ūrarÎË Player: thdavies Game: NetHack 3.6.0 Server: $ATTR(14)em.slashem.me - https://em.slashem.me/$ATTR() Filename: 2021-10-22.18:08:32.ttyrec Time: (1634926112) Fri Oct 22 18:08:32 2021  ūra\íNetHack, Copyright 1985-2020  By Stichting Mathematisch Centrum and M. Stephenson.  Version 3.6.6-0 Unix post-release, built Mar 21 21:28:42 2020.  See license for details.  ūraĒmVShall I pick character's race, role, gender and alignment for you? [ynaq] +ūraÖûán name: thdavies  role: choosing now  race: not yet specified  gender: not yet specified  alignment: not yet specified Pick a role or profession  a - an Archeologist b - a Barbarian c - a Caveman/Cavewoman h - a Healer k - a Knight m - a Monk p - a Priest/Priestess r - a Rogue R - a Ranger s - a Samurai t - a Tourist v - a Valkyrie w - a Wizard * + Random  / - Pick race first " - Pick gender first [ - Pick alignment first q - Quit(end) 3ūra¨"¨+ name: thdavies  role: Barbarian  race: choosing now  gender: not yet specified  alignment: not yet specified Pick a race or species  h - human o - orc * + Random  ? - Pick another role first " - Pick gender first [ - Pick alignment first q - Quit(end) 6ūra=į(+ name: thdavies  role: Barbarian  race: human  gender: choosing now  alignment: not yet specified Pick a gender or sex  m - male f - female * + Random  ? - Pick another role first / - Pick another race first [ - Pick alignment first q - Quit(end) 8ūra÷)+ name: thdavies  role: Barbarian  race: human  gender: male  alignment: choosing now Pick an alignment or creed  n - neutral c - chaotic * + Random  ? - Pick another role first / - Pick another race first " - Pick another gender first q - Quit(end) ;ūrar+Ö+ name: thdavies  role: Barbarian  race: human  gender: male  alignment: chaotic Is this ok? [ynq]  thdavies, chaotic male human Barbarian  y + Yes; start game n - No; choose role again q - Quit(end) CūrajHb-CūraĢ---.------ |........| |........| |........| |........| |.......@| |......f.. ----------Cūra˛†Thdavies the Plunderer St:18/01 Dx:17 Co:17 In:8 Wi:7 Ch:7 Chaotic Dlvl:1 $:0 HP:16(16) Pw:2(2) AC:7 Xp:1 It is written in the Book of Set:  After the Creation, the cruel god Moloch rebelled against the authority of Marduk the Creator. Moloch stole from Marduk the most powerful of all the artifacts of the gods, the Amulet of Yendor, and he hid it in the dark cavities of Gehennom, the Under World, where he now lurks, and bides his time.  Your god Set seeks to possess the Amulet, and with it to gain deserved ascendance over the other gods.  You, a newly trained Plunderer, have been heralded from birth as the instrument of Set. You are destined to recover the Amulet for your deity, or die in the attempt. Your hour of destiny has come. For the sake of us all: Go braveCūra‡"ly with Set!--More--Pūra|ęŊPūraībHello thdavies, welcome to NetHack! You are a chaotic male human Barbarian.PūraæņŗYou are lucky! Full moon tonight.Thdavies the Plunderer St:18/01 Dx:17 Co:17 In:8 Wi:7 Ch:7 Chaotic Dlvl:1 $:0 HP:16(16) Pw:2(2) AC:7 Xp:1Vūra3h@<XūraTy@.f.Yūra]@..f.Zūraˇ (@.f.ZūraÅa(@f..\ūra¤.,##@.f.]ūra[f+@.f..^ūraã*##@#f._ūra)f@.`ūra!##@#faūraJę@##aūraëŒ 3...##@#fbūra5ĸ B-----......?.#@#cūrahĢ.@#fdūraĢa|+|||||.|-@-f#dūraÍ !@-f-#eūra-sW@.f - a scroll labeled VENZAR BORGAVVE.@f..gūra:D9What do you want to read? [f or ?*] hūranÔtAs you read the scroll, it disappears.Your hands begin to glow red.--More--jūraø 9Call a scroll labeled VENZAR BORGAVVE: mūraērmūraßemūraėüdmūraˇũ mūraūĩ hmūra đ amūraĄ\ nmūraĘēdnūraáæsnūraՌ.foūra^Ą@.f.pūrab 2The door opens.-.fqūraõ› rūra  $@f..sūra".@#f#tūraíÂf-@.tūraå.-f@#uūraŋH "#f@##vūra4^ ##@wūraSŦf#@##wūra¯$ ##@fxūraLˇ f@xūraˎ<You swap places with your kitten.f##zūraˌ-##@##{ūraŠp#@#|ūra.Of#@|ūraxn $#f@#}ūraú 5#f@##.~ūra[–$#f@#ūraMq##@f€ūra  f@€ūraUzYou swap places with your kitten.#f#.............