









                                 |̖{ւ̏
                               (NetHack KChubN)


                                   Eric S. Raymond
                     (o[W 3.4 ̂߂̍L͈͂ȍZƊg[)



          1.  ͂߂

               ŋ߁AȂ͓X̌JԂɖłAh鎩
          ɋCBTA񂾂AɎQA 
           ƂƂȖ̊Ԗ̒łтт
          ͌̂AȂɂ̗͂R͂Ƃ͂킩Ȃ B
           Ȃ̖͂ۂɂ͐܂Ă̂ƌĂ
          ɁA܂łɂĉ̂YĂ܂Ă̂ł͂ȂA 
          v   ɂȂBAȂ͔ыN吺ŋԂ͂߂ɂȂ
          B̒̓ÂȂp̈Âɐł炵A 
           ŋ͂ȉ̑NȋLɋ|̂Bɂтяov邱
          Ƃ͎ۂɋNĂ邱Ƃł͂Ȃ̂H閈ɁAՂ̋߂̕sv c
           Aɓ肽Ƃ~ȂB閈ɁA
          ͂̂悤ȍl𓴌AɓċAėȂlX̘bv o
           ƂœǂoĂBAɂȂ͖̒ɏo
          svcȏꏊ{߂Ƃv}ȂȂB 
           ĂA߂Ă`҂͍ŏɂ̓ʂĂA
          ɖ߂ė̕TɂȂĂ悤Ɍ̂B ߂
          ėȂl͊FAPɂ܂`𑱂Ă邾Ȃ̂ł͂ȂH


               ŕĂ܂邤ɁAȂ͂\ɂBCF
          _[̖ƌĂ΂̂Aɓ邱Ƃł 
          ΁A ΂炵Y炷ƌ̂BȂƂ`
          ł́A̂͐_s̑̂Ƃ 
           炵B͋|̖{̉[AQwi̒Jzǂ
          Ƃ\łB̓`𕷂uԁAȂ͎ɂ͓A 
           āAނ̘b{߂ׂ[mȂȂɂ
          ^ƊmMBȂ͂Ƃ̗͂^łȂ A
           ȂƂ`kn̋VlɂȂ̋zŔ荞߂邾낤
          ƍlB̒ŏoĂ낵AsvcȐɏo 
           Ȃ΂ȂłBȂ͒n̈hňӂ̏h
          B̏h̕ǂɓ\oꂽȂ̐ւ̃IbY 
          ΉقǁAȂ͈ӋCB


               NƁAȂ͏iW߁AȂ͓AɌė
          B̗𑱂ċ|̖{ւ̓Ñ̈ 
             ǂ蒅BXĂ̂œŃLv邱Ƃ
          A̖͍LXƂ̉ŖɏABȂ͓ 
           W߁Aƒnł̍ŌɂȂ邩ȂHς܂A


          NetHack Guidebook                                               1





          NetHack Guidebook                                               2



          AւƓĂEEE


          2.  Ȃ芪󋵂́H

               ĂȂ NetHack ƂQ[n߂邱ƂɂȂ B
           Ȃ̖ړI͎Ă̕W߁ACF_[̖o
          Aɂ͂̋|̖{琶ĒEo邱ƂłB

               `ɂ邢낢ȍɑΉ邽߂̊e̔\͂͂́A
          Ȃ̐ƏCɂĕω邾낤B

               l  w (Archeologist) ͓Aɂđ̒mĂ
          B̂ߑfĂ̏ɂƂ؂蔲邱 
           Bނ͊wpÎ߂̒TsɓKďo
          B

                ؐl(Barbarian) ͉nĂmłA퓬 
           ɒbĂBނ͗ނ܂ȗ͂̋Avȍ
          Ƒ傫ȗ莝݂̌̂ĒTɏoB

                Al(Caveman  Cavewoman)͂Ƃ킯͂   
          AcOȂƂɐVΊ펞̕ďoB

               t(Healer)͈p򕨂ɂĐʂĂBC񕜂
          Aɂa炰AAł𒆘a肷鍁 
           򑐂ɂďڂBĊgĐ̌NԂ
          ƂłBނ͊JƈƂĂȂ悢V𓾂ĂāA   
          ēAɓĂB

               R m(Knight) ͋Rmɒł邱ƂƖhقǗD
          邱ƂƂ_ŁAʂ̖Ƃ͋ʂB

                (Monk)  ͏C҂łAiȓ̓IKƐ_IP 
           āAȂłĝƓ悤ɐ키ƂoB
          ނ͖hgɂȂA@コ邱ƂŖߍ킹 
          B

               mƓm(Priest  Priestess) ͐E̓młAƖh
          AĐȂƂgĐ`L߂Ƃ鐹młB F
           ʂĐ_ƌ\͂ɂAނ͂΂Ί瓦邱Ƃ
          łcAF͊炷ƂB

               W[(Ranger) ͂قƂǐXZ݂ƂAA͏X 
           ȂBAނ͒ǐՏpBsƋɁA|p̒Bl
          łB

               (Rogue) ͕qŐgBƂɒD_łA㩂
          ɏڂBނ̒͊PłA͔ȒƂȂB

               (Samurai) ͕̓{̐s̕lłBh͌y
          ĝȂɏGłĂȀȂ܂ꂽ  召  2{̓
          ттĂB



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                               3



               όq(Tourist) ͑z̋(ɍœKł)ƃNWbgJ[
          hAʂ̐HAn}AčȃJďoBق 
          ǂ͎̉ʐ^ɎB̂̂łB

                L[(Valkyrie) ͗EȏmłBߍȃXJW
          irA̍Xňޏ͊拭ŁAɂςAgB 
          ƂƍIgɂĂB

               @g(Wizard)͖p̒mƂɑIєꂽ@̓
          ĂAɂ̖@wɑ΂ēɑw[B͎セ 
           ȒPɑł|悤Ɏv邪Aoς񂾖@gׂ͋
          GłB

               ܂ALN^̎푰IԂƂłB

               h[t(Dwarf) ͐lԂGtA肵
           ŏvłBh[t̒ڂׂ͍̌@ƋH̐
          IZpłBh[t̖h̓Gt̃~XhƓƂ܂ 
          Ȃ܂łAɎiłB

               Gt(Elf) ͋@qƐvAĉsqȊoĂB
          ͂ŋNǂȍׂȂƂނ̖ڂ𓦂邱Ƃ͂łȂB E
          lC̔ނ̎Ɩh͗DGȂ̂łB

               m[(Gnome) ̓h[tɏAh[tƎ
          Bm[͏ň@tƂĒmAxƊ댯ŖĂ 
          ̒nB|̖{ɍĂ邱ƂŒmB

               l(Human) ͒nōłʓIȎ푰ŁA䂦ɑ̎푰Ɣr
          鎞̊ƂȂĂBʂȔ\͎͂ĂȂA 
          EƂɒƂłB

               I[N(Orc) ͎cŖ؂Ȏ푰ŁA(̃I[N܂)
          ĂBɁAI[N̓GẗႢ䂦ɌA 
           킴@ĎEƂBI[Nɂčꂽ
          hƕ͈ʓIɕiB

          3.  ʂɕ\̂̈Ӗ́H

               ʏɂ͂Ȃ݂铴ÅKłłɒTI
          n }ƁAŖڂɂĂBɐ[Ti߂
          AēA͂̎pɂȂ̑Ỏʂɖ炩ɂĂB

               NetHack ̑cł rogue ŏɌꂽƂÃXN [
           w  ̓Rs[^t@^W[Q[̒łSƓ̂̂
          BȗXN[w͗OIȂ̂ƂނW 
           ȂBNetHack ͂̂΂炵`󂯌płB^I
          pŃR}h͂Čʂ͂ŕ\eLXgA h x 
          `[ Q[Ƃ͈قȂANetHack ̃R}hׂ͂ 1  2 
          ̃L[͂ŗ^Ǎʂ͉ʏɃOtBJɕ\ 
          B ʂ͍Œ 80  24 s̑傫Bȏ
          傫Ă 80 ~ 21 ̗̈悾n}̕\ɎgB




