Misplaced Pages

Hack (video game)

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
1984 roguelike video game This article is about the roguelike game. For the series of PlayStation 2 role-playing games, see .hack (video game series).
This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.
Find sources: "Hack" video game – news · newspapers · books · scholar · JSTOR (August 2007) (Learn how and when to remove this message)
Hack
Initial release17 January 1984; 40 years ago (1984-01-17)
Stable release1.0.3 / 23 July 1985; 39 years ago (1985-07-23)
Written inC
SuccessorNetHack
Available inEnglish
TypeRoguelike video game
License3-clause BSD license

Hack is a 1984 roguelike video game that introduced shops as gameplay elements and expanded available monsters, items, and spells. It later became the basis for NetHack.

History and development

Hack was created in 1982 by Jay Fenlason with the assistance of Kenny Woodland, Mike Thome, and Jonathan Payne, while students at Lincoln-Sudbury Regional High School. A greatly extended version was first released on Usenet in 1984 by Andries Brouwer. Brouwer continued to work on Hack until July 1985. Don Kneller ported the game to MS-DOS and continued development there. Development on all Hack versions ended within a few years. Hack descendant NetHack was released in 1987.

Hack is still available for Unix, and is distributed alongside many modern Unix-like OSes, including Debian, Ubuntu, the BSDs, Fedora, and others. Hack has also been ported to a variety of non-Unix-based platforms. NetHack is available for almost all platforms which run Hack. There is one exception: Hack is available, but NetHack is unavailable, for the Game Boy Advance.

Gameplay

This article is written like a review. Please help improve this article by rewriting it in encyclopedic style. (August 2023)

This describes Brouwer's version 1.0.3, which is the most canonical version, being the one installed by package managers on Linux systems.

Being developed by one man means the game is more balanced. Even when the player has discovered all properties of monsters, wands, potions, and has fathomed the role of "luck", the game remains as playable as ever. It may take ages before the player reaches that stage. The player will be helped by rumors: cryptic hints, hidden in fortune cookies.

The object of the game is to delve into a dungeon to retrieve the Amulet of Yendor, and perish with as many game points as possible. The player can start out with a different ability set, such as Wizard or Cave(wo)man. The player confronts various monsters: hobgoblins, leprechauns, acid blobs, bats, centaurs, chameleons, dragons, ghosts, imps, trolls, and has weapons, armor, potions, wands, rings and special items to aid in this, e.g. related to fire there is a scroll, a ring, a monster and a wand, and their interplay is to be discovered.

There is time pressure because the player dies if their food runs out, though food is scattered around the dungeon. There is a limit to how much the player can carry, forcing them to leave valuable items behind. The amount of gold and gems the player possesses when they die increases their score, but holding them comes with a burden of more weight.

The player must enter Hell to recover the Amulet. Entering Hell for the uninitiated just means that "you burn to a crisp". In NetHack, Hell is renamed.

The player encounters special rooms such as shops, crypts, and vaults. Other spatial elements in the game are traps and swamps. As the player's experience grows, so do their abilities, score and the need for food.

Interface

Hack implements a graphical user interface using arrangements of ASCII or Extended ASCII glyphs to represent game elements. Some later ports of Hack, on AmigaOS for example, use graphical tiles in place of these letters and symbols.

Typical Hack session

You hear some noises in the distance.
 
  
 #
                                                                  ------
                                                                  |....|
                       -----                                    ##+....|
                       |..$+#                                     |...<|
                       +...|#                                     |....|
                       |...|###############                       ------
                       |...|#             #-----+-----
                       |..%|##            #|.........|
                  #    -----#             #|.[......%L
       -+----  ##############             #|.........|
       |....|   #                         #+@........|
       |....+####                        ##-----------
       |....|
       |....+
       ------
 
 
 
 
Level 1    Hp  15(15)   Ac 9    Str 16      Exp  1          
Key:
@ the player character
+ a door
$ gold
% food
L monster; a leprechaun
[ armor
# corridor
< stairway leading upwards

References

  1. "Hack". RogueBasin. Archived from the original on 30 August 2006. Retrieved 19 July 2013.
  2. "Index of games/hack/". DragonFly BSD revision-control system. Retrieved 19 July 2013.
  3. "Hack". Archived from the original on 4 August 2003. Retrieved 19 July 2013.
  4. Harvey, Brian, A Case Study: The Lincoln-Sudbury Regional High School, archived from the original on June 1, 2016, retrieved December 19, 2018
  5. ^ "Hack 1.0.3". NetHackWiki. Archived from the original on 12 May 2011. Retrieved 19 July 2013.
  6. "Game history 1.0.3". NetHackWiki. Archived from the original on 17 November 2010. Retrieved 19 July 2013.
  7. "NetHack 1.3d". NetHackWiki. Archived from the original on 29 May 2011. Retrieved 19 July 2013.
  8. "bsd-games.spec". Fedora Project Packages GIT repositories » bsd-games.git. Line 162. Retrieved 19 July 2013.
  9. "List of handheld roguelikes". RogueBasin. Archived from the original on December 19, 2018. Retrieved 19 July 2013.

External links

Categories: