FACTOID # 14: North Carolina has a larger Native American population than North Dakota, South Dakota and Montana combined.
 
 Home   Encyclopedia   Statistics   States A-Z   Flags   Maps   FAQ   About 
   
 
WHAT'S NEW
RELATED ARTICLES
People who viewed "Nethack" also viewed:
 

SEARCH ALL

FACTS & STATISTICS    Advanced view

Search encyclopedia, statistics and forums:

 

 

(* = Graphable)

 

 


Encyclopedia > Nethack
? This article or section may contain original research or unverified claims.
Please help Wikipedia by adding references. See the talk page for details.
NetHack

Released from the confines of a magic lamp, a grateful djinni grants the player a wish.
Developer: The NetHack DevTeam
Latest release: 3.4.3 / December 8, 2003
OS: Cross-platform
Genre: Roguelike game
License: NetHack General Public License
Website: www.nethack.org
Video games Portal

NetHack is a single-player roguelike computer game originally released in 1987. It is an evolution of an earlier game called Hack (1985), which was itself an evolution of Rogue (1980). The "net" element references that its development has been coordinated through the Internet, which was notable at the time. The "hack" element refers to a genre of role-playing games known as hack and slash for their focus on combat. Image File history File links Circle-question. ... It is proposed that this article be deleted, because of the following concern: Unreleased, non-notable game; article certainly fails WP:CRYSTAL, and probably WP:WEB. If you can address this concern by improving, copyediting, sourcing, renaming or merging the page, please edit this page and do so. ... Image File history File links Nethack_releasing_a_djinni. ... Software development is the translation of a user need or marketing goal into a software product. ... A software release refers to the creation and availability of a new version of a computer software product. ... December 8 is the 342nd day of the year (343rd in leap years) in the Gregorian calendar. ... 2003 2003 in games 2002 in video gaming 2004 in video gaming Notable events of 2003 in computer and video games. ... An operating system (OS) is a set of computer programs that manage the hardware and software resources of a computer. ... A cross-platform (or platform independent) programming language, software application or hardware device works on more than one system platform (e. ... Look up genre in Wiktionary, the free dictionary. ... A roguelike is a computer game that borrows some of the elements of the 1980s computer game Rogue. ... A software license is a legal agreement which may take the form of a proprietary or gratuitous license as well as a memorandum of contract between a producer and a user of computer software. ... This article or section needs a complete rewrite for the reasons listed on the talk page. ... A Web site (or colloquially, Website) is a collection of Web pages, images, videos and other digital assets that is hosted on a Web server, usually accessible via the Internet or a LAN. A Web page is a document, typically written in HTML, that is almost always accessible via HTTP... Image File history File links Nuvola_apps_package_games. ... A roguelike is a computer game that borrows some of the elements of the 1980s computer game Rogue. ... Namcos Pac-Man was a hit, and became a universal phenomenon. ... Hack is a roguelike computer game originally written in 1982 by Jay Fenlason with the assistance of Kenny Woodland, Mike Thome, and Jon Payne. ... Rogue is a dungeon crawling computer game dating from 1980. ... This article is about games in which one plays the role of a character. ... In several different types of video games, hack and slash refers to a type of game or a style of gameplay which primarily comprises defeating enemies and/or monsters in combat, typically with swords or other melee weapons, hence the name. ...


The player takes the part of a dungeon-diving hero in search of the Amulet of Yendor. The dungeon spans over 50 levels, most of which are randomly generated. The dungeon contains monsters, weaponry, magical items, hidden doors and more. This article is being considered for deletion in accordance with Wikipedias deletion policy. ...


NetHack is open source and one of the oldest computer games still being actively developed, with new features and bug fixes regularly being added by a loose but secretive group of volunteer developers, commonly called the DevTeam. Open source refers to projects that are open to the public and which draw on other projects that are freely available to the general public. ...


NetHack is traditionally played using text mode graphics where the dungeon's features, inhabitants, and items are all represented by single ASCII characters. There are also several graphical user interfaces available for the game. A text mode program communicates with the user by only displaying text and possibly a limited set of predefined semi-graphical characters, which allow the drawing of rudimentary boxes around portions of text, either to highlight the content or to simulate widget or control interface objects found in GUI programs. ... There are 95 printable ASCII characters, numbered 32 to 126. ...

