juao [2J[1;1H Player: VegNBeans Game: Slash'EM Extended Server: $ATTR(14)em.slashem.me - https://em.slashem.me/$ATTR() Filename: 2022-01-05.10:39:38.ttyrec Time: (1641379178) Wed Jan 5 10:39:38 2022 [2Jjua E [H[2J[H[2;1HThis is Sadistic Levels of Endless X-Citement (SLEX) 1997-2018 by Amy [3;1HNetHack, Copyright 1985-2003 Stichting Mathematisch Centrum, M. Stephenson. [4;1HContact the dev team via the #em.slashem.me channel on Libera IRC. [5;1HSee license for details. Bug reports can also be posted on Nethackwiki. [6;1Hjua [HRestoring save file...[Kjua( [16;57Hjuak* 2 [23;1H[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1HDlvl:1 $0 HP [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T4 [25;1H[K[1;25HYou return to level 1 in The Dungeons of Doom.[K--More--rua= [H[K[H[2J[H[13;54H[1m[38;5;5m+[m[14;54H[1m[38;5;5m[m[38;5;7m[m[1m[38;5;5m[m[15;54H[1m[38;5;5m[m[38;5;7m[m[1m[38;5;5m[m[16;54H[1m[38;5;5m+[m[38;5;7m[m[38;5;5mx[m[1m[38;5;7m@[m[1m[38;5;5m[m[17;54H[1m[38;5;5m[m[38;5;7m[m[1m[38;5;5m[m[18;54H[1m[38;5;5m<[m[38;5;7m[m[1m[38;5;5m[m[19;54H[1m[38;5;5m+[m[38;5;7m[m[1m[38;5;5m[m[20;54H[1m[38;5;5m[m[16;57Hrua N [23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1HDlvl:1 $0 HP[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T4 [25;1H[K[HHello VegNBeans, the shoe Gang Scholar, welcome back to SlashEMExtended![K[16;57Hrua $ [23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T4 [25;1H[K[1;75HBe careful! New moon tonight.[K[16;57HtuaX [H[K[1;148H[K Main Menu[2;148H[K [3;148H[K g - Game[4;148H[K i - Inventory[5;148H[K a - Action[6;148H[K p - Player[7;148H[K d - Discoveries[8;148H[K ? - Help[9;148H[K[C(end) uua k [1;147H[K[2;147H[K[3;147H[K[4;147H[K[5;147H[K[6;147H[K[7;147H[K[8;147H[K[9;147H[K[10;147H[K[23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T4 [25;1H[K[16;57Huua[ [Hb - an uncursed +0 ring mail (being worn) {100}.[K[23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T4 [25;1H[K[16;57H[H[K[1;133H[K Drop what type of items?[2;133H[K [3;133H[K a - All types[4;133H[K b - Weapons (')')[5;133H[K c - Armor ('[')[6;133H[K d - Scrolls ('?')[7;133H[K e - Spellbooks ('+')[8;133H[K f - Potions ('!')[9;133H[K g - Rings ('=')[10;133H[K h - Wands ('/')[11;133H[K A - Auto-select every item[12;133H[K B - Items known to be Blessed[13;133H[K U - Items known to be Uncursed[14;133H[K[C(end) wua/ [1;132H[K[2;132H[K[3;132H[K[4;132H[K[5;132H[K[6;132H[K[7;132H[K[8;132H[K[9;132H[K[10;132H[K[11;132H[K[12;132H[K[13;132H[K[14;132H[K[15;132H[K[23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T4 [25;1H[K[16;57HyuaI [1;148H[K Main Menu[2;148H[K [3;148H[K g - Game[4;148H[K i - Inventory[5;148H[K a - Action[6;148H[K p - Player[7;148H[K d - Discoveries[8;148H[K ? - Help[9;148H[K[C(end) {ua [3;151H+[1;147H[K[2;147H[K[3;147H[K[4;147H[K[5;147H[K[6;147H[K[7;147H[K[8;147H[K[9;147H[K[10;147H[K[1;146H[K Game[2;146H[K [3;146H[K O - Options[4;146H[K r - Redraw Screen[5;146H[K S - Save[6;146H[K q - Quit [M-q][7;146H[K[C(end) }uaI [4;149H+[1;145H[K[2;145H[K[3;145H[K[4;145H[K[5;145H[K[6;145H[K[7;145H[K[8;145H[K[H[2J[H[23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1HDlvl:1 $0 HP[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T4 [25;1H[K[13;54H[1m[38;5;5m+[m[14;54H[1m[38;5;5m[m[38;5;7m[m[1m[38;5;5m[m[15;54H[1m[38;5;5m[m[38;5;7m[m[1m[38;5;5m[m[16;54H[1m[38;5;5m+[m[38;5;7m[m[38;5;5mx[m[1m[38;5;7m@[m[1m[38;5;5m[m[17;54H[1m[38;5;5m[m[38;5;7m[m[1m[38;5;5m[m[18;54H[1m[38;5;5m<[m[38;5;7m[m[1m[38;5;5m[m[19;54H[1m[38;5;5m+[m[38;5;7m[m[1m[38;5;5m[m[20;54H[1m[38;5;5m[m[16;57Hua [1;148H[K Main Menu[2;148H[K [3;148H[K g - Game[4;148H[K i - Inventory[5;148H[K a - Action[6;148H[K p - Player[7;148H[K d - Discoveries[8;148H[K ? - Help[9;148H[K[C(end) ua [5;151H+[1;147H[K[2;147H[K[3;147H[K[4;147H[K[5;147H[K[6;147H[K[7;147H[K[8;147H[K[9;147H[K[10;147H[K[1;141H[K Action[2;141H[K [3;141H[K c - Close a door[4;141H[K e - Eat some food[5;141H[K f - Force a lock [M-f][6;141H[K l - Loot an object[7;141H[K o - Open a door[8;141H[K q - Quaff a potion[9;141H[K r - Read an object[10;141H[K u - Untrap[11;141H[K z - Zap a wand[12;141H[K Z - Cast a spell[13;141H[K[C(end) uaҶ \ [1;140H[K[2;140H[K[3;140H[K[4;140H[K[5;140H[K[6;140H[K[7;140H[K[8;140H[K[9;140H[K[10;140H[K[11;140H[K[12;140H[K[13;140H[K[14;140H[K[1;148H[K Main Menu[2;148H[K [3;148H[K g - Game[4;148H[K i - Inventory[5;148H[K a - Action[6;148H[K p - Player[7;148H[K d - Discoveries[8;148H[K ? - Help[9;148H[K[C(end) ua k [1;147H[K[2;147H[K[3;147H[K[4;147H[K[5;147H[K[6;147H[K[7;147H[K[8;147H[K[9;147H[K[10;147H[K[23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T4 [25;1H[K[16;57Hua} [HCount: 54[Kua3 [H[K[16;57H[HCount: 541[Kuaf [H[K[16;57H[HCount: 5411[Kua˕ [H[K[16;57H[HCount: 32767[Kua [H[K[16;57H[HCount: 32767[Kua [H[K[16;57H[HCount: 32767[Kuaq [H[K[16;57H[HCount: 32767[KuaI [H[K[16;57H[HCount: 32767[Kuax [H[K[16;57H[HCount: 32767[Kua [H[K[16;57H[HCount: 32767[Kua [H[K[16;57H[HCount: 32767[Kua [H[K[16;57H[HCount: 32767[Kua [H[K[16;57H[HCount: 32767[KuaQ [H[K[16;57H[HCount: 32767[Kua @ [H[K[16;57H[HSpecify unknown object by cursor? [ynq] (q) [Kuan q[K[23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T4 [25;1H[K[16;57Hua#) [H[K[16;57H[HCount: 99[Kua< [H[K[23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T4 [25;1H[K[16;57Hua 1 [23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T5 [25;1H[K[16;56H[38;5;7m[m[17;56H[38;5;5mx[m[1m[38;5;7m@[muaK 1 [23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T6 [25;1H[K[17;56H[38;5;7m[m[18;56H[38;5;5mx[m[1m[38;5;7m@[mua 0 [23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T7 [25;1H[K[18;56H[38;5;7m[m[38;5;5mx[m[19;57H[1m[38;5;7m@[muamM # [HUnknown command '^?'.[K--More--uaPm T [19;57H[HYou might want to turn on the number pad, which is done by opening the options with shift-O and navigating to the number_pad entry (it's not between null and[K[K perm_invent, you have to scroll further down to the compound options). Toggle that with the appropriate letter key and hit spacebar (not escape!) until the[K[K number_pad dialog comes up, and set it to 2. Alternatively, you can also turn on the number pad by adding this line to your options file: OPTIONS=number_pad:2[K[K (probably requires you to start a new game). (Press y to disable this message) [yn] (n) [KuaE W n[K[H[K[K[2;1H[K[3;1H[K[4;1H[K[19;57H[HTurn the number pad on? [yn] (n) [Kua y[K[23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T7 [25;1H[K[19;57HuaI8 [H[K[19;57Hua39 [HUnknown command '^J'.[K[23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T7 [25;1H[K[19;57Huai [H[K[19;57Huan " [HYou kill the weapon bug![K[23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T7 [25;1H[K[A[A[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T8 [25;1H[K[18;57H[38;5;7m[m[19;57HuaG [H[K[23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T8 [25;1H[K[A[A[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T9 [25;1H[K[18;57H[1m[38;5;7m@[m[19;57H[38;5;7m[m[Auarb [23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T9 [25;1H[K[A[A[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T10 [25;1H[K[17;57H[1m[38;5;7m@[m[18;57H[38;5;7m[m[Aua [23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T10 [25;1H[K[A[A[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T11 [25;1H[K[16;57H[1m[38;5;7m@[m[17;57H[38;5;7m[m[Aua [23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T11 [25;1H[K[A[A[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T12 [25;1H[K[16;56H[1m[38;5;7m@[m[38;5;7m[muau [23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T12 [25;1H[K[A[A[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T13 [25;1H[K[16;56H[38;5;7m[m[17;56H[1m[38;5;7m@[mua [23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T13 [25;1H[K[A[A[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T14 [25;1H[K[17;56H[38;5;7m[m[18;56H[1m[38;5;7m@[muaP [23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T14 [25;1H[K[A[A[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T15 [25;1H[K[18;55H[1m[38;5;7m[41m@[m[38;5;7m[muǎ [23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T15 [25;1H[K[A[A[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T16 [25;1H[K[17;56H[1m[38;5;7m@[m[18;55H[1m[38;5;5m<[m[Aua^ [23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T16 [25;1H[K[A[A[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T17 [25;1H[K[16;57H[1m[38;5;7m@[m[17;56H[38;5;7m[m[Aua [23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T17 [25;1H[K[A[A[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T18 [25;1H[K[16;56H[1m[38;5;7m@[m[38;5;7m[mua& [23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T18 [25;1H[K[A[A[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T19 [25;1H[K[16;55H[1m[38;5;7m@[m[38;5;7m[muaY ; [HYou can't open anything -- you have no hands![K--More--uax T [H[K[16;55H[HTry to open it with another part of your body instead? [yn] (n) [Kua+ y[K[16;55Hua, [HA cloud of darkness falls upon you.[K[16;55H[1m[38;5;7m@[m[23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T19 [25;1H[K[A[24;42HBli [25;1H[K[A[25;1H[K[1;38HOff - you just blinded yourself![K--More--uao W [H[K[23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T19 [25;1H[K[A[24;42HBli [25;1H[K[A[25;1H[K[A[A[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T20 [25;1H[K[A[24;42HBli [25;1H[K[A[25;1H[K[16;55H[1m[38;5;7m@[mua{ K [23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T20 [25;1H[K[A[24;42HBli [25;1H[K[A[25;1H[K[16;55H[38;5;7m[m[17;55H[1m[38;5;7m@[mua/ ' [HYou can see again.[K[23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T21 [25;1H[K[17;55H[1m[38;5;7m@[mua7 # [H[K[23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T21 [25;1H[K[A[A[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T22 [25;1H[K[17;55H[38;5;7m[m[18;55H[1m[38;5;7m[41m@[mua [23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T22 [25;1H[K[A[A[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T23 [25;1H[K[18;55H[1m[38;5;5m<[m[19;55H[1m[38;5;7m@[mua [H[2J[Hcmdassist: Invalid direction key! [2;1H[3;1HValid direction keys (with number_pad on) are: [4;1H 7 8 9 [5;1H \ | / [6;1H 4- . -6 [7;1H / | \ [8;1H 1 2 3 [9;1H[10;1H < up [11;1H > down [12;1H . direct at yourself [13;1H[14;1H(Suppress this message with !cmdassist in config file.) [15;1HHint: Shift-O opens the options. To change between [16;1Hvi-like keys and the number pad, use the number_pad option. [17;1H[18;1HAdd OPTIONS=number_pad:2 to your options file to turn the number pad on. [19;1HAdd OPTIONS=number_pad:0 to your options file to turn the number pad off. [20;1H(Editing the options file might not take effect until you start a new game)[33;1H[K--More--uam [H[2J[H[23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1HDlvl:1 $0 HP[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T23 [25;1H[K[13;54H[1m[38;5;5m+[m[14;54H[1m[38;5;5m[m[38;5;7m[m[1m[38;5;5m[m[15;54H[1m[38;5;5m[m[38;5;7m[m[1m[38;5;5m[m[16;54H[1m[38;5;5m+[m[38;5;7m[m[1m[38;5;5m[m[17;54H[1m[38;5;5m[m[38;5;7m[m[1m[38;5;5m[m[18;54H[1m[38;5;5m<[m[38;5;7m[m[1m[38;5;5m[m[19;54H[1m[38;5;5m+[m[1m[38;5;7m@[m[38;5;7m[m[1m[38;5;5m[m[20;54H[1m[38;5;5m[m[19;55Hua< ; [HYou can't open anything -- you have no hands![K--More--ua T [H[K[19;55H[HTry to open it with another part of your body instead? [yn] (n) [Kua V y[K[19;55HuaY [HThe door resists![K[23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T23 [25;1H[K[A[A[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T24 [25;1H[K[19;55Huai J [H[K[19;55H[HYou can't close anything -- you have no hands![K--More--uaz [ [H[K[H[K[19;55H[HTry to close it with another part of your body instead? [yn] (n) [Kua n[K[23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T24 [25;1H[K[19;55Hua3o [H[K[19;55Hua p [HUnknown command '^J'.