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                               4



               NetHack ͓_≹̏؂āAڂ̕sRȐlłv
          CłBڂ̕sRȐl̂߂NetHack̐ݒ@ɂẮA
          ̃hLgŌqB

               NetHack ̓vC邽тɐVA쐬B̂߉
           Q[ɏƂ̂҂ɂA܂̃Q[͊y
          ɖ̂ƊB

               NetHack ͂܂܂ȕ\̃IvV񋟂BIvV
           Ȃ̃n[hEFA\tgEFA̔\͂ɈˑAvbgtH[
          ɂ܂܂łB܂܂ȃRpC̃IvV   s
          t@ CꂽƂɂ̂݉\ƂȂBmNLN^C^
          tF[XAJ[LN^C^tF[XA^CƌĂ΂鏬 
          G  pOtBJC^tF[X 3 ̕\@B 2
          ̃LN^C^tF[X̓tHg𑼂̕ɒu邱 
           ł邪AWݒł W ASCII LN^pđSĂ\
          B܂܂ȕ\̃IvV̓Q[eɂ͉e ^  
          B ^CF̓KChubNŕ\LłȂA͑SẴvb
          gtH[ɋʂł͂Ȃ̂ŁAQ[ɕ\̂̐ 
          Ă̓mNLN^fBXvCŕ\W ASCII L
          N^pB

               NetHack ŉNĂ̂𗝉ɂ́A܂ NetHack  
           ʂǂȂĂ̂𗝉ȂĂ͂ȂȂBNetHack ̉
          ʂ́AeLXgAhx`[Q[ɂuȂ́cv 
           ȕ͂̑łB} 1  NetHack ł͉ʂɉ\
          邩̈łBʂǂ̂悤ɕ\邩̓vbgz[ 
          ˑB

            --------------------------------------------------------------
             ݂͊I

                 ------
                 |....|    ----------
                 |.<..|####...@...$.|
                 |....-#   |...B....+
                 |....|    |.d......|
                 ------    -------|--



             Player v[Y     :12 :7 :18 m:11 :9 :15  
             n:1 $:0  :9(12) :3(3) Z:10 o:1/19 :257 

            --------------------------------------------------------------
                                      Figure 1


          3.1.  Xe[^Xs(ʂ̉)

                ʂ̉ 2 sɂ́AȂ݂̌̏Ԃ\Í̂悤ȏ
          ̒fЂ܂܂ĂBǂ炩̍sʂ̕ȂƂ 
          S 邱Ƃ͂łȂȂBȉɏԂ낢
          ڂӖ̂qׂ (ݒɂẮAȉɈꗗ 


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                               5



          Ԃڂׂ̂Ă\Ƃ͌Ȃ)B

          OƃN(Rank)
                 ̃LN^(q̌oxɊÂ)Eƕʂ̓
               B

          (Strength)
               Ȃ̃LN^̗͋̒lłA6 ̊{Iȑ 1
                łBlԂ̃LN^̏ꍇA͂̋ 3  18 ̊
               ̒lƂB̑̏ꍇA̐z邱Ƃ (  
               18/xx ̂悤ȓʂȗ͂𓾂邱ƂA@̗͂ʂ̐
               z\͂^邱Ƃ)B͋̒l傫قǁA 
               Ȃ̗͂͋B͎͋͗dǂꂾ܂邩A킢
               łǂꂾ̃_[W^邩Aǂꂭ炢ו^ׂ邩ɉe
               B

          f(Dexterity)
               f͐킢ɂ閽A㩂𓦂\AĂ̑
               qKvƂd╨ɊpɈ邩Ȃǂ̂Ƃ
               ɉe^B

          ϋv(Constitution)
               ϋv͉͂₻̑̔JɂX^~ȉՂ񕜂\
               ͂ɉeB

          m(Intelligence)
               m͎͂\͂ǂޔ\͂ɉe^B

          (Wisdom)
               (ɖ@)IȌoɂ蓾B@̃Gl
               M[ɉeB

          (Charisma)
               ͂͂̐Ȃɑ΂ĂƂԓxɉe^B
               ɓX傪iɉeB

          (Alignment)
               ɂ  (Lawful),  (Neutral),  (Chaotic)  
               B΂΁A͑PAׂ͈łƂ邪A@Ɠ
               ɈvƂ͌ȂBȂ̑͑̉̂Ȃɑ
               锽ɉe^B߂͍DIł͂ȂA
               ̑ɑ΂Ă͂Ȃ݂̑ɑ΂ċɂ߂čDIł  
               B

          K(Dungeon Level)
                ꂾẢ[܂ōsBl 1 ŁAA
               [sقǑ傫ȒlɂȂB̊K͓ʂŁA
               ͂ȂOŎʂBCF_[̖͒n 20 K[
               ̂ǂɂƍlĂB

          (Gold)
               ҂ɏĂ݂̐łBȂǂɉB͊
               ɓĂȂB



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                               6



          ̗(Hit Points)
               ̗͂̌ݒlƍőlłB̗͂͂Ƃǂꂾ̃_[W
               ƎʂB킢ŏقǒl͌B̗͂͋x
               ▂@̃ACeɂ񕜂łBʂ̗̒̐͑
               ̂Ƃ蓾őlłB

          (Power)
               Ɏg͂łB͎̂ɕKvȐ_  
               (mana: }i ) ǂقǂ邩B͂܂x邱
               ɂ񕜂B

          hl(Armor Class)
               FDIȐ̍UhǂقǐH~߂邩
               lłBقǖh͗LłAhl
               lɂȂ邱Ƃ\蓾B

          ol(Experience)
               ݂̌oxƌolłB`iނƌol𓾂邱
               łBol̍vl܂ŒBƁAox
               オBoςނɂA킢B@̍Uɂς
               悤ɂȂB̃o[Wł͌ox\
               B

          (Time)
               o߂^[łB time IvVÎƂɕ\
               B

          (Hunger status)
               ݂̕łB  (Satiated) 
                 ӂ(Fainting)  ܂ł̒lƂBʂȂ\
               ȂB

               ̑ɂԂ\̌ɕ\邱Ƃ
           ȂBĂƂɂ (Conf)AaĈƂɂ H
          (FoodPois) ܂ aC(Ill)AڂȂƂɂ Ӗ(Blind)A
           򂪂Ƃ ῝(Stun)AoĂƂ o(Hallu) 
          \B

          3.2.  bZ[Ws(ʂ̏㕔)

               ʂ̍ŏs͎oIɕ\łȂƂ郁bZ[W
           ߂ɎgBŏs``--More--''\ꂽƂ́Â
          ɂɃbZ[WĂ邯ǂ݂̃bZ[W܂m 
           ǂނ悤ĂƂƂłB̃bZ[Wǂނ߂
          ͒PɃXy[XL[΂悢B

          3.3.  n}(ʂ̂̑̕)

               ʂ̂̑́̕AȂ݂Kł܂łɒTI
           ̒n}łBʏ̃V{͂ꂼꉽ\Ă
          B\V{̂́A܂܂ȃOtBbN I
          v Vݒ肷邱Ƃɂĕς邱ƂłBłȂ
          Wݒ̃V{pBɕWݒ̃V{̈Ӗ 
          B


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                               7



          -  |
               ̕ǁA܂͊JA܂͕ (|)B

          .    ̏AXA܂͔̂ȂoB

          #     ʘHAS̖_A؁A邢͑䏊̗(IvVL
               ȏꍇ) ܂͒ˋ

          >    Ki:̊Kւ̒ʘHB

          <    Ki:̊Kւ̒ʘHB

          +    A܂͊wKł邩Ȃ̏ꂽB

          @    Ȃ̃LN^A܂͐lԁB

          $    ݂̎RB

          ^    (ЂƂєΕ\)B

          )    B

          [    ܂͂Ȃ炩̖hB

          %    H(qIłƂ͌Ȃ)B

          ?    B

          /    B

          =    wցB

          !    B

          (    ֗ȃACe(͂AAvc)B

          "