Contents

Game

Before playing the game, the player is asked to name their character and then select a race, role, gender, and alignment for his or her character, or allow the game to create a random character. There are traditional character roles such as knight, wizard, rogue, valkyrie, and samurai, but there are also unusual ones, including archeologist, tourist, and caveman. The player's character class and alignment dictate which god the player serves in the game; by pleasing his or her god, the player may receive aid and gifts. Many fantasy stories and worlds call their main sapient humanoid species races rather than species. ... A character class represents a characters archetype and career in some role-playing games (RPGs). ... Gender in common usage refers to the sexual distinction between male and female. ... In Dungeons & Dragons and some similar role-playing games, alignment is a categorisation of the moral and ethical perspective of the player characters, non-player characters, monsters, and societies in the game. ... The silver Anglia knight, commissioned as a trophy in 1850, intended to represent the Black Prince. ... The Wizard is a magician character class in many role-playing games and computer role-playing games. ... In the Dungeons & Dragons role-playing game, rogue or thief is one of the base character classes. ... The Valkyries Vigil, by the Pre-Raphaelite painter Edward Robert Hughes. ... Japanese samurai in armour, 1860s. ... Archaeology or sometimes in American English archeology (from the Greek words αρχαίος = ancient and λόγος = word/speech) is the study of human cultures through the recovery, documentation and analysis of material remains, including architecture, artefacts, biofacts, human remains, and landscapes. ... A tourist boat travels the River Seine in Paris, France Tourism can be defined as the act of travel for the purpose of recreation, and the provision of services for this act. ... A typical depiction of a caveman, as seen in a Minute Maid advertisement. ...


After the player's character is created, the task is then introduced:


{{cquote|After the Creation, the cruel god Moloch rebelled against the authority of Marduk the Creator. Moloch stole from Marduk the most powerful of all the artifacts of the gods, the Amulet of Yendor, and he hid it in the dark cavities of Gehennom, the Under World, where he now lurks, and bides his time.}(keep in mind that this is not always exactly the same) Moloch or Molech or Molekh representing Hebrew מלך mlk is either the name of a god or the name of a particular kind of sacrifice associated historically with Phoenician and related cultures in north Africa and the Levant. ... Marduk (Sumerian spelling in Akkadian: AMAR.UTU solar calf; Biblical: Merodach) was the Babylonian name of a late-generation god from ancient Mesopotamia and patron deity of the city of Babylon, who, when Babylon permanently became the political center of the Euphrates valley in the time of Hammurabi (18th century... This article is being considered for deletion in accordance with Wikipedias deletion policy. ... Medieval illustration of the Mouth of Hell Hell is, according to many religious beliefs about the afterlife, a place of torment, of great weeping and gnashing of teeth. ...


To win the game, the player must find the Amulet of Yendor and sacrifice it to his or her deity. The Amulet is found at the lowest level of the dungeon. Successful completion of this main task rewards the player with the gift of immortality (the player is said to ascend), and the player attains the status of demigod(-dess). In addition to the main quest to find and sacrifice the Amulet, a number of sub-quests must be completed along the way, including one class-specific quest. This article is being considered for deletion in accordance with Wikipedias deletion policy. ... Look up deity in Wiktionary, the free dictionary. ... The term demigod, meaning half-god, is a modern distinction, often misapplied in Greek mythology. ...


The player's character is initially accompanied by a pet animal, typically a kitten or little dog, although knights begin with a pony. Kitten at six weeks. ... Mixed-breed puppy A puppy is a juvenile dog, generally less than one year of age. ... A Shetland Pony A pony is any of several horse breeds with a specific conformation and temperament. ...


The game is very broad in scope, with hundreds of unique items, situations, monsters, and personages providing opportunities for interaction within the gameworld. Some interactions are rare and occasionally amusing, while others can prove quite painful or even deadly.

The prompt "Do you want your possessions identified?" (abbreviated as DYWYPI) is given by default at the end of any game, allowing the player to learn any unknown properties of the items found during the game.
The prompt "Do you want your possessions identified?" (abbreviated as DYWYPI) is given by default at the end of any game, allowing the player to learn any unknown properties of the items found during the game.

Players sometimes use the acronyms YAAD and YASD when discussing their characters' deaths, meaning Yet Another Annoying Death or Yet Another Stupid Death. An "annoying" death is typically one that was the fault of misfortune more than the player (such as falling into a spiked, poisoned pit trap early in the game); a "stupid" death is when player's actions were directly responsible for their own death. Like roguelikes in general, Nethack features permadeath: expired characters can't be revived by anything excluding editing the actual save files (savescumming). Image File history File links Nethack-dywypi. ... Image File history File links Nethack-dywypi. ... A roguelike is a computer game that borrows some of the elements of the 1980s computer game Rogue. ... This article or section does not cite any references or sources. ...