[K[23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T24 [25;1H[K[19;55HualU [H[K[H[2J[HSLASH'EM History file for release 0.0.7 [2;1H[3;1HBehold, mortal, the origins of SLASH'EM... [4;1H[5;1HJay Fenlason wrote the original Hack with help from Kenny Woodland, [6;1HMike Thome, and Jon Payne. [7;1H[8;1HAndries Brouwer did a major re-write, transforming Hack into a very different [9;1Hgame, and published (at least) three versions (1.0.1, 1.0.2, and 1.0.3) for [10;1HUNIX(tm) machines to the Usenet. [11;1H[12;1HDon G. Kneller ported Hack 1.0.3 to Microsoft(tm) C and MS-DOS(tm), producing [13;1HPC HACK 1.01e, added support for DEC Rainbow graphics in version 1.03g, and [14;1Hwent on to produce at least four more versions (3.0, 3.2, 3.51, and 3.6). [15;1H[16;1HR. Black ported PC HACK 3.51 to Lattice(tm) C and the Atari 520/1040ST, [17;1Hproducing ST Hack 1.03. [18;1H[19;1HMike Stephenson merged these various versions back together, incorporating [20;1Hmany of the added features, and produced NetHack version 1.4. He then [21;1Hcoordinated a cast of thousands in enhancuaU ing and debugging NetHack 1.4 and [22;1Hreleased NetHack versions 2.2 and 2.3. [23;1H [24;1HLater, Mike coordinated a major rewrite of the game, heading a team which [25;1Hincluded Ken Arromdee, Jean-Christophe Collet, Steve Creps, Eric Hendrickson, [26;1HIzchak Miller, Eric S. Raymond, John Rupley, Mike Threepoint, and Janet Walz, [27;1Hto produce NetHack 3.0c. The same group subsequently released ten patch- [28;1Hlevel revisions and updates of 3.0. [29;1H[30;1HNetHack 3.0 was ported to the Atari by Eric R. Smith, to OS/2 by Timo [31;1HHakulinen, and to VMS by David Gentzel. The three of them and Kevin Darcy [32;1Hlater joined the main development team to produce subsequent revisions of [33;1H[K--More--ua [H[2J[H3.0. [2;1H[3;1HOlaf Seibert ported NetHack 2.3 and 3.0 to the Amiga. Norm Meluch, Stephen [4;1HSpackman and Pierre Martineau designed overlay code for PC NetHack 3.0. [5;1HJohnny Lee ported NetHack 3.0 to the Macintosh. Along with various other [6;1HDungeoneers, they continued to enhance the PC, Macintosh, and Amiga ports [7;1Hthrough the later revisions of 3.0. [8;1H[9;1HA scant one month before the next major version release of Nethack, two [10;1Hadventurous souls undertook their own modification to the sacred Nethack [11;1Hformula. Tom Proudfoot and Yuval released Nethack++, which was rapidly [12;1Hrenamed Nethack--, containeing new monsters, items and other miscellaneous [13;1Hmodifications. [14;1H [15;1HHeaded by Mike Stephenson and coordinated by Izchak Miller and Janet Walz, [16;1Hthe development team which now included Ken Arromdee, David Cohrs, [17;1HJean-Christophe Collet, Kevin Darcy, Matt Day, Timo Hakulinen, Steve Linhart, [18;1HDean Luick, Pat Rankin, EriuaF c Raymond, and Eric Smith undertook a radical [19;1Hrevision of 3.0. They re-structured the game's design, and re-wrote major [20;1Hparts of the code. They added multiple dungeons, a new display, special [21;1Hindividual character quests, a new endgame and many other new features, and [22;1Hproduced NetHack 3.1. [23;1H[24;1HKen Lorber, Gregg Wonderly and Greg Olson, with help from Richard Addison, [25;1HMike Passaretti, and Olaf Seibert, developed NetHack 3.1 