cz Player: vnd Game: NetHack 3.6.0 Server: $ATTR(14)em.slashem.me - https://em.slashem.me/$ATTR() Filename: 2023-02-14.22:01:04.ttyrec Time: (1676412064) Tue Feb 14 22:01:04 2023 cu?NetHack, Copyright 1985-2020  By Stichting Mathematisch Centrum and M. Stephenson.  Version 3.6.6-0 Unix post-release, built Mar 21 21:28:42 2020.  See license for details. cVShall I pick character's race, role, gender and alignment for you? [ynaq] cDiBy name: vnd  role: Rogue  race: human  gender: male  alignment: chaotic Is this ok? [ynq]  vnd, chaotic male human Rogue  y + Yes; start game n - No; choose role again q - Quit(end) cX b-c< ---.-----.----|............||............|....d.....#..||..@.........|--------------c;> Vnd the Footpad St:12 Dx:16 Co:14 In:12 Wi:13 Ch:9 Chaotic Dlvl:1 $:0 HP:12(12) Pw:2(2) AC:7 Xp:1 It is written in the Book of Kos:  After the Creation, the cruel god Moloch rebelled against the authority of Marduk the Creator. Moloch stole from Marduk the most powerful of all the artifacts of the gods, the Amulet of Yendor, and he hid it in the dark cavities of Gehennom, the Under World, where he now lurks, and bides his time.  Your god Kos seeks to possess the Amulet, and with it to gain deserved ascendance over the other gods.  You, a newly trained Footpad, have been heralded from birth as the instrument of Kos. You are destined to recover the Amulet for your deity, or die in the attempt. Your hour of destiny has come. For the sake of us all: Go bravely cW> with Kos!--More--cu +---.-----.----|............||............|....d.....#..||..@.........|cv c Hello vnd, welcome to NetHack! You are a chaotic male human Rogue.Vnd the Footpad St:12 Dx:16 Co:14 In:12 Wi:13 Ch:9 Chaotic Dlvl:1 $:0 HP:12(12) Pw:2(2) AC:7 Xp:1clc"nc - an uncursed +1 leather armor (being worn). What type of things do you want to take off?  a - All worn types b - Weapons c - Armor  U - Items known to be Uncursed(end) cF c - an uncursed +1 leather armor (being worn).c1/What do you want to drop? [a-f or ?*] cyNever mind.c - an uncursed +1 leather armor (being worn).c-r c - an uncursed +1 leather armor (being worn). What do you want to name?  m - a monster i - a particular object in inventory o - the type of an object in inventory f - the type of an object upon the floor d - the type of an object on discoveries list a - record an annotation for the current level(end) c+(For instructions type a '?')cODone.cv | Select one item:  a - About NetHack (version information). b - Long description of the game and commands. c - List of game commands. d - Concise history of NetHack. e - Info on a character in the game display. f - Info on what a given key does. g - List of game options. h - Longer explanation of game options. i - Full list of keyboard commands j - List of extended commands. k - List menu control keys l - The NetHack license. m - Support information.(end) c+---.-----.----|............||............|....d.....#..| NETHACK GENERAL PUBLIC LICENSE  (Copyright 1989 M. Stephenson)  (Based on the BISON general public license,  copyright 1988 Richard M. Stallman)  Everyone is permitted to copy and distribute verbatim copies of this  license, but changing it is not allowed. You can also use this wording to  make the terms for other programs.  The license agreements of most software companies keep you at the mercy of those companies. By contrast, our general public license is intended to give everyone the right to share NetHack. To make sure that you get the rights cͿwe want you to have, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. Hence this license agreement.  Specifically, we want to make sure that you have the right to give away copies of NetHack, that you receive source code or else can get it if you want it, that you can change NetHack or use pieces of it in new free programs, and that you know you can do these things.  To make sure that everyone has such rights, we have to forbid you to deprive anyone else of these rights. For example, if you distribute copies of NetHack, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must tell them their rights. --More--c Also, for our own protection, we must make certain that everyone finds out that there is no warranty for NetHack. If NetHack is modified by someone else and passed on, we want its recipients to know that what they have is not what we distributed.  