Sporadically, the game saves the level on which a character has died, and then integrates that level into a later dungeon, complete with the ex-player's possessions, ghost and killer(s). This is done via 'bones files', which are saved on the computer hosting the game. A player using a publicly-hosted copy of the game can thus encounter the remains of many other players. Players can also swap bones files via programs like Hearse.[1]


It is often said that "the DevTeam thinks of everything" (abbreviated as TDTTOE). Anything the player can think of for their character to do, the DevTeam will probably have thought of a plausible response.


Bugs, funny messages, stories, experiences, and ideas for the next version are discussed on the Usenet newsgroup rec.games.roguelike.nethack[2] (abbreviated RGRN). Usenet (USEr NETwork) is a global, distributed Internet discussion system that evolved from a general purpose UUCP network of the same name. ... A newsgroup is a repository usually within the Usenet system, for messages posted from many users at different locations. ...


Items and tools

NetHack features a variety of items: armor to protect the player; scrolls and spellbooks to cast; potions to quaff; and an assortment of tools such as keys and lamps. Although the majority of items are beneficial to the player, their use is unknown until the player finds out about them. Armour sucks ass alottttttttttt Armour was also commonly used to protect war animals, such as war horses and elephants. ... Scroll can have different meanings: A scroll is a roll of parchment, papyrus, or paper which has been drawn or written upon. ... A potion (from Latin potio, potionis, meaning beverage, potion, poison) is a drinkable medicine or poison. ... A modern hammer is directly descended from ancient hand tools A tool or device is a piece of equipment which typically provides a mechanical advantage in accomplishing a physical task. ...


Blessings and curses

A player's inventory, early in the game.
A player's inventory, early in the game.

As in many other roguelike games, all items in NetHack are either "blessed", "uncursed", or "cursed". The majority of items are found uncursed, but the "b/u/c" (blessed/uncursed/cursed) status of an item is unknown until it is identified or detected through other means. Image File history File links Nethack-inventory. ... Image File history File links Nethack-inventory. ... Look up blessing in Wiktionary, the free dictionary. ... Look up Curse in Wiktionary, the free dictionary. ...


A blessing makes the item more powerful, or less harmful in the case of items such as a scroll of punishment. Cursed items, on the other hand, cause ill or unintended effects, for example wearable items can no longer be removed until they have been uncursed.


Voluntary conducts

While NetHack is very difficult, veteran players often attempt "conducts", which are voluntary restrictions on their behavior tracked by the game, to increase the difficulty further. Examples include:

  • Not wishing for artifacts
  • Not wishing for objects at all
  • Adhering to a vegan or vegetarian diet
  • Going without food entirely (For the superstitious belief that food is unnecessary, see: Inedia)
  • Not polymorphing into some other kind of creature
  • Being an atheist: not praying, sacrificing corpses, or talking to a priest
  • Illiteracy, not reading or writing anything during the game.
  • Pacifism, in which the player cannot directly kill any creature.

Some conducts are not tracked by the game, but remain popular, such as speedrunning, making it through the dungeon within a set number of turns, and chastity, or not using incubi or succubi to gain experience. Other challenges include not using items, such as wearing no armor. Hens kept in cramped conditions — the avoidance of animal suffering is the primary motivation of people who become vegans A vegan is a person who avoids the ingestion or use of animal products. ... For animals adapted to eat primarily plants, sometimes referred to as vegetarian animals, see Herbivore. ... Inedia is the alleged ability to live without food. ... “Atheist” redirects here. ... World illiteracy rates by country Literacy is the ability to read and write. ... Pacifism is the opposition to war or violence as a means of settling disputes. ... A speedrun (IPA: ) is a play-through of a computer or video game, created with the intent of completing it as quickly as possible, optionally under certain conditions, mainly for the purposes of entertainment and competition. ... Allegory of chastity by Hans Memling. ... Incubus, 1870 This article is about the type of demon called an Incubus. For other uses, see Incubus. ... A bracket carved as a winged succubus on the outside of an English inn, suggesting that a brothel could have been found inside. ...


Spoiler files

Players over the years have compiled extensive documentation for every aspect of the game[3], from instructions on exactly how to navigate certain obstacles, to detailed formulas explaining the probability of in-game events. Gleaning spoiler information from the source code is known as source-diving. The documents are collectively known as spoilers.


Graphics

NetHack was originally created without a graphical user interface, although the option to play using one was added later in its development. The game's interface, environment, entities and objects, are all created or represented by arrangements of ASCII or ANSI characters: There are 95 printable ASCII characters, numbered 32 to 126. ... Microsoft uses two main groups of code pages in Microsoft Windows (known as character encodings in other operating systems). ...