for the Amiga. [26;1H[27;1HNorm Meluch and Kevin Smolkowski, with help from Carl Schelin, Stephen [28;1HSpackman, Steve VanDevender, and Paul Winner, ported NetHack 3.1 to the PC. [29;1H[30;1HJon Watte and Hao-yang Wang, with help from Ross Brown, Mike Engber, David [31;1HHairston, Michael Hamel, Jonathan Handler, Johnny Lee, Tim Lennan, Rob Menke, [32;1Hand Andy Swanson developed NetHack 3.1 for the Macintosh, porting it for [33;1H[K--More--uaI [H[2J[HMPW. Building on their development, Barton House added a Think C port. [2;1H[3;1HTimo Hakulinen ported NetHack 3.1 to OS/2. Eric Smith ported NetHack 3.1 [4;1Hto the Atari. Pat Rankin, with help from Joshua Delahunty, is responsible [5;1Hfor the VMS version of NetHack 3.1. Michael Allison ported NetHack 3.1 to [6;1HWindows NT. [7;1H[8;1HDean Luick, with help from David Cohrs, developed NetHack 3.1 for X11. [9;1HWarwick Allison added in the "tiled" version of the game and generated most [10;1Hof the individual tiles for NetHack 3.2. [11;1H[12;1HTime passed, and Nethack-- was ported to 3.11 by Chris. [13;1H[14;1HStephen White then released his own modification known as Nethack Plus, [15;1Hwhich contained new character classes. Unbeknownst to the world at large, [16;1HTom Proudfoot took this source and combined it with his Nethack--. [17;1HStephen White went on to add weapon skills, which were eventually integrated [18;1Hinto the next version of Nethack, and otherua e features. [19;1H[20;1HIn February 1996, Tom Proudfoot released SLASH V1. Including part of [21;1HStephen White's Nethack Plus and his own Nethack--, leaving unmentioned [22;1Hhis own slew of further modifications, this is perhaps the best known of [23;1Hthe Nethack modifications. Six versions of this, ending with SLASH V6, [24;1Hare known to exist. [25;1H[26;1HThe 3.2 development team, comprised of: Michael Allison; Ken Arromdee; David [27;1HCohrs; Jessie Collet; Steve Creps; Kevin Darcy; Timo Hakulinen; Steve [28;1HLinhart; Dean Luick; Pat Rankin; Eric Smith; Mike Stephenson; Janet Walz; and [29;1HPaul Winner, released version 3.2 in April of 1996. [30;1H[31;1HVersion 3.2 marks the tenth anniversary of the formation of the development [32;1Hteam. In a testament to their dedication to the game, all thirteen members [33;1H[K--More--uaz [H[2J[Hof the original development team remained on the team at the start of work [2;1Hon the current release. During the interval between the release of 3.1.3 [3;1Hand 3.2, one of the founding members of the development team, Dr. Izchak [4;1HMiller, passed away. This release of the game is dedicated to him by the [5;1Hdevelopment and porting teams. [6;1H[7;1HVersion 3.2 proved to be more stable than previous versions. Many bugs [8;1Hwere fixed, abuses eliminated, and game features tuned for better game [9;1Hplay. [10;1H[11;1HSLASH V6 was picked up by Enrico Horn managed to synchronize it with the [12;1H3.2 source. The new SLASH 4.1.2 was released as far back as November 1996 [13;1Hwent through at least 4 editlevels (E5, E6, E7) with the latest version [14;1Hbeing 4.1.2E8, synchronized with Nethack 3.2.2 and the Blackmarket option [15;1Havailable, released in June 1997. [16;1H[17;1HNathan La began the arduous task of drawing tiles for the SLASH monsters. [18;1H[19;1HKentaro ua Y Shirakata ported SLASH 4.1.2E8 to Unix. [20;1H[21;1HLief Clennon ported SLASH 4.1.2E8 to OS/2. [22;1H[23;1HRomain Dolbeau ported SLASH 4.1.2E8 to Macintosh. [24;1H[25;1HWarren Cheung combined SLASH 4.1.2 and Wizard Patch to create SLASH'EM 0.1 [26;1Hin November 1997. Several revisions including new spells and other minor [27;1Hadditions have led to SLASH'EM 0.0.3. Steven Uy has generously made [28;1Hadditional modifications. [29;1H[30;1HDirk Schoenberger has continued