









                                 ||̖{{ւ̏
                               ((NNeettHHaacckk KKCChhuubbNN))


                                   _E_r_i_c _S_. _R_a_y_m_o_n_d
                     _(o[W _3_._4 ̂߂̍L͈͂ȍZƊg[_)



          11..  ͂߂

               ŋ߁AȂ͓X̎dɖȂAh鎩
          CBŋߐAȂ閲͒TA݁A\RA 
           ̂łAȂɂ̗͂R͂Ƃ͂킩
          BȂ̖͂ۂɂ͐܂Ă̂ƌ 
            āA Ȃ܂łɂĖY悤ƂĂ̂ł͂Ȃ
          AƎvBAȂ͔ыNāA̒̓Â 
          p ̌ɐł悤ɌAŋ͂ȉ̑NȋL
          Ƃđ吺ŋ񂾁BȂ̖ɏove͖{Ȃ̂ 
          ?    閈ɁApЂ̋߂̕svcȓAɓƂ~Ȃ
          BłAȂ͂̂悤ȍlAAɓċA 
           lX̘bvoƂœǂoBA
          Ȃ͖̒ɏoĂsvcȏꏊ{߂Ƃv} 
           ȂȂBƂĂA`҂͍ŏɂ̓ʂĂ
          Aɖ߂ė鎞̕TɂȂĂ悤Ɍ 
          B߂ėȂl͊FAPɂ܂`𑱂Ă邾Ȃ̂ł?


               Őq˂邤ɁAȂ͂\ɂBCF_[
           Ƃ̂Aɓ邱ƂłȂA΂炵
          Y炷ƌ̂BȂƂ`ł́A 
           ̂͐_s̑̂ƂĂ炵B
          ͋|̖{̉[AQwi̒JzǂɂƂ 
          \ łB`𕷂uԁAȂ͎ɂ͓AɓĔނ̘b
          Ă閂{߂ׂ[Ŗm̂Ȃ炩̗R 
          m MBȂ͂Ƃ̗͂^łȂĂAȂƂ`
          kn̂̋VlɂȂ̋zŔ荞߂邾낤ƍl B
           ̒ŏoĂ낵AsvcȉɏoƂł΂Ȃ
          łBȂ͒n̈hōŌ̏h΍B h
           ǂɌfꂽ̃IbYΉقǁAȂ͈ӋC
          B


               NƁAȂ͏iW߁AȂ͓AɌė
           B̗𑱂ċ|̖{ւ̓Ñ̈
          ւƂǂ蒅BXĂ̂œŃLv   
          A ̖͍LXƂ̉ŖɏABȂ͓
          W߁Aƒnł̍ŌɂȂ邩ȂHς A
          AւƓĂB



          NetHack Guidebook                                               1





          NetHack Guidebook                                               2



          22..  Ȃ芪

                ĂȂ NetHack ƂQ[n߂邱ƂɂȂB
          Ȃ̖ړI͎Ă̕W߁ACF_[̖ o
          Aɂ͂̋|̖{琶ĒEo邱ƂłB

               `ɂ邢낢ȍɑΉ邽߂̊e̔\͂͂́A
          Ȃ̐ƏCsɂĕωB

               lÊw_(_A_r_c_h_e_o_l_o_g_i_s_t_) ͓Aɂđ̒m   
          B ̂ߑf蓴Ał̕sȎԂ؂蔲邱Ƃ
          Bނ͊wpÎ߂̒TsɓKďo 
          B

                 ؐl_(_B_a_r_b_a_r_i_a_n_) ͉nĂmłA퓬̂
          ߂ɒbĂBނ͗ނ܂ȗ͂̋Avȍ 
          Ƒ傫ȗ莝݂̌̂ĒTɏoB

                 A l_(_C_a_v_e_m_a_n   _C_a_v_e_w_o_m_a_n_)͂Ƃ킯͂Ă
          AVΊ펞ɎgꂽďoB

               _(_H_e_a_l_e_r_)͈p򕨂ɂĐʂĂBC񕜂
           Aɂa炰AAł𒆘a肷鍁
          򑐂ɂďڂBĊgĐ̌NԂ 
           łBނ͊JƈƂĂȂ悢V𓾂āA
          AɓĂB

               Rm_(_K_n_i_g_h_t_) ͋Rmɒł邱ƂƖhقǗD 
          邱ƂƂ_ŁAʂ̐mƂ͋ʂB

                 N_(_M_o_n_k_)  ͏C҂łAiȓ̓IKƐ_IP
          ɂāAȂłĝƓ悤ɐ키Ƃo B
           N͖hȂA@コ邱ƂŖߍ킹Ă
          B

               mƓm_(_P_r_i_e_s_t  _P_r_i_e_s_t_e_s_s_) ͐E̐młAƖh
           @̋ƂgĐ`L߂Ƃ鐹młBF
          ʂĐ_ƌ\͂ɂAނ͂΂Ί瓦邱Ƃ 
          cAF͊炷ƂB

                W[_(_R_a_n_g_e_r_) ͂قƂǐXZ݂ƂAA͏X
          ȂBAނ͒ǐՏpBsƋɁA|p̒B l
          łB

                 _(_R_o_g_u_e_) ͕qŐgBƂɒD_łA㩂
          łɏڂBނ̒͊PłA͔ȒƂȂB

                _(_S_a_m_u_r_a_i_) ͕̓{̐s̕lłBh͌y 
          ŐĝȂɏGłĂȀȂ܂ꂽ  召  2{̓
          ттĂB

                όq_(_T_o_u_r_i_s_t_) ͑z̋(ɍœKł)ƃN  Wb g
          J[ hAʂ̐HAn}AčȃJďoB
          Ƃǂ͎̉ʐ^ɎB̂̂łB


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                               3



                L[_(_V_a_l_k_y_r_i_e_) ͗EȏmłBߍȃXJW
          i rA̍Xňޏ͊拭ŁAɂςAgB
          ƂƍIgɂĂB

                @g_(_W_i_z_a_r_d_)͖p̒mƂɑIєꂽ@̓ 
           ĂAɂ̖@wɑ΂ēɑw[B͎セ
          ŊȒPɑł|悤Ɏv邪Aoς񂾖@g͋ 
          GłB

               ܂ALN^[̎푰IԂƂłB

                h[t_(_D_w_a_r_f_)  ͐lԂGtA肵
          ̂ŏvłBh[t̒ڂׂ͍̌@ƋH 
           IZpłBh[t̖h̓Gt̃~XhƓƂ܂
          ͂Ȃ܂łAɎiłB

                Gt_(_E_l_f_)  ͋@qƐvAĉsqȊo  
          B   ŋNǂȍׂȂƂނ̖ڂ𓦂邱Ƃ͂ł
          BElC̔ނ̎Ɩh͗DGȂ̂łB

                m[_(_G_n_o_m_e_)  ̓h[tɏAh[tƎ
           Bm[͏ň@tƂĒmAxƊ댯ŖĂ
          閧̒nB|̖{ɍĂ邱ƂŒmB

                l_(_H_u_m_a_n_)  ͒nōłʓIȎ푰ŁA䂦ɑ̎푰Ɣ
          r 鎞̊ƂȂĂBʂȔ\͎͂ĂȂA
          EƂŐ邱ƂłB

                I[N_(_O_r_c_)  ͎cŖ؂Ȏ푰ŁA(̃I[N܂)
           ĂBɁAI[N̓GẗႢ䂦ɌA
          킴킴@ĎEƂBI[Nɂč 
          hƕ͈ʓIɕiB

          33..  ʂɕ\\̂̈Ӗ

               ʏɂ͂Ȃ݂铴ÅKłłɒTI
          n}ƁAŖڂɂĂBɐ[Ti߂ 
          AēA͂̎pɂȂ̑Ỏʂɖ炩ɂĂB

               NetHack  ̑cł _r_o_g_u_e ŏɌꂽƂÃXN[
          w̓Rs[^t@^W[Q[̒łSƓ   
           BȗXN[w͗OIȂ̂ƂނW
          ƂȂBNetHack ͂̂΂炵`󂯌płB^I 
          p   R}h͂Aʂ͂ŕ\eLXgAhx
          `[Q[Ƃ͈قȂANetHack ̃R}hׂ͂ 1  2  
           ̃L[͂ŗ^Ǎʂ͉ʏɃOtBJɕ\
          Bʂ͍Œ 80  24 s̑傫Bȏ 
          傫Ă 80 ~ 21 ̗̈悾n}̕\ɎgB

               NetHack ͓_≹̏؂āAڂ̕sRȐlłv
          CłBڂ̕sRȐl̂߂NetHack̐ݒ@ɂẮA
          ̃hLgŌqB




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                               4



               NetHack ̓vC邽тɐVA쐬B̂߉
          Q[ɏƂ̂҂ɂA܂̃Q[͊y 
          ɖ̂ƊB

               NetHack ͂܂܂ȕ\̃IvV񋟂BIvV
          Ȃ̃n[hEFA\tgEFA̔\͂ɈˑAvbg tH[
             ܂܂łB܂܂ȃRpC̃IvV͎s
          t@CꂽƂɂ̂݉\ƂȂBmNLN^C ^
          tF[ XAJ[LN^C^tF[XA^CƌĂ΂鏬
          GpOtBJC^tF[X 3 ̕\@ B  2
           ̃LN^C^tF[X̓tHg𑼂̕ɒu邱
          ł邪AWݒł W ASCII LN^pđSĂ \
            B ܂܂ȕ\̃IvV̓Q[eɂ͉e^
          B^CF̓KChubNŕ\LłȂA͑SẴv b
          g tH[ɋʂł͂Ȃ̂ŁAQ[ɕ\̂̐Ƃ
          Ă̓mNLN^fBXvCŕ\W ASCII L
          N^pB

               NetHack  ŉNĂ̂𗝉ɂ́A܂ NetHack 
          ͉ʂǂȂĂ̂𗝉ȂĂ͂ȂȂBNetHack  
           ́AeLXgAhx`[Q[ɂuȂ́cv
          悤ȕ͂̑łB} 1  NetHack ł͉ʂɉ\ 
           ̈łBʂǂ̂悤ɕ\邩̓vbgz[
          ˑB

          --------------------------------------------------------------------
           The bat bites!

               ------
               |....|    ----------
               |.<..|####...@...$.|
               |....-#   |...B....+
               |....|    |.d......|
               ------    -------|--



           Player the Rambler     St:12 Dx:7 Co:18 In:11 Wi:9 Ch:15  Neutral
           Dlvl:1 $:0  HP:9(12) Pw:3(3) AC:10 Exp:1/19 T:257 Weak

          --------------------------------------------------------------------
                                      Figure 1


          33..11..  XXee[[^^XXss((ʂ̉))

               ʂ̉ 2 sɂ́AȂ݂̌̏Ԃ\Í̂悤ȏ 
           fЂ܂܂ĂBǂ炩̍sʂ̕ȂƂ
          S邱Ƃ͂łȂȂBȉɏԂ낢 
           ڂӖ̂qׂ (RtBO[VɂẮA
          ȉɈꗗĂԂڂׂ̂Ă\Ƃ͌ 
          )B




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                               5



          OƃN(Rank)
                 ̃LN^(q̌oxɊÂ)Eƕʂ̓
               B

          (Strength)
               Ȃ̃LN^̗͂̋̒lłA6 ̊{Iȑ
               1   łBlԂ̃LN^[̏ꍇC͂̋ 3  18
               ̊Ԃ̒lƂB̑̏ꍇC̐z邱Ƃ (
                 18/xx ̂悤ȓʂȗ͂𓾂邱ƂA@̗͂ʂ
               z\͂^邱Ƃ)B͂̋̒l傫 
               ǁAȂ̗͂͋B͎͂̋͗dǂꂾ܂
               A킢łǂꂾ̃_[W^邩Aǂꂭ炢ו^
               邩ɉeB

          f(Dexterity)
               f͐킢ɂ閽A㩂𓦂\AĂ̑
               qKvƂd╨ɊpɈ邩Ȃǂ̂Ƃ
               ɉe^B

                v(Constitution) ϋv͉͂₻̑̈ɂX^~
               ȉՂ񕜂\͂ɉeB

          m(Intelligence)
               m͎͂\͂▂@ǂޔ\͂ɉe^B

          (Wisdom)
               (ɖ@)IȌoɂ蓾B@̃Gl
               M[ɉeB

          (Charisma)
               ͂͂̐Ȃɑ΂ĂƂԓxɉe^B
               ɓX傪iɉeB

          (Alignment)
               ɂ   ((LLaawwffuull)),   ((NNeeuuttrraall)),
                ((CChhaaoottiicc)) B΂΁A͑PAׂ͈ł 
               邪A@ƓɈvƂ͌ȂBȂ̑
               ̉̂Ȃɑ΂锽ɉe^BĂ
               ͍DIł͂ȂA΂̑ɑ΂Ă͂Ȃ݂̑ɑ΂
               ɂ߂čDIł炵B

          K(Dungeon Level)
               ǂꂾẢ[܂ōsBl 1 ŁA A
               [sقǑ傫ȒlɂȂB̊K͓ʂŁA
               ͂ȂOŎʂBCF_[̖͒n 20 K[
               ̂ǂɂƍlĂB

          (Gold)
               ҂ɏĂ̗ʂłBȂǂɉB͊
               ɓĂȂB

          ̗(Hit Points)
               ̗͂̌ݒlƍőlłB̗͂͂Ƃǂꂾ̃_[W
               ƎʂB킢ŏقǒl͌B̗͂͋x


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                               6



               ▂@̃ACeɂ񕜂łBʂ̗̒̐͑
               ̂Ƃ蓾őlłB

          (Power)
                 Ɏg͂łB͎̂ɕKvȐ_̗
               (_m_a_n_a_: }i ) ǂقǂ邩B͂܂x邱
               ɂ񕜂B

          hl(Armor Class)
               FDIȐ̍UhǂقǐH~߂邩
               lłBقǖh͗LłAhl̒l
               ɂȂ邱Ƃ\蓾B

          ol(Experience)
               ݂̌oxƌolłB`iނƌol𓾂邱
               łBol̍vl܂ŒBƁAox
               オBoςނɂA킢B@̍Uɂς
               悤ɂȂB̃o[Wł͌ox\
               B

          (Time)
               o߂^[łB ttiimmee IvVÎƂɕ\
               B

          (Hunger status)
               ݂̕łB  ((SSaattiiaatteedd)) 
                ӂӂ((FFaaiinnttiinngg)) PP ܂ł̒llƂBBʂȂ\\
               ȂBB

               ̑ɂԂ\̌ɕ\邱Ƃ
          ȂBĂƂɂ CCoonnffAaĈƂɂ  FFooooddPPooiiss
          ܂ IIllllAڂȂƂɂ BBlliinnddA῝򂪂Ƃ SSttuunnA
          oĂƂ HHaalllluu ƕ\B

          33..22..  bbZZ[[WWss((ʂ̏㕔))

               ʂ̍ŏs͎oIɕ\łȂƂ郁bZ[W
           ߂ɎgBŏs``----MMoorree----''\ꂽƂ́Â
          ɂɃbZ[WĂ邯ǂ݂̃bZ[W܂m 
           ǂނ悤ĂƂƂłB̃bZ[Wǂނ߂
          ͒PɃXy[XL[΂悢B

          33..33..  nn}}((ʂ̂̑̕))

               ʂ̂̑́̕AȂ݂Kł܂łɒTI
           ̒n}łBʏ̃V{͂ꂼꉽ\Ă
          B\V{̂́A܂܂ȃOtBbN I
          v Vݒ肷邱Ƃɂĕς邱ƂłBłȂ
          Wݒ̃V{pBɕWݒ̃V{̈Ӗ 
          B

          -  |
               ̕ǁA܂͊JA܂͕ (|)B



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                               7



          .    ̏AXA܂͔̂ȂoB

          #     ʘHAS̖_A؁A邢͑䏊̗(䂪Cv
               gĂƂ) ܂͒ˋ

          >    Ki:̊Kւ̒ʘHB

          <    Ki:̊Kւ̒ʘHB

          +    A܂͊wKł邩Ȃ̏ꂽ@B

          @    Ȃ̃LN^[A܂͐lԁB

          $    ̎RB

          ^    (ЂƂєΕ\)B

          )    B

          [    ܂͂Ȃ炩̖hB

          %    H(qIłƂ͌Ȃ)B

          ?    B

          /    B

          =    wցB

          !    B

          (    ֗ȃACe(͂AAvc)B

          "