$-------ūraYķ Ž#----------f.........|@.........|.............|...|---‚ūraîí<-#|.f@|.‚ūraŅô.-#.@|.--ƒūraŽ ..@.‡ūraöįf.@‡ūraY2 .f.@ˆūraU4"...f@ˆūraĀ.f.@ˆūraˆ' C.@ $:2$ - 2 gold pieces..f@Šūraؓ,f.@..Šūraa!.@.fŠūraŪ?.@.f‹ūraM@.@#f.‹ūra˜æ %#f.@#.ŒūraĶ÷#.f#@Œūraƒ>@.f#ūra $#f@##Žūra!-#f@Žūrah##@#fūraA@f#ūraŌŽf@##’ūraUØ ###@#“ūrau###@“ūraÚ!#@f#”ūratđ##f@#•ūra͍"#@f##•ūraÁf@•ūraáÁ0You swap places with your kitten.#–ūraPa &##@#f—ūra@}e----...|......|........###@##—ūraÂÄ #f@#˜ūrašã +...|...f@##™ūraÍJ##f@#šūraF%-.###@#šūraÔ A###@....|f#------+---œūraQœ+@f##žūra‰û ‡The door opens.-----|....||.*....|.......*......-f----+---------Ÿūra˛¸ 9---....|@##- ūra ė-+@- ūraôŽ @. ūraGC@.ĄūraôÅ@.ĄūraŠū @.ĸūraÛË&@.g - an orange gem.@ŖūraųQ.@ĨūraJ^@.Ĩūraũį$@.h - a green gem.@Ļūra‚v ###@.#§ūrah#@.§ūra$k ##@#¨ūrai‹/------|......@#¨ūra #@#.¨ūra_Ŋ#@#.ŠūraĮ#@#.Šūral@#.Šūra6› -@#.|Ēūraį@.-ĢūraCÄ .@Ģūrae.@f.ŦūraĖĢ.@#f..Ŧūra°’.@#.­ūraŪ #@#Žūraü˙@#Žūraė1 @#ŽūraŽ@.¯ūra3‹ @f.°ūra6?1The door opens.f.|°ūraM† +.f@##ąūra)8 .|@#˛ūraŋl..f@#˛ūraZž&|#f@##ŗūra˛##f@ŗūraŖ§ @fŗūra¨ HYou swap places with your kitten.f###ŗūragA#@#´ūra›ú #f@##ĩūra&’#f@ĩūra> #@fˇūra›‡f#ˇūra>f#ˇūraÜū#fˇūraô€ >+You find a hidden door.#f¸ūrav>#fšūra‰ß In what direction? ēūra ēūraM 4The door opens.f#|ŧūra`F"##@ŧūra(á |@Ŋūraü .@ŊūraDũ.@žūraä; f.@žūraŗ!.f.@xžūraŊ2 ..f.@.xŋūra™ã.f.@x.xŋūraÃ1.f.@.x.xĀūra&g)..f@.x.xĀūraŠü +.f@.x.xÁūra? f...x.x@ÂūraPÅ$..f@.x.x.Åūraŧ€ <You kill the grid bug!f..x.ČūražT.f.xÉūra}Ī :You kill the grid bug!.f.ĖūraŦŠķ Coins $ - 2 gold pieces Weapons a - a +0 two-handed sword (weapon in hands) b - a +0 axe (alternate weapon; not wielded) Armor c - an uncursed +0 ring mail (being worn) Comestibles d - an uncursed food ration Tools e - an uncursed oil lamp Gems/Stones g - an orange gem h - a green gem(end) Ōūra#ޝĶūra[ Thdavies the Barbarian's attributes:  Background: You are a Plunderer, a level 1 male human Barbarian. You are chaotic, on a mission for Set who is opposed by Mitra (lawful) and Crom (neutral). You are in the Dungeons of Doom, on level 1. You entered the dungeon 136 turns ago. There is a full moon in effect. You have 2 experience points.  Basics: You have all 16 hit points. You have both energy points (spell power). Your armor class is 7. Your wallet contains 2 zorkmids. Autopickup is on for all types.  Current Characteristics: Your strength is 18/01. Your dexterity is 17. Your constitution is 17. Your intelligence is 8. Your wisdom is 7. Your charisma is 7.  Current Status: You are unencumbered.Ķūrak[} You are wielding a two-handed sword. You have basic skill with two-handed sword.(end) ÖūraJ ŪThdavies the Plunderer St:18/01 Dx:17 Co:17 In:8 Wi:7 Ch:7 Chaotic Dlvl:1 $:2 HP:16(16) Pw:2(2) AC:7 Xp:1ØūrayP  Thdavies the Barbarian's attributes:  Background: You are a Plunderer, a level 1 male human Barbarian. You are chaotic, on a mission for Set who is opposed by Mitra (lawful) and Crom (neutral). You are in the Dungeons of Doom, on level 1. You entered the dungeon 136 turns ago. There is a full moon in effect. You have 2 experience points.  Basics: You have all 16 hit points. You have both energy points (spell power). Your armor class is 7. Your wallet contains 2 zorkmids. Autopickup is on for all types.  Current Characteristics: Your strength is 18/01. Your dexterity is 17. Your constitution is 17. Your intelligence is 8. Your wisdom is 7. Your charisma is 7.  Current Status: You are unencumbered.Øūra Q } You are wielding a two-handed sword. You have basic skill with two-handed sword.(end) Úūraš9ŪThdavies the Plunderer St:18/01 Dx:17 Co:17 In:8 Wi:7 Ch:7 Chaotic Dlvl:1 $:2 HP:16(16) Pw:2(2) AC:7 Xp:1Úūra˜6 %You can't go down here.