Therefore we (Mike Stephenson and other holders of NetHack copyrights) make the following terms which say what you must do to be allowed to distribute or change NetHack.  COPYING POLICIES  1. You may copy and distribute verbatim copies of NetHack source code as you receive it, in any medium, provided that you keep intact the notices on all files that refer to copyrights, to this License Agreement, and to the absence of any warranty; and give any other recipients of the NetHack program a copy of this License Agreement along with the program.  2. You may modify ccyour copy or copies of NetHack or any portion of it, and copy and distribute such modifications under the terms of Paragraph 1 above (including distributing this License Agreement), provided that you also do the following:  a) cause the modified files to carry prominent notices stating that you  changed the files and the date of any change; and  b) cause the whole of any work that you distribute or publish, that in  whole or in part contains or is a derivative of NetHack or any part --More--c thereof, to be licensed at no charge to all third parties on terms  identical to those contained in this License Agreement (except that you  may choose to grant more extensive warranty protection to some or all  third parties, at your option)  c) You may charge a distribution fee for the physical act of  transferring a copy, and you may at your option offer warranty protection  in exchange for a fee.  3. You may copy and distribute NetHack (or a portion or derivative of it, under Paragraph 2) in object code or executable form under the terms of Paragraphs 1 and 2 above provided that you also do one of the following:  a) accompany it with the complete machine-readable source code, which  must be distributed under the terms of Paragraphs 1 and 2 above; or,  b) accompany it with full information as to how to obtain the comc<plete  machine-readable source code from an appropriate archive site. (This  alternative is allowed only for noncommercial distribution.) For these purposes, complete source code means either the full source distribution as originally released over Usenet or updated copies of the files in this distribution used to create the object code or executable.  4. You may not copy, sublicense, distribute or transfer NetHack except as expressly provided under this License Agreement. Any attempt otherwise to copy, sublicense, distribute or transfer NetHack is void and your rights to use the program under this License agreement shall be automatically --More--c terminated. However, parties who have received computer software programs from you with this License Agreement will not have their licenses terminated so long as such parties remain in full compliance. Stated plainly: You are permitted to modify NetHack, or otherwise use parts of NetHack, provided that you comply with the conditions specified above; in particular, your modified NetHack or program containing parts of NetHack must remain freely available as provided in this License Agreement. In other words, go ahead and share NetHack, but don't try to stop anyone else from sharing it farther. --More--cMVnd the Footpad St:12 Dx:16 Co:14 In:12 Wi:13 Ch:9 Chaotic Dlvl:1 $:0 HP:12(12) Pw:2(2) AC:7 Xp:1---.-----.----|............||............|....d.....#..||..@.........|--------------c"Unknown command ' '.c c<@c d..@c-.d@cd..@c(d..@.cB "d.@.cG.d@c(d.@.c+ d..@.cNe ,..@.dc@<d.ca@.d.cpx2d@...cW; @..dcE &@..d.c.@d.c# .@..dce ).@d..c64.@.dc>(.d@.c0 ..@.dcE>.@.dcd.@.c .d.@c] .d.@c5..d@cI* d..@c1 .d..@c$.d.@c  .d@.c "d.@.cR! %.d@.c$.@d.ca\ .#@dc_ @.d.c< @.d.c @d..c @d.c^ @d...c@..dcM@.d.c @.d.ca @..dc #@.d..c0d@.c0EThe jackal bites! HP:10d.c)0You miss the jackal.c<aThe jackal bites! HP:8(12) Pw:2(2) AC:7 Xp:1d.c(6 cB6 6You kill the jackal!#.dcc #@d.cd@.d..c.#d@dc*d@ceGYou swap places with your little dog.d.#.co'..d.@c!d..@cd..@cB X What do you want to look at:  / - something on the map i - something you're carrying ? - something else (by symbol or name)  m - nearby monsters M - all monsters shown on map o - nearby objects O - all objects shown on map(end) c1c ..dceZd.cK !d.d.c !.d.dcߗ7.dThe little dog misses the jackal.cMThe little dog bites the jackal. HP:9c'?.dThe little dog misses the jackal.c HThe jackal bites! HP:7c BThe little dog misses the jackal.