Key: Image File history File links Nethack-usual-cropped. ...

  • @ - the player character
  • d - a dog (in this case, the player character's pet)
  • ` - boulder or statue
  • < and > - up and down staircases
  • % - anything edible; corpses or rations
  • ? - scroll
  • + - closed door
  • ( - tool (lamp, pick-axe, bag, etc.)
  • F and : - monsters; a fungus (here, a lichen) and a lizard (newt)
  • ^ a trap (in this case, a trap door)
  • { a fountain

Below the map is the status line. First there is the hero's name and professional ranking, the latter being based on the hero's experience. St stands for strength, Dx for dexterity, Co for constitution, In for intelligence, Wi for wisdom, Ch for charisma, and the player's alignment is Neutral. A player character or playable character (PC) is a fictional character in a game who is controlled or controllable by the player. ... In some role-playing games, alignment is a categorisation of the moral and ethical perspective of the player characters, non-player characters, monsters, and societies in the game. ...


The next line shows the dungeon level the hero is currently on (increasing when the player goes deeper), money, hit points, magical power, armor class, and experience level. The hero's hunger status, ranging from Satiated down to Fainting is shown on the far right, if it is anything other than normal. This article needs additional references or sources to facilitate its verification. ... In many wargames, role-playing games, and combat-oriented video games, hit points are an abstraction for the amount of damage an object or player in the game can take before becoming ineffective. ... In games like the tabletop role-playing game Dungeons & Dragons, Armor Class (abbreviated AC) is a number assigned to every character or creature, which indicates how difficult it is to hit that creature with an attack. ... To meet Wikipedias quality standards, this article or section may require cleanup. ...

This screenshot shows NetHack for Windows, one of the many graphical interfaces that have been developed for NetHack. The tiled X11 interface for Unix/Linux machines is similar in appearance. The hero can be seen on the right-hand side engaged in combat with a goblin.
This screenshot shows NetHack for Windows, one of the many graphical interfaces that have been developed for NetHack. The tiled X11 interface for Unix/Linux machines is similar in appearance. The hero can be seen on the right-hand side engaged in combat with a goblin.

The user:Sam jervis has considered this image Public Domain, by saying the following: Screenshot taken by myself depicting the NetHack for Windows computer game. ... The user:Sam jervis has considered this image Public Domain, by saying the following: Screenshot taken by myself depicting the NetHack for Windows computer game. ... Microsoft Windows is the name of several families of proprietary software operating systems by Microsoft. ... In computing, the X Window System (commonly X11 or X) is a windowing system for bitmap displays. ... Filiation of Unix and Unix-like systems Unix (officially trademarked as UNIX®) is a computer operating system originally developed in the 1960s and 1970s by a group of AT&T employees at Bell Labs including Ken Thompson, Dennis Ritchie and Douglas McIlroy. ... It has been suggested that Criticism of Linux be merged into this article or section. ... This article or section is in need of attention from an expert on the subject. ...

Tiles mode

Apart from the original text mode, there are interfaces that replace text mode screen representations with images, or tiles, to represent the objects in the game - this is known as "tiles mode". Graphic interfaces include those using X11 tiled and the similar Windows graphical interface, the Qt toolkit, and the GNOME libraries. There are also enhanced graphical interfaces such as the isometric SDL-based Falcon's Eye or Vulture's Eye and also the OpenGL based noegnud. A text mode program communicates with the user by only displaying text and possibly a limited set of predefined semi-graphical characters, which allow the drawing of rudimentary boxes around portions of text, either to highlight the content or to simulate widget or control interface objects found in GUI programs. ... In computing, the X Window System (commonly X11 or X) is a windowing system for bitmap displays. ... In computer programming, Qt is a cross-platform application development framework, widely used for the development of GUI programs, and, since the release of Qt 4, also used for developing non-GUI programs such as console tools and servers. ... This article or section does not cite any references or sources. ... An isometric drawing of a cube. ... Simple DirectMedia Layer (SDL) is a cross-platform multimedia free software library written in C that creates an abstraction over various platforms graphics, sound, and input APIs, allowing a developer to write a computer game or other multimedia application once and run it on many operating systems including GNU/Linux... This article is about Falcons eye, the graphical nethack. ... Vultures Eye is a graphical version of NetHack and Vultures Claw is a graphical version of SlashEM. They feature isometric graphics graphics whereas NetHack and SlashEM are two-dimensional text-based games. ... OpenGL (Open Graphics Library) is a standard specification defining a cross-language cross-platform API for writing applications that produce 3D computer graphics (and 2D computer graphics as well). ... noegnud (dungeon in reverse) is a graphical user interface using SDL for NetHack and SlashEM featuring the following graphic modes: character view tiled 2D view isometric 2D view true 3D view (As of 2004 this mode is still in development) Since OpenGL is used to render the scene rotating...