          *     ΂܂͐(MdȂ̂ȂAl̂Ȃ̂
               Ȃ)B

          `    A܂͒B

          0    SB

          _    ՒdA܂͓S̍B

          {    

          }    ܂A܂͖xA܂͗n̊CB

          \    ؂₩ȋʍ




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                               8



          a-zA-Z т̑̃V{
               ̕Ƃ̑̂̃V{͋|̖{̗lX
               Zl\Bނ͕s@ňӂɖĂ邩mȂ
               ŌxȂ΂ȂȂBAƂɂ͉̎菕ɂȂ邱
               B

          I    ̃}[N͓A邢͂̑̌ȂŌɂ
               ꏊɕ\B͂łɈړĂ邩Ȃ
               Ƃɒӂ邱ƁBł'F''m'̃R}h֗낤B

               ̃V{ׂċLKv͂ȂB`/' R}hł
          ̃V{\m邱Ƃł(ڍׂ͎̍ Q   
          )B


          4.  R}h

               R}h 1  2 ̃L[͂sƂŎsB
          ̃R}hAႦ``search''͂ȏ NetHack ɏ^
           KvȂB̃R}h͗ႦΕgp镨Ȃǂ̏
          ɗ^KvB炳ȂKvƂR}h 
          ΂ẮA NetHack ͑Ij[̓R}hCvvg
          ̂ꂩ\Bǂ炪\邩͎Ƃ menustyle I
          vVǂ̂悤ɐݒ肵ɂB

               Ⴆ ``gH [a-zA-Z ?*]'' Ƃ`̎₪悭
          A͂ȂɎĂ镨̂ǂIԂq˂̂ 
          B ̎ɂāua-zA-Zv͂ȂIׂ鎝̖ژ^Lł
          B `?' ͂Ƃ̖̕ژ^ꗗAX̋L
           \Ă̂m邱ƂłB̗ł́A`*' B
          ꗗɂ͕\Ă炸Aʏ킻̃R}hł̎gpz肵Ă 
             A g Ǝv΂IԂƂł邱ƂĂ
          B`*' ͂ƂׂĂ̖̎ژ^\AX̎ 
           ɂĂ̖ژ^Lm邱ƂłBlČǂ̃R}
          hgȂƂɂƂɂ ESC L[΃R}hI
          ƂłB

               R}h̒ɂ́ȂOɐ͂邱ƂŉJԂ
          Ƃł̂BႦ΁u10sv 10 ̒T\ĂB
           number_pad IvVÎƂɂ͐̑O `n' ͂
          Ȃ΂ȂȂB܂̗ł͑Ɂun 10svƓ͂Ȃ
           ȂȂBs邱ƂӖȃR}hł͖͂
          BɁAړR}h̑Oɓ̕(vtBbNX)t 
           ƂɂĂ܂܂Ȉړ@Ƃ邱Ƃł(q)BJ
          񐔂vtBbNX߂ɂ ESC L[΂悢B

               R}ḧꗗ͂Ȃ蒷AQ[ `?' R}hg p
           ăwvj[邱ƂɂAłR}ḧꗗ
          ƂłBȉ̓R}ḧꗗłB

          ?    wvj[: \\ȃwvʂ̂ 1  \  
               B




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                               9



          /    V{Ӗ邩Bw肷ɂ͏ꏊA
               ̓V{(邢͒PS)͂邩I邱Ƃ
               B

                  w  ́A K    u܂ŃJ[\ړĂ
          `.'A`,'A`;'A`:'̂ǂꂩƂɂčsȂB `.' 
          ƁAI񂾏ꏊŕ\ĂV{̐\A help
          IvVIȂꍇɂĂ``ڍׂH(More info?)'' 
           ₳Aꂩ炳ɑ̏ꏊw肷邱ƂłB `,'
          ƁAV{̐\邪Aڍ׏͕\ȂB  `;'
           ƁAڍ׏͕\ꂸAɑ̏ꏊ̎włȂB
          `:'ƁA(Ȃ)mFȂŏڍ׏񂪕\Bꏊ
          IԎ ESC L[ƂɂẴR}h𒆒fłA `?'
          Ƃǂ̂悤ɓ삷邩̊ȒPȐ\BꏊłȂ 
          Ow肵ꍇ́Aɂ̖Oɑ΂ǉ񂪕\B

          &    R}h̓B

          <    ̊K֍s(Ki͂̏ɂƂ)B

          >    ̊K֍s(Ki͂̏ɂƂ)B

          [yuhjklbn]
               w 肵ֈi(} 2 Q)B̕ɉƊ
               Ă邩oĂƂ́Aړ̂ł͂ȂƐ키
               ɂȂBƐ키ƂɂȂ̂͂̈ړ̃R}h
               B̑̃R}h(q)́uSvłB

                                   y  k  u            7  8  9
                                    \ | /              \ | /
                                   h- . -l            4- . -6
                                    / | \              / | \
                                   b  j  n            1  2  3
                                             (number_pad ÎƂ)

                                         Figure 2


          [YUHJKLBN]
               ǂɓ˂邩ɏՓ˂܂Ŏw肵ɐiށB

          m[yuhjklbn]
               Ou: EA (ƂɉƎvĂ )
               肹ɈړB

          F[yuhjklbn]
               Ou: (ɉƗ\zĂ邾ł)Ɛ키

          M[yuhjklbn]
               Ou: E킸ɉֈړB

          g[yuhjklbn]
               Ou: ܂ňړB



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              10



          G[yuhjklbn] or <CONTROL->[yuhjklbn]
               Ou: 'g' ƓBʘH̕_ł͎~܂ȂB

          _    w肳ꂽʒu܂ŁAŒZASYpĈړB
               ŹAȂmĂ(A܂͈ȑOɒʂ)n}z
               uɌvZBmĂ铹ȂꍇAɐs
               B `G'R}hƂقړŒ~邪A `M'R}h
               ƓlɕEȂňړB}EXɑΉĂłł́A
               ݈ʒuȊÖʒu}EXŃNbNƂɂ̃R}h
               B

          .    xeB1 ^[ȂB

          a    (͂AAvc)p(g)B

          A    1   ܂͕̐gɂĂ(hȂ)͂Bh
               1 ͂Ƃɂ 'T'(take off: h͂)AAN
               Z T  1 ͂Ƃ 'R'(remove: ANZT͂
               )gpB

          ^A   1 ÕR}hJԂB

          c    B

          C    X̉ɖOtB

          ^C   pjbN{^BQ[B

          d    ɒuB:ud7av a Ƃ 7 ɒuƂ
               ӖB

          D      ̕ɒuB``ǂ̎ނ̃ACeu܂H
               [!%= BUCXaium] (Drop what type of items?)''  (ǂ̎ނ̂
               u܂?)  ̎ɑ΂āA0 ȏ̃̕V{
               邱ƂœB`a', `i', `m', `u' ̌ɓ 
               邱ƂłBāAjꂽ(B)/ĂȂ(U)/
               ꂽ(C)ACew肷邱ƂłB

                    DB  - jĂƔĂ镨SĂɒuB
                    DU  - ĂȂƔĂ镨SĂɒuB
                    DC  - ĂƔĂ镨SĂɒuB
                    DX  - j/􂢂ĂȂSĂɒuB
                    Da - mFȂɂׂĂ̕ɒuB
                    Di - uOɎmFB
                    Du - (XɂƂ)̕ɒuB
                    Dm - uIԂ̂Ƀj[pB
                    D%u - ̐HɒuB