--More--cn/The little dog misses the jackal.cB .dd@c%6.dd@The little dog misses the jackal.cB.dd@The little dog misses the jackal.cD.dd@c@ r@.The jackal misses!The little dog bites the jackal.--More--c)bThe jackal misses the little dog.The little dog misses the jackal.cs| Select one item:  a - About NetHack (version information). b - Long description of the game and commands. c - List of game commands. d - Concise history of NetHack. e - Info on a character in the game display. f - Info on what a given key does. g - List of game options. h - Longer explanation of game options. i - Full list of keyboard commands j - List of extended commands. k - List menu control keys l - The NetHack license. m - Support information.(end) c,2---.-----.----|............||.......@....|##......dd..#..|c# /What do you want to drop? [a-f or ?*] c71You don't have that object.--More--c7What do you want to drop? [a-f or ?*] c]!Never mind.c=Y0Unknown command ' '.cW!dd@..cU .dd@c.dd@c|.dd@cFx.@The jackal bites! HP:6The little dog misses the jackal.cF $..dd@c@.clThe jackal bites! HP:4The little dog bites the jackal.c2The jackal is killed!..dc8N@dcGNZYou swap places with your little dog. HP:5d.cC -d.#@.c (.d@.cfI%.d@.c#.@.d.cD@.d.c 7:@#d..c@..dcأ @..d.c5S@.d.cy5.:.@d.#c &@d...cX 3You kill the newt!.d.c.@d.c]Ad@ctA=You swap places with your little dog.d.cA HP:6...@dc@...dc~ .@d.cYd@..c #.@.dc}@..dcC!@..d.c@.d.c!@.d..c2 #@#d..cj #@#.d.cs7#@#d.cD$##@#d..c`B "#@#d.c@#.c]( HP:7#@#c ##@#cd #@##cUx#@#c #@#c>##@#c-< #@#c?#@#c#@#c~< ###@#c(:##@# cy##@# cŅ#@# c#@# c #@# c@ 7 HP:8#@# c+#@# cC@# cz The door resists! c':  c=:`The door opens.---------.........-|.......------+- cC.-@#.|- c9O@-- c< @. c @. c@. c@. c@. c .@ cx@.c=@.cO / HP:9@.cԅ .@c @.c:#@.#c@.cx#@##c#@#c\6 @#c#@#c#@#ci#@##c #@#c@#c#@#c #@#c:Q HP:10(12) Pw:2(2) AC:7 Xp:1#@#c#@#c_1#@#c /#@+#c, #@clvThe door opens.-----------|........!.-|.?...$...........--------c B-@#.|...---c@--c@..c+g - an effervescent potion.@c@.c @.c. .@c}@.c}; $:3$ - 3 gold pieces.@cf.@c@.cJd3  HP:11@.cY .@c-*@.c'@.c  d-@.ch@.c}Kh - a scroll labeled LOREM IPSUM..@d.c 4..@d.c @.d..c "##@.d.#cW #@.d.c4+#@#. c'2#@# c ##@#!cė #@#"cx0##@"c ; HP:12#@##c#@#cX #@##cQ_ #@#$c#@#$c#@#$cW #@#$c #@#%c3-#--.....#@#%cPs--------|......k.|..........@|..........#|........---------%c[ M.|k@#.|d...--&cR\-.k@.#||-You hear a slow drip.&cg.d@'c "d...@'cYt.@#The little dog bites the kobold.The kobold is killed!.'c (c4%.d@|)c .d@.)c d.@.)cd.@.)c d.@.)cO d@.*cId@..*cJ@d..*c "@..d.+c.@.d.+cR .@.d,c!j.@d..,c.@.d,cUS.@d..,c%.d.@.,cEd@...,cѣ ..d@-cy .d@-cSG!d..@-c-..d.@-cK &d|@#.cO2.d#@##.c&.|#@.c[ ##@d.cuI #@##/cC#@d/cۏ #@##/c}#@##/c @#0c~#d@#0c}'#d@##0c "#d@#1cQTd@##2c#d@3cH@d3c_8You swap places with your little dog.d#6c#d@7cZr@d7ckrBYou swap places with your little dog.###7cz #@#+7cx@#8c"JThe door opens.dx.+..|----8c& 8c9 IYou hit the grid bug.#The grid bug bites!8cA ?You get zapped! HP:11d9c 9cϻIYou hit the grid bug.#The grid bug bites!9c<You get zapped! HP:109cQ*TYou miss the grid bug.The grid bug bites!9ca*WYou get zapped! HP:9(12) Pw:2(2) AC:7 Xp:1d:cTr <c@ 0You kill the grid bug!#|=ci =c~8#d-@-.. |..--=ch [ HP:10(12) Pw:2(2) AC:7 Xp:1# ---| |>@>c6<.@You hear some noises in the distance.>cij >c @.>c @.?c@.?c9 @.d @ch >@d.@c.@.d.Ac^/ d@.Aca$The door opens.d.-Ach x..d@#Acf |d-@#Bcܢ .-d@#Bca#d@#Bc^##@#BcN ) HP:11#@#Bcn d@#Cc`##@Cc#@Cc, d@Fc'@dFc<CYou swap places with your little dog.d.Fc~ @d#FcJ @d#Gcd@Gc<You swap places with your little dog.x#Gcһ.xd@Gc8 -#d@Hc\@d#IcT ##@Ich#@#Jc#d@#JcW 3 HP:12@##Lc_#@#Mc4@#You hear some noises.Mc> #@dNc@d#Nc @d#Nc @##Nc[ @dNcu @d#NczU @##Nc @dNc? @##Oc #@dOc d@Oc:You swap places with your little dog.dPcy #d@Pc#d@PcZd#d@PcY#d@PcNN##@Pc d@Pc d@#Qc#d@Qc#@#dRc<You stop. Your little dog is in the way!dRcd@Rc<You swap places with your little dog.dRc "##@Rc #@Scϑ#@#Sc; d#@#Tc##@TcH #@UcI@#Uch@#UcW @#Uc @#UcЗ@#VcDS@#VcK@#Vc@#Wc@#Xc@-Xca @.dYcrI@d.-Ycq d@Yc ;You swap places with your little dog.#dYc #|@Zc("|d@ZcK .d@[c-d@[c##@[cxd@[c(##@[cd@[c#d@[ci#d@[c#d@\cϻ0What do you want to drop? [$a-h or ?*] ]c"|]cl<You drop an empty uncursed sack.#d^c;You have no ammunition readied.--More--_c>What do you want to throw? [$ab or ?*] `c|Z!Never mind.acE0;What do you want to read? [h or ?*] ac !Never mind.bc;You don't have anything to eat.bce ;You don't have anything to eat.cc;You don't have anything to eat.