, attacking, etc.
41 hack.do.c drink, eat, read, wield, save, etc.
42 hack.do1.c zap, wear, remove, etc...
43 hack.pri.c stuff having to do with the screen, most of the terminal
44 independent stuff is in here.
45 hack.lev.c temp files and calling of mklev.
47 Because of the peculiar restraints on our system, I make mklev (create
48 a level) a separate procedure execd by hack when needed. The source for
49 mklev is (Naturaly) mklev.c. You may want to put mklev back into hack.
52 Most of hack was written by me, with help from
53 Kenny Woodland (KW) (general random things including
55 Mike Thome (MT) (The original chamelian)
56 and Jon Payne (JP) (The original lock file kludge and
59 This entire program would not have been possible without the SFSU Logo
60 Workshop. I am eternally grateful to all of our students (Especially K.L.),
61 without whom I would never have seen Rogue. I am especially grateful to
62 Mike Clancy, without whose generous help I would never have gotten to play