ÜūraņØ | Select one item:  a - About NetHack (version information). b - Long description of the game and commands. c - List of game commands. d - Concise history of NetHack. e - Info on a character in the game display. f - Info on what a given key does. g - List of game options. h - Longer explanation of game options. i - Full list of keyboard commands j - List of extended commands. k - List menu control keys l - The NetHack license. m - Support information.(end) ôūraW` + NETHACK GENERAL PUBLIC LICENSE  (Copyright 1989 M. Stephenson)  (Based on the BISON general public license,  copyright 1988 Richard M. Stallman)  Everyone is permitted to copy and distribute verbatim copies of this  license, but changing it is not allowed. You can also use this wording to  make the terms for other programs.  The license agreements of most software companies keep you at the mercy of those companies. By contrast, our general public license is intended to give everyone the right to share NetHack. To make sure that you get the rights we want you to have, we need to make restrictions that forbid anyone ôūraQa #to deny you these rights or to ask you to surrender the rights. Hence this license agreement.  Specifically, we want to make sure that you have the right to give away copies of NetHack, that you receive source code or else can get it if you want it, that you can change NetHack or use pieces of it in new free programs, and that you know you can do these things.  To make sure that everyone has such rights, we have to forbid you to --More--˙ūraFÖdeprive anyone else of these rights. For example, if you distribute copies of NetHack, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must tell them their rights.  Also, for our own protection, we must make certain that everyone finds out that there is no warranty for NetHack. If NetHack is modified by someone else and passed on, we want its recipients to know that what they have is not what we distributed.  Therefore we (Mike Stephenson and other holders of NetHack copyrights) make the following terms which say what you must do to be allowed to distribute or change NetHack.  COPYING POLICIES  1. You may copy and distribute verbatim copies of NetHack source code as you receive it, in any medium, provided˙ūraÜÖ3 that you keep intact the notices on all files that refer to copyrights, to this License Agreement, and to the absence of any warranty; and give any other recipients of the NetHack program a copy of this License Agreement along with the program. --More--˙raĮ 2. You may modify your copy or copies of NetHack or any portion of it, and copy and distribute such modifications under the terms of Paragraph 1 above (including distributing this License Agreement), provided that you also do the following:  a) cause the modified files to carry prominent notices stating that you  changed the files and the date of any change; and  b) cause the whole of any work that you distribute or publish, that in  whole or in part contains or is a derivative of NetHack or any part  thereof, to be licensed at no charge to all third parties on terms  identical to those contained in this License Agreement (except that you  may choose to grant more extensive warranty protection to some or all  third parties, at your option)  c) You may charge a distribution fee for the physical act of  transferr˙raÚĮŠing a copy, and you may at your option offer warranty protection  in exchange for a fee.  3. You may copy and distribute NetHack (or a portion or derivative of it, under Paragraph 2) in object code or executable form under the terms of Paragraphs 1 and 2 above provided that you also do one of the following: --More--˙ra]Ļ a) accompany it with the complete machine-readable source code, which  must be distributed under the terms of Paragraphs 1 and 2 above; or,  b) accompany it with full information as to how to obtain the complete  machine-readable source code from an appropriate archive site. (This  alternative is allowed only for noncommercial distribution.) For these purposes, complete source code means either the full source distribution as originally released over Usenet or updated copies of the files in this distribution used to create the object code or executable.  