Notable (non-player) characters

  • The Wizard of Yendor, also known as Rodney (which is "Yendor" spelled backwards)
  • King Croesus, lord of Fort Ludios
  • The Oracle of Delphi (with references to the Internet Oracle and Oracle machines)
  • Vlad the Impaler, a figure based on Vlad III Dracula and the Dracula story
  • The Gorgon Medusa, also from Greek mythology
  • Various demons, like Asmodeus, Demogorgon, Baalzebub, Dispater, Juiblex, and Orcus. The demons that appear in NetHack originate from the fantasy game Dungeons & Dragons, which in turn were taken from classical mythology and literature.
  • The Jabberwock from Lewis Carroll's Jabberwocky appears as a monster, along with the Vorpal Blade of the poem's protagonist.
  • Izchak Miller was one of the founding members of the DevTeam, who died on April 1, 1994 from complications due to cancer. As he was responsible for, among other things, much of the shopkeeper logic, the owner of the lighting shop was named for him as a tribute. The DevTeam also dedicated version 3.2 of NetHack to his memory. It is generally considered to be very bad form to kill Izchak, even when playing as an extinctionist (a conduct where the player kills enough of every monster for no more to be born). Many players who will happily slay everything else that moves will spare Izchak's life as a sign of respect.
  • The Wumpus - as part of the Ranger class-specific quest, characters are required to 'hunt the Wumpus'. This is a reference to one of the earliest pre-RPG computer games Hunt the Wumpus.
  • Three of the Four Horsemen of the Apocalypse appear towards the end of the game.

The Wizard of Yendor (or simply WoY) is a powerful enemy in the roguelike NetHack. ... Croesus Croesus (IPA pronunciation: , CREE-sus) was the king of Lydia from 560/561 BC until his defeat by the Persians in about 547 BC. The English name Croesus come from the Latin transliteration of the Greek , in Arabic and Persian قارون, Qârun. ... Consulting the Oracle by John William Waterhouse, showing eight priestesses in a temple of prophecy An oracle is a person or persons considered to be the source of wise counsel or prophetic opinion; an infallible authority, usually spiritual in nature. ... Delphi (Greek Δελφοί, [ðeÌžlˈfi]) is an archaeological site and a modern town in Greece on the south-western spur of Mount Parnassus in a valley of Phocis. ... The Internet Oracle (historically known as The Usenet Oracle) is a effort at collective humor in a pseudo-Socratic question-and-answer format. ... In complexity theory and computability theory, an oracle machine is an abstract machine used to study decision problems. ... Portrait of Vlad III in the Innsbruck Ambras Castle Vlad III Basarab (other names: Vlad Å¢epeÅŸ IPA: in Romanian, meaning Vlad the Impaler; Vlad Draculea in Romanian, transliterated as Vlad Dracula in some documents; Kazıklı Bey in Turkish, meaning Impaler Prince), (November or December, 1431 – December 1476). ... Dracula is an 1897 novel by Irish author Bram Stoker, featuring as its primary antagonist the vampire Count Dracula. ... See also Gorgona, for the Colombian/Italian islands. ... A relatively modern image of Medusa painted by Arnold Böcklin In Greek mythology, Medusa (&#924;&#949;&#948;&#959;&#965;&#963;&#945; Queen), was a monstrous female character whose gaze could turn people to stone. ... The bust of Zeus found at Otricoli (Sala Rotonda, Museo Pio-Clementino, Vatican) Greek mythology is the body of stories belonging to the ancient Greeks concerning their gods and heroes, the nature of the world and the origins and significance of their own cult and ritual practices. ... Asmodeus (Asmodeus, Asmodaeus, pronounced Ashmed or Ashmedeus in Hebrew, also Chammadai, Sydonai) is a semi-Biblical demon mostly known thanks to the deuterocanonical Book of Tobit; he is also mentioned in some Talmudic legends and in demonology, as he is a leading figure in the construction efforts of the Temple... Demogorgon, although often ascribed to Greek mythology, is actually an invention of Christian scholars, imagined as the name of a pagan god or demon, associated with the underworld and envisaged as a powerful primordial being, whose very name had been taboo. ... Beelzebub as depicted in Collin de Plancys Dictionnaire Infernal (Paris, 1863). ... For the French nuclear ballistic missile system, see Hades (missile). ... In many campaign settings for the Dungeons & Dragons role-playing game, Juiblex (also called the Faceless Lord) is the demon lord of slimes and oozes. ... The demon prince Orcus emerging from a gate created by his followers on the cover of the adventure module The Mines of Bloodstone. Art by Keith Parkinson. ... Charles Lutwidge Dodgson (Lewis Carroll) - believed to be a self-portrait Charles Lutwidge Dodgson (January 27, 1832 – January 14, 1898), better known by the pen name Lewis Carroll, was an English author, mathematician, logician, Anglican clergyman, and photographer. ... The Jabberwock, as illustrated by John Tenniel Jabberwocky is a poem of nonsense verse written by Lewis Carroll, and found as a part of his novel Through the Looking-Glass, and What Alice Found There (1871). ... For the plasma physics software, see VORPAL. Jabberwocky illustration by John Tenniel. ... April 1 is the 91st day of the year (92nd in leap years) in the Gregorian calendar. ... 1994 1994 in games 1993 in video gaming 1995 in video gaming Notable events of 1994 in computer and video games. ... Cancer is a class of diseases or disorders characterized by uncontrolled division of cells and the ability of these to spread, either by direct growth into adjacent tissue through invasion, or by implantation into distant sites by metastasis (where cancer cells are transported through the bloodstream or lymphatic system). ... Hunt the Wumpus was an early computer game. ... Four horsemen redirects here. ...