          ^D   (ʂ͔)RB

          e    HHׂB

          E    ɃbZ[WݍށB``Elbereth'' Ƃ   
               ƁAẲ͂Ȃɔ𒧂ŗȂȂ (


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              11



               ȂUƕ͏Ă܂)B́Aꑧ 
               ƂɂȂȂ֗łB (̋@\̓RpCɍ폜
               Ă邩mȂ̂ŁAȂ̃o[WŕK@\
               Ƃ͌ȂB)

                    E- - ق̒ɎwŏB

          f     ɓĂ̂𔭎˂B˂̂͗\`Q'R}
               hőI邱Ƃo邵A autoquiver IvVݒ肳
               Ăꍇ́ARs[^ɎIɓKȂ̂ݒ肳邱
               ƂłB

          i    ̖ژ^(Ă镨ׂ)\B

          I    ̖ژ^̂w肵ꕔ\B

                    I* - ̂΂ׂĕ\B
                    Iu - ׂ̕ĕ\B
                    Ix - gĂ܂ׂĕ\B
                    I$ - 𐔂B

          o    JB

          O    IvVݒ肷B݂̃IvV̒l̈ꗗ\  
               B  (o^Cv邩NbN邱Ƃɂ)ύX
               IvVIŁAقƂǂ̒lύX邱Ƃ  
               B u[ lłȂIvV̏ꍇ́AɃj[o
               AvvgoBݒ\ȃIvV͂̃KChubN
                قǂɈꗗBIvV͒ʏ `O' R}hł͂
               AQ[n߂Oɐݒ肷Bq̃IvV̍QƂ
               ƁB

          p    𕥂B

          P    wցA邢͂̑̑iiAډBjgɂB

          ^P   1 ÕbZ[Wx\B ^P ͂
                  O  b Z[ W ɕ\B̐U镑
               msg_windows IvVɂĕωB

          q    (AȂ)ށB

          Q    ɓ̂IBőÎ`f'R} h
                ˂邱ƂłB (o[W 3.3 ȑOł͂̃R}
               h̓Q[̂A̋@\`#quit'Ɉړ 
               )

          r    ǂށB

          R    iiwցAȂǁj͂B

          ^R   ʂ`B




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              12



          s    ͂̉B㩂TBɂ͕ʉTKv
               B

          S    Q[Z[uāAfBQ[͎vCɎI
               B

          t    𓊂B܂͖Ȃǂ𔭎˂B

          T    h͂B

          ^T   uԈړ\͂ΏuԈړB

          v    o[Wԍ\B

          V    ̃Q[̗\B

          w    B

                    w- - ƂĉfɂȂB

          W

          x    Ă镐\̕ƌB\͓̕񓁗U
               ŗpB\̕킪ȂĂ͎s( 
               Ă̂\ɂāAfɂȂ)ƂɒӁB

          X    qT()[hɓB

          ^X   Ȃ̖OAEƁA푰AʁAсÃQ[ɂ
               邳܂܂Ȑ_̖O\B

          z    UBɐUꍇ́A`.'gB

          Z    BɎƂ́AƂ`.' g
               B

          ^Z    Q[  ꎞ~(WuRg[@\̂ UNIX(R)
               o[Ŵ)B

          :    ɉ邩B

          ;    ĂV{\B

          ,    EB`m'̌ɉƂɂāAݒɊւ炸I 
               j[\B

          @    autopickup IvṼIEIt؂ւB

          ^    ܂łɔ㩂̎ނ𒲂ׂB



          __________
          (R)UNIX is a registered trademark of AT&T.


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              13



          )    Ă镐\B

          [    tĂh\B

          =    ͂߂Ăwւ\B

          "    tĂ閂\B

          (    gĂ铹\B

          *     Ă̂\B 5 ̃R}hɂ
               ́B

          $    Ă݂𐔂B

          +    mĂ̈ꗗ\B̃R}hɂāA
               \鏇Ԃς邱ƂłBj[`ŕ\
               A܂ڂ̎IAɓւI
               邱ƂɂďԂւBɓւꍇ͂
               ̑JԂB

          \    ܂łɂǂȎނ̕\B

          !    VFɔB

          #    gR}hsBȏォ番悤 NetHack ̍ 
               ׂ͂Ă̕gʂĂ܂̂ŁA܂pɂɎg
               ȂR}h͂̂悤ɂēꂽBǂ̊gR}h
               gp\́AQ[̃RpCɂǂ̋@\Lɂꂽ
               ɂB

          #adjust
               ̖ژ^LύX( fixinv IvVuIv̎ 
               ɕ֗ł)B

          #chat
               NƘbB

          #conduct
               ǂ̒킪܂Ă邩\Bڂ͌qu
               Iv̏͂QƂ邱ƁB

          #dip ɐZB

          #enhance
               ̋Zʂ߂Aׂ肷B

          #force
               JB

          #invoke
               ʂȔ\͂𔭓B




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              14



          #jump
               ʂ̏ꏊփWvB

          #loot
               Ȃ̂΂ɂ鏰ɒuĂ锠⊓A܂͂Ȃ  
               Ăn̈Ƃ̒g𒲂ׂB

          #monster
               (̎pɕωĂ鎞)̓\͂gB

          #name
               ╨̎ނɖOtB

          #offer
               _ɂɂB

          #pray
               _ɋFď߂B

          #quit
               Q[Z[uɃvOIB

          #ride
               ɏ(邢͏̂߂)B

          #rub v΂B

          #sit B

          #turn
               s̉ǂB

          #twoweapon
               񓁗퓬̃IEIt؂ւB񓁗ɓK؂ȕg
               ƁBȂΎIɃItɂȂB

          #untrap
               (㩁AA)㩂͂B

          #version
               ̃o[W NetHack RpCƂ̃IvV 
               \B

          #wipe
               @B

          #?   wvj[: p\ȊgR}ḧꗗ\B

               Ȃ̃L[{[hɃ^L[ (ʂ̃L[ƈꏏɉƂ
          ẴL[`^'[ 8A܂`']rbgZbg)
           ΁AR}h̓^L[ƈꏏɉƂɂđ̊g
          R}hN邱ƂłB NT, OS/2,  PC  NetHack    
          'Alt' L[̖ړIɎg.



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              15



          M-?  #? (ΉĂȂvbgz[)

          M-2  #twoweapon (number_pad It̏ꍇ)

          M-a  #adjust

          M-c  #chat

          M-d  #dip

          M-e  #enhance

          M-f  #force

          M-i  #invoke

          M-j  #jump

          M-l  #loot

          M-m  #monster

          M-n  #name

          M-o  #offer

          M-p  #pray

          M-q  #quit

          M-r  #rub

          M-s  #sit

          M-t  #turn

          M-u  #untrap

          M-v  #version

          M-w  #wipe

               number_pad  IvVÎƂ́Aɉ
          R}hLɂȂB

          h    wvj[: ``?'' ƓlɃwvj[\B

          j    ʂ̏ꏊփWvBu#jumpvuM-jvƓB

          k    (ʏ͔)RB'^D' ƓB

          l    Ȃ̂΂ɂ鏰ɒuĂ锠⊓A܂͂Ȃ  
               Ăn̈Ƃ̒g𒲂ׂBu#lootvuM-lvƓB



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              16



          N    ╨̎ނɖOtBu#namevuM-nvƓB

          u     㩁A A   Ȃǂ̎d|ꂽ㩂͂Bu#untrapv
               uM-uvƓB


          5.  ƒʘH

               A̕ʘH͖肪Ă邱Ƃ邵AĂ
           ƂB̂Ă镔Ŏ̎ɓ镔͉ʂ
          \BÂƂł͎ 1 ̋ԂBǂʘH
          ͉ʂɕ\ꂽ܂܂ɂȂB

               B ʘH͕\ȂB `s'(search: T) R}h
          Ŕ邱ƂłB

          5.1.  o

               o͕ƒʘHڑ̂łBo̒ɂ͔̂
           ̂B̂Ƃɂ͂̂܂ܒʂ蔲邱ƂłB̑
          ̏oɂ͔邪A̔͊JĂ邩AĂ邩A 
                   ꂩłBĂJɂ
          `o'(open: J) R}hpBĂ       
          `c'(close: ) R}hpB