          *     ΂܂͊(MdȂ̂ȂAl̂Ȃ̂
               Ȃ)B

          `    A܂͒B

          0    SB

          _    ՒdA܂͓S̍B

          {    

          }    ܂A܂͖xA܂͗n̊CB

          \    ؂ȉ

          a-zA-Z т̑̃V{
               ̕Ƃ̑̂̃V{͋|̖{̂낢
               ȏZl\Bނ͕s@ňӂɖĂ邩m
               ̂ŌxȂ΂ȂȂBAƂɂ͉̎菕ɂȂ


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                               8



               ƂB

          I    ̃}[N͓A邢͂̑̌ȂŌɂ
               ꏊɕ\B͂łɈړĂ邩Ȃ
               Ƃɒӂ邱ƁBł'F''m'̃R}h֗낤B

               ̃V{ׂċLKv͂ȂB`/' R}hł
          ̃V{\m邱Ƃł(ڍׂ͎̍ Q   
          )B


          44..  RR}}hh

               R}h 1  2 ̃L[͂sƂŎsB
          ̃R}hAႦ``search''͂ȏ NetHack ɏ^
           KvȂB̃R}h͗ႦΕgp镨Ȃǂ̏
          ɗ^KvB炳ȂKvƂR}h 
          ΂ẮA NetHack ͑Ij[̓R}hCvvg
          ̂ꂩ\Bǂ炪\邩͎Ƃ mmeennuussttyyllee I
          vVǂ̂悤ɐݒ肵ɂB

               Ⴆ ``What do you want to use? [a-zA-Z ?*]'' Ƃ`
          ₪悭邪A͂ȂɎĂ镨̂ǂIԂ 
          q ˂̂łB̎ɂāua-zA-Zv͂ȂIׂ鎝
          ̖ژ^LłB `?' ͂Ƃ̖̕ژ^ꗗA
           X ̋L\Ă̂m邱ƂłB̗ł́A`*'
          B͈ꗗɂ͕\Ă炸Aʏ킻̃R}hł̎g p
           z肵ĂȂłAgƎv΂IԂƂł邱
          ĂB`*' ͂ƂׂĂ̖̎ژ^\A X
           ׂĂɂĂ̖ژ^Lm邱ƂłBlČ
          ̃R}hgȂƂɂƂɂ ESC L[΃R}h
          I邱ƂłB

               R}h̒ɂ́ȂOɐ͂邱ƂŉJԂ
          Ƃł̂BႦ΁u10sv 10 ̒T\ĂB
           nnuummbbeerr__ppaadd IvVÎƂɂ͐̑O `n' ͂
          Ȃ΂ȂȂB܂̗ł͑Ɂun 10svƓ͂Ȃ
           ȂȂBs邱ƂӖȃR}hł͖͂
          BɁAړR}h̑Oɓ̕(vtBbNX)t 
           ƂɂĂ܂܂Ȉړ@Ƃ邱Ƃł(q)BJ
          񐔂vtBbNX߂ɂ ESC L[΂悢B

               R}ḧꗗ͂Ȃ蒷AQ[ `?' R}hg p
           ăwvj[邱ƂɂAłR}ḧꗗ
          ƂłBȉ̓R}ḧꗗłB

          ?    wvj[: \\ȃwvʂ̂ 1  \  
               B

          /    V{Ӗ邩Bw肷ɂ͏ꏊA
               ̓V{(邢͒PS)͂邩I邱Ƃ
               B




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                               9



                  w  ́A K    u܂ŃJ[\ړĂ
          `.'A`,'A`;'A`:'̂ǂꂩƂɂčsȂB `.' 
          ƁAI񂾏ꏊŕ\ĂV{̐\A hheellpp
          IvVIȂꍇɂĂ``More info?''(ڍׂ?)Ǝ
           Aꂩ炳ɑ̏ꏊw肷邱ƂłB `,'
          ƁAV{̐\邪Aڍ׏͕\ȂB `;' 
            ƁA ڍ׏͕\ꂸAɑ̏ꏊ̎włȂB
          `:'ƁA(Ȃ)mFȂŏڍ׏񂪕\Bꏊ
          IԎ ESC L[ƂɂẴR}h𒆒fłA `?'
          Ƃǂ̂悤ɓ삷邩̊ȒPȐ\BꏊłȂ 
          Ow肵ꍇ́Aɂ̖Oɑ΂ǉ񂪕\B

          &    R}h̓B

          <    ̊K֍s(Ki͂ɂƂ)B

          >    ̊K֍s(Ki͂ɂƂ)B

          [yuhjklbn]
               w 肵ֈi(} 2 Q)B̕ɉƊ
               Ă邩oĂƂ́Aړ̂ł͂ȂƐ키
               ɂȂBƐ키ƂɂȂ̂͂̈ړ̃R}h
               B̑̃R}h(q)́uSvłB

                                   y  k  u            7  8  9
                                    \ | /              \ | /
                                   h- . -l            4- . -6
                                    / | \              / | \
                                   b  j  n            1  2  3
                                             (nnuummbbeerr__ppaadd ÎƂ)

                                         Figure 2


          [YUHJKLBN]
               ǂɓ˂邩ɏՓ˂܂Ŏw肵ɐiށB

          m[yuhjklbn]
               vtBbNX: EA (ƂɉƎv
               ĂĂ)肹ɈړB

          F[yuhjklbn]
               vtBbNX: (ɉƗ\zĂ邾ł)
               Ɛ키

          M[yuhjklbn]
               vtBbNX: E킸ɉֈړB

          g[yuhjklbn]
               vtBbNX: ܂ňړB

          G[yuhjklbn] or <CONTROL->[yuhjklbn]
               vtBbNX: 'g' ƓBʘH̕_ł͎~  
               B


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              10



          _    w肳ꂽʒu܂ŁAŒZASYpĈړB
               ŹAȂmĂ(A܂͈ȑOɒʂ)n}z
               uɌvZBmĂ铹ȂꍇAɐs
               B `G'R}hƂقړŒ~邪A `M'R}h
               ƓlɕEȂňړB

          .    xeB1 ^[ȂB

          a    (͂AAvc)p(g)B

          A    1   ܂͕̐gɂĂ(hȂ)͂Bh
               1 ͂Ƃɂ 'T'(take off: h͂)AAN
               Z T  1 ͂Ƃ 'R'(remove: ANZT͂
               )gpB

          ^A   1 ÕR}hJԂB

          c    B

          C    X̉ɖOtB

          ^C   pjbN{^BQ[B

          d    ɒuB:ud7av a Ƃ 7 ɒuƂ
               ӖB

          D      ̕ɒuB``What kinds of things do you want
               to drop?[!%= BUCXaium]'' (ǂ̎ނ̂̂u܂?)  ̎
               ɑ΂āA0 ȏ̃̕V{͂邱ƂœB
               `a', `i', `m', `u' ̌ɓ͂邱ƂłB 
               āA jꂽ(B)/ĂȂ(U)/ꂽ(C)ACew
               肷邱ƂłB

                    DB  - jĂƔĂ镨SĂɒuB
                    DU  - ĂȂƔĂ镨SĂɒuB
                    DC  - ĂƔĂ镨SĂɒuB
                    DX  - j/􂢂ĂȂSĂɒuB
                    Da - mFȂɂׂĂ̕ɒuB
                    Di - uOɎmFB
                    Du - (XɂƂ)̕ɒuB
                    Dm - uIԂ̂Ƀj[pB
                    D%u - ̐HɒuB

          ^D   (ʂ͔)RB

          e    HHׂB

          E    ɃbZ[WݍށB``Elbereth'' Ƃ   
               ƁAẲ͂Ȃɔ𒧂ŗȂȂ (
               ȂUƕ͏Ă܂)B́Aꑧ 
               ƂɂȂȂ֗łB (̋@\̓RpCɍ폜
               Ă邩mȂ̂ŁAȂ̃o[WŕK@\
               Ƃ͌ȂB)



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              11



                    E- - ق̒ɎwŏB

          f     ɓĂ̂𔭎˂B˂̂͗\`Q'R}
               hőI邱Ƃo邵A aauuttooqquuiivveerr IvVݒ肳
               Ăꍇ́ARs[^[ɎIɓKȂ̂ݒ肳
               ƂłB

          i    ̖ژ^(Ă镨ׂ)\B

          I    ̖ژ^̂w肵ꕔ\B

                    I* - ̂΂ׂĕ\B
                    Iu - ׂ̕ĕ\B
                    Ix - gĂ܂ׂĕ\B
                    I$ - 𐔂B

          o    JB

          O    IvVݒ肷B݂̃IvV̒l̈ꗗ\  
               B  (o^Cv邩NbN邱Ƃɂ)ύX
               IvVIŁAقƂǂ̒lύX邱Ƃ  
               B u[ lłȂIvV̏ꍇ́AɃj[o
               AvvgoBݒ\ȃIvV͂̃KChubN
                قǂɈꗗBIvV͒ʏ `O' R}hł͂
               AQ[n߂Oɐݒ肷Bq̃IvV̍QƂ
               ƁB

          p    𕥂B

          P    wցA邢͂̑̑iiAډBjgɂB

          ^P   1 ÕbZ[Wx\B ^P ͂
                  O  b Z[ W ɕ\B̐U镑
               msg_windows IvVɂĕωB

          q    (CȂ)ށB

          Q    ɓ̂IBőÎ`f'R} h
                ˂邱ƂłB (o[W 3.3 ȑOł͂̃R}
               h̓Q[̂A̋@\`#quit'Ɉړ 
               )

          r    ▂@ǂށB

          R    iiwցAȂǁj͂B

          ^R   ʂ`B

          s    ͂̉B㩂TBɂ͕ʉTKv
               B

          S    Q[Z[uāAfBQ[͎vCɎI
               B



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              12



          t    𓊂B܂͖Ȃǂ𔭎˂B

          T    h͂B

          ^T   e|[g\͂΃e|[gB

          v    o[Wԍ\B

          V    ̃Q[̗\B

          w    B

                    w- - ƂĉfɂȂB

          W

          x    Ă镐\̕ƌB\͓̕񓁗U
               ŗpB\̕킪ȂĂ͎s( 
               Ă̂\ɂāAfɂȂ)ƂɒӁB

          X    qT()[hɓB

          ^X   Ȃ̖OAEƁA푰AʁAсÃQ[ɂ
               邳܂܂Ȑ_̖O\B

          z    UBɐUꍇ́A`.'gB

          Z    BɎƂ́AƂ`.' g
               B

          ^Z    Q[  ꎞ~(WuRg[@\̂ UNIX(R)
               o[Ŵ)B

          :    ɉ邩B

          ;    ĂV{\B

          ,    EB`m'̌ɉƂɂāAݒɊւ炸I 
               j[\B

          @    aauuttooppiicckkuupp IvṼIEIt؂ւB

          ^    ܂łɔ㩂̎ނ𒲂ׂB

          )    Ă镐\B

          [    tĂh\B

          =    ͂߂Ăwւ\B



          __________
          (R)UNIX is a registered trademark of AT&T.


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              13



          "    tĂ閂\B

          (    gĂ铹\B

          *     Ă̂\B 5 ̃R}hɂ
               ́B

          $    Ă𐔂B

          +    mĂ̈ꗗ\B̃R}hɂāA
               \鏇Ԃς邱ƂłBj[`ŕ\
               A܂ڂ̎IAɓւI
               邱ƂɂďԂւBɓւꍇ͂
               ̑JԂB

          \    ܂łɂǂȎނ̕\B

          !    VFɔB

          #    gR}hsBȏォ番悤 NetHack ̍ 
               ׂ͂Ă̕gʂĂ܂̂ŁA܂pɂɎg
               ȂR}h͂̂悤ɂēꂽBǂ̊gR}h
               gp\́AQ[̃RpCɂǂ̋@\Lɂꂽ
               ɂB

          #adjust
               ̖ژ^LύX( ffiixxiinnvv IvVuIv̎ 
               ɕ֗ł)B

          #chat
               NƘbB

          #conduct
               ǂ̒킪܂Ă邩\Bڂ͌qu
               vCv̏͂QƂ邱ƁB

          #dip ɐZB

          #enhance
               ̋Zʂ߂Aׂ肷B

          #force
               JB

          #invoke
               ʂȔ\͂𔭓B

          #jump
               ʂ̏ꏊփWvB

          #loot
               Ȃ̂΂ɂ鏰ɒuĂ锠⊓A܂͂Ȃ  
               Ăn̈Ƃ̒g𒲂ׂB



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              14



          #monster
               (̎pɕωĂ鎞)̓\͂gB

          #name
               ╨̎ނɖOtB

          #offer
               _ɂɂB

          #pray
               _ɋFď߂B

          #quit
               Q[Z[uɃvOIB

          #ride
               ɏ(邢͏̂߂)B

          #rub v΂B

          #sit B

          #turn
               s̉ǂB

          #twoweapon
               񓁗퓬̃IEIt؂ւB񓁗ɓK؂ȕg
               ƁBȂΎIɃItɂȂB

          #untrap
               (㩁AA)㩂͂B

          #version
               ̃o[W NetHack RpCƂ̃IvV 
               \B

          #wipe
               @B

          #?   wvj[: p\ȊgR}ḧꗗ\B

               Ȃ̃L[{[hɃ^L[ (ʂ̃L[ƈꏏɉƂ
          ẴL[`^'[ 8A܂`']rbgZbg)
           ΁AR}h̓^L[ƈꏏɉƂɂđ̊g
          R}hN邱ƂłB NT, OS/2,  PC  NetHack    
          'Alt' L[̖ړIɎg.

          M-?  #? (ΉĂȂvbgz[)

          M-2  #twoweapon (number_pad It̏ꍇ)

          M-a  #adjust




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              15



          M-c  #chat

          M-d  #dip

          M-e  #enhance

          M-f  #force

          M-i  #invoke

          M-j  #jump

          M-l  #loot

          M-m  #monster

          M-n  #name

          M-o  #offer

          M-p  #pray

          M-q  #quit

          M-r  #rub

          M-s  #sit

          M-t  #turn

          M-u  #untrap

          M-v  #version

          M-w  #wipe

               nnuummbbeerr__ppaadd  IvVÎƂ́Aɉ
          R}hLɂȂB

          h    wvj[: ``?'' ƓlɃwvj[\B

          j    ʂ̏ꏊփWvBu#jumpvuM-jvƓB

          k    (ʏ͔)RB'^D' ƓB

          l    Ȃ̂΂ɂ鏰ɒuĂ锠⊓A܂͂Ȃ  
               Ăn̈Ƃ̒g𒲂ׂBu#lootvuM-lvƓB

          N    ╨̎ނɖOtBu#namevuM-nvƓB

          u     㩁A A   Ȃǂ̎d|ꂽ㩂͂Bu#untrapv
               uM-uvƓB




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              16



          55..  ƒʘHH

               A̕ʘH͖肪Ă邱Ƃ邵AĂ
           ƂB̂Ă镔Ŏ̎ɓ镔͉ʂ
          \BÂƂł͎ 1 ̋ԂBǂʘH
          ͉ʂɕ\ꂽ܂܂ɂȂB

               B ʘH͕\ȂB `s'(search: T) R}h
          Ŕ邱ƂłB

          55..11..  oo

               o͕ƒʘHڑ̂łBo̒ɂ͔̂
           ̂B̂Ƃɂ͂̂܂ܒʂ蔲邱ƂłB̑
          ̏oɂ͔邪A̔͊JĂ邩AĂ邩A 
                   ꂩłBĂJɂ
          `o'(open: J) R}hpBĂ       
          `c'(close: ) R}hpB

               ɏĂƂ `a'(apply: p) R}h
          ŏ͂gA`^D'(kick: R) R}hŔRj邱
          ƂŒʂ邱ƂłB

               JɎ΂߂邱Ƃ͂łȂB邢͐
          ^ɋߕtȂ΂ȂȂB̂Ȃoɂ͂̂悤 
          ͂ȂB

               ͉ߏôɖɗBẲ͔J邱
          ƂłȂBǂ̉ɂƂĂ͔JKv 
          Ȃ(: S͔ʂ蔲邱Ƃł)B

               B ͕\ȂB `s'(search: T) R}h
          邱ƂłBxƕʂ̔ƓlɂȂB

          55..22..   ((``^^''))

               `҂ׂ悤Ƃ㩂ÂɂB
           ΗɗƏôɐ^[̊Ԃ̏ꂩ瓮Ȃ
          Ȃł낤BɒN𓥂ݓĈ邩A`s'(search:
          T ) R}hŌ邩ď߂㩂͕\B㩂̉a
          HɂȂ邱ƂB͔ɗLȖhpłBÓTIR 
          s[ ^Q[łuqɔԁvɂʂȃ_Wւ̕
          ꓹ݂B̃_Wł̖ړI͑𗎂ɓ邱 
           BTdɐǂ݂΁ASĂ̊K͑qɔԂ̓`̃[ŃN
          AłBsl܂Ă܂`҂̂߂ɂ̏M p
          ӂĂ邪A͉^ቺĂ܂B

          55..33..  KKii ((``<<'',, ``>>''))

                ʓIɓÅeKɂ́AO̊Kւ̏Ki('<')ƁÅK
          ̉Ki('>')ЂƂBAOBႦ΁AA
           rI󂢊KłȂ͓̉KiK𔭌邾낤B
          ЂƂ͓ȂłAЂƂ̓m[̍BƂĒm 
          n тɑĂB̍B͍Ōɂ͍s~܂ɂȂĂāA


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              17



          T(Ȃ邱ƂIꍇ)A̓Aɂ 
          ߂ėKvB

               KigA邢͑̊KɈړ㩂Ɉ|ꍇA
          ܂܂łK͔񊈐āAfBXÑt@Cɒ   
          B ̖KꂽKɍĂіKꂽꍇAfBXÑt@Cǂݍ܂
          čĊB߂ĖKKɈړꍇÅK(قƂ
           K͈ꂩAuʂȁvK̓ev[gAúvK(q)
          ꍇ̓t@Cǂݍ) Vɍ쐬B݂͌̊K 
          ̂sB̊Kɂ͎̂~܂ĂB

               ʁAȂKigƁAȂ͖ړInőΉKȉ
          ɌBAybg(q)Ƃ̉͂ȂKi 
           ~肵ɂĂāAẌ̂ȂƓւ邱
          ƂBȂꍇAybg₻̑̉KȉɌ A
          Ȃ͂̂΂ɌB

          55..44..  ͂ ((``<<'',, ``>>''))

               ͂͊KiƓڂłAKq̓̎ނ̓Q[
          قƂǋʂłȂB

          55..55..  XXƔ

               XhÂ΂ɓX傪āAɂ̕uĂ镔
          ɍs邱ƂDEāA`p'R}hgƂŕ
          ƂłDEOɁȀɗ``#chat''R}hg
           ƂŒlimFłDxOɕgƎ؋ɂȂA
          X͍x܂ł͓X̊OɏoĂȂȂD

               X̒ɂƂɕ𗎂ƂŕXɔ邱ƂłD
           pi񎦂A邩ǂmF邩APɓX傪
          ȂƂm炳(ʓIɁAXŔĂ镨Ɠނ̕
          Ώۂł)B

               RŕX̒ɗĂ܂ƁAX͕ʑ㏞ȂɏL
          咣D߂߂ɂ͔߂KvD

               X͎sɂȂ邱ƂBȂꍇA𔄂낤
           ƌ̑ɐMp݂ĂBMp݂͕𔃂
          Ɏg邪AXłLłB̓X͈󂯂ȂB  (
           {ŁuNWbgJ[hvɓ邱Ƃ邪AXŎg
          ƂĂ͂ȂBX͎󂯓ȂB)

               `$'R}hgƁA^ł݂̐(΂  
          Ă̂͏)ƂƂɁAMp݂Ε\B
          `Iu'R}h͖̕(܂XL镨)̈ꗗ()\ 
          B `Ix'R}h͎gĂ܂̑̈ꗗ()\
          B

          55..55..11..  XX̓Ȑ

               X̂͈̐ӊOȂ̂ȂB



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              18



          * ACe̒li͐FXȗvfɂėlXɕωB

          * X̓hÄ̏ꏊ͓X̊OƂĈB

          * X͂Ȃ̂悤ɒӐ[Ă邪AʓIɂ 
            ̏҂ɂĂ͖B

          *  X"closed for inventory"(uÎߕXv)̏ꍇA҂Ă
            ĂJX͂ȂB

          * X͗Ⴆi͊ĂVACeׂ邱Ƃ͂ȂB


          66..  

               ʏɂ͂Ȃ猩\ȂAЂƂ
           ƈł̒ŉƂ΂o킷ƂɂȂ邩Ȃ̂Œ
          KvłB@̃ACe̒ɂ́AȂ𔭌 
          OɂȂ𔭌̂ɖ𗧂(̔\͂ɑ
          ϗDĂB)

               `/' R}h `;' R}hʏɕ\Ă 
          𓾂̂ɗpB `C' R}h͉ɖO
          ɗpẢ鎞ɁA𑼂̂̂ƌ 
           ɕ֗łBOƂăXy[Xw肷ƁAȑOɂ
          OƂɂȂB

               gR}hu#chatvɂāAאڂƌ𗬂łB 
          ۂ̑䎌͑IłȂ(ƁAȂׂ邩͑I
          Ȃ)AX Oracle of Delphi(ft@C̐_a)Ƃ 
          b邱Ƃ́ALvȌʂ炷B


          66..11..  퓬

               Ɛ킢Ƃɂ́APɂ̉ɌĈړ
          悤ɂ΂悢B̉͂Ȃ킢𒧂܂ȂA 
           ƂCɂ邱Ƃ͂ȂB𗧂ĂƑϊ댯ȉBuO
          \ZvɂvƂƂ킴YꂸɁB

               Ȃ(A܂͂ȂڂȂ)ꍇA
          ƂȂvʒu`I'̕\B̋
          ƂƁAĂ鎞Ɠ悤ɂȂ͉ɍU 
           BAړĂ܂ĂAȂ̍U
          ͋؂邱ƂɂȂBłɈړĂ܂Ă   l
          A 킢Ȃꍇ́A `m'R}hgƂŐ키ƂȂړ
          łBtɁAɉ邩ǂ킩ȂǂƂɂ 
          Čꍇ́A `F'R}hgB

          66..22..  yybbgg

                Ȃ͎e(`d')AqL(`f')A|j[(`u')̂ꂩƂƂ
          Q[n߂BȂ̃ybg͂ȂƂƂɓA܂悢A 
             Bybg͂ȂƓlɐ̂т邽߂̐HKvƂ


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              19



          Bybg͐VNȎ₻̑̓ɂĂByb g
           ƂCłAybg炵ĂƎv
          AȂڂ^邱ƂłB̂߂ɂ͐H yb
          g ɌēĂ΂悢BƌPꂽybg͂
          󋵂̂Ƃŋɂ߂ėplB

               ybg|ĂɂČoςłB܂Ԃ
           ɐA̗͂⑊ɗ^_[WB߂̂
          ͂Ȃybg̕낤Ax̒ႢLN ^
          ɂƂĂ͖ɗ낤B

               Ȃ̊KֈړƂAׂɃybgAĂ΃ybg
          ȂɂĈړBuɂƖ쐶Ă܂ 
           ȂBlɁAȂ̈ʒuς悤㩂ɂ
          ꍇ (Ⴆ΁AgbvhAŉ̊Kɗꍇ)Aׂɂybg
           ĂAׂɂȂybg͎cBybgł
          ̂悤㩂ɂ邱ƂBȂ͂Ƃ̎Ƀybg̗ 
          ĂꏏɈړ邱Ƃ͂ȂB

          66..33..  RRnn

               _  Wɂ邠̐́AȂƔ\͂
          Ă΁A邱ƂłB쐶̐ɂȂ邱Ƃ [
           ͍̂łB̓A̎͋͊֌Włグ
          ɖ@̗͂ɗȂ΂ȂȂBAUȂ̎x z
           ɒuȂA `#ride'R}hŏ~肷邱ƂłB
          ɏēAړ@́Agړ̂Ɠł B
          n}ɕ\̂͂ȂĂ铮łB

               nZp`#enhance'R}hŊǗ邱ƂłBڂ
          q镐̋Zp̏͂QƂ邱ƁB

          66..44..  [[̊KK

               `҂̗HƂ̎(邢͂͐܂ςÔ 
          gł邱Ƃ)Ȁiɏo킷ȂBH
          EƂ͓Â낭قƂǃ_[W󂯂Ȃ 
           Pɓ邱ƂłBȂ͎񂾖`҂̏iD
          łB͎Ă邱ƂBȑO̖`҂ 
           炵߂̂ɂׂ͂Ēӂ𕥂˂΂ȂȂB͂
          pjA̒ȌɐĂ邩炾B


          77..  

               A̒ŉꍇAEƎv̂͂悭
          邱ƂłB NetHack ł͂̏̕ʂ邱ƂɂĎIɏE
          Ƃł( aauuttooppiicckkuupp IvV(q)ItɂȂĂƂ
          `m'   v  tBbNX (Oq)pĈړƂ͂̌ł͂
          )A܂ `,' R}hgĎ蓮ŏEƂłB

               Ƃɂ́ANetHack ͂Ȃɂ̂悤ɍA
          ȏEƂ͂łȂȂBłȂ NetHack ͂̕
          Ȃ̉וɉAE\B


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              20



               ɘAāAו̏ddȂBǂꂾ̏d
           ^ׂ邩͋ؗ͂Ƒϋv͂ɂB͂قǁAו̏d̉e
          ͏ȂBłAA̒Ăו d
           ȂɕSɂȂƂB͓݂ȂAJ[
          ȂĂ葽̐HKvƂȂBčŏIIɂ͉וd 
          ĉ̂ĂȂƓȂȂĂ܂B

               NetHack ł͉ו̏dǂꂭ炢e^邩Ă
          Bŉsɕ\    `Burdened',  `Stressed',  `Strained',
          `Overtaxed',`Overloaded' ̕\Ȃ̏ԂĂB

               EƂA̕ɂ͖ژ^L蓖ĂBɊւ
          鑽̃R}h͂Ȃǂ̕ĝq˂ĂB 
          ̂̕IԂ悤 NetHack q˂ĂƂ́Aʖژ^L
          ̈ꗗ\Ă̒I(Oq̃R}h̍Q  
          )B

               ̕AႦΕނ̂悤ȕ́AǂȂ̂ȒPɋ
          ʂtB̑̕AႦΊ␅͂̎ނɉ 
          낢ȖOtĂB 1 ̃Q[̊Ԃ͓O
          ͓ނ̕łBɕt閼O̓Q[Ƃ 
          ̂ɂȂB

               ̂悤ȕgǍʂ炩ȏꍇ NetHack
          ꂪł邩ĂĂB̌ʂ܂薾炩 
           ꍇ͂̎̕ނƖt邩q˂ĂB̂ߌɂȂ
          ĂvoƂłB܂ł``#name''R}hg
           l̂ƂłAނׂ̕ĂɖOtX̕
          OtłBłɖOĂ̂``#name''g
           AVOƂăXy[Xw肷邱ƂɂāAȑO
          OƂłB

          77..11..  Əjj

               Ȃ낢ȕ́AƂꂪɗ  
           ƂĂ􂢂Ă邩mȂB􂢂
          镨gƂꂪtĂ܂Ƃ͍ł悭錋 
           B􂢂Ă镐Ƃ͎ɒtĂ܂
          ĎȂȂB􂢂Ă镨gɂƕʂ̕@ 
           ͂ƂłȂBɁA􂢂Ă镐h
          ͕Kƌ킯ł͂ȂĂ̏ꍇ̖͂^   
          āA łȂ퓬̌͂B̑̎􂢂
          Ă镨́A܂ɗȂ܂͂̑̓_ŊQy 
          肷邾낤B

               ܂jĂ镨BjĂ镨͎􂢂
          ĂȂʂ̕ɔׂċǂɗBႦΏjꂽ 
          ͈Ɉw̃_[W^邱Ƃł邾낤B

                @ gƕɎ􂢂􂢂肷邱Ƃł
          B̂߂ƂtĂ܂ĂA􂢂Ă͂ 
           łBm͐􂢂jɕqȂ̂ŁA̐EƂ̖`҂
          eՂɎĂ̂邱ƂłB



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              21



               Ȃ̖̎ژ^̒Ŏ􂢂Ă邩ǂ
           ͖ژ^̂Ȃœɉ̐ȂBǂȏԂɂ邩mĂ
          镨͖ژ^ꗗŁucursed(ꂽ)vuuncursed(Ă )v
          ublessed(jꂽ)vȂǂ̌t̐ɗ^B

          77..22..   ((``))''))

               |̖{ɏZނقƂǂׂẲ́A`XƌΌ
          ȂȂEƂ邾낤B̐g(ɉEĂ
          ܂)߂ɂȂ͕KvƂBȂł̓|Cgɂ 1
          ` 2 ̃_[W (炩̉Z邩mȂ)^邱 
           łȂBAAN͗OłBN͕gčU
          fōUyɑ傫ȃ_[W^邱Ƃ 
          B

               ɂ͒Ȗ⌕̂悤ȐU񂷂߂̂̂ƁA⑄̂悤
          邽߂̂̂BŉɑŌ^邽߂ɂ́A 
           ɂĉU邩ɓȂ΂ȂȂB
          ɂ́APɑ𓊂悤ɑI邾ł悢B| 
           ˂ɂ́A܂|ɎĂ𓊂΂悢BNX{E
           crossbow bolt(NX{Ep̑)𔭎˂邽߂̂̂ł B
          Ί͊(΂̂悤)̑̐΂𓊂邽߂ɗpB

                ͂̂镐ɂ́uǉ\́v(U\͂ƌƂŐƕ
          蓾)tĂAUɓ\Ɨ^
          _ [WɒǉB̖͂𑪒肷ɂ́AȂ炩̕@
          @gĊӒ肷邵ȂB͎̕K̂悤Ȃ   _
          [W󂯂₷B̂悤ȁuHv_[W͏C\łB

               U  ܂ɖ邩ƁAɂǂꂭ炢̃_
          [W^邩́A̗vfɂČ肳Bɂ͈ 
           ̂: ̎ށA̕i(͂╅H)AoxA
          ́AqAו̏dAZ(q)B̖hl(ʓIȖh䗦B
          h𒅂邱ƂɂƂ͌Ȃ)vf̈łB܂A
          ̕ɑ΂ēɑϐB

               ͕̕Ў莝ł邪A肪KvȕB莝
           ̕Ə𓯎ɎƂ͂łȂBЎ莝̕Ă
          ꍇAЂƂ̕\ƂďĂāA `x'R} h
           gĂ镐ƌ邱ƂłBɁu񓁗퓬vZ
          \̋ZʂꍇA̕𓯎  g       B
          `#twoweapon' gR}hœ񓁗퓬邩ǂ؂ւ
          Bꕔ̃LN^[(ႦΖؐl)̋Z\Ă B
           Ƃ̋Z\ĂĂAxɓ̕gƂЂƂ
          gȂɔׂēGɖmɃyieB󂯂B

               S̕Ȃ邩ȂB邽
           ɂ́ÂIԎ`-'IԂA邢`A'R}h
          ̑̐gɂĂ̂ÔƓɌݎgĂ镐 O
          ƂłB

               AD&D vCƂ̂ǎ҂͂Ct낤AAD&D ɓo
          ꂵ NetHack ɂĂɂ_[W ^ 
          B܂ǂmĂȂ( _a_k_l_y_s(ALX), _l_u_c_e_r_n _h_a_m_m_e_r(


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              22



          bcFn}[), _b_e_c_-_d_e_-_c_o_r_b_i_n(xbOEfERr) Ȃ) 
            AD&D ̒ǉ[ł _U_n_e_a_r_t_h_e_d _A_r_c_a_n_a ̕t^ŏڂ
          ĂB

               gR}h `w'(wield: )A `t'(throw:  
           )A  `f' (fire: 𔭎˂ЂƂ̕@), `Q'(quiver:
          )A `x' (exchange: )A`#twoweapon'A`#enhance'(
          q) łB

          77..22..11..  ̂邱ƂƔ˂邱

               `t' R}hgƂɂāAǂȕł邱Ƃł
          B̃R}hw肷ƁA镨q˂ĂB `?'   
          ƁA ̒œ̂ɌĂȕ̈ꗗ\A `*'
          ƁASĂ̎̈ꗗ\B𓊂邩w肵 
          A( ǂ̖ڕWɓ邩ł͂Ȃ)ǂ̕ɓ邩q˂B
          邱Ƃł鋗́Aɕ̎ނƋؗ͂ɂB͎œ 
           Ƃł邪A|ēyɉ܂ŔсAڕW
          ₷B

               `Q'R}hŗ\ߍD݂́u˕vIĂA `f'R} 
          h œ邱ƂɂāA鑀ȒPɂ邱ƂoB
          Ɠlɓ͐q˂邪A `f'R}hgтɉ 
             w肷Kv͂ȂB aauuttooqquuiivveerr IvVIɂ
          ƁA `Q'R}hŐݒ肵ȂȂɁA NetHack I
          ɑ̕ĂB

               ---  ---  xɕ̕𓊂邱ƂłLN^[
          Bxɕ̖𑕓U(邢͈xɕ̕)A 
           WɓĂ邱Ƃ͂₷dł͂ȂBW[͂̋Z\ɗD
          Ă邵AK؂ȕ̋Z\ (|Ė˂Ȃ|̋Z\A N
           X{DgȂNX{D̋Z\AXOĐ΂𓊂
          XŐZ\) ɂčx̋ZʂΑ̐EƂł 
          \ łBȂ̃ACe𓯎ɓ邱Ƃł邩
          ^[ωB `t'R}h`f'R}h̑Oɐw肷邱
             āA    鐔𖾎Iɐ邱ƂłBႦ
          ΁A``2f''( nnuummbbeerr__ppaadd IvVI̎ɂ``n2f'')Ǝw肷
          ƁA Ƃ 3 {ˉ\łő 2 {˂ȂBA
          ɔ˂ł鐔傫w肵ꍇ (̗    ``4f'')
          ́Aɐw肵ȂꍇƓlAۂɔˉ\Ȑ(
           3 {)˂ȂBUJnȂASẴACe 
          ͓ɔԁB 1 {ڂŉ|ȂAc͂̐܂
          łƂɂȂB

          77..22..22..  ̋ZZ

               pł镐̋Z\͂܂܂ɈقȂĂB̋Z( Z
          \)͂̕ǂꂭ炢܂邩ɉeBZ\̓Q[
          ʂČコ邱Ƃo邪A͐EƂox═ 
          ̎gp񐔂ɂB

               Z ʂ߂ɁA daggers A broadswords A polearms
          Ƃɂ̃O[vɕĂBꂼ̃O [
          v ŋZʃxǂ܂ō߂邱Ƃo邩͐EƖɌ܂Ă


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              23



          BႦΖ@g daggers  staves ɑ΂Ă͍xɒB
          邱Ƃo邪A swords  bows ɑ΂Ă͂ł͂ȂB

               `#enhance'gR}hŌ݂̕(Ǝ)̋Zʂ邱Ƃ
          łBɁAЂƂ܂͕̋Z\コ邱Ƃł 
           ȂAǂ̋Z\コ邩I邱ƂłBZ\̃
          N"none" (Z\コ邱           
          "restricted"(ꂽ) ƌĂ΂邱Ƃ)A "unskilled"(S
          ), "basic"(), "skilled"(n), "expert"(GLXp[g)
           B  ꂽZ\͒P`#enhance'R}hňꗗɕ\
          B (_̉ɂ肠̋Z\̐邱ƂB 
           ɂ͋Z\"unskilled"ƂȂAE"basic"܂łƂȂ) L
          N^[ɂẮAfł̐퓬 }[ V  A[ c  Z \ 
          ``master''( }X^[)``grand master''(Oh}X^[)ɂ܂Ō
          コ邱ƂłB

               Z\x"restricted""unskilled"̕gƁA 
           ▽ɗ^_[WɃyieBB "basic"
          ł̓yieB{[iXȂB "skilled"ł͖Ɨ^   _
          [Wɂ₩ȃ{[iXB "expert"ł̓{[iX͑傫
          BUƁAgĂ镐ɊւZ\(őɒB
           ȂȂ) コ邽߂̌Px𑝂₷`XB
          Px̃xɕKvȒlɒBƁA̋Z\ɂ莩M 
           悤ɊƂB̎_`#enhance'R}h
          gƂɂĂЂƂ܂͕̋Z\コ邱Ƃł B
          Z \͎Iɂ͌サȂBȂȂSĂ̋Z\x̍vɂ͐
          ̂ŁAǂ̋Z\コāAǂ𖳎邩߂K v
          邩łB

          77..33..  hh ((``[[''))

               ̔FDIȂ̂Aɂ͐łB̂
          ̍U䂪gɂ͖hKvłBh̒ɂ͑̎ 
           hhʂɗDꂽB Armor class(AC)(hl)
          ̖hʂ̎ړxłBhl (AC) AD&D ł̏ꍇƓ悤
          ] B 10 hȂ̏ԂƓAlقǗDꂽ
          hł邱ƂB AD&D ɑ݂Z͂ NetHack ɂ
          ĂhʂBȉ(sSł͂邪) e̊ZƂɋK
          肳hl̈ꗗB

                  dragon scale mail(hS̗؊Z)               1
                  plate mail(|S̊Z)                            3
                  crystal plate mail(̊Z)                    3
                  bronze plate mail(̊Z)                     4
                  splint mail(SЂ̊Z)                           4
                  banded mail(ы̊Z)                           4
                  dwarvish mithril-coat(h[t̃~X)     4
                  elven mithril-coat(Gt̃~X)          5
                  chain mail(т)                          5
                  orcish chain mail(I[N̍т)           6
                  scale mail(؂̊Z)                              6
                  studded leather armor(etZ)               7
                  ring mail(S̊Z)                             7



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              24



                  orcish ring mail(I[N̓S̊Z)              8
                  leather armor(Z)                             8
                  leather jacket(WPbg)                    9
                  no armor(ZȂ)                               10

               ɑ̖h(: ACA|AN[N) gɂAh l
          ̒l邱ƂłBeɓ镨 1 g
          ɂ邱Ƃ͂łȂ (Z͈ꎮAN[N 1 A 1 A |
           1 Ȃ)B

               h ɖ͂΂̖h̖hʂ͒ʏ̕ǂ(
          ͈)ȂĂAɕtĂu{Lv(邢́|L)
           hl̒lȂBႦ +1 т́Aʏ̍
          тhʂAhl 1 PʕȂ 4  
           BhgɂƒɖhlƁu{Lv̒lB
          ꂽh͒ʏ핉̖(|L)ĂA͂ 
          Ƃ͂łȂB

               ̊Z͎K̂悤Ȃ̃_[W󂯂₷B̂悤
          _[W͏C\łB@̂WhB

               Zg߂̃R}h `W'(wear: ht)  `T'(take
          off: h͂) łB `A'(remove all: SĂ͂)܂
          ̐gɂ̓lAh͂̂ɎgpłB

          77..44..  HH ((``%%''))

               ̂тɂ͐HsłDԐHɂȂ܂
           Ƃ₪č|AXɉ쎀ւ̓ǂ邱ƂɂȂBۑ
          uĂȂƏł܂AHׂɂ͕sqɂȂH   
          B ACX{bNXʂɓĂH͒ʏ͂܂ł܂Ȃ
          AACX{bNX͏dAʂ͊Ĵɏ΂莞ԂKv 
          B

               Eƒʏ͂̎̂c邪ÁuHvɂȂB
          ׂĂƌ킯ł͂Ȃ͐Hׂ邵Aɂ͐HׂƓ 
           ͂̂B傴ςɌ΁uĤׂɂȂvƂ
          ƂłB

               ؐH`̐EƂBؐH`̉͌ē̎
           HׂȂBؐH`̃vC[͓̎̂Hׂ邱Ƃ
          邪AȂ炩̂肪ȂpB

               ffuurriitt IvVɂĂȂ̍D̐HɂȂł̖O
           1 ݒ肷邱ƂłB


               HHׂ邽߂̃R}h `e' łB

          77..55..   ((``??''))

               ɂ͂낢ȕ\肪tĂ邪A͂炭
          ̖ptɒׂƂđI񂾂̂ł낤 (:``READ ME'' 
            ``THANX MAUD'' ̋tǂ݂Ƃ)B͓ǂނƏł(


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              25



          @̎̏ĂȂ͏łȂ)B

               ̒ōłpl̍̂_s_c_r_o_l_l _o_f _i_d_e_n_t_i_f_y_( 
          ̊_)łB͑̕ɂĂꂪł邩A􂢂
          Ă邩jĂ邩AƉ͂𔭊ł邩m 
          B ̂̒mȂ͂̒ɂ͂̊Ȃł͉ł邩
          Ӓ肵̂B

               Cf[ĂĂȂ_s_c_r_o_l_l _o_f _m_a_i_l_(莆̊_)
           nĂ邱Ƃ (̋@\LɂăRpCĂ
          o[W̏ꍇ)B NetHack ̃[zB@\̓VXẽ[ 
          {b NXɓdq[ĂꍇɋNB̋@\gp
          ɂ͊ϐ``MAIL''ɂȂ̃[{bNX̃t@C 
          肵 NetHack ɐV[Tꏊm点KvB܂
          ]ނȂΊϐ``MAILREADER''Ɏg[MvO 
          t@Cݒ肷邱ƂłB̂Ƃ NetHack 炻̃vO
          NĂ̊ǂނƂłB[Q[ɂ 
          ă_ɐo[W NetHack ł͂̊ϐ
          BCf[ mmaaiill IvVŃItɂłB

               ǂނ߂̃R}h `r' łB

          77..66..   ((``!!''))

               ͏тɓĂt̂̐FɂċʂB͈
          ނƏłĂ܂B

               Ȑ͐łB͂΂ΏjĂ􂢂
          Ă肵āAsȐɂȂ肷Bs̉ 
          ƂĐ͗LQȂ̂ŁAs̉ɓ(`t')ƗL
          Bɑ̕Z(``#dip'')̂ւLvłB

               ނ߂̃R}h `q'(quaff: ) łB

          77..77..   ((``//''))

               @̏͒ʏ퉽͂𔭊D̒ɂ͕̂
           ȀꍇUwȂĂ͂ȂȂB
          ɌĐU邱Ƃł(Ƃ `.'  `s' ͂)A 
           ͂΂΋ȍsׂƂȂB̑̏ɂ͕ȂAU
          q˂ĂȂB񂪌͂𔭊񐔂͏񂲂ƂɕsŁA 
          gxɂ̉񐔂 1 B

               ̖@̗ʂȂȂƁAʏ͏gpĂNȂB
          Ȃ玞܁AŌ̈ꈬ̖͂g񂩂 
           \łBƏ͉Ă܂B͓K؂Ȗ
          @ɂčď[U邱Ƃł邪AƏ񂪔Ă 
           \B\͍ŏ͔ɏAɉx
          ď[U邲Ƃɑ傫ȂB

               \sȂȍsׂł͂邪AǂɂȂȂȂƂɂ͏
           󂷂ƂB͎Cȍsׂł͂ȂBsƂ
          AjIȖ@̃GlM[邩łB



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              26



               SɊӒ肵ꍇÄꗗł͊ʂ̒ɒǉ
           񂪕\B͍ď[Uꂽ񐔁ARA݂̎gp\
          ȉ񐔂łB񂪖ꂽꍇɂ͎gp\ȉ񐔂 -1    
          B

               g߂̃R}h `z'(zap: U) łB󂷂ɂ
          `a' (apply: g)łB

          77..88..  ww ((``==''))

               wւ͑ϖɗłBƂ̂⊪̂悤
           ͂ߐɂȂ̂ƈႢAwւ̖͔͂rIPvI
          邩炾B

               wւ͂߂邱ƂɂĂ̖͔͂Bwւ̖͗
          w 1 Av 2 ͂߂邱Ƃ͂łȂB

               ܂Ă̎wւ͐gɂƕ̌ȂB
          ͎wւ̎ނɂĈقȂB

               wւg߂̃R}h `P'(put on: wւ   )   
          `R'(remove: wւ͂) łB

          77..99..  @@ ((``++''))

               @͋͂Ȗ@L傫Ȗ{łB`r'(read: ǂ) R
          }hŊwԂƎ̒mǂݎɓ](čŌɂ͓
          ߂ȂȂ)AȂ΂݂͕̎šʂɏIB􂢂
          ꂽ@m̋y΂Ȃ_̌Ñ㕶ŋLꂽ@ǂ 
          NԂɊQyԉ\I

                 Ƃ(wł鎞)ɂ͂t邱Ƃ
          BȂ̌oxł͉y΂ȂxȎ悤Ǝ 
           AΉ^CvɊւZ\ႩAЂǂĂ
          ƂɎ肷ƁÂɕKvȃGlM[ 
          ԂQɏIĂ܂ƂB

               邱Ƃ́A@̃GlM[ĂыNĂ𐸐_
          ̂̂ɏW邱ƂłBȂg̓o閂@ G
          l M[JAAĎƔĂ܂B
          ɂ͗KKvłBKĂ΁Aꂼ̎̈ Z
          \ ͌サĂBȂAԂoɂĂꂼ̎
          ɊւL͔AxwԕKvłĂ邾낤B

               ŵ̏ꍇAw肷Kv  
          B Ƃ`.'܂`s'w肷邱ƂŎgɑ΂Ď
          邱ƂłBA͂΂΋ȍsׂłBw 
          ̂Ȃ̏ꍇAw肷Kv͂ȂB

                 Knx̖ʂŃO[vĂ̂ƓlAO
          [vĂB̂ɐƁÃO[v 
          P ƂɂȂB\ȋZ\Ύ̌ʂ߁As̉
          \߂邱ƂłBZ\Xbg͕XLƋLB(``
          ̋Z''̍QƂ̂)


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              27



               @ɂ͎RɈړłȂ΂ȂȂB܂A
          ̎ނ̊Z𒅂ĂƖ@̂W邾낤B

               @ǂނ߂̃R}h͊ǂނƂƓ `r'(read:
          ǂ) łB `+' R}hɂAmĂƂ̃xC
          Cꗗ\B `Z'(cast: ) R}hɂ
          B

          77..1100..   ((``((''))

               ͂낢ȖړIɎgXGȕłBȂǂƓ
          Ɏgp񐔂ɐ̂镨BႦ΃v͂΂炭 R
           sĂ܂B̑̓̒ɂ͗e܂܂ĂAo
          ꂷ邱ƂłB

               g߂̃R}h `a'(apply: p) łB

          77..1100..11..  