Notable creatures

See also: Mythology and fiction in NetHack
  • The cockatrice: a typical example of a complex NetHack monster. Its touch can turn the player to stone, so attacking it using the player's bare hands is not recommended. The cockatrice is an example of a monster or item that inspires the compilation of spoiler files.
  • The chickatrice: is analogous to the cockatrice with almost identical properties, except that it cannot lay eggs.
  • The floating eye: a monster without any active form of attack, this is one of the most dangerous creatures to the inexperienced or incautious NetHack player. If the player attacks a floating eye when not blind and not capable of reflecting its gaze, there is a very high chance of it immobilizing the player for many turns, leaving him or her open to attacks from other creatures that roam the Dungeons of Doom.
  • The soldier ant: even though this creature has no unusual abilities, it often comes as a surprise for unprepared players. These critters move in swarms, are very fast, hard to hit and hit hard themselves.
  • The nymph: taking its origin in Greek mythology, these creatures are females of astounding charm. They manage to entice men and women alike into entranced helplessness, stealing the belongings of an adventurer who has fallen into their hands and teleporting away.
  • The mind flayer: this creature (and its more powerful relative, the master mind flayer) is very dangerous in close combat, as it can extract and eat parts of its opponent's brain. Not only does this cause an eventually-fatal loss of intelligence, but it can also cause its victim to forget information such as the layout of previously explored areas or the nature of any items being carried. As another example of "the DevTeam thinks of everything", a mind flayer is at a significant disadvantage when fighting creatures without a head.
  • Gremlins: these creatures multiply when they have contact with water, as in the movie Gremlins.
  • Quantum Mechanics: these characters are another humorous addition by the NetHack DevTeam. While not dangerous on their own, quantum mechanics' attacks teleport a player randomly within the same level unless the player has the ability to control teleportation. Quantum mechanics occasionally carry a box; if so, the box always contains Schr√∂dinger's cat. Whether the cat is alive or dead is not defined until the box is opened.
  • The xorn is perhaps one of the most unusual and useful characters. It can go through any door and nearly any wall, and can exist in solid areas. A xorn will not drown in water because it does not breathe. It also has a very damaging multiple hit attack, can wield a weapon and has good strength. Because the xorn can eat metal, a player polymorphed into a xorn can consume metal items, such as magical rings and amulets. In this way, the player can acquire the special powers conferred by wearing the item. For example, a player who polymorphs into a xorn and eats a ring of invisibility may become permanently invisible, even after changing back into human form.