               ɏĂƂ `a'(apply: p) R}h
          ŏ͂gA`^D'(kick: R) R}hŔRj邱
          ƂŒʂ邱ƂłB

               JɎ΂߂邱Ƃ͂łȂB邢͐
          ^ɋߕtȂ΂ȂȂB̂Ȃoɂ͂̂悤 
          ͂ȂB

               ͉ߏôɖɗBẲ͔J邱
          ƂłȂBǂ̉ɂƂĂ͔JKv 
          Ȃ(: S͔ʂ蔲邱Ƃł)B

               B ͕\ȂB `s'(search: T) R}h
          邱ƂłBxƕʂ̔ƓlɂȂB

          5.2.   (`^')

               `҂ׂ悤Ƃ㩂ÂɂB
           ΗɗƔオ܂ł̐^[̊Ԃ̏ꂩ瓮
          ȂȂł낤BɒN           
          A`s'(search:  T) R}hŌ邩ď߂㩂͕\
          B㩂̉aHɂȂ邱ƂB͔ɗLȖhp 
           BÓTIRs[^Q[łuqɔԁvɂʂȃ_
          Wւ̕ꓹ݂B̃_Wł̖ړI͑ 
           ɓ邱ƂłBTdɐǂ݂΁ASĂ̊K͑qɔԂ̓`
          ̃[ŃNAłBsl܂Ă܂`҂̂߂ɂ 
          ̏MpӂĂ邪A͉^ቺĂ܂B




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              17



          5.3.  Ki (`<', `>')

                ʓIɓÅeKɂ́AO̊Kւ̏Ki('<')ƁÅK
          ̉Ki('>')ЂƂBAOBႦ΁AA
           rI󂢊KłȂ͓̉KiK𔭌邾낤B
          ЂƂ͓ȂłAЂƂ̓m[̍BƂĒm 
          n тɑĂB̍B͍Ōɂ͍s~܂ɂȂĂāA
          T(Ȃ邱ƂIꍇ)A̓Aɂ 
          ߂ėKvB

               KigA邢͑̊KɈړ㩂Ɉ|ꍇA
          ܂܂łK͔񊈐āAfBXÑt@Cɒ   
          B ̖KꂽKɍĂіKꂽꍇAfBXÑt@Cǂݍ܂
          čĊB߂ĖKKɈړꍇÅK(قƂ
           K͈ꂩAuʂȁvK̓ev[gAúvK(q)
          ꍇ̓t@Cǂݍ) Vɍ쐬B݂͌̊K 
          ̂sB̊Kɂ͎̂~܂ĂB

               ʁAȂKigƁAȂ͖ړInőΉKȉ
          ɌBAybg(q)Ƃ̉͂ȂKi 
           ~肵ɂĂāAẌ̂ȂƓւ邱
          ƂBȂꍇAybg₻̑̉KȉɌ A
          Ȃ͂̂΂ɌB

          5.4.  ͂ (`<', `>')

               ͂͊KiƓڂłAKq̓̎ނ̓Q[
          قƂǋʂłȂB

          5.5.  XƔ

               XhÂ΂ɓX傪āAɂ̕uĂ镔
          ɍs邱ƂBEāA`p'R}hgƂŕ
          ƂłBEOɁȀɗ``#chat''R}hg
           ƂŒlimFłBxOɕgƎ؋ɂȂA
          X͍x܂ł͓X̊OɏoĂȂȂB

               X̒ɂƂɕ𗎂ƂŕXɔ邱ƂłB
           pi񎦂A邩ǂmF邩APɓX傪
          ȂƂm炳(ʓIɁAXŔĂ镨Ɠނ̕
          Ώۂł)B

               RŕX̒ɗĂ܂ƁAX͕ʑ㏞ȂɏL
          咣B߂߂ɂ͔߂KvB

               X͎sɂȂ邱ƂBȂꍇA𔄂낤
           ƌ̑ɐMp݂ĂBMp݂͕𔃂
          Ɏg邪AXłLłB̓X͈󂯂ȂB  (
           {ŁuNWbgJ[hvɓ邱Ƃ邪AXŎg
          ƂĂ͂ȂBX͎󂯓ȂB)

               `$'R}hgƁA^ł݂̐(΂  
          Ă̂͏)ƂƂɁAMp݂Ε\B
          `Iu'R}h͖̕(܂XL镨)̈ꗗ()\ 


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              18



          B `Ix'R}h͎gĂ܂̑̈ꗗ()\
          B

          5.5.1.  X̓Ȑ

               X̂͈̐ӊOȂ̂ȂB

          * ACe̒li͐FXȗvfɂėlXɕωB

          * X̓hÄ̏ꏊ͓X̊OƂĈB

          * X͂Ȃ̂悤ɒӐ[Ă邪AʓIɂ 
            ̏҂ɂĂ͖B

          *  X"closed for inventory"(uÎߕXv)̏ꍇA҂Ă
            ĂJX͂ȂB

          * X͗Ⴆi͊ĂVACeׂ邱Ƃ͂ȂB


          6.  

               ʏɂ͂Ȃ猩\ȂAЂƂ
           ƈł̒ŉƂ΂o킷ƂɂȂ邩Ȃ̂Œ
          KvłB@̃ACe̒ɂ́AȂ𔭌 
          OɂȂ𔭌̂ɖ𗧂(̔\͂ɑ
          ϗDĂB)

               `/' R}h `;' R}hʏɕ\Ă 
          𓾂̂ɗpB `C' R}h͉ɖO
          ɗpẢ鎞ɁA𑼂̂̂ƌ 
           ɕ֗łBOƂăXy[Xw肷ƁAȑOɂ
          OƂɂȂB

               gR}hu#chatvɂāAאڂƌ𗬂łB 
          ۂ̑䎌͑IłȂ(ƁAȂׂ邩͑I
          Ȃ)AX Oracle of Delphi(ft@C̐_a)Ƃ 
          b邱Ƃ́ALvȌʂ炷B


          6.1.  퓬

               Ɛ킢Ƃɂ́APɂ̉ɌĈړ
          悤ɂ΂悢B̉͂Ȃ킢𒧂܂ȂA 
           ƂCɂ邱Ƃ͂ȂB𗧂ĂƑϊ댯ȉBuO
          \ZvɂvƂƂ킴YꂸɁB

               Ȃ(A܂͂ȂڂȂ)ꍇA
          ƂȂvʒu`I'̕\B̋
          ƂƁAĂ鎞Ɠ悤ɂȂ͉ɍU 
           BAړĂ܂ĂAȂ̍U
          ͋؂邱ƂɂȂBłɈړĂ܂Ă   l
          A 킢Ȃꍇ́A `m'R}hgƂŐ키ƂȂړ
          łBtɁAɉ邩ǂ킩ȂǂƂɂ 


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              19



          Ă݂ꍇ́A `F'R}hgB

          6.2.  ybg

                Ȃ͎e(`d')AqL(`f')A|j[(`u')̂ꂩƂƂ
          Q[n߂BȂ̃ybg͂ȂƂƂɓA܂悢A 
             Bybg͂ȂƓlɐ̂т邽߂̐HKvƂ
          Bybg͐VNȎ₻̑̓ɂĂByb g
           ƂCłAybg炵ĂƎv
          AȂڂ^邱ƂłB̂߂ɂ͐H yb
          g ɌēĂ΂悢BƌPꂽybg͂
          󋵂̂Ƃŋɂ߂ėplB

               ybg|ĂɂČoςłB܂Ԃ
           ɐA̗͂⑊ɗ^_[WB߂̂
          ͂Ȃybg̕낤Ax̒ႢLN ^
          ɂƂĂ͖ɗ낤B