               `̓rŊ┠Ђɏo킷Ƃł낤B
          ͒uĂꏊɗĂꍇɂ͊gR}hu#lootv  
          āA ܂ĂƂɂ `a'(apply: p) R}hŊJ
          邱ƂłBȂЂɂ͂΂ΏĂ A
           ͏dĉ^тɂ̂łBЂ͎ɎƂ͂łȂ
          Ȃ̂ŁA͂(`a'(apply: p) R}hŌ 
               g A `^D'R}hŏRƂ΂AgR}
          h``#force''ɂ蕐gĂJȂǂ̕@ɂ)ɂ͏
          uȂĂ͂ȂȂB

               Ђɂ㩂d|Ă̂A͂ӂ
          J肵ƂɕsȏoNBgR}h``#untrap''
          ă`FbN㩂ɂȂ悤݂邱ƂłB

          77..1111..   ((``""''))

                 ͎wւƑς悭ĂA΂΂Ƒ傫Ȍ͂
          ĂBwւƓ悤ɖɂ͂낢Ȗ@̓   
          A LvȂ̂LQȂ̂āAgɂ邱Ƃɂ͂
          B

               ͈ɂ邱ƂłȂB

               g߂̃R}h͎wւ̏ꍇƓ  `P'(put  on:
          wւ͂߂)  `R'(remove: wւ͂) łB

          77..1122..   ((``**''))

               ΂̒ɂ͉l̂̂AlŔB΂͍Y
          @ƂĂƂċɂ߂ČʓIȂłBl̂ 
          ΂EoɏĂΓ_ɉZB

               ̏Ȑ΂΂ɕނ邪Ảl͂قƂǂȂB
          ASĂ̐΂(XOĂȂ)eƂėL   
          B]Ɋׂœ邱Ƃ\łB


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              28



          77..1133..  傫Ȋ ((````''))

               ⋐΂͓ɗLpł͂ȂAʓIɏd̂łB
          Ƃ͈قȂƂ\łB

               ȃq[}mCh(l₻̒)͋΂𕐊Ƃėp
          ƂłB

          77..1144..   ((``$$''))

               ͓_ɉZA܂Xł͋ŕ𔃂ƂłB{
          ɂ͂Ȃ̎ɉe邩Ȃ̉(X
          ͕ʂƂ)B


          88..  vvCC

               P  NetHack ɏ邾ł͖łȂꕔ̃vC[
          ́AvCɐ݂邱Ƃɒ킵ĂB̒̈ꕔ 
          Q[ ɂĎIɋL^AQ[ł #conduct R}
          hŊmFłB܂Q[Iɂ\Bɔ 
           sƁA͂₻͕̒\ȂBl ̒ɏ
          邱ƂɂāAvC[͒ǉ``錠''   
          B ȂA̐ɏ]ƂȂQ[ɏ邱ƂS
          LłAŏɃQ[ɏƂ͕ʂ̒͊֌W 
          B

               ̂͐HוɊւ̂łBłȒ͐H
          Ȃ̒łB͐HȂłԐł邪A K
          v   B]āAݕɑ΂Ă͉̐ȂBႦh{
          ĂłB_ɋFċQ̂Ƃ͂ȂHוɊ 
          钧ɂᔽȂB

               ȍؐH`҂͓ꂽHוHׂȂB{I
          h{͉ʕƖ؂łBubu(`b')A[[(`j')A׋(`F')
           ؂Ƃ݂ȂBlԂ̐HɂgĂȂ̂B
          oXANAuHv(ۖ)Aj[VAb[V 
           B̐ɕωĂƂ́AȂǂ̕ʏłȂ
          ȍؐH`җp̐HƂĈBA 
          HȂ̒ɂ͔邱Ƃɒӂ邱ƁB

               ؐH`҂͓HׂȂBA̕YH
          邱Ƃ͌ȍؐH`҂قǂ͌ȂBĽȍؐH` 
          ĤׂɒǉāAubNvȊÕv(`P')AA
          ꂽHו (肢NbL[ƃpP[L)A瑢ꂽ
          Hו (N[pCƃLfB[o[)AC[[Hׂ邱
          ƂłBN͍ؐH`҂Ƃ݂ȂB

               Hׂ邱Ƃ͌ȍؐH`ҁAؐH`ҁAHȂ̒
           Bɂ͂قALȊỎ̎̂ʋlA{Ō
          邻̑̓̂܂܂ށBωɁuݍŏvU 
           ̂͂̉̎̂ĤׂƂ݂ȂBA؁Ałł
          ̂AłɕωĐHׂA}Cht 
          C [ɕωĔ]Hׂ邱Ƃ͓HׂƂ݂ȂBA


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              29



          X͓̕Ƃ݂ȂB

               Ɋւ炸As\ȕAHׂƊ댯Ȃ̂
          B ɑ΂āuݍŏvU邱Ƃ́Ả
          ̂ĤׂƂ݂ȂBuiȍؐH`(``vegan'')vƂ
          t ͐HוɊւ镶ł̂ݗp邱ƂɒӂĂقB
          ꂽ(A̗؁AApA)ggɂ 
           邱Ƃ͐ɈᔽȂB܂Au~NF́v͕sȔ
          Fł͂邪A܂ł킯ł͂Ȃ̂ŁAȍؐH` 
                  B X  ChvC[`
          ``fruits''́AႦuځvł낤u|[N`bvv 
          낤AȍؐH`҂̐ɈᔽȂB

               __҂͏@ے肷B܂A#pray(F), #offer(
          ), #turn (ŝ̂߂), mɑ΂ #chat(b)
           ͂łȂBꕔ̓ǎ҂̓NmŃvĈ̐
          ĂƎ咣邩ȂAł̓vC[̑I ]
          n cĂBCF_[̖_ɕ̂̓Q[ɏ
          邽߂ɕKvȂ̂Őɂ͔Ȃ̂ƂB܂A{_ m
           ₻̑̏@I݂bt𕷂Ăɂ͔ȂB^
          __҂͌t͕CɂȂʂȈӖoȂB

               قƂǂ̃vC[͕(邢͕Ƃđ邱 
          lĂ铹)ɐ키B̈͂̂悤ȕɂ
          g킸ɃQ[ɏ邱ƂłB𓊂A˂ A
          R 肷̂͋B܂AAA邢͂̑̃ACe
          gAfrŐ키ƂB

               NetHack ɂāAa`҂͑̉EĂ͂ȂȂ( 
          ƁA̎ɂČol𓾂Ă͂ȂȂ)B͓ɓ
          ł邪A̎iɂČol𓾂邱Ƃ͉\łB

               ӎ҂͓ǂݏłȂBɂ͈ȉ̍sׂ܂܂B
          ǂށA@ǂށA肢NbL[̃bZ[WǂށATVc
          ̕ǂށAA``x''ꕶ(ӎ҂̓`IȃTC)
          O ̕ށBł镶ǂނƂƁAQ[ɏ邽
          ɐ΂ɕKvȃACeǂނƂ͐ɂ͔Ȃ   B
          Q[ JnɎĂ銪Ɩ@̓emĂ邱Ƃ
          ю̒ḿAQ[JnȑOɋt狳̂Ƃ݂ȂA 
          ɂ͔Ȃ̂ƂB

               ̑ɂׂ̍Q[ƂċL^钧킪B
          ͋sE邱Ƃ\łBɃvĈ 
           B  sE@^ꂽƂA ``none''(܂``
          '')ƓƁAsEȂ܂܂ɂ邱ƂłBȂ̓ACe
          𓯂O[v̑̃ACeɕω (``polypiling'')A
          ̏EEŎ̑̂𑼂̐ɕς(``polyself'') 
          B ̌ʂpȂƂ͂ꂼ꒧Ƃ݂ȂBŌɁA
          Ȃ͂Ƃǂ肢ȂĂ炤ƂBȂ̃ACe 
          킸ɃvĈ͈̒łAȂ(Ƃ
          łƂĂ)ŃvĈ̒łBACe肤
          @ ^ꂽƂA ``nothing''܂``Ȃ''ƓƁA
          Ȃ܂܂ɂ邱ƂłB



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              30



          99..  IIvvVV

               lɂ͂ꂼꂢ낢ȍD݂ NetHack ̗Vѕ 
           قȂĂ̂ŁANetHack ̐U镑ύX邽ߐݒłI
          vVB

          99..11..  IIvvVV̐ݒ

               IvVݒ肷@ɂ͂BQ[ `O'  R
          } hgƂɂđSẴIvV邱ƂłÂ
          ƂǂύXłB܂Aϐ``NETHACKOPTIONS''ݒt@ C
           ŎIɐݒ肷邱ƂłBNetHack ̃o[WɂĂ
          Q[JnOɃIvVݒ肷邱ƂłvO 
          邱ƂB

          99..22..  ϐ NNEETTHHAACCKKOOPPTTIIOONNSS gg

               ϐ NETHACKOPTIONS ɂ͂낢ȃIvV̏lJ
          }ŋ؂ė񋓂ݒ肷BIvV̂̂̂ 
          P ɃIIt̑Ił邾łB̃IvVXg
          ɓƃIɂȂAIvV̑O `!' ``no''ƃI
          t ɂȂB̑̃IvVł͐ݒlƂĕ񂪕KvłB
          ̃IvVݒ肷ɂ̓IvVAR܂̓C R[
           LAݒl̏œ͂΂悢Bݒl͎̃J}͕
          ̍Ō܂łƂȂB

               Ⴆ``autoquiver''I A``autopickup''  I tA  O
          ``Blue  Meanie'' ɁAt[c``papaya''ɂȂ悤Ɋϐ
          ݒ肷ɂ _c_s_h ł͎̃R}h͂΂悢B (!͓ꕶ 
          Ȃ̂ŃGXP[vĂKv邱Ƃɒ)

               % sseetteennvv NNEETTHHAACCKKOOPPTTIIOONNSS ""aauuttooqquuiivveerr,,\\!!aauuttooppiicckkuupp,,nnaammee::BBlluuee MMeeaanniiee,,ffrruuiitt::ppaappaayyaa""

          sshh ܂ kksshh ł

               $ NNEETTHHAACCKKOOPPTTIIOONNSS==""aauuttooqquuiivveerr,,!!aauuttooppiicckkuupp,,nnaammee::BBlluuee MMeeaanniiee,,ffrruuiitt::ppaappaayyaa""
               $ eexxppoorrtt NNEETTHHAACCKKOOPPTTIIOONNSS

          Ƃ΂悢B

          99..33..  ݒtt@@CCgg

                t@C̒`#'Ŏn܂s̓RgƂĈB
          t@C̒``OPTION=''Ŏn܂s͊ϐ``NETHACKOPTIONS''
              @  I v V   L q Ă̂ƌȂB
          ``DUNGEON=''A``EFFECTS=''A``MONSTERS=''A``OBJECTS=''A``TRAPS=''A``BOULDER=''
          Ŏn܂s͂ꂼ dduunnggeeoonn A eeffffeeccttss A mmoonnsstteerrss A oobbjjeeccttss A
          ttrraappss A bboouullddeerr
           IvVƂĈ邪A̎w@́AݎgĂtH
           ĝɎgLN^R[h 10 i̗łB
          ̗ 0 w肷ƁA̍ڂ͕ύXȂB̋@\ I v
          V̕@ł͗płȂB̗͊es̍Ō`\'邱
          ɂĕsɓn邱ƂłB



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              31



               RpC AUTOPICKUP_EXCEPTIONS IvVݒ肳 
           ƁA ``AUTOPICKUP_EXCEPTION=''Ŏn܂sɂ ppiicckkuupp__ttyyppee
          IvV̗O`łB

               Wݒ̐ݒt@C OS ɂĈ   A   
          ``NETHACKOPTIONS''  i擪`@'t邱ƂŁjgpݒ
          t@Cw肷邱ƂłB

          99..44..  JJXX^^}}CCYYIIvvVV

               ȉɂ낢ȃIvV̖B܂ɒ
           ͖̕Bȉ̃IvV̂ɂĂ͖
          ƂȂĂIvVB

          align
            X^[g̑(align:lawful, align:neutral,  align:chaotic)B
             ̈ꕶŎw肷邱ƂłBWݒł̓_ɑI
            B `O' R}hŐݒ肷邱Ƃ͂łȂB

          autodig
            @邽߂̓ɂĂāA@邱Ƃłn`Ɉړ 
            ƂƂAIɌ@iWݒ̓ItjB

          autopickup
             ɂ̂IɏEiWݒ̓IjB̐U镑
            JX^}CY邽߂ɂ ppiicckkuupp__ttyyppeess QƂ邱ƁB

          autoquiver
            ̃IvV͖̎`f'(fire:̒ɂ̂𔭎
             ) R}hsɂǂ邩߂BIȂAR
            s[^[͓KȕɓB̎A􂢁A j A 
            @A  A ̐Ȃǂ͍lȂ̂Œӂ邱ƁB
            `Q'R}hgĎ̍DȕɓB镐킪
            ȂÃIvVIt̎͑`t'(throw:𓊂)
            R}hsB (Wݒ̓It)

          boulder
            \̂ɗpLN^iWݒ͊\L N
            ^jB

          catname
            X^[g̔L̖O(: catname:Morris)B `O' R}hŐݒ肷
            邱Ƃ͂łȂB

          character
            LN^[̃^ C v     ( :``character:Monk'')B
            ``role'' IvVƓłBEƂݒ肷邻̑̕@ɂ
            Ă``name''IvVQƂ̂ƁB ``random''ȊO̕
            ŏ 1 ŔʂB

          checkpoint
            v ONbVɕł悤ɊKړ閈
            ԂZ[uiWݒ̓IjB



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              32



          color
            FXȉ╨⓴A̒n`J[ŕ\ (} C N  R 
            s[^ł͕Wݒ̓I)B

          checkspace
            t@CޑOɃfBXN̋󂫗eʂ`FbN(Wݒ
            ̓I)BZ[ut@C⃌xt@Ĉ߂Ɏgp[eBV
            2GBȏ̋󂫗eʂꍇÃIvVItȂ
            ΂ȂȂȂB̃IvV̓RpCMFLOPPY
            `ĂƂ̂ݓKpB

          cmdassist
             肪ȃ~XoƂɐVKvC[̂߂ɒǉ̃R}
            h⏕bZ[W\(Wݒ̓I)B

          confirm
            ybgAXȂ̍UĂȂU悤Ƃ 
            ɊmF(Wݒ̓I)B

          DECgraphics
             A  \ɗp镶ȂgłׂĒ`ɁA
            DEC VT-xxx/DEC Rainbow/ANSI rZbg炠炩ߗp 
             ݒgp(Wݒ̓It)B̃IvV͂܂^[~
            iK؂ȃOtBbNLN^[悤ݒ肷B 
             AȂŃOtBbN㏑ݒ肷Ƃɂ
            ȂĂ͂ȂB

          disclose
            Q[Iɕ\𐧌䂷(Wݒ́ASĂ\  
            )Bݒł͈̂ȉ̒ʂB

                 i - ̊Ӓ
                 a - ̌J
                 v - ގ̈ꗗ
                 g - E
                 c - 

             ꂼ̕\ɑ΂āȂOɂǂ̂悤ɐUw镶
            邱ƂłB̈Ӗ͈ȉ̂ƂB

                 y - mF邪AWݒ̓CGXɂB
                 n - mF邪AWݒ̓m[ɂB
                 + - mFȂɕ\B
                 - - mFȂŔ\ƂB

            (: ``disclose:yi na +v -g -c'') ̂悤ɐݒ肵ꍇA 
              m F  (Wݒ̓CGX)B ͊mF(Wݒ
            m[)B ގ͊mFȂɕ\B EE͊mF
            ɔ\ƂB ͊mFɔ\ƂBގ
            ꗗ㩂⓯mɂĎ񂾉܂ނƂɒӁB

          dogname
            X^[ǧ̖O(: dogname:Fang)B `O' R}hŐݒ肷
            Ƃ͂łȂB


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              33



          dungeon
             { \   ߂̃OtBbNV{ݒ肷 (Wݒ
            `` |--------||.-|++##.##<><>_|\\#{}.}..## #}'') dduunnggeeoonn   I v
            V  ͕Wݒ̑̕ɒn}`̂Ɏgp 1 
            41 ̕BWݒ̑̕ɂŐݒ肵
             gēA̒n}\AWݒ͎̕gȂB
            Ȃ̃VFʈ镶gȂÃL N
            ^GXP[vKv邩ȂƂɒӁB

            ̃IvVŐݒ肳镶́A݂ł͒ʏ C Ŏg
            ŃGXP[v邱ƂɒӂȂĂ͂   B
            `\'    ͂̂̂̕̕ƂĎ舵Aʂȃv
            tBbNXƂĂ͈ȂƂƂłB] āA`\'   
            `\\' ƂKvBȃGXP[v`ł `\m' ͌
            ̃^rbgIɂA

            V{͈ȉ̏łFA(c)A()A pA
            E̊pÅpAE̊p, ǂ̌AT ̕ǁAt T 
            ǁA T̕, E T ̕ǁÂȂoAJ
             (c)AJ(), (c)A()AS̖_A
            ؁ȀAÂʘHA邢ʘH, ւ̊KiAւ̊KiA 
             ̂͂Aւ̂͂AՒdA, ʍAAA܂
            ܂͖xAXAnA~Ă钵ˋ(c)A~Ă    (
            )AオĂ钵ˋ(c)AオĂ钵ˋ()ACA_A
            

            lp̕\𓾂邽߂ɂ͊p T ̕ǂ '+'  g
             悢mȂB̃[Xł͐VV{
            Â݂̂č\\̂ŒӁB

            `O' R}hŐݒ肷邱Ƃ͂łȂB

          effects
            ʕ\̂߂̃OtBbNV{ݒ    ( W   
            ``|-\\/*!)(0#@*/-\\||\\-//-\\| |\\-/'').   eeffffeeccttss IvV
            ͕Wݒ̑̕ɒn}`̂Ɏgp 1-29  
            B̕ dduunnggeeoonn IvVƓlɏB