The computer game NetHack draws from many mythologies which are not explicitly fictional, as well as works of modern fiction and other computer games. ... Cockatrice A cockatrice is a legendary creature, an ornament in the drama and poetry of the Elizabethans (Breiner). ... Cockatrice A cockatrice is a legendary creature, an ornament in the drama and poetry of the Elizabethans (Breiner). ... // A human eye. ... Subfamilies Aenictogitoninae Agroecomyrmecinae Amblyoponinae (incl. ... In Greek mythology, a nymph is any member of a large class of female nature entities, either bound to a particular location or landform or joining the retinue of a god or goddess. ... The bust of Zeus found at Otricoli (Sala Rotonda, Museo Pio-Clementino, Vatican) Greek mythology is the body of stories belonging to the ancient Greeks concerning their gods and heroes, the nature of the world and the origins and significance of their own cult and ritual practices. ... The iconic Illithid Mindflayer from Dungeons & Dragons. ... Intelligence is a property of mind that encompasses many related mental abilities, such as the capacities to reason, plan, solve problems, think abstractly, comprehend ideas and language, and learn. ... A gremlin is a folkloric creature, commonly depicted as mischievous and mechanically oriented with a specific interest in aircraft. ... Impact from a water drop causes an upward rebound jet surrounded by circular capillary waves. ... Gremlins is an American horror-comedy film directed by Joe Dante and released in 1984. ... Schrödingers Cat: If the nucleus in the bottom left decays, the geiger counter on its right will sense it and trigger the release of the gas. ... In the Dungeons & Dragons role-playing game, Xorn are elemental creatures from the Inner Plane of Earth; it devours earthen and silicate materials, and has a taste for gems, precious metals and magical items. ... Hot metal work from a blacksmith In chemistry, a metal (Greek: Metallon) is an element that readily loses electrons to form positive ions (cations) and has metallic bonds between metal atoms. ...

Development

NetHack, as stated above, is developed by the DevTeam. They do not publicly discuss versions in progress, and they release new versions without notice. However, a listing of known bugs (though not patches for those bugs) is available on their webpage. Often, unofficial patches will be released by others between versions. This article is about changes or modifications in computer software. ...


Other versions & interfaces

Even though many experienced NetHack players prefer the original text mode interface, as they feel the graphical alternatives deter attention from playability and the use of one's imagination, several graphical user interfaces exist for NetHack.

This screenshot shows NetHack using the Vulture's isometric graphical interface.
This screenshot shows NetHack using the Vulture's isometric graphical interface.

Image File history File links Size of this preview: 800 × 600 pixel Image in higher resolution (1600 × 1200 pixel, file size: 215 KB, MIME type: image/jpeg) A screenshot of a scene in Vultures. ... Image File history File links Size of this preview: 800 × 600 pixel Image in higher resolution (1600 × 1200 pixel, file size: 215 KB, MIME type: image/jpeg) A screenshot of a scene in Vultures. ... Vultures Eye is a graphical version of NetHack and Vultures Claw is a graphical version of SlashEM. They feature isometric graphics graphics whereas NetHack and SlashEM are two-dimensional text-based games. ... An isometric drawing of a cube. ... Wikipedia does not yet have an article with this exact name. ... Interplay Entertainment Corporation was an American video game and computer game publisher and developer. ... Strategic Simulations, Inc. ... Notable events of 2006 in video gaming. ... BioWare Corp. ... This article is about the 2002 computer role-playing game. ... Vultures Eye is a graphical version of NetHack and Vultures Claw is a graphical version of SlashEM. They feature isometric graphics graphics whereas NetHack and SlashEM are two-dimensional text-based games. ... This article is about Falcons eye, the graphical nethack. ... An isometric drawing of a cube. ... OpenGL (Open Graphics Library) is a standard specification defining a cross-language cross-platform API for writing applications that produce 3D computer graphics (and 2D computer graphics as well). ... Example of a dimetric axonometric drawing from a US Patent (1874) Dimetric projection is a form of axonometric projection, in which its direction of viewing is such that two of the three axes of space appear equally foreshortened, of which the attendant scale and angles of presentation are determined according... noegnud (dungeon in reverse) is a graphical user interface using SDL for NetHack and SlashEM featuring the following graphic modes: character view tiled 2D view isometric 2D view true 3D view (As of 2004 this mode is still in development) Since OpenGL is used to render the scene rotating... This article is about Falcons eye, the graphical nethack. ... SlashEM (short for Super Lotsa Added Stuff Hack - Extended Magic), is a variant of the roguelike game NetHack with many extra features, monsters, and items. ... Branching, in revision control and software configuration management, is the duplication of an object under revision control (usually a source code file) in such a way that the newly created object has initially the same contents as the version branched off from, and (more importantly) development (creation of new versions... Emacs is a class of text editors, possessing an extensive set of features, that are popular with computer programmers and other technically proficient computer users. ... Shawn Betts is a Canadian computer programmer who is the author of the ratpoison and Stumpwm X11 X window managers, as well as the conkeror web browser. ... In computer science, porting is the process of adapting software so that an executable program can be created for a computing environment that is different from the one for which it was originally designed (e. ... “NDS” redirects here. ... The PlayStation Portable , officially abbreviated as PSP) is a handheld game console released and manufactured by Sony Computer Entertainment. ... The Tapwave Zodiac 2 The Tapwave Zodiac is a Palm OS 5-based PDA created by the US company Tapwave, and the first Palm-based device developed with gaming and multimedia as primary considerations. ... Palm OS is a compact operating system developed and licensed by PalmSource, Inc. ... The GP2X is an open-source, Linux-based handheld video game console and media player created and sold by GamePark Holdings of South Korea. ...