4. You may not copy, sublicense, distribute or transfer NetHack except as expressly provided under this License Agreement. Any attempt otherwise to copy, sublicense, distribute or transfer NetHack is void and your rights to use the program under this License agreement shall be automatically [˙rađĻ41;1Hterminated. However, parties who have received computer software programs from you with this License Agreement will not have their licenses terminated so long as such parties remain in full compliance. Stated plainly: You are permitted to modify NetHack, or otherwise use parts of NetHack, provided that you comply with the conditions specified above; in particular, your modified NetHack or program containing parts of NetHack --More--˙ra›éæmust remain freely available as provided in this License Agreement. In other words, go ahead and share NetHack, but don't try to stop anyone else from sharing it farther. --More--˙raˇ˙raĢŠ v Select one item:  a - About NetHack (version information). b - Long description of the game and commands. c - List of game commands. d - Concise history of NetHack. e - Info on a character in the game display. f - Info on what a given key does. g - List of game options. h - Longer explanation of game options. i - Full list of keyboard commands j - List of extended commands. k - List menu control keys l - The NetHack license. m - Support information.(end) ˙ra! +y k u 7 8 9 Move commands:  \|/ \|/ yuhjklbn: go one step in specified direction h-.-l 4-.-6 YUHJKLBN: go in specified direction until you  /|\ /|\ hit a wall or run into something b j n 1 2 3 g: run in direction until something  numberpad interesting is seen  G, same, except a branching corridor isn't  < up ^: considered interesting (the ^ in this  case means the Control key, not a caret)  > down m: move without picking up objects/fighting  F: fight even if you don't se˙raß Ĩnse a monster  If the number_pad option is set, the number keys move instead.  Depending on the platform, Shift number (on the numberpad),  Meta number, or Alt number will invoke the YUHJKLBN commands.  Control may or may not work when number_pad is enabled,  depending on the platform's capabilities.  Digit '5' acts as 'G' prefix, unless number_pad is set to 2  in which case it acts as 'g' instead.  If number_pad is set to 3, the roles of 1,2,3 and 7,8,9 are  reversed; when set to 4, behaves same as 3 combined with 2.  If number_pad is set to -1, alphabetic movement commands are  used but 'y' and 'z' are swapped. --More--˙ra‚General commands: ? help display one of several informative texts #quit quit end the game without saving current game S save save the game (to be continued later) and exit  [to restore, play again and use the same character name] ! sh escape to some SHELL (if allowed; 'exit' to resume play) ^Z suspend suspend the game (independent of your current suspend char)  [on UNIX(tm)-based systems, use the 'fg' command to resume] O options set options / what-is tell what a map symbol represents \ known display list of what's been discovered v version display version number V history display game history ^A again redo the previous command (^A denotes the keystroke CTRL-A) ^R redraw redraw the screen ^P prevmsg repeat previous message (subsequent ˙ra‚^P's repeat earlier ones) # introduces an extended command (#? for a list of them) & what-does describe the command a keystroke invokes Game commands: ^D kick kick (a door, or something else) ^T 'port teleport (if you can) ^X show show your attributes --More--*˙raVo,˙raŒ— Really save? [yn] (n) .˙raQõSaving....˙ra|÷"Be seeing you...