:fB  Player: 0xZero Game: NetHack 3.6.0 Server: $ATTR(14)em.slashem.me - https://em.slashem.me/$ATTR() Filename: 2024-09-27.23:07:47.ttyrec Time: (1727478467) Fri Sep 27 23:07:47 2024 :f8NetHack, Copyright 1985-2020  By Stichting Mathematisch Centrum and M. Stephenson.  Version 3.6.6-0 Unix post-release, built Mar 21 21:28:42 2020.  See license for details. :fVShall I pick character's race, role, gender and alignment for you? [ynaq] :fjZy name: 0xZero  role: Archeologist  race: human  gender: female  alignment: neutral Is this ok? [ynq]  0xZero, neutral female human Archeologist  y + Yes; start game n - No; choose role again q - Quit(end) :f@+ name: 0xZero  role: choosing now  race: not yet specified  gender: not yet specified  alignment: not yet specified Pick a role or profession  a - an Archeologist b - a Barbarian c - a Caveman/Cavewoman h - a Healer k - a Knight m - a Monk p - a Priest/Priestess r - a Rogue R - a Ranger s - a Samurai t - a Tourist v - a Valkyrie w - a Wizard * + Random  / - Pick race first " - Pick gender first [ - Pick alignment first q - Quit(end) F;fX+ name: 0xZero  role: Barbarian  race: choosing now  gender: not yet specified  alignment: not yet specified Pick a race or species  h - human o - orc * + Random  ? - Pick another role first " - Pick gender first [ - Pick alignment first q - Quit(end) N;fC&+ name: 0xZero  role: Barbarian  race: human  gender: choosing now  alignment: not yet specified Pick a gender or sex  m - male f - female * + Random  ? - Pick another role first / - Pick another race first [ - Pick alignment first q - Quit(end) P;f '+ name: 0xZero  role: Barbarian  race: human  gender: male  alignment: choosing now Pick an alignment or creed  n - neutral c - chaotic * + Random  ? - Pick another role first / - Pick another race first " - Pick another gender first q - Quit(end) R;fg+ name: 0xZero  role: Barbarian  race: human  gender: male  alignment: neutral Is this ok? [ynq]  0xZero, neutral male human Barbarian  y + Yes; start game n - No; choose role again q - Quit(end) V;fߒb-V;f -----------|...$.....|..........||....d.....|.....@...||.........||.........|----+------V;f0xZero the Plunderer St:18/01 Dx:17 Co:18 In:8 Wi:7 Ch:6 Neutral Dlvl:1 $:0 HP:16(16) Pw:2(2) AC:7 Xp:1 It is written in the Book of Crom:  After the Creation, the cruel god Moloch rebelled against the authority of Marduk the Creator. Moloch stole from Marduk the most powerful of all the artifacts of the gods, the Amulet of Yendor, and he hid it in the dark cavities of Gehennom, the Under World, where he now lurks, and bides his time.  Your god Crom seeks to possess the Amulet, and with it to gain deserved ascendance over the other gods.  You, a newly trained Plunderer, have been heralded from birth as the instrument of Crom. You are destined to recover the Amulet for your deity, or die in the attempt. Your hour of destiny has come. For the sake of us all: Go brV;f,&avely with Crom!--More--;f;f@;f:Hello 0xZero, welcome to NetHack! You are a neutral male human Barbarian.0xZero the Plunderer St:18/01 Dx:17 Co:18 In:8 Wi:7 Ch:6 Neutral Dlvl:1 $:0 HP:16(16) Pw:2(2) AC:7 Xp:1;fBWhat do you want to use or apply? [a or ?*] ;f-Never mind.;f<@;f/)d.@.;fd.@<;f- $d@.;f'$.d@.;fd@..;fH@d;f4h)You swap places with Idefix.;f\hK $:3$ - 3 gold pieces.@.d;fd@.;f .d@;f~b!d..@;f7.d.@;f?,..d.@;f.d<@;f.d.@;f @d;fB 1You swap places with Idefix..d;fBWhat do you want to use or apply? [a or ?*] ;fEONever mind.;fx| Select one item:  a - About NetHack (version information). b - Long description of the game and commands. c - List of game commands. d - Concise history of NetHack. e - Info on a character in the game display. f - Info on what a given key does. g - List of game options. h - Longer explanation of game options. i - Full list of keyboard commands j - List of extended commands. k - List menu control keys l - The NetHack license. m - Support information.