Cultural references

NetHack's long life has led to a wide acceptance into computer culture, with constant references being made to it in the social circles, on the Internet, in other games, and online comics, such as User Friendly [11]. To a hallucinating player, monsters will appear to be creatures drawn from other mythos, fictional universes or popular culture, including references to The Lord of the Rings, The Hitchhiker's Guide to the Galaxy, Star Trek, Star Wars, BattleTech, Discworld, Zork, and even Pok√©mon. NetHack references extend even to software: GNU Screen features a nethack option which changes the error and information messages to humorous NetHack-style messages. For example, exiting copy and paste mode will give the message "You have escaped the dungeon", and "Suddenly, the dungeon collapses" when it crashes. Wikipedia does not have an article with this exact name. ... For the concept in software engineering, see user-friendliness. ... Popular culture, sometimes called pop culture, consists of widespread cultural elements in any given society. ... The Lord of the Rings is an epic high fantasy novel written by the British academic J. R. R. Tolkien. ... The cover of the first novel in the Hitchhikers series, from a late 1990s printing. ... The current Star Trek franchise logo Star Trek is an American science fiction entertainment series. ... This article is about the series. ... BattleTech is a wargaming and science fiction franchise, launched by FASA Corporation and currently owned by WizKids. ... Cover of an early edition of The Colour of Magic; art by Josh Kirby Discworld is a comedic fantasy book series by the British author Terry Pratchett set on the Discworld, a flat world balanced on the backs of four elephants which are in turn standing on the back of... Zork universe Zork games Zork Anthology Zork trilogy Zork I   Zork II   Zork III Beyond Zork   Zork Zero Enchanter trilogy Enchanter   Sorcerer   Spellbreaker Other games Wishbringer   Return to Zork Zork: Nemesis   Zork Grand Inquisitor Zork: The Undiscovered Underground Topics in Zork Encyclopedia Frobozzica Characters   Kings   Creatures Timeline   Magic   Calendar Zorkmid... The official Pokémon logo. ... GNU Screen is a free terminal multiplexer developed by the GNU Project. ... This page is about computer text editing. ...


Numerous references to NetHack can be found in the online satirical RPG Kingdom of Loathing, including an entire area.[12]. Satire is a literary technique of writing or art which principally ridicules its subject (individuals, organizations, states) often as an intended means of provoking or preventing change. ... Kingdom of Loathing (KoL) is a humorous, browser-based, multiplayer role playing game designed and operated by Asymmetric Publications (including creator Zack Jick Johnson and writer Josh Mr. ...


In the video game Deus Ex, a reference to NetHack can be found in an e-mail accessible on an employee's personal computer in the headquarters of the fictional company VersaLife. This article is about the video game. ... Wikipedia does not yet have an article with this exact name. ... VersaLife is an organization in the computer and video game Deus Ex. ...


References

External links

Wikiquote has a collection of quotations related to:
Official
Reviews
Wikis
Spoilers

  Results from FactBites:
 
NetHack: review, discussion, hints, tips and walkthrough at Jay is Games (3769 words)
Nethack is a classic singl-player (randomly generated) dungeon exploration game that runs on a wide variety of platforms, and yet each implementation uses the same game engine.
Nethack is one of the oldest games still being developed, and some consider it to be the greatest game ever made.
Nethack is frequently acclaimed by players as one of the finest games ever designed, not so much for its casual look, but for its incredibly intricate gameplay, clever sense of humor and epic scope.
NetHack: Information from Answers.com (3341 words)
NetHack is widely considered one of the hardest games of all time, due to its intentional lack of a facility to reload a saved game after making a mistake.
NetHack is an open source game (although the source code is only released along with new versions), so anyone can edit the source code and thus create new variants.
NetHack's long life has led to a wide acceptance into computer culture, with constant references being made to it in the social circles, on the Internet, in other games, and online comics, such as User Friendly.
  More results at FactBites »

 
 

COMMENTARY     


Share your thoughts, questions and commentary here
Your name
Your comments

Want to know more?
Search encyclopedia, statistics and forums:

 


Press Releases |  Feeds | Contact
The Wikipedia article included on this page is licensed under the GFDL.
Images may be subject to relevant owners' copyright.
All other elements are (c) copyright NationMaster.com 2003-5. All Rights Reserved.
Usage implies agreement with terms, 1022, m