            V{͈ȉ̏łF(c)A()A(ォE
            )A(Eォ獶)A@AJ̃tbVAu[
            ()Au[(E)A@hɗp 4 ̋LAݍ܂
             ƂɎg 8 ̋LAɗp 9 ̋LB 3
            LN^ 3 񂩂ȂA̒S͂ 3 ~ 3 ̔z̒S
            ȂB

             ̃[Xł͐VV{Â݂̂č\
            \̂ŒӁB

            `O' R}hŐݒ肷邱Ƃ͂łȂB

          extmenu
            gR}hC^[tF[XALȃR}ḧꗗj[ 
            o悤ɕύXBL[͂́AŌ Enter KvȂ
            ƈȊO͓`IȃC^[tF[Xƌ݊B tty C  ^[


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              34



            tF[XɂĂB(Wݒ̓It)

          female
            ``gender:female'' ̌ÂʖB `O' R}hŐݒ肷邱Ƃ͂ł
            ȂB

          fixinv
            ̖ژ^LƕƂ̑Ή͂̕ɒuĂωȂ(W
            ݒ̓I)BItɂƂ͕ɒuƂ̖̕ژ^Lȍ~
            ̋LƕƂ̑Ή 1 B

          fruit
            Ȃ̍D̉ʕɂȂł̖Oݒ肷( :fruit:mango)
            (Wݒ́uslime moldv)B NetHack ŎXgÎ
            IȖȌtłB slime mold(lolo)ƐH~
              Hוɂׂł낤B apples(S)Aoranges(I
            W)A pears(mȂ)A bananas(oii)A melons (   )   
            NetHack ɂ݂͂Ă̂ŁAݒ肵Ă͂ȂȂB

          gender
            Jn̐(gender:male ܂ gender:female).  ŏ̈ꕶ
            w肷邱ƂłB ``male''  ``female'' IvVw 
             ĂĂA ``gender'' IvVD悳BWݒł͓K
            ؂Ȑʂ_ɑIB `O' R}hŐݒ肷邱Ƃ͂
            ȂB

          help
            `/'   R }hgĒׂĂ镨ɂĉ炩̏񂪂
            A邩ǂq˂(Wݒ̓I)Bwvo 
             ɂ ``More info?'' Ƃvvgɔς킳ȂȂ
            ̂ŁAf𒲂ׂ邱ƂłB͋[dv 
            Ă܂mȂƂӖB

          hilite_pet
            yb g𓯎̓王oIɋʂ(Wݒ̓It)BeLX
            gEBhE\ł color It̂Ƃɋ\B X̃^C
            gpƂ́An[g̋LybgɂB

          horsename
            J n̔n̖O (:``horsename:Trigger'').  `O' R}
            hŐݒ肷邱Ƃ͂łȂB

          IBMgraphics
            AAʁA㩂̕\ɗp镶ȂgłׂĒ` 
             ɁA IBM g ASCII Zbg炠炩ߗpӂꂽݒ
            gp (Wݒ̓It)B̃IvV͂܂^[~iK
             ȃOtBbNLN^[悤ݒ肷BȂ킿A
            Ȃ̃OtBbNŏ㏑ݒ肷Ƃɂ 
            Ă͂ȂB

          ignintr
            u[N܂ފ荞ݐM𖳎(Wݒ̓It)B




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              35



          legacy
            Q[JnɐbZ[W\(Wݒ̓I)B

          lit_corridor
             ڂ₠Ȃ̃LN^ĂɂČʘH\
             (Wݒ̓It)B

          lootabc
            JƂ`o', `i', `b'ł͂Ȃ`a', `b', `c'̃L[g 
            (Wݒ̓It)B

          mail
            Q[Ƀ[zB悤ɂ(Wݒ̓I)B

          male
            ``gender:male'' ̌ÂȂʖB `O' R}hŐݒ肷邱Ƃ
            łȂB

          menustyle
            낢ȃIuWFNgw肷Ƃ(Ƃ DropR}h)ɗp
            C^tF[X̐Bl tradional, combination, partial,
            full  4 ̃^Cv̍ŏ̈ꕶw肷B ``tradional'' 
              o[ WŗBꗘpł̂ŁA̎ނ̓
            ́AɑI񂾎ނɓĂ͂܂SĂ̕  m F  B
            ``combination''͑I̎ނ͂邪A
            Ă͂܂镨mFőÎł͂ȂAj[` 
            I B ``partial''͕̎ނIԂƂAɑSĂ
            \ꂽj[\B ``full''͕̎ނ̕
             ɁAŏɕ̎ނ̃j[\AꂩI
            ނɓĂ͂܂镨̃j[\B

          menu_deselect_all
            j[̑SĂ̍ڂIɂL[B Amiga, Gem, X11, tty
            ĂB(Wݒ `-')

          menu_deselect_page
             j[   A ݕ\ĂSĂ̍ڂIɂ
            L[B Amiga, Gem, tty ŎĂB(Wݒ `\')

          menu_first_page
            j[̍ŏ̃y[WֈړL[B Amiga, Gem, tty Ŏ
            ĂB(Wݒ `^')

          menu_headings
             j[  ڂĂ镔ǂ̂悤ɕ\邩w肷
            Bl 'bold'(), 'inverse'(]), 'underline'()̂
            ꂩłB.  SẴ|[gŎۂɎOSẴ^Cv\ł
            킯ł͂ȂB

          menu_invert_all
            j[̑SĂ̍ڂ̑IԂ𔽓]L[B Amiga, Gem, X11,
            tty ŎĂB(Wݒ `@')




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              36



          menu_invert_page
             j[  ݂̃y[W̑SĂ̍ڂ̑IԂ𔽓]L[B
            Amiga, Gem, tty ŎĂB(Wݒ `~')

          menu_last_page
            j[̍Ō̃y[WֈړL[B Amiga, Gem, tty Ŏ
            ĂB(Wݒ '|')

          menu_next_page
            j[̎̃y[WֈړL[B Amiga, Gem, tty Ŏ
            ĂB(Wݒ `>')

          menu_previous_page
            j[̑Õy[WֈړL[B Amiga, Gem, tty Ŏ
            ĂB(Wݒ `<')

          menu_search
             j[ŌsL[B Amiga, Gem, X11 ŎĂB(
            Wݒ `:')

          menu_select_all
            j[̑SĂ̍ڂIɂL[B Amiga, Gem, X11, tty  
            ĂB(Wݒ `.')

          menu_select_page
             j[̂Aݕ\ĂSĂ̍ڂIɂL[B
            Amiga, Gem, tty ŎĂB(Wݒ `,')

          monsters
            ̎ނ\̂ɎgpLN^w肷B (W 
                     ``abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTU-
            VWXYZ@ '&;:~]'').  ̕ dduunnggeeoonn IvVƓlɏ 
            BV{̏́A ant or other insect(a邢͂̑
            ̍), blob(ubu), cockatrice(RJgX), dog  or  other
            canine( ܂͂̑̃CkȂ̓), eye or sphere(ڂ܂͋
            ), feline(L), gremlin(O), humanoid(l ),  imp  or
            minor demon(Cv܂͒ዉ), jelly([[), kobold(R{
            h), leprechaun(vR[), mimic(~~bN), nymph(j t),
            orc( I[ N),  piercer(  h), quadruped(l),
            rodent(l), arachnid or centipede(܂̓Jf), trapper or
            lurker above(gbp[܂͓Vɐނ), horse or unicorn(
            n܂̓jR[), vortex(Q), worm([), xan or other
            mythical/fantastic  insect( U   ͂̑̕svcȍ),
            light(Cg), zruty(YeB), angelic being(Vĝ   
            ),  bat  or  bird( R E܂͒), centaur(P^EX),
            dragon(), elemental(G^), fungus or mold(J r  R
            P),  gnome( m[ ),  giant  humanoid(  ^ l), invisible
            monster(Ȃ), jabberwock(Wo[EHb N),  Keystone
            Kop(L[Xg[Rbv), lich(b`), mummy(~C), naga(i[
            K), ogre(I[K), pudding or ooze(XC), quantum mechanic(
             q͊w), rust monster(K̉), snake(), troll(g[),
            umber hulk(Ao[nN), vampire(opCA),  wraith(  C
            X),  xorn(][), apelike creature(̂悤Ȑ), zombie(
            ]r), human(l), ghost(H), golem(S[ ),  demon( 


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              37



            ), sea monster(C̉), lizard(gJQ), long worm tail(
            O[̐K), mimic(~~bN) `O' R}hŐݒ肷邱Ƃ͂
            ȂB

          msghistory
             ^P ŌĂяo߂ɕۑĂŏs̃bZ[W̐(W
            ݒ 20)B `O' R}hŐݒ肷邱Ƃ͂łȂB

          msg_window
            ߋ̃bZ[W̕\@ύX(_ł tty ɂ̂ݎ 
            Ă)Bwłl͈ȉ̂ƂB

                 s - `single': 1 bZ[W (WݒB 3.4.0 ȑOł̐U镑ł)
                 c - `conbination': ŏ 2 bZ[W `single'Ǎ `full'B
                 f - `full': SʁBÂbZ[WB
                 r - SʁBVbZ[WB

             Ƃ̌݊̂߂ɁAlȂɂł(`full'Ƃ݂Ȃ)A
            ł(`single'Ƃ݂Ȃ)B

          name
            Ȃ̃LN^̖Oݒ肷(Wݒ͂Ȃ [ U[
            )B  -LƃLN^̐EƂ̓t(܂ --AA --BB
            --CC --HH --KK --MM --PP --RRaa --RRoo --SS --TT --VV --WW ̂ǂꂩɕt) 
             ĐEƂݒ肷邱ƂłBEƂƂ --@@ gpƁA
            _ȂЂƂIɑIB `O' R}hŐݒ肷邱
            Ƃ͂łȂB

          news
            NetHack  ̃j[Xt@C΂ǂ(Wݒ̓I)B
            j[X̓Q[̍ŏɕ\̂ŁA `O' R}hł
            肷͖̂ӖłB

          null
            [ɃpfBÔ߂̃iLN^𑗂(Wݒ̓It)B

          number_pad
            ړ̂߂[yuhjklbn]̂ɐL[gp(Wݒ 0
            ܂̓It)B (number_pad:2 ͐̂ DOS ł̐U镑ɂB `5'
            `g'Ameta-`5'`G'Ameta-`0'`I'ƂȂB)

          objects
                 \      gݒ肷 (Wݒ
            ``])[="(%!?+/$*`0_.'')  ̕ dduunnggeeoonn IvVƓl
             BV{̏Ԃ́iƂȂ悤ȁjȕ
            ́AAhAwցAAHAHAAA@ A
            A݁A΂܂͐΁A΂܂͒ASAAŉtB `O' R
            }hŐݒ肷邱Ƃ͂łȂB

          packorder
            ̎ނ\      w   ( W    
            ``")[%?+!=/(*`0_'').   ̃IvVɂ͂낢ȕ̎ނ\
            ̗ݒ肷Bݒ肳Ȃނ͈ȑȌōŌ 
            \B


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              38



          perm_invent
              I Ȃ΁A݂̎ꗗɃEBhEɕ\Ă
            B̋@\ĂEBhEVXeł̂ݗLB

          pettype
            vCLN^NX̃^Cṽybggpł 
             ̃ybgw肷A܂͏̃ybgSw肵ȂB
            wô``cat'', ``dog'', ``none'' łB `O' R} h
            Őݒ肷邱Ƃ͂łȂB

          pickup_burden
             EɂŎw肵ו̏dx (Unburdened, Bur-
            dened, streSsed, straiNed, overTaxed, overLoaded) ȏ   
            ƁAs邩ǂmFB (Wݒ `S').

          pickup_types
            aauuttooppiicckkuupp   IvVݒ肳Ă鎞ɏE̎ނw肷
            (Wݒ͑SĂ̎)BIRpCIvV   
            AUTOPICKUP_EXCEPTIONS w肳ĂƁA aauuttooppiicckkuupp__eexxcceeppttiioonn
            sgƂ aauuttooppiicckkuupp ̐U镑ׂłB

          prayconfirm
            _ɋFOɊmF(Wݒ̓I)B

          preload_tiles
            MSDOS̃veNg[hŁA^CQ[̎n߂ɂ炩 RAM
               łǂ𐧌䂷BIɂƁA^CO
            tBbÑptH[}X܂邪A葽̃gp(
            Wݒ̓I)B `O' R}hŐݒ肷邱Ƃ͂łȂB

          pushweapon
            ɕĂ鎞 `w' (wield: ) R}hg
            ƂAɎĂ\̕ɐݒ肷(Wݒ  I
            t)B

          race
             I(: ``race:human'')BWݒ̓_łB
            `O' R}hŐݒ肷邱Ƃ͂łȂB

          rest_on_space
            Xy[XL[ `.'(rest: xe) R}hƂĎgp (W
            ݒ̓It)B

          role
            L  N ^[  ^ C v  ݒ肷 (:``role:Samurai'')B
            ``character''IvVƓłBEƂݒ肷邻̑̕@
            ɂĂ``name''IvVQƂ̂ƁBʂ͐擪 1 
                          A   `r'         O      
            B``Rogue''A``Ranger''A``random''邩łB

          runmode
            u܂Ƃ߂Ĉړv(shift+control+ňړ邩As
            R}h}EX̃NbNgꍇ) Ƃɂǂꂭ炢̕p x
            Œn}XV邩𐧌䂷Bݒ\Ȓl͈ȉ̒ʂB


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              39



                 teleport - ړĂn}XVB
                 run - 7 炢ɒn}XVB
                 walk - 1 ɒn}XVB
                 crawl - ``walk'' ƓlAɂ΂炭~B

             ̃IvV͉ʕ\ɂ̂݉eAۂ̈ړʂɂ͉e
            ȂBWݒ `run' łBo[W 3.4.1 ȑO   `tele-
            port'  ݂̂łBʂmFł邩ǂ͎gĂł[
            ̎ނɈˑB

          safe_pet
            ybg(ybgƒm)UĂ܂̂h(Wݒ  I
            )B

          scores
             ɃXRAXĝǂ̕邩𐧌䂷 (F``scores:5
            top scores/4 around my score/own scores'')Bꂼ̕ 
            ̕ (`t', `a', `o')݂̂KvłB

          showexp
            ŉsɌ݂̌o_\(Wݒ̓It)B

          showrace
             Ȃ\ƂɁAEƂɑΉ}[Nł͂ȂA푰ɑ
            }[Nŕ\(Wݒ̓It)B̐ݒ͕\ɂ p
            AQ[ƂĂ͉ςȂƂɒӁB

          showscore
            ŉsɌ݂̃XRA\(Wݒ̓It)B

          silent
            [̃r[v炳Ȃ(Wݒ̓I)B

          sortpack
             ̖ژ^\Ƃޖɉו̓eבւ (W
            ̓I)B

          sound
            Ȃ̃LN^[̂Ɋւ郁bZ[W\(W
            ݒ̓I)B̓Rs[^[̉o͋@\Ƃ͉̊֌W
            ȂƂɒӂ邱ƁB̃IvV͕IɂvC [
             䉺ɂBႦ΁AĂԂ͂̃IvV͎I
            ItɂAڊo߂ƃIɂȂB

          sparkle
            (₠Ȃ)U󂯁AɒRꍇɉʌʂ\ 
             (Wݒ̓I)B

          standout
            ``----MMoorree----''𑾎ŕ\(Wݒ̓It)B

          suppress_alert
            O ̃o[WύXꂽ@\ɑ΂Ēӂ𑣂bZ[W
            \Ȃ悤ɂ NetHack ̃o[W   B  ( :