               Ȃ̊KֈړƂAׂɃybgAĂ΃ybg
          ȂɂĈړBuɂƖ쐶Ă܂ 
           ȂBlɁAȂ̈ʒuς悤㩂ɂ
          ꍇ (Ⴆ΁AgbvhAŉ̊Kɗꍇ)Aׂɂybg
           ĂAׂɂȂybg͎cBybgł
          ̂悤㩂ɂ邱ƂBȂ͂Ƃ̎Ƀybg̗ 
          ĂꏏɈړ邱Ƃ͂ȂB

          6.3.  Rn

               _  Wɂ邠̐́AȂƔ\͂
          Ă΁A邱ƂłB쐶̐ɂȂ邱Ƃ [
           ͍̂łB̓A}jA͋͊֌Włグ
          ̂ɖ@̗͂ɗȂ΂ȂȂBAUȂ x
          z ɒuȂA `#ride'R}hŏ~肷邱ƂłB
          ɏēAړ@́Agړ̂Ɠ   
          Bn}ɕ\̂͂ȂĂ铮łB

               nZp`#enhance'R}hŊǗ邱ƂłBڂ
          q镐̋Zp̏͂QƂ邱ƁB

          6.4.  [̊K

               `҂̗HƂ̎(邢͂͐܂ςÔ 
          gł邱Ƃ)Ȁiɏo킷ȂBH
          EƂ͓Â낭قƂǃ_[W󂯂Ȃ 
           Pɓ邱ƂłBȂ͎񂾖`҂̏iD
          łB͎Ă邱ƂBȑO̖`҂ 
           炵߂̂ɂׂ͂Ēӂ𕥂˂΂ȂȂB͂
          pjA̒ȌɐĂ邩炾B


          7.  

               A̒ŉꍇAEƎv̂͂悭
          邱ƂłB NetHack ł͂̏̕ʂ邱ƂɂĎIɏE


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              20



          Ƃł( autopickup IvV(q)ItɂȂĂƂ
          `m'   v  tBbNX (Oq)pĈړƂ͂̌ł͂
          )A܂ `,' R}hgĎ蓮ŏEƂłB

               Ƃɂ́ANetHack ͂Ȃɂ̂悤ɍA
          ȏEƂ͂łȂȂBłȂ NetHack ͂̕
          Ȃ̉וɉAE\B

               ɘAāAו̏ddȂBǂꂾ̏d
           ^ׂ邩͋ؗ͂Ƒϋv͂ɂB͂قǁAו̏d̉e
          ͏ȂBłAA̒Ăו d
           ȂɕSɂȂƂB͓݂ȂAJ[
          ȂĂ葽̐HKvƂȂBčŏIIɂ͉וd 
          ĉ̂ĂȂƓȂȂĂ܂B

               NetHack ł͉ו̏dǂꂭ炢e^邩Ă
          Bŉsɕ\    `Burdened',  `Stressed',  `Strained',
          `Overtaxed',`Overloaded' ̕\Ȃ̏ԂĂB

               EƂA̕ɂ͖ژ^L蓖ĂBɊւ
          鑽̃R}h͂Ȃǂ̕ĝq˂ĂB 
          ̂̕IԂ悤 NetHack q˂ĂƂ́Aʖژ^L
          ̈ꗗ\Ă̒I(Oq̃R}h̍Q  
          )B

               ̕AႦΕނ̂悤ȕ́AǂȂ̂ȒPɋ
          ʂtB̑̕AႦΊ␅͂̎ނɉ 
          낢ȖOtĂB 1 ̃Q[̊Ԃ͓O
          ͓ނ̕łBɕt閼O̓Q[Ƃ 
          ̂ɂȂB

               ̂悤ȕgǍʂ炩ȏꍇ NetHack
          ꂪł邩ĂĂB̌ʂ܂薾炩 
           ꍇ͂̎̕ނƖt邩q˂ĂB̂ߌɂȂ
          ĂvoƂłB܂ł``#name''R}hg
           l̂ƂłAނׂ̕ĂɖOtX̕
          OtłBłɖOĂ̂``#name''g
           AVOƂăXy[Xw肷邱ƂɂāAȑO
          OƂłB

          7.1.  􂢂Əj

               Ȃ낢ȕ́AƂꂪɗ  
           ƂĂ􂢂Ă邩mȂB􂢂
          镨gƂꂪtĂ܂Ƃ͍ł悭錋 
           B􂢂Ă镐Ƃ͎ɒtĂ܂
          ĎȂȂB􂢂Ă镨gɂƕʂ̕@ 
           ͂ƂłȂBɁA􂢂Ă镐h
          ͕Kƌ킯ł͂ȂĂ̏ꍇ̖͂^   
          āA łȂ퓬̌͂B̑̎􂢂
          Ă镨́A܂ɗȂ܂͂̑̓_ŊQy 
          肷邾낤B




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              21



               ܂jĂ镨BjĂ镨͎􂢂
          ĂȂʂ̕ɔׂċǂɗBႦΏjꂽ 
          ͈Ɉw̃_[W^邱Ƃł邾낤B

                @ gƕɎ􂢂􂢂肷邱Ƃł
          B̂߂ƂtĂ܂ĂA􂢂Ă͂ 
           łBm͐􂢂jɕqȂ̂ŁA̐EƂ̖`҂
          eՂɎĂ̂邱ƂłB

               Ȃ̖̎ژ^̒Ŏ􂢂Ă邩ǂ
           ͖ژ^̂Ȃœɉ̐ȂBǂȏԂɂ邩mĂ
          镨͖ژ^ꗗŁucursed(ꂽ)vuuncursed(Ă )v
          ublessed(jꂽ)vȂǂ̌t̐ɗ^B

          7.2.   (`)')

               |̖{ɏZނقƂǂׂẲ́A`XƌΌ
          ȂȂEƂ邾낤B̐g(ɉEĂ
          ܂)߂ɂȂ͕KvƂBȂł̓|Cgɂ 1
          ` 2 ̃_[W (炩̉Z邩mȂ)^邱 
           łȂBAAƂ͗OłBƂ͕gčU
          fōUyɑ傫ȃ_[W^邱Ƃ 
          B

               ɂ͒Ȗ⌕̂悤ȐU񂷂߂̂̂ƁA⑄̂悤
          邽߂̂̂BŉɑŌ^邽߂ɂ́A 
           ɂĉU邩ɓȂ΂ȂȂB
          ɂ́APɑ𓊂悤ɑI邾ł悢B| 
           ˂ɂ́A܂|ɎĂ𓊂΂悢BNX{E
           crossbow bolt(NX{Ep̑)𔭎˂邽߂̂̂ł B
          Ί͊(΂̂悤)̑̐΂𓊂邽߂ɗpB

                ͂̂镐ɂ́uǉ\́v(U\͂ƌƂŐƕ
          蓾)tĂAUɓ\Ɨ^
          _ [WɒǉB̖͂𑪒肷ɂ́AȂ炩̕@
          @gĊӒ肷邵ȂB͎̕K̂悤Ȃ   _
          [W󂯂₷B̂悤ȁuHv_[W͏C\łB

               U  ܂ɖ邩ƁAɂǂꂭ炢̃_
          [W^邩́A̗vfɂČ肳Bɂ͈ 
           ̂: ̎ށA̕i(͂╅H)AoxA
          ́AqAו̏dAZ(q)B̖hl(ʓIȖh䗦B
          h𒅂邱ƂɂƂ͌Ȃ)vf̈łB܂A
          ̕ɑ΂ēɑϐB

               ͕̕Ў莝ł邪A肪KvȕB莝
           ̕Ə𓯎ɎƂ͂łȂBЎ莝̕Ă
          ꍇAЂƂ̕\ƂďĂāA `x'R} h
           gĂ镐ƌ邱ƂłBɁu񓁗퓬vZ
          \̋ZʂꍇA̕𓯎  g       B
          `#twoweapon' gR}hœ񓁗퓬邩ǂ؂ւ
          Bꕔ̃LN^(ႦΖؐl)̋Z\ĂB 
           ̋Z\ĂĂAxɓ̕gƂЂƂg
          ȂɔׂēGɖmɃyieB󂯂B