updating the SLASH/SLASH'EM monster tiles. [31;1HHe has also ported SLASH'EM to Linux. [32;1H[33;1H[K--More--ua'H [H[2J[HLief Clennon ported SLASH'EM to OS/2 EMX. [2;1H[3;1HKevin Hugo ported SLASH'EM to Macintosh, and has also contributed [4;1Hadditional changes and improvements. [5;1H[6;1HRobin Johnson finished arduous task of drawing tiles for the SLASH'EM [7;1Hmonsters. He has also contributed many more new tiles. [8;1H[9;1HKevin later joined the DevTeam and incorporated the best of these ideas [10;1Hin NetHack 3.3. [11;1H[12;1HJNetHack (the Japanese version of NetHack) has been around since at least [13;1H1994, developed by Issei Numata and others. The GTK interface was written [14;1Hfor this variant and released in 1999. [15;1H[16;1HMitsuhiro Itakura headed a team which began the process of redrawing the [17;1HNetHack tiles in 8-bit color at 32x32 pixels. [18;1H[19;1HThe final update to 3.2 was the bug fix release 3.2.3, which was released [20;1Hsimultaneously with 3.3.0 in December 1999 just in time for the Year 2000. [21;1H[22;1HThe 3.3 development team, consisting of Michael Allison, KenuaH Arromdee, [23;1HDavid Cohrs, Jessie Collet, Steve Creps, Kevin Darcy, Timo Hakulinen, [24;1HKevin Hugo, Steve Linhart, Ken Lorber, Dean Luick, Pat Rankin, Eric Smith, [25;1HMike Stephenson, Janet Walz, and Paul Winner, released 3.3.0 in [26;1HDecember 1999 and 3.3.1 in August of 2000. [27;1H[28;1HVersion 3.3 offered many firsts. It was the first version to separate race [29;1Hand profession. The Elf class was removed in preference to an elf race, [30;1Hand the races of dwarves, gnomes, and orcs made their first appearance in [31;1Hthe game alongside the familiar human race. Monk and Ranger roles joined [32;1HArcheologists, Barbarians, Cavemen, Healers, Knights, Priests, Rogues, [33;1H[K--More--ua> [H[2J[HSamurai, Tourists, Valkyries and of course, Wizards. It was also the first [2;1Hversion to allow you to ride a steed, and was the first version to have a [3;1Hpublicly available web-site listing all the bugs that had been discovered. [4;1HDespite that constantly growing bug list, 3.3 proved stable enough to last [5;1Hfor more than a year and a half. [6;1H[7;1HWarren Cheung combined SLASH'EM 0.0.5E7F1 and NetHack 3.3 to create [8;1HSLASH'EM 0.0.6 and maintained the DOS and Microsoft Windows ports. [9;1H[10;1HJ. Ali Harlow incorporated the GTK interface and Mitsuhiro Itakura's 32x32 [11;1Htileset into SLASH'EM 0.0.6 and maintained the UNIX port of SLASH'EM 0.0.6. [12;1HPeter Makholm maintained the Debian package. [13;1H[14;1HPaul Hurtley maintained the MAC port of SLASH'EM 0.0.6. [15;1H[16;1HThe 3.4 development team initially consisted of Michael Allison, Ken Arromdee, [17;1HDavid Cohrs, Jessie Collet, Kevin Hugo, Ken Lorber, Dean Luick, Pat Rankin, [18;1HMike Stephenson, Janet Walz,uaԜ and Paul Winner, with Warwick Allison joining [19;1Hjust before the release of NetHack 3.4.0 in March 2002. [20;1H[21;1HAs with version 3.3, various people contributed to the game as a whole as [22;1Hwell as supporting ports on the different platforms that NetHack runs on: [23;1H[24;1HPat Rankin maintained 3.4 for VMS. [25;1H[26;1HMichael Allison maintained NetHack 3.4 for the MS-DOS platform. [27;1HPaul Winner and Yitzhak Sapir provided encouragement. [28;1H[29;1HDean Luick, Mark Modrall, and Kevin Hugo maintained and enhanced the [30;1HMacintosh port of 3.4. [31;1H[32;1HMichael Allison, David Cohrs, Alex Kompel, Dion Nicolaas, and Yitzhak Sapir [33;1H[K--More--ua [H[2J[Hmaintained and enhanced 3.4 for the Microsoft Windows platform. Alex Kompel [2;1Hcontributed a new graphical interface for the Windows port. Alex Kompel also [3;1Hcontributed a Windows CE port for 3.4.1. [4;1H[5;1HRon Van Iwaarden