Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

omega-rpg(6) [debian man page]

omega(6)							   Games Manual 							  omega(6)

NAME
omega - a hack-style game with quests. SYNOPSIS
omega [save file] DESCRIPTION
omega is a complex rogue-style game of dungeon exploration. Unlike other such games, there are a number of ways to "win", depending on various actions taken during play. The ways you can get your name on the hiscore board include becoming the highest ranked head of a guild, sect, college, etc., as well as gaining the most points figured from possessions and experience. The game (via the oracle) may impose some structure on your exploration, but you need not follow all of the oracle's advice. There *is* a "total winner" status, by the way. If the save file is not specified, omega gives the player the choice of generating a random character, or playing themselves, doing a short quiz to determine an approximation of their abilities. If the save file is given, omega will restore that save file, and if successful, the save file is deleted. Note that some installations of omega compress the save file, using either compress(1) or gzip(1) - if this is the case, and you have a save file that is uncompressed (such files are generated by omega if it receives a signal during play, for exam- ple), you can compress it (with compress(1) or gzip(1)) and remove the .Z or .gz extension. Alternatively, you may simply run with the uncompressed save file - this will not affect the game in any way, but takes more disk space between games. omega offers a richness of playing detail that goes beyond a simple game like rogue. However, the majority of gameplay is very similar to rogue, hack, ultrarogue, larn, and other such games. The player is represented by the highlighted "@" symbol, objects and terrain features are represented by non-alphabetic symbols, monsters are represented by the various upper and lower case letters, and other humans are rep- resented by a non-highlighted "@". omega currently consists of a countryside in which are sited a city, various villages, several dungeons, and some "special" sites, such as the temples of the various priesthoods. The game starts in the city of Rampart, where all the guilds have headquarters. As a dungeon is explored, all generated levels are saved in memory. However, only one dungeon is "remembered" at a time, so if you enter two dungeons, the first will be forgotten (it will be regenerated should you wish to enter it again). However, if a dungeon is "completed", this fact will be remembered, basically meaning that the unique monster at the bottom will not be regenerated if you've killed it already. SEE ALSO
compress(1), gzip(1), nethack(6) AUTHOR
Laurence Brothers omega(6)

Check Out this Related Man Page

HACK(6) 							 BSD Games Manual							   HACK(6)

NAME
hack -- exploring The Dungeons of Doom SYNOPSIS
hack [-d directory] [-n] [-u playername] hack [-d directory] [-s] [-X] [playername ...] DESCRIPTION
hack is a display oriented dungeons & dragons-like game. Both display and command structure resemble rogue. (For a game with the same structure but entirely different display - a real cave instead of dull rectangles - try Quest.) To get started you really only need to know two commands. The command ? will give you a list of the available commands and the command / will identify the things you see on the screen. To win the game (as opposed to merely playing to beat other people's high scores) you must locate the Amulet of Yendor which is somewhere below the 20th level of the dungeon and get it out. Nobody has achieved this yet and if somebody does, he will probably go down in history as a hero among heroes. When the game ends, either by your death, when you quit, or if you escape from the caves, hack will give you (a fragment of) the list of top scorers. The scoring is based on many aspects of your behavior but a rough estimate is obtained by taking the amount of gold you've found in the cave plus four times your (real) experience. Precious stones may be worth a lot of gold when brought to the exit. There is a 10% penalty for getting yourself killed. The administration of the game is kept in the directory specified with the -d option, or, if no such option is given, in the directory speci- fied by the environment variable HACKDIR, or, if no such variable exists, in the current directory. This same directory contains several auxiliary files such as lockfiles and the list of topscorers and a subdirectory save where games are saved. The game administrator may how- ever choose to install hack with a fixed playing ground, usually /var/games/hack. The -n option suppresses printing of the news. The -u playername option supplies the answer to the question "Who are you?". When playername has as suffix one of -T, -S, -K, -F, -C, or -W, then this supplies the answer to the question "What kind of character ... ?". The -s option will print out the list of your scores. It may be followed by arguments -X where X is one of the letters C, F, K, S, T, W to print the scores of Cavemen, Fighters, Knights, Speleologists, Tourists or Wizards. It may also be followed by one or more player names to print the scores of the players mentioned. AUTHORS
Jay Fenlason (+ Kenny Woodland, Mike Thome and Jon Payne) wrote the original hack, very much like rogue (but full of bugs). Andries Brouwer continuously deformed their sources into the current version - in fact an entirely different game. FILES
hack The hack program. data, rumors Data files used by hack. help, hh Help data files. record The list of topscorers. save A subdirectory containing the saved games. bones_dd Descriptions of the ghost and belongings of a deceased adventurer. xlock.dd Description of a dungeon level. safelock Lock file for xlock. record_lock Lock file for record. ENVIRONMENT
USER or LOGNAME Your login name. HOME Your home directory. SHELL Your shell. TERM The type of your terminal. HACKPAGER, PAGER Pager used instead of default pager. MAIL Mailbox file. MAILREADER Reader used instead of default (probably /usr/bin/mail). HACKDIR Playground. HACKOPTIONS String predefining several hack options (see help file). Several other environment variables are used in debugging (wizard) mode, like GENOCIDED, INVENT, MAGIC and SHOPTYPE. BUGS
Probably infinite. Mail complaints to mcvax!aeb . BSD
March 31, 1985 BSD
Man Page