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              22



               S̕Ȃ邩ȂB邽
           ɂ́ÂIԎ`-'IԂA邢`A'R}h
          ̑̐gɂĂ̂ÔƓɌݎgĂ镐 O
          ƂłB

               AD&D vCƂ̂ǎ҂͂Ct낤AAD&D ɓo
          ꂵ NetHack ɂĂɂ_[W ^ 
          B܂ǂmĂȂ( aklys(ALX), lucern hammer(
          bcFn}[), bec-de-corbin(xbOEfERr) Ȃ) 
            AD&D ̒ǉ[ł Unearthed Arcana ̕t^ŏڂ
          ĂB

               gR}h `w'(wield: )A `t'(throw:  
           )A  `f' (fire: 𔭎˂ЂƂ̕@), `Q'(quiver:
          )A `x' (exchange: )A`#twoweapon'A`#enhance'(
          q) łB

          7.2.1.  ̂𓊂邱ƂƔ˂邱

               `t' R}hgƂɂāAǂȕł邱Ƃł
          B̃R}hw肷ƁA镨q˂ĂB `?'   
          ƁA ̒œ̂ɌĂȕ̈ꗗ\A `*'
          ƁASĂ̎̈ꗗ\B𓊂邩w肵 
          A( ǂ̖ڕWɓ邩ł͂Ȃ)ǂ̕ɓ邩q˂B
          邱Ƃł鋗́Aɕ̎ނƋؗ͂ɂB͎œ 
           Ƃł邪A|ēyɉ܂ŔсAڕW
          ₷B

               `Q'R}hŗ\ߍD݂́u˕vIĂA `f'R} 
          h œ邱ƂɂāA鑀ȒPɂ邱ƂoB
          Ɠlɓ͐q˂邪A `f'R}hgтɉ 
             w肷Kv͂ȂB autoquiver IvVIɂ
          ƁA `Q'R}hŐݒ肵ȂȂɁA NetHack I
          ɑ̕ĂB

               xɕ̕𓊂邱ƂłLN^Bxɕ
          ̖𑕓U(邢͈xɕ̕)AڕWɓ 
           Ƃ͂₷dł͂ȂBW[͂̋Z\ɗDĂ邵A
          K؂ȕ̋Z\ (|Ė˂Ȃ|̋Z\ANX{D g
           ȂNX{D̋Z\AXOĐ΂𓊂ȂXO
          Z\) ɂčx̋ZʂΑ̐EƂł\łB 
           ̃ACe𓯎ɓ邱Ƃł邩͖^[ω
          B `t'R}h`f'R}h̑Oɐw肷邱ƂɂāA
             鐔𖾎Iɐ邱ƂłBႦ΁A``2f''( num-
          ber_pad IvVI̎ɂ``n2f'')Ǝw肷ƁAƂ 3 {
          ˉ\łő 2 {˂ȂBAۂɔ˂ł鐔
          傫w肵ꍇ (̗ł ``4f'')́Aɐw 
          ȂꍇƓlAۂɔˉ\Ȑ(ł 3 {)˂
          ȂBUJnȂASẴACe͓ɔ ԁB
           1 {ڂŉ|ȂAc͂̐܂ŔłƂɂ
          B





          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              23



          7.2.2.  ̋Z

               pł镐̋Z\͂܂܂ɈقȂĂB̋Z( Z
          \)͂̕ǂꂭ炢܂邩ɉeBZ\̓Q[
          ʂČコ邱Ƃo邪A͐EƂox═ 
          ̎gp񐔂ɂB

               Zʂ߂ɁA Z A Ľ A  Ƃ
          ɂ̃O[vɕĂBꂼ̃O[vŋZ 
          x ǂ܂ō߂邱Ƃo邩͐EƖɌ܂ĂBႦ
          @g Z  Zږ_ ɑ΂Ă͍xɒB邱Ƃo 
          邪A  | ɑ΂Ă͂ł͂ȂB

               `#enhance'gR}hŌ݂̕(Ǝ)̋Zʂ邱Ƃ
          łBɁAЂƂ܂͕̋Z\コ邱Ƃł 
           ȂAǂ̋Z\コ邩I邱ƂłBZ\̃
          N``Ȃ''(none) (Z\コ邱ƂłȂƂӖ ``
            ꂽ''(restricted) ƌĂ΂邱Ƃ)A ``S''(un-
          skilled), ``''(basic), ``n''(skilled), ``G L X p[
          g''(expert) łBꂽZ\͒P`#enhance'R}hňꗗ
          ɕ\ȂB (_̉ɂ肠̋Z\̐ 
           B̎ɂ͋Z\ S ƂȂAE  ܂łƂ
          ) LN^ɂẮAfł̐퓬}[VA[c̋Z\ 
          `` }X^[''(master)``Oh}X^[''(grand master)ɂ܂Ō
          コ邱ƂłB

               Z\x``ꂽ''``S''̕gƁA
            ▽ɗ^_[WɃyieBB ``
          ''ł̓yieB{[iXȂB ``n''ł͖Ɨ^
          _[Wɂ₩ȃ{[iXB ``GLXp[g''ł̓{[iX
          ͑傫ȂBUƁAgĂ镐ɊւZ\(
           ɒBĂȂȂ) コ邽߂̌Px𑝂₷`X
          B̌Px̃xɕKvȒlɒBƁA̋Z\ 
           MĂ悤ɊƂB̎_`#enhance'
          R}hgƂɂĂЂƂ܂͕̋Z\コ邱 
           łBZ\͎Iɂ͌サȂBȂȂSĂ̋Z\x
          vɂ͐̂ŁAǂ̋Z\コāAǂ𖳎邩 
          ߂Kv邩łB

          7.3.  h (`[')

               ̔FDIȂ̂Aɂ͐łB̂
          ̍U䂪gɂ͖hKvłBh̒ɂ͑̎ 
           hhʂɗDꂽB Armor class(AC)(hl)
          ̖hʂ̎ړxłBhl (AC) AD&D ł̏ꍇƓ悤
          ] B 10 hȂ̏ԂƓAlقǗDꂽ
          hł邱ƂB AD&D ɑ݂Z͂ NetHack ɂ
          ĂhʂBȉ(sSł͂邪) e̊ZƂɋK
          肳hl̈ꗗB

                  dragon scale mail(hS̗؊Z)               1
                  plate mail(|S̊Z)                            3
                  crystal plate mail(̊Z)                    3



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              24



                  bronze plate mail(̊Z)                     4
                  splint mail(SЂ̊Z)                           4
                  banded mail(ы̊Z)                           4
                  dwarvish mithril-coat(h[t̃~X)     4
                  elven mithril-coat(Gt̃~X)          5
                  chain mail(т)                          5
                  orcish chain mail(I[N̍т)           6
                  scale mail(؂̊Z)                              6
                  studded leather armor(etvZ)               7
                  ring mail(S̊Z)                             7
                  orcish ring mail(I[N̓S̊Z)              8
                  leather armor(vZ)                             8
                  leather jacket(v̕)                          9
                  no armor(ZȂ)                               10

               ɑ̖h(: ACA|AN[N) gɂAh l
          ̒l邱ƂłBeɓ镨 1 g
          ɂ邱Ƃ͂łȂ (Z͈ꎮAN[N 1 A 1 A |
           1 Ȃ)B

               h ɖ͂΂̖h̖hʂ͒ʏ̕ǂ(
          ͈)ȂĂAɕtĂu{Lv(邢́|L)
           hl̒lȂBႦ +1 т́Aʏ̍
          тhʂAhl 1 PʕȂ 4  
           BhgɂƒɖhlƁu{Lv̒lB
          ꂽh͒ʏ핉̖(|L)ĂA͂ 
          Ƃ͂łȂB