maintained 3.4 for OS/2. [6;1H[7;1HJanne Salmijarvi and Teemu Suikki maintained and enhanced the [8;1HAmiga port of 3.4 after Janne Salmijarvi resurrected it for 3.3.1. [9;1H[10;1HChristian `Marvin' Bressler maintained 3.4 for the Atari after he [11;1Hresurrected it for 3.3.1. [12;1H[13;1HWarren Cheung, Christian Cooper, J. Ali Harlow, Paul Hurtley, Pekka Rousu [14;1Hand Darshan Shaligram combined SLASH'EM 0.0.6E5F2 and Nethack 3.4 [15;1Hto create SLASH'EM 0.0.7 [16;1H[17;1HThe Slash'EM home page is at http://www.slashem.org/. [18;1H[19;1H - - - - - - - - - - [20;1H[21;1HFrom time to time, some depraved individual out there in netland sends a [22;1Hparticularly intriguing modification to help out with the game. The Gods of [uaq 23;1Hthe Dungeon sometimes make note of the names of the worst of these miscreants [24;1Hin this, the list of Dungeoneers: [25;1H[26;1H Adam Aronow Izchak Miller Mike Stephenson [27;1H Alex Kompel J. Ali Harlow Norm Meluch [28;1H Andreas Dorn Janet Walz Olaf Seibert [29;1H Andy Church Janne Salmijarvi Pasi Kallinen [30;1H Andy Swanson Jean-Christophe Collet Pat Rankin [31;1H Ari Huttunen Jochen Erwied Paul Winner [32;1H Barton House John Kallen Pierre Martineau [33;1H[K--More--uas [H[2J[H Benson I. Margulies John Rupley Ralf Brown [2;1H Bill Dyer John S. Bien Ray Chason [3;1H Boudewijn Waijers Johnny Lee Richard Addison [4;1H Bruce Cox Jon W{tte Richard Beigel [5;1H Bruce Holloway Jonathan Handler Richard P. Hughey [6;1H Bruce Mewborne Joshua Delahunty Rob Menke [7;1H Carl Schelin Keizo Yamamoto Robin Johnson [8;1H Chris Russo Ken Arnold Roderick Schertler [9;1H David Cohrs Ken Arromdee Roland McGrath [10;1H David Damerell Ken Lorber Ron Van Iwaarden [11;1H David Gentzel Ken Washikita Ronnen Miller [12;1H David Hairston Kevin Darcy Ross Brown [13;1H Dean Luick Kevin Hugo Sascha Wostmann [14;1H Del Lamb ua Kevin Sitze Scott Bigham [15;1H Deron Meranda Kevin Smolkowski Scott R. Turner [16;1H Dion Nicolaas Kevin Sweet Stephen Spackman [17;1H Dylan O'Donnell Lars Huttar Stephen White [18;1H Eric Backus Malcolm Ryan Steve Creps [19;1H Eric Hendrickson Mark Gooderum Steve Linhart [20;1H Eric R. Smith Mark Modrall Steve VanDevender [21;1H Eric S. Raymond Marvin Bressler Teemu Suikki [22;1H Erik Andersen Matthew Day Tim Lennan [23;1H Frederick Roeber Merlyn LeRoy Timo Hakulinen [24;1H Gil Neiger Michael Allison Tom Almy [25;1H Greg Laskin Michael Feir Tom West [26;1H Greg Olson Michael Hamel Warua @ ren Cheung [27;1H Gregg Wonderly Michael Sokolov Warwick Allison [28;1H Hao-yang Wang Mike Engber Yitzhak Sapir [29;1H Helge Hafting Mike Gallop [30;1H Irina Rempt-Drijfhout Mike Passaretti [31;1H[33;1H[K--More--uae [H[2J[H[23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1HDlvl:1 $0 HP[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T24 [25;1H[K[13;54H[1m[38;5;5m+[m[14;54H[1m[38;5;5m[m[38;5;7m[m[1m[38;5;5m[m[15;54H[1m[38;5;5m[m[38;5;7m[m[1m[38;5;5m[m[16;54H[1m[38;5;5m+[m[38;5;7m[m[1m[38;5;5m[m[17;54H[1m[38;5;5m[m[38;5;7m[m[1m[38;5;5m[m[18;54H[1m[38;5;5m<[m[38;5;7m[m[1m[38;5;5m[m[19;54H[1m[38;5;5m+[m[1m[38;5;7m@[m[38;5;7m[m[1m[38;5;5m[m[20;54H[1m[38;5;5m[m[19;55Hua ) [H(For instructions type a ?)[K[19;55Hua [H[K[13;57Hua [16;54Huap [19;54Hua0 [13;57Hua @ [1;102H[K Use [2468] to move the cursor to the monster you want to name.[2;102H[K Use [HJKL] to move the cursor 8 units at a time.[3;102H[K Or enter a background symbol (ex. <).[4;102H[K Type a . when you are at the right place.[5;102H[K Type Space or Escape when you're done.[6;102H[K [7;102H[K[C--More--ua' U [1;101H[K[2;101H[K[3;101H[K[4;101H[K[5;101H[K[6;101H[K[7;101H[K[13;57Hva @ [1;102H[K Use [2468] to move the cursor to the monster you want to name.[2;102H[K Use [HJKL] to move the cursor 8 units at a time.[3;102H[K Or enter a background symbol (ex. <).[4;102H[K Type a . when you are at the right place.[5;102H[K Type Space or Escape when you're done.[6;102H[K [7;102H[K[C--More--vau U [1;101H[K[2;101H[K[3;101H[K[4;101H[K[5;101H[K[6;101H[K[7;101H[K[13;57HvaT 5 [19;55H[HCan't find dungeon feature '/'.[K[13;57Hva [H[K[23;1H[K[[CVegNBeans the Bullying Victim[m [23;31H] St7 Dx7 Co12 In12 Wi11 Ch17 ScoShoFemLaw [24;1H[24;13H[K [25;1H[K[A[24;13H18(18) [25;1H[K[A[24;19H Pw [25;1H[K[A[24;22H10(10) [25;1H[K[A[24;28H AC6 Exp1 T24 [25;1H[K[19;55H va [1;117H[K Select one item:[2;117H[K [3;117H[K a - Long description of the game and commands.[4;117H[K b - List of game commands.[5;117H[K c - Concise history of Slash'EM.[6;117H[K d - Info on a character in the game display.[7;117H[K e - Info on what a given key does.[8;117H[K f - List of game options.[9;117H[K g - Longer explanation of game options.[10;117H[K h - Full list of keyboard commands.[11;117H[K i - List of extended commands.[12;117H[K j - The NetHack license.[13;117H[K [14;117H[K[C(end) va1 [3;120H+[1;116H[K[2;116H[K[3;116H[K[4;116H[K[5;116H[K[6;116H[K[7;116H[K[8;116H[K[9;116H[K[10;116H[K[11;116H[K[12;116H[K[13;116H[K[14;116H[K[15;116H[K[H[2J[H Welcome to NetHack! ( description of version 3.4 ) [2;1H[3;1H NetHack is a Dungeons and Dragons like game where you (the adventurer) [4;1Hdescend into the depths of the dungeon in search of the Amulet of Yendor, [5;1Hreputed to be hidden somewhere below the twentieth level. You begin your [6;1Hadventure with a pet that can help you in many ways, and can be trained [7;1Hto do all sorts of things. On the way you will find useful (or useless) [8;1Hitems, quite possibly with magic properties, and assorted monsters. You can [9;1Hattack a monster by trying to move onto the space a monster is on (but often [10;1Hit is much wiser to leave it alone). [11;1H[12;1H Unlike most adventure games, which give you a verbal description of [13;1Hyour location, NetHack gives you a visual imavay2 ge of the dungeon level you are [14;1Hon.[15;1H[16;1H NetHack uses the following symbols: [17;1H[18;1H - and | The walls of a room, possibly also open doors or a grave. [19;1H . The floor of a room or a doorway. [20;1H # A corridor, or iron bars, or a tree, or possibly a kitchen [21;1H sink (if your dungeon has sinks), or a drawbridge. [22;1H > Stairs down: a way to the next level. [23;1H < Stairs up: a way to the previous level. [24;1H @ You (usually), or another human. [25;1H ) A weapon of some sort. [26;1H [ A suit or piece of armor. [27;1H % Something edible (not necessarily healthy). [28;1H / A wand. [29;1H = A ring. [30;1H ? A scroll. [31;1H ! A potion. [32;1H ( Some other useful object (pick-axe, key, lamp...) va 3 [33;1H[K--More--va [H[2J[H $ A pile of gold. [2;1H * A gem or rock (possibly valuable, possibly worthless). [3;1H + A closed door, or a spell book containing a spell [4;1H you can learn. [5;1H ^ A trap (once you detect it). [6;1H " An amulet, or a spider web. [7;1H 0 An iron ball. [8;1H _ An altar, or an iron chain. [9;1H { A fountain. [10;1H } A pool of water or moat or a pool of lava. [11;1H \ An opulent throne. [12;1H ` A boulder or statue. [13;1H A to Z, a to z, and several others: Monsters. [14;1H I Invisible or unseen monster's last known location [15;1H[16;1H You can find out what a symbol represents by typing [17;1H '/' and following the directions to move the cursor [18;1H to the symbol in question. For instance, a 'd' may [19;1H turn out to be ava# P dog. [20;1H[21;1H[22;1Hy k u 7 8 9 Move commands: [23;1H \|/ \|/ yuhjklbn: go one step in specified direction [24;1Hh-.-l 4-.-6 YUHJKLBN: go in specified direction until you [25;1H /|\ /|\ hit a wall or run into something [26;1Hb j n 1 2 3 g