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              40



            ``suppress_alert:3.3.1'') ̂悤Ɏw肷 3.3.1 ȑOɕύX
            ꂽ@\ɑ΂钍ӃbZ[W͕\ȂB

          time
            ŉsɃQ[Ōo߂Ԃ^[ŕ\(Wݒ  I
            t)B

          timed_delay
             ╨̂̈ړȂǁAʂ\邽߂ɂƎԑ҂
            ƂAȃLN^ʂɑ邩Ƀ^C}[gp B
            (tty  C^tF[Xɂ̂ݓKpB X11 C^tF[X͏
            ^C}[gpBWݒ̓^C}[ɂ鎞ԑ҂gݍ 
            ĂȂ΃I)

          tombstone
            񂾂Ƃ΂\(Wݒ̓I)B

          toptenwin
            Q[I̕\Wo͂̂NetHack̃EBhEɕ\
             (Wݒ̓It)B̃IvVݒ肷ƃEBhEg
            o[W NetHack ł͋NeEBhEƂ͕ʂ̃EBh
            EɃXRAXg\BAXRAXg̓Q[ I
            ƃ^[~iEBhEɂ͎cȂB

          traps
            㩂̎ނ\̂ɎgpLN^w肷B(Wݒ
            ``^^^^^^^^^^^^^^^^^"^^^^'').  ttrraappss IvV͕Wݒ̕ 
            ̑㩂`̂Ɏgp 1  22 ̕B
            ̕ dungeon IvVƓB    
            dduunnggeeoonn IvVƓlɏB

            V  {̏́A arrow trap(), dart trap(),
            falling rock trap(◎), squeaky board(  ),  bear
            trap( F), land mine(n), rolling boulder trap(),
            sleeping gas trap(KX), rust trap(  H  ),  fire
            trap(   ),  pit( ), spiked pit(gQ炯̗),
            hole(), trap door(), teleportation trap(uԈړ ),
            level teleporter(ʂ̊Kւ̏uԈړ), magic portal(@̓
            ), web(̑), statue trap(), magic trap(  @ 
            ),  anti-magic  field( @Ԃ), polymorph trap(ω
            )B

            `O' R}hŐݒ肷邱Ƃ͂łȂB

          travel
            gxR}hLɂ(Wݒ̓I)B̃IvV 
            I tɂ邱ƂɂāAn}EBhENbN邱
            ƂɂāA]܂Ȃړ悤Ƃ邱ƂhƂłB

          verbose
            Q[̃Rgڍׂɕ\(Wݒ̓I)B

          windowtype
            EChEVXegp邩ǂuttyv܂́uX11v I


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              41



            iWݒ̓o[WɂjB `O' R}hŐݒ肷邱
            Ƃ͂łȂB

          99..55..  EECChhEEVVXXeeŐppJJXX^^}}CCYYIIvvVV

               ȉ͂ȂIEBhD^Cv̓JX^}CY
           ύX邽߂ɗplXȃIvV̐łB镶
          ͓Kɐ؂l߂BSẴEBhD^Cvɑ΂Ă S
           ̃IvVLƂ킯ł͂ȂB̃IvVݒ
          ꂽƂAEBhD^Cv̐ݒ󂯕tȂA 
            B 󂯕tȂȂAPɖB݂̃EB
          hD^CvőΉĂIvV́AIvVꗗ\ (`O') 
          \Bꕔ̃IvV`O'R}hœIɕύXłB

          align_message
            bZ[WEBhEǂɒu(top, bottom, left, right)

          align_status
            Xe[^XEBhEǂɒu(top, bottom, left, right)

          ascii_map
            \ȂASCIILN^}bv\

          color
            ÁAA̍\vfJ[ŕ\

          eight_bit_tty
            8 rbgLN^(Ⴆ ttrraappss IvVŎw肵)
            ܂܃^[~iɕ\(Wݒ̓It)B

          font_map
            }bvEBhE\tHg

          font_menu
            j[\tHg

          font_message
            bZ[W\tHg

          font_status
            Xe[^X\tHg

          font_text
            eLXg\tHg

          font_size_map
            }bvEBhE\tHgTCY

          font_size_menu
            j[EBhE\tHgTCY

          font_size_message
            bZ[WEBhE\tHgTCY



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              42



          font_size_status
            Xe[^XEBhE\tHgTCY

          font_size_text
            eLXgEBhE\tHgTCY

          fullscreen
            EBhEłȂʑŜŕ\悤Ǝ݂

          hilite_pet
            ybgڗ悤ɕ\(Wݒ̓It)B̃IvV 
            U 镑͎gĂEBhEVXeɈˑBeLXgEB
            hȄꍇAPx]ɗpB^C̏ꍇA 
            Iɂ̓ybg̋߂Ƀn[g}[N\B

          large_font
            傫tHggB

          map_mode
            w肳ꂽ@Ń}bv\B

          mouse_support
            ͂ƈړɃ}EXg悤ɂB

          player_selection
            LN^[IɃ_CAO{bNXmFʂp

          popup_dialog
            ͎Ƀ|bvAbv_CAO{bNXp

          preload_tiles
            ^ C    ɗ\ߓǂݍłBႦ΁AveNg[
            hMSDOSł̏ꍇAQ[JnɃ^C RAM ɗ\ߓǂݍނ 
             𐧌䂷B\ߓǂݍނƃ^COtBbN̐\͌シ
            邪A葽̃ (Wݒ̓I)B `O' R} 
            hŐݒ肷邱Ƃ͂łȂB

          scroll_amount
            scroll_margin  IvVŎw肳ꂽʒuɗƂɁAǂꂾ
            ̐XN[邩w肷B

          scroll_margin
            EBhE̒[炱Ŏw肳ꂽ}XɂȂ܂̓J[\ 
            ړƂɁAʂXN[B

          softkeyboard

          splash_screen
            NɃXvbVXN[\(Wݒ̓I)

          tiled_map
            \Ȃ^C}bv\




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              43



          tile_file
            Wݒ㏑ʂ̃^Ct@C̖O

          tile_height
            ^C\łł̃^C̍

          tile_width
            ^C\łł̃^C̕

          use_inverse
            Q[w肵Ƃɉʂ𔽓]

          vary_msgcount
            bZ[WEBhEɈxɕ\郁bZ[W̐

          windowcolors
            \ȂEBhEw肵OiF/wiFŕ\

          wraptext

          99..66..  vvbbggttHH[[ŗLL̐ݒIIvvVV

               ȉ͓̃vbgtH[ŃJX^}CYU镑̕ύX
          邽߂ɗpIvV̐łB

          altkeyhandler
            L[͂ DLL I(Win32 tty NetHack ̂)B DLL  
             ÓA.dll ̊gqpXŎw肷B `O' R}hŐݒ
            邱Ƃ͂łȂB

          altmeta
            (Wݒ̓IB AMIGA NetHack ̂)B

          BIOS
            ɉʂAړɃJ[\L[g悤ɃL[ {[
            h ǂނ߂ɁA IBM-PC ݊ BIOS ROM gpĂ}V
            BIOS R[gpB (Wݒ̓ItBOS/2 , PC,    ST
            NetHack ̂)

          flush
            (Wݒ̓ItB AMIGA NetHack ̂)B

          MACgraphics
            (Wݒ̓IB Mac NetHack ̂)B

          page_wait
            (Wݒ̓IB Mac NetHack ̂)B

          rawio
            raw(cbreak łȂ) [hgpāA荂ȏo͂Ɩ̋N
            Ȃ͂ (MS-DOS ł̓v^Ȃɂ    
            `^P'  v^o͂̃gOƂ݂ȂĂ܂Ƃ) (W
            ̓It)B: DEC Rainbow ł͂ꂪÎƂ̓nOAbv
            Ă܂B `O' R}hŐݒ肷邱Ƃ͂łȂB


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              44



          soundcard
            (Wݒ̓IB PC NetHack ̂)B `O' R}hŐݒ肷邱
            ͂łȂB

          subkeyvalue
            (Win32 tty NetHack ̂)BۃL[{[h̖␳̂ 
            邽߂ɁA OS  NetHack ɕԂL[͂̒lύX邽߂Ɏg
            pB OPTIONS=subkeyvalue:171/92 ƂƁAƂ 171 
            悤ƂĂꍇA NetHack  92 ԂBKvȂA
            subkeyvalue sݒt@CɏĂ悢B `O' R}hŐݒ
            邱Ƃ͂łȂB

          video
            g prfI[hݒ肷(PC NetHack ̂)Bl `autode-
            tect', `default', `vga' ̂ꂩłB `vga' (    VGA
            n[hEFAƂ`autodetect')ɐݒ肷ƁA\Ƀ^C
            pB `O' R}hŐݒ肷邱Ƃ͂łȂB

          videocolors
            NO_TERMgpĂPCVXẽJ[pbgZbg (W
            ݒ́u4-2-6-1-5-3-15-12-10-14-9-13-11v)(PC NetHack ̂)B
            V{̏Ԃ́AԁE΁EFEE}[^EVAEP E
            PԁEP΁EFEPEP}[^EPVAB `O' R
            }hŐݒ肷邱Ƃ͂łȂB

          videoshades
            3 iK̗p\ȃOCXP[ݒ肷 (Wݒ   ``dark
            normal  light''  PC  Nethack̂)BQ[ʂɂꍇ
            ́AR̃XP[𒲐Ă݂邱ƁBł܂   
            A!colorĂ݂邱ƁB `O' R}hŐݒ肷邱Ƃ
            łȂB

          99..77..  EEOO̐ݒ

               IRpCIvVƂ AUTOPICKUP_EXCEPTIONS  
           B  ̃IvV`ăRpCꂽoCȉꍇA
          aauuttooppiicckkuupp IvV̐U镑 ppiicckkuupp__ttyyppeess IvVg
          邱ƂłB

               aauuttooppiicckkuupp__eexxcceeppttiioonn  sݒt@CɏƂŁAE
          ƂƂɃ`FbNׂp^[`łB

          autopickup_exception
            ppiicckkuupp__ttyyppeess IvV̗Oݒ肷B  aauuttooppiicckkuupp__eexxcceeppttiioonn
            I v V ͂Ȃ̈ʒuɂ镨̂̐̒P`Ɉvp
            ^[w肷B 1-80 ̕łׂłB

               p^[ł͈ȉ̓ꕶgB

                 *--- 0 ȏ̕Ƀ}b`B
                 ?--- Cӂ 1 Ƀ}b`B

               ɁAp^[̐擪ɒuꍇɓʈ镶
          B


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              45



               < - ȉ̃p^[Ɉv镨̂͏ɏEB
               > - ȉ̃p^[Ɉv镨̂͌ďEȂB

               `O' IvVŐݒ肷邱Ƃł邪Aݒ̓Z[uE[h
          Ƃɂ͕ۑȂB

               ȉ autopickup_exceptions ̗łB


          L̗̍ŏ̂̂́ASĂ̖IɏEBԖڂ̗́A 
           ͎E̗OƂBṒ̗AĂƂ킩Ă
          ͎̂E̗OƂB `ďEȂ'[` E '
          [ɗD悷B

          99..88..  ̐ݒ

               bZ[WEBhEɕ\ꂽbZ[W[U[`̃p
          ^[ƈvƂɓ̉t@C炷Ƃ   v
          bgtH[B݂̂ƂAQt, win32tty, win32gui [
          U[ɑΉĂB

               [U[ƃbZ[W̊֘AtɊւݒt@Cڂ
          ȉ̂ƂłB

          SOUNDDIR
            t@ĈfBNg

          SOUND
             t@Cƃ[U[w肷郁bZ[Wp^[֘At
            ځBe SOUND ڂ͈ȉ̍ڂɕB

                 MESG       - bZ[WEBhEw (3.4 ł͂ɑΉĂ)
                 pattern    - }b`p^[
                 sound file - 炷t@C
                 volume     - t@C炷Ƃ̉

               p^[̐mȏ̓vbgtH[ ``K\'' p
             NetHack ̓p^[}b`O@\p邩ɂĕς
          B ``K\'' }b`O NetHack p^[}b`O
           Ă邪AT[hp[eBCuKvȃvbgtH[
          B ``K\'' Ɋւ͂ǂ̂ƂQƂ 
          ƁB ǂ̃p^[}b`OpĂ邩 #version R}
          hŊmFłB

               NetHack ̓p^[}b`O[`͈ȉ̓ꕶp
          B

                 *--- 0 ȏ̕Ƀ}b`B
                 ?--- Cӂ 1 Ƀ}b`B

               ȉ NetHack p^[}b`O@\płB

                   SOUND=MESG "*chime of a cash register*" "gong.wav" 50



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              46



              "chime of a cash register" ܂ރbZ[Wɔ
          "gong.wav" 炷Bݒt@Cɂ͕ SOUND ݒ 
          łB

          99..99..  ooQQ҂NNeettHHaacckkvvCC邽߂̐ݒ

               NetHack  ͓A̒n}̂ɕW ASCII LN^[
          g悤ɐݒ肷邱ƂłB   A  MS-DOS    
          NetHack  ͉܂͓_ZppΖڂ̕sRȐlłS
          ɃvC\łBvC[͂̉ʓǂݎVXe 
           \ȒmKvŁA㉺EɈꕶړ@m
          ΂ȂȂ낤BʓǂݎVXě\͂m邱 
           Ȃ艿lBvCOɂ̃KChubN\ɓǂ߂΁A
          ʂ̃CAEgǂȊ킩邾낤B܂A PC J[\ 
            u ˂~߂邱ƂłKvB͎̃LN
          ^[̈ʒuĂB `@'͑̃q[}mCh\킷̂ɂ p
          ̂ŁÄʒuT̂`@'邾ł͕s\ł
          BɁAȂĂʒu PC J[\̈ʒu̕I s
           m点@\Kv낤B̋@\̓XN[Ŝɂǂ̂
          ȃACe邩𔻕ʂ̂ɕ֗łB

               ꂽ[U[Ȃ ddeeffaauullttss..nnhhC邱Ƃ͓Ȃ
          AS҂͏Ђł܂dȂB NetHack ̑S
          ̌zzɂ NNHHAAcccceessss..nnhhƂt@ C        B
          ddeeffaauulltt..nnhh t@C̃t@CƓւ邱ƂɂAڂ̕s
          RȐlvCł悤ȐݒɂȂBt@CC   
          Q[ ̂̂ɊꂽȂAD݂ɍ悤ɐݒύX
          ƎvƂ낤B̂߂̐ NNHHAAcccceessss..nnhh ̂̂Ɋ܂܂
           BQ[̃ANZVreBɍłe^ݒ͈ȉ̂
          ł:

          IBMgraphics
            ̃IvVRgAEg邱Ƃɂ IBM OtBbN
            𖳌ɂB

          menustyle:traditional
            ͉VXe𗘗p鏕ɂȂB

          number_pad
             ̔vO number-pad ʂ̊mFɗpB̏
            A number_pad IvVItɂāA`I Rogue R}
            hgƁB

          Character graphics
            ddeeffaauullttss..nnhh  t@C̉̕ɂSẴLN^[OtBb
            NݒRgAEgB̂قƂǂ NNeettHHaacckk ̕W
             A W ASCII LN^[pA̕\gLN
            ^[ZbĝÂLN^[ŒuB̃L 
            N^[͉ʓǂݎVXeς킹邾낤B

          1100..  __

               NetHack ͐ݒɂāAȂ̋@Bɂ鍂_̈ꗗ܂
          ͍_҂̈ꗗ쐬B҂̐ݒɂȂĂꍇAQ[ 


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              47



           ܂ŏIꍇ̃}V 1 ̃AJEgɂ 1 
          ̈ꗗɂ͍ڂȂBȂ̈ꗗɍڂĂ鑼 N
           荂_ƂA͂Ȃ̑O̓_荂_
          Ƃɂ̂݁Äꗗׂ̂ʒuɂȂ̖ O  
          B_܂ōڂ邩RpCɐݒłB

               _͎ɌolA험iABKƃQ[̏IɊ
          ĂBQ[ꍇɂ͎ĂSzɂĒE o
           B|̖{̒ŎEꂽꍇɂ́AS[
          ƎĂ 90% Mhɓ`(`҂͖S[ 
          ꍇɂ͎萔邱ƂmĂ)B]ĉɂɈ
          ĉ^ΐcƂ邩AĂ̎_Ŏ 
           ŏI邩͂Ȃ߂邱ƂłBꍇׂ͂
          ̋ɂ邱ƂłBĐc΂ɑ 
          邱Ƃł邩mȂB

               PɌ_ł̍_ҁE_̈ꗗꍇɂ͂قƂ
          ̃o[Wł nneetthhaacckk --ss aallll Ɠ͂΂悢B


          1111..  TT[[hh

               NetHack ͕GœQ[łBS҂͐c邷ׂm
           ȂƂɋCÂA|ɂÂĂ܂ȂB
          邱Ƃ͂ȂB`铴AɁuTv́uv[h 
           ꍇɂ́A_̈ꗗɍڂȂƂƂɑȂfb
          gƈւɑÕZ[ut@CcĂsgƂȂꂽ 
          ̂łB