               ̊Z͎K̂悤Ȃ̃_[W󂯂₷B̂悤
          _[W͏C\łB@̂WhB

               Zg߂̃R}h `W'(wear: ht)  `T'(take
          off: h͂) łB `A'(remove all: SĂ͂)܂
          ̐gɂ̓lAh͂̂ɎgpłB

          7.4.  H (`%')

               ̂тɂ͐HsłBԐHɂȂ܂
           Ƃ₪č|AXɉ쎀ւ̓ǂ邱ƂɂȂBۑ
          uĂȂƏł܂AHׂɂ͕sqɂȂH   
          B ACX{bNXʂɓĂH͒ʏ͂܂ł܂Ȃ
          AACX{bNX͏dAʂ͊Ĵɏ΂莞ԂKv 
          B

               Eƒʏ͂̎̂c邪ÁuHvɂȂB
          ׂĂƌ킯ł͂Ȃ͐Hׂ邵Aɂ͐HׂƓ 
           ͂̂B傴ςɌ΁uĤׂɂȂvƂ
          ƂłB

               ؐH`̐EƂBؐH`̉͌ē̎
           HׂȂBؐH`̃vC[͓̎̂Hׂ邱Ƃ
          邪AȂ炩̂肪ȂpB




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              25



               furit IvVɂĂȂ̍D̐HɂȂł̖O
           1 ݒ肷邱ƂłB


               HHׂ邽߂̃R}h `e' łB

          7.5.   (`?')

               ɂ͂낢ȕ\肪tĂ邪A͂炭
          ̖ptɒׂƂđI񂾂̂ł낤 (:``READ ME'' 
            ``THANX MAUD'' ̋tǂ݂Ƃ)B͓ǂނƏł(
          @̎̏ĂȂ͏łȂ)B

               ̒ōłpl̍̂scroll of identify( 
          ̊)łB͑̕ɂĂꂪł邩A􂢂
          Ă邩jĂ邩AƉ͂𔭊ł邩m 
          B ̂̒mȂ͂̒ɂ͂̊Ȃł͉ł邩
          Ӓ肵̂B

               Cf[ĂĂȂscroll of mail(莆̊)
           nĂ邱Ƃ (̋@\LɂăRpCĂ
          o[W̏ꍇ)B NetHack ̃[zB@\̓VXẽ[ 
          {b NXɓdq[ĂꍇɋNB̋@\gp
          ɂ͊ϐ``MAIL''ɂȂ̃[{bNX̃t@C 
          肵 NetHack ɐV[Tꏊm点KvB܂
          ]ނȂΊϐ``MAILREADER''Ɏg[MvO 
          t@Cݒ肷邱ƂłB̂Ƃ NetHack 炻̃vO
          NĂ̊ǂނƂłB[Q[ɂ 
          ă_ɐo[W NetHack ł͂̊ϐ
          BCf[ mail IvVŃItɂłB

               ǂނ߂̃R}h `r' łB

          7.6.   (`!')

               ͏тɓĂt̂̐FɂċʂB͈
          ނƏłĂ܂B

               Ȑ͐łB͂΂ΏjĂ􂢂
          Ă肵āAsȐɂȂ肷Bs̉ 
          ƂĐ͗LQȂ̂ŁAs̉ɓ(`t')ƗL
          Bɑ̕Z(``#dip'')̂ւLvłB

               ނ߂̃R}h `q'(quaff: ) łB

          7.7.   (`/')

               @̏͒ʏ퉽͂𔭊B̒ɂ͕̂
           ȀꍇUwȂĂ͂ȂȂB
          ɌĐU邱Ƃł(Ƃ `.'  `s' ͂)A 
           ͂΂΋ȍsׂƂȂB̑̏ɂ͕ȂAU
          q˂ĂȂB񂪌͂𔭊񐔂͏񂲂ƂɕsŁA 
          gxɂ̉񐔂 1 B



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              26



               ̖@̗ʂȂȂƁAʏ͏gpĂNȂB
          Ȃ玞܁AŌ̈ꈬ̖͂g񂩂 
           \łBƏ͉Ă܂B͓K؂Ȗ
          @ɂčď[U邱Ƃł邪AƏ񂪔Ă 
           \B\͍ŏ͔ɏAɉx
          ď[U邲Ƃɑ傫ȂB

               \sȂȍsׂł͂邪AǂɂȂȂȂƂɂ͏
           󂷂ƂB͎Cȍsׂł͂ȂBsƂ
          AjIȖ@̃GlM[邩łB

               SɊӒ肵ꍇÄꗗł͊ʂ̒ɒǉ
           񂪕\B͍ď[Uꂽ񐔁ARA݂̎gp\
          ȉ񐔂łB񂪖ꂽꍇɂ͎gp\ȉ񐔂 -1    
          B

               g߂̃R}h `z'(zap: U) łB󂷂ɂ
          `a' (apply: g)łB

          7.8.  w (`=')

               wւ͑ϖɗłBƂ̂⊪̂悤
           ͂ߐɂȂ̂ƈႢAwւ̖͔͂rIPvI
          邩炾B

               wւ͂߂邱ƂɂĂ̖͔͂Bwւ̖͗
          w 1 Av 2 ͂߂邱Ƃ͂łȂB

               ܂Ă̎wւ͐gɂƕ̌ȂB
          ͎wւ̎ނɂĈقȂB

               wւg߂̃R}h `P'(put on: wւ   )   
          `R'(remove: wւ͂) łB

          7.9.   (`+')

               ͋͂Ȗ@L傫Ȗ{łB`r'(read: ǂ) R
          }hŊwԂƎ̒mǂݎɓ](čŌɂ͓
          ߂ȂȂ)AȂ΂݂͕̎šʂɏIB􂢂
          ꂽm̋y΂Ȃ_̌Ñ㕶ŋLꂽǂ 
          NԂɊQyԉ\I

                 Ƃ(wł鎞)ɂ͂t邱Ƃ
          BȂ̌oxł͉y΂ȂxȎ悤Ǝ 
           AΉ^CvɊւZ\ႩAЂǂĂ
          ƂɎ肷ƁÂɕKvȃGlM[ 
          ԂQɏIĂ܂ƂB

               邱Ƃ́A@̃GlM[ĂыNĂ𐸐_
          ̂̂ɏW邱ƂłBȂg̓o閂@ G
          l M[JAAĎƔĂ܂B
          ɂ͗KKvłBKĂ΁Aꂼ̎̈ Z
          \ ͌サĂBȂAԂoɂĂꂼ̎
          ɊւL͔AxwԕKvłĂ邾낤B


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              27



               ŵ̏ꍇAw肷Kv  
          B Ƃ`.'܂`s'w肷邱ƂŎgɑ΂Ď
          邱ƂłBA͑ɂċȍsׂł B
          ŵȂ̏ꍇAw肷Kv͂ȂB

                 Knx̖ʂŃO[vĂ̂ƓlAO
          [vĂB̂ɐƁÃO[v 
          P ƂɂȂB\ȋZ\Ύ̌ʂ߁As̉
          \߂邱ƂłBZ\Xbg͕XLƋLB(``
          ̋Z''̍QƂ̂)

               @ɂ͎RɈړłȂ΂ȂȂB܂A
          ̎ނ̊Z𒅂ĂƖ@̂W邾낤B

               ǂނ߂̃R}h͊ǂނƂƓ `r'(read:
          ǂ) łB `+' R}hɂAmĂƂ̃xA
          Aꗗ\B `Z'(cast: ) R}hɂ
          B

          7.10.   (`(')

               ͂낢ȖړIɎgXGȕłBȂǂƓ
          Ɏgp񐔂ɐ̂镨BႦ΃v͂΂炭 R
           sĂ܂B̑ɂ̒ɂ͔܂ƂRei
          ܂ĂAACeoꂷ邱