(end) ;fV +Unix NetHack Version 3.6.6-0 post-release - last build Sat Mar 21 21:28:42 2020  (36ee1849b1932d72a2340233c57701b1274c90ee,branch:NetHack-3.6). Options compiled into this edition:  color, data librarian, end-of-game dumplogs, insurance files for  recovering from crashes, log file, extended log file, errors and  warnings log file, mail daemon, news file, pattern matching via  posixregex, pseudo random numbers generated by ISAAC64, score on status  line, screen clipping, shell command, traditional status display, status  via windowport with highlighting, suspend command, terminal info  library, system configuration at run-time, save and bones files accepted  from versions 3.6.0 through 3.6.5, and;f basic NetHack features. Supported windowing system:  "tty" (traditional text with optional line-drawing). --More--;f#0xZero the Plunderer St:18/01 Dx:17 Co:18 In:8 Wi:7 Ch:6 Neutral Dlvl:1 $:3 HP:16(16) Pw:2(2) AC:7 Xp:1-----------|.........|..........||..........|.....<@..||.......d.||.........|----+------;fRv Select one item:  a - About NetHack (version information). b - Long description of the game and commands. c - List of game commands. d - Concise history of NetHack. e - Info on a character in the game display. f - Info on what a given key does. g - List of game options. h - Longer explanation of game options. i - Full list of keyboard commands j - List of extended commands. k - List menu control keys l - The NetHack license. m - Support information.(end) ;f*+ Welcome to NetHack! ( description of version 3.6 )  NetHack is a Dungeons and Dragons like game where you (the adventurer) descend into the depths of the dungeon in search of the Amulet of Yendor, reputed to be hidden somewhere below the twentieth level. You begin your adventure with a pet that can help you in many ways, and can be trained to do all sorts of things. On the way you will find useful (or useless) items, quite possibly with magic properties, and assorted monsters. You can attack a monster by trying to move onto the space a monster is on (but often it is much wiser to leave it alone).  Unlike most adventure games, which give you a verbal description of your;ff location, NetHack gives you a visual image of the dungeon level you are on. NetHack uses the following symbols:  - and | The walls of a room, possibly also open doors or a grave.  . The floor of a room or a doorway.  # A corridor, or iron bars, or a tree, or possibly a kitchen  sink (if your dungeon has sinks), or a drawbridge.  > Stairs down: a way to the next level.  < Stairs up: a way to the previous level.  @ You (usually), or another human.  ) A weapon of some sort.  [ A suit or piece of armor.  % Something edible (not necessarily healthy).  / A wand.  = A ring.  ? A scroll. --More--": run in direction until something  numberpad interesting is seen  G, same, except a branching corridor isn't --More--^: considered interesting (the ^ in this  case means the Control key, not a caret)  > down m: move without picking up objects  F: fight even if you don't sense a monster  If the number_pad option is set, the number keys move instead.  Depending on the platform, Shift number (on the numberpad),  Meta number, or Alt number will invoke the YUHJKLBN commands.  Control may or may not work when number_pad is enabled,  depending on the platform's capabilities.  Digit '5' acts as 'G' prefix, unless number_pad is set to 2  in which case it acts as 'g' instead.  If number_pad is set to 3, the roles of 1,2,3 and 7,8,9 are  reversed; when set to^ Go down a staircase (if you are standing on it).  . Rest, do nothing for one turn.  _ Travel via a shortest-path algorithm to a point on the map.  a Apply (use) a tool (p^