               T [hɓɂ 2 ʂ̕@B1 ̓Q[̊Jn
           --XX XCb`t邱ƂłB 1 ̓Q[̃vC
          `X'  R}h͂邱ƂłBT[hœ鑼̗_
          _ȓǎҏNm߂ė~B


          1122..  NNWWbbgg

               ŏ hack ƂQ[́Ao[NC UNIX ̃Q[ _r_o_g_u_e
           fƂĂB̃hLg̑啔 Michael C. Toy 
          Kenneth C. R. C. Arnold ̎ɂȂ _A _G_u_i_d_e  _t_o  _t_h_e  _D_u_n_g_e_o_n_s  _o_f
          _D_o_o_m_(^̓Aւ̏_) }Xp̂łB܂ꕔ
           Ken Arromdee ɂ _F_u_r_t_h_e_r _E_x_p_l_o_r_a_t_i_o_n  _o_f  _t_h_e  _D_u_n_g_e_o_n_s  _o_f
          _D_o_o_m_(^̓A̐[ւ̒T_) ̂ĂB

               NetHack ͕ǂ艽\l̐lX̎ɂĊꂽB
          ̓Q[̊J̉ߒł̎ȏołB


               JJaayy FFeennllaassoonn  KKeennnnyy WWooooddllaanndd, MMiikkee TThhoommee, JJoonn PPaayynnee ̏
          𓾂āAŏ Hack B

               AAnnddrriieess BBrroouuwweerr ̓vO啝ɏ Hack Ƃ
          ȂقȂQ[ɎdďグA UNIX }Vp(Ȃ  )3
          o[W(1.0.1A1.0.2A1.0.3) Usenet Ŕ\B


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              48



               DDoonn  GG..  KKnneelllleerr  Hack 1.0.3  Microsoft C gp MS-
          DOS ֈڐA PC HACK 1.01e 쐬Bo[W 1.03g ł  DEC
          Rainbow   ̃OtBbNT|[gAďȂƂ 4 
          o[W(3.0A3.2A 3.51A3.6)쐬B

               RR.. BBllaacckk  PC HACK 3.51  Lattice C   g p    Atari
          520/1040ST ֈڐA ST Hack 1.03 쐬B

               MMiikkee  SStteepphheennssoonn ͂̂낢ȃo[WĂ 1 
          A̒ǉvfƍ킹 NetHack o[W 1.4 쐬 
          Bɔނ͉l̐lXɍƂ𕪒S NetHack 1.4 ̊g
          fobOsA NetHack o[W 2.2  2.3 𔭕\B

               ɂ̌AMike  KKeenn AArrrroommddeeee, JJeeaann--CChhrriissttoopphhee  CCoolllleett,
          SStteevvee  CCrreeppss, EErriicc HHeennddrriicckkssoonnAIIzzcchhaakk MMiilllleerrAJJoohhnn RRuupplleeyyA MMiikkee
          TThhrreeeeppooiinnttAJJaanneett WWaallzz ܂ރ`[𗦂ăQ[̑啝ȏ
          sȂA NetHack 3.0c 쐬B

               NetHack  3.0  EErriicc RR.. SSmmiitthh ɂ Atari ցA TTiimmoo HHaakkuu--
          lliinneenn ɂ OS/2 ցA DDaavviidd GGeennttzzeell ɂ VMS ֈ A  
          B  3 l KKeevviinn DDaarrccyy ͂̌͊J`[ɉA 3.0
          ̂̌̂̉ł쐬B

               OOllaaff SSeeiibbeerrtt  NetHack 2.3  3.0  Amiga   A  B
          NNoorrmm MMeelluucchhAASStteepphheenn SSppaacckkmmaannAAPPiieerrrree MMaarrttiinneeaauu  PPCC NNeettHHaacckk 33..00
          ̂߂̃II[[oo[[CC[[``݌vvBB JJoohhnnnnyy LLeeee     NNeettHHaacckk
          33..00  MMaacciinnttoosshh ֈڐAABBނ͑̂܂܂ȓAA̎傽Ƃ
           PPCCAAMMaacciinnttoosshhAAAAmmiiggaa ̈ڐAAł̊ggAA 33..00 ̂̌̂
          ̉ł쐬BB

               MMiikkee SStteepphheennssoonn[_[ƂAIIzzcchhaakk MMiilllleerrJJaanneett WWaallzz̏
          ɂ KKeenn AArrrroommddeeee,  DDaavviidd  CCoohhrrss,  JJeeaann--CChhrriissttoopphhee  CCoolllleett,
          KKeevviinn DDaarrccyy, MMaatttt DDaayy, TTiimmoo HHaakkuulliinneenn, SStteevvee LLiinnhhaarrtt, DDeeaann LLuuiicckk,
          PPaatt RRaannkkiinn, EErriicc RRaayymmoonndd, EErriicc SSmmiitthh ܂ސ`[ 3.0̓O
          I ȌsȂBނ̓Q[fUCč\zAR[h̑
          B_WAVfBXvCAꂼ 
          L N^[̓ʂ̃NGXgAVGhQ[Ƃ̑̑
          ̐VvfǉA NetHack 3.1𐧍삵B

               KKeenn LLoorrbbeerr, GGrreegggg WWoonnddeerrllyy, GGrreegg OOllssoonn   RRiicchhaarrdd  AAddddiissoonn,
          MMiikkee PPaassssaarreettttii, OOllaaff SSeeiibbeerrtt ̏؂ Amiga p NetHack 3.1
          쐬B

               NNoorrmm MMeelluucchh  KKeevviinn SSmmoollkkoowwsskkii    CCaarrll  SScchheelliinn,  SStteepphheenn
          SSppaacckkmmaann,  SStteevvee  VVaannDDeevveennddeerr, PPaauull WWiinnnneerr ̏؂ NetHack
          3.1  PC ɈڐAB

               JJoonn WWaattttee  HHaaoo--yyaanngg WWaanngg  RRoossss BBrroowwnn, MMiikkee EEnnggbbeerr, DDaavviidd
          HHaaiirrssttoonn,  MMiicchhaaeell  HHaammeell,  JJoonnaatthhaann  HHaannddlleerr,  JJoohhnnnnyy  LLeeee,  TTiimm
          LLeennnnaann, RRoobb MMeennkkee, AAnnddyy SSwwaannssoonn ̏؂ MPW p Macintosh
          p  NetHack 3.1 쐬B̍쐬ɁABBaarrttoonn HHoouussee  Think C
          pB




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              49



               TTiimmoo HHaakkuulliinneenn  NetHack 3.1  OS/2   A  B  EErriicc
          SSmmiitthh    NetHack 3.1  Atari ɈڐAB PPaatt RRaannkkiinn  JJoosshhuuaa
          DDeellaahhuunnttyy ̏؂ VMS  NetHack 3.1 쐬B  MMiicchhaaeell
          AAlllliissoonn  NetHack 3.1  Windows NT ɈڐAB

               DDeeaann  LLuuiicckk   DDaavviidd CCoohhrrss ̏؂ X11 p NetHack3.1
          쐬B WWaarrwwiicckk AAlllliissoonn  Atari p NetHack ̃^C  o[
          W   쐬Bނ͌Ƀ^CJ`[Ɋ񑡂A^CT
          |[g͑̃vbgtH[ɂǉꂽB

               MMiicchhaaeell AAlllliissoonn, KKeenn AArrrroommddeeee, DDaavviidd CCoohhrrss,  JJeessssiiee  CCoolllleett,
          SStteevvee  CCrreeppss,  KKeevviinn  DDaarrccyy,  TTiimmoo HHaakkuulliinneenn, SStteevvee LLiinnhhaarrtt, DDeeaann
          LLuuiicckk, PPaatt RRaannkkiinn, EErriicc SSmmiitthh, MMiikkee SStteepphheennssoonn, JJaanneett  WWaallzz,  and
          PPaauull  WWiinnnneerr Ȃ 3.2̊J`[ o[W 3.2  1996 N
          4 Ƀ[XB

               o[W 3.2 ͊J`[Ă 10 N̂ 
          Bނ̃Q[ւ̍vɂċLƁA13 l̏̊J`[
          S͂̃[X̊Jn̍ŏ̎_܂Ń`[ɎcĂ B
          A 3.1.3  3.2 ̊ԂɁAJ`[̑nn҂̈lł IIzzcchhaakk
          MMiilllleerrmmƐffASȂB̃[X͊J`[ 
          шڐA`[ނɕꂽB

               NetHack  3.1  3.2 ̎ɁAQ[ɔMlQ[
          Ɏg̕ύXuvɔ\B

               TToomm PPrroouuddffoooott  YYuuvvaall OOrreenn  NetHack++ 쐬A 
             NetHack--   ɉꂽBƂ͓ƗɁASStteepphheenn WWhhiittee 
          NetHack Plus 쐬B TToomm PPrroouuddffoooott ͌ NetHack  Plus   
          NetHack--    A SLASH 쐬B LLaarrrryy SStteewwaarrtt--ZZeerrbbaa 
          WWaarrwwiicckk AAlllliissoonn ͎rVXeǂ Wizard Patch  
           B WWaarrwwiicckk AAlllliissoonn  NetHack  Qt C^[tF[Xg
          ɕύXB

               WWaarrrreenn CChheeuunngg  SLASH  Wizard Patch 𓝍   Slash'em
           쐬A KKeevviinn HHuuggoo ̗͂؂āA̗vfǉB Kevin
          ͌ɊJ`[ɉÃACfA NetHack 3.3 ɓ
          B

               3.2  ̍ŏIo[W̓oOCłł 3.2.3 łB
          2000 N΍̂߂ 3.3.0 Ɠ 1999 N 12 ɔ \  
          B

               MMiicchhaaeell  AAlllliissoonn,  KKeenn AArrrroommddeeee, DDaavviidd CCoohhrrss, JJeessssiiee CCoolllleett,
          SStteevvee CCrreeppss, KKeevviinn DDaarrccyy, TTiimmoo HHaakkuulliinneenn, KKeevviinn HHuuggoo, SStteevvee  LLiinn--
          hhaarrtt,  KKeenn  LLoorrbbeerr,  DDeeaann  LLuuiicckk,  PPaatt  RRaannkkiinn,  EErriicc SSmmiitthh, MMiikkee
          SStteepphheennssoonn, JJaanneett WWaallzz, PPaauull WWiinnnneerr Ȃ 3.3 ̊J`[  
          1999 N 12  3.3.0A 2000 N 8  3.3.1 [XB

               o[ W 3.3 ͑̐Vvf񋟂B܂A푰ƐEƂ
          ŏ̃o[WłBEƂƂẴGt͍폜A 
           ̈ƂȂB܂Ah[tAm[AI[N푰ƂĒǉ
          ꂽBNƃW[̓EƂƂĒǉꂽB ɁA
           ɏ邱Ƃoŏ̃o[WłAꂽSĂ


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              50



          oOEFuTCgŌ\ŏ̃o[WłBoOX g
           ɐLтĂɂւ炸A 3.3  1 NƂŏ\
          肵ĂƂؖB

               3.4 J`[ MMiicchhaaeell AAlllliissoonn, KKeenn AArrrroommddeeee, DDaavviidd CCoohhrrss,
          JJeessssiiee  CCoolllleett,  KKeevviinn  HHuuggoo, KKeenn LLoorrbbeerr, DDeeaann LLuuiicckk, PPaatt RRaannkkiinn,
          MMiikkee SStteepphheennssoonn, JJaanneett WWaallzz, and PPaauull WWiinnnneerr ŊJnA NetHack
          3.4.0 [XO 2002 N 3   WWaarrwwiicckk AAlllliissoonn B

               o[W 3.3 ƓlɁAlXȐlX NetHack ̐FXȃvb
          gtH[ւ̈ڐAsȂĂꂽB

               PPaatt RRaannkkiinn  3.4  VMS ւ̈ڐASB

               MMiicchhaaeell  AAlllliissoonn  MS-DOS ł NetHack 3.4 ǗĂB
          PPaauull WWiinnnneerr  YYiittzzhhaakk SSaappiirr `ĂB

               DDeeaann LLuuiicckk, MMaarrkk MMooddrraallll, KKeevviinn HHuuggoo  3.4  Macintosh  
          ̈ڐAƊgSB

               MMiicchhaaeell  AAlllliissoonn,  DDaavviidd  CCoohhrrss, AAlleexx KKoommppeell, DDiioonn NNiiccoollaaaass,
          YYiittzzhhaakk SSaappiirr  3.4  Microsoft Windows vbgtH[ւ 
          A  g   SB AAlleexx KKoommppeell  Windows łւ̐VO
          tBbNC^[tF[X񋟂B AAlleexx KKoommppeell ͂܂A3.4.1 
          Windows CE ł񋟂B

               RRoonn VVaann IIwwaaaarrddeenn  3.4  OS/2 łǗĂB

               3.3.1  ŕ Amiga ւ̈ڐAƊg JJaannnnee SSaallmmiijjaarrvvii 
          TTeeeemmuu SSuuiikkkkii sĂB

               3.3.1 ŕ Atari ł CChhrriissttiiaann ````MMaarrvviinn'''' BBrreesssslleerr 
          ǗĂB

               KKeenn  LLoorrbbeerr  ɂĊǗĂ NetHack ̃EFuTCg
          http://www.nethack.org/ ɂB

                    - - - - - - - - - -

               Xlbg[N̐Êǂ悤ȂAAQ[̉
           菕悤ƂĂƂ킯悤ȏC𑗂Ă悱
          BA̐_X́AƂɂ͂}̂łł׈ȘA 
          ̖O𓴌A̎傽̈ꗗƂĂɋL̂B













          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              51



                    Adam Aronow            Izchak Miller         Mike Stephenson
                    Alex Kompel            J. Ali Harlow           Norm Meluch
                   Andreas Dorn              Janet Walz            Olaf Seibert
                    Andy Church           Janne Salmijarvi        Pasi Kallinen
                   Andy Swanson        Jean-Christophe Collet       Pat Rankin
                   Ari Huttunen            Jochen Erwied           Paul Winner
                   Barton House             John Kallen          Pierre Martineau
                Benson I. Margulies         John Rupley             Ralf Brown
                     Bill Dyer              John S. Bien            Ray Chason
                 Boudewijn Waijers           Johnny Lee          Richard Addison
                     Bruce Cox               Jon W{tte            Richard Beigel
                  Bruce Holloway          Jonathan Handler      Richard P. Hughey
                  Bruce Mewborne          Joshua Delahunty          Rob Menke
                   Carl Schelin            Keizo Yamamoto         Robin Johnson
                    Chris Russo              Ken Arnold         Roderick Schertler
                    David Cohrs             Ken Arromdee          Roland McGrath
                  David Damerell             Ken Lorber          Ron Van Iwaarden
                   David Gentzel           Ken Washikita          Ronnen Miller
                  David Hairston            Kevin Darcy             Ross Brown
                    Dean Luick               Kevin Hugo          Sascha Wostmann
                     Del Lamb               Kevin Sitze            Scott Bigham
                   Deron Meranda          Kevin Smolkowski       Scott R. Turner
                   Dion Nicolaas            Kevin Sweet          Stephen Spackman
                  Dylan O'Donnell           Lars Huttar           Stephen White
                    Eric Backus             Malcolm Ryan           Steve Creps
                 Eric Hendrickson          Mark Gooderum          Steve Linhart
                   Eric R. Smith            Mark Modrall        Steve VanDevender
                  Eric S. Raymond         Marvin Bressler          Teemu Suikki
                   Erik Andersen            Matthew Day             Tim Lennan
                 Frederick Roeber           Merlyn LeRoy          Timo Hakulinen
                    Gil Neiger            Michael Allison            Tom Almy
                    Greg Laskin             Michael Feir             Tom West
                    Greg Olson             Michael Hamel          Warren Cheung
                  Gregg Wonderly          Michael Sokolov        Warwick Allison
                   Hao-yang Wang            Mike Engber           Yitzhak Sapir
                   Helge Hafting            Mike Gallop
               Irina Rempt-Drijfhout      Mike Passaretti

          uhƐi͊eЂ̏W܂͓o^WłB

















          NetHack 3.4                                      December 2, 2003



