Difference between revisions of "Jay Fenlason's Hack"
Ray Chason (talk | contribs) (Initial revision.) |
m (Category:History) |
||
Line 186: | Line 186: | ||
{{stub}} | {{stub}} | ||
+ | |||
+ | [[Category:History]] |
Revision as of 16:48, 13 July 2006
NetHack Versions |
|
|
|
|
|
|
|
|
Jay Fenlason's Hack is the name given in this article to the original Hack as written by Jay Fenlason and friends, and to two other versions of Hack of different lineage than Andries Brouwer's Hack.
The exact content of the original Hack is unknown. No source for this game has ever been published. Three derivatives are known to exist:
- "hack121" is a DOS Binary available at Ali Harlow's website as hack121.zip. No source for this program is known to exist.
- PDP-11 Hack was published on Usenet in February 1985, and a port of this to a Unix clone called PC/IX was published in May. They are archived at Google Groups at:
- Hack 1.0 was developed by Andries Brouwer and posted to Usenet in December 1984. All other versions of Hack and NetHack are descended from this version.
The rest of this article covers mainly PDP-11 Hack and "hack121".
Contents
Overview
These games do not have distinct roles for the player to pursue. "Hack121" begins with a screen from which the player may buy equipment; PDP-11 Hack starts the player off as a sort of generic fighter character.
The exact goal of the adventurer is uncertain. The Amulet of Yendor is nowhere mentioned in either game.
Both games have shops. Other special rooms in hack121 are uncertain at this time. PDP-11 Hack has several special room types, including some that appear in Hack 1.0. PDP-11 Hack apparently has vaults, but they are implemented very differently than in Hack 1.0.
PDP-11 Hack starts the player off with a little dog. Hack121 apparently does not have pets.
Bestiary
The bestiaries of hack121 and PDP-11 Hack are listed below, along with the Hack 1.0 bestiary for comparison. The monster symbols for hack121 are not available at this moment; also, other monster descriptions may be lurking in other parts of the binary.
Main monster list
These are given in the order of their appearance in the code; it will be seen that the lists are quite similar.
Hack121 | PDP-11 Hack | Hack 1.0 |
---|---|---|
bat | bat (B) | bat (B) |
lizard | gnome (G) | gnome (G) |
goblin | hobgoblin (H) | hobgoblin (H) |
jackal | jackal (J) | jackal (J) |
kobold | kobold (K) | kobold (K) |
pickpocket | leprechaun (L) | leprechaun (L) |
giant rat | giant rat (r) | giant rat (r) |
acid blob | acid blob (a) | acid blob (a) |
evil eye | floating eye (E) | floating eye (E) |
hurkle | homunculus (h) | homunculus (h) |
neevil | imp (i) | imp (i) |
orc | orc (O) | orc (O) |
yellow light | yellow light (y) | yellow light (y) |
zombie | zombie (Z) | zombie (Z) |
giant ant | giant ant (A) | giant ant (A) |
fog cloud | fog cloud (f) | fog cloud (f) |
robber | nymph (N) | nymph (N) |
stalactoid | piercer (p) | piercer (p) |
queevolt | quasit (Q) | quasit (Q) |
quivering blob | quivering blob (q) | quivering blob (q) |
grabber | violet fungi (v) | violet fungi (v) |
nepto | giant beetle (b) | giant beetle (b) |
centaur | centaur (C) | centaur (C) |
cockatrice | cockatrice (c) | cockatrice (c) |
ghost | gelatinous cube (g) | gelatinous cube (g) |
jaguar | jaguar (j) | jaguar (j) |
killer bee | killer bee (k) | killer bee (k) |
viper | snake (S) | snake (S) |
ice ball | freezing sphere (F) | freezing sphere (F) |
giant bear | owlbear (o) | owlbear (o) |
oxidizer | rust monster (R) | rust monster (R) |
unox | giant scorpion (s) | scorpion (s) |
teleporter | teleporter (t) | tengu (t) |
wraith | wraith (W) | wraith (W) |
snowman | long worm (w) | long worm or wumpus (w) |
octopus | large dog (d) | large dog (d) |
xyloman | leocrotta (l) | leocrotta (l) |
faker | mimic (M) | mimic (M) |
minotaur | minotaur (m) | found at end of table |
troll | troll (T) | troll (T) |
ugod | ugod (u) | unicorn (u) |
xerp | yeti (Y) | yeti (Y) |
phase shifter | invisible stalker (I) | stalker (I) |
hydra | umber hulk (U) | umber hulk (U) |
vampire | vampire (V) | vampire (V) |
wumpus | xorn (X) | xorn (X) |
rock lobster | xerp (x) | xan (x) |
zelomp | zelomp (z) | zruty (z) |
chameleon | chameleon (:) | chameleon (:) |
dragon | dragon (D) | dragon (D) |
energar | ettin (e) | ettin (e) |
floor fiend | lurker above (') | lurker above (~) |
landshark | neo-otyugh (n) | nurse (n) |
argus | trapper (,) | trapper (,) |
mega-worm | purple worm (P) | purple worm (P) |
demon | demon (&) | demon (&) |
minotaur (m) | ||
shopkeeper (@) |
Other monsters kept in separate structures
All versions of Hack and NetHack prior to NetHack 3.0.0 have various monster description structures floating around in their source code, for monsters with special functions. These are listed here, with monsters having the same function in the same row. The large dog appears both here and in the above table because the structure in the above table is used for wild dogs, and the one shown below is used for pets. In Hack 1.0, the shopkeeper is moved to the main monster list.
Hack121 | PDP-11 Hack | Hack 1.0 |
---|---|---|
vampire bat | ||
shopkeep | shopkeeper (@) | in main monster table |
guard | treasurer (@) | guard (@) |
little dog (d) | little dog (d) | |
dog (d) | dog (d) | |
large dog (d) | large dog (d) |
Available Objects
- This page is a stub. Should you wish to do so, you can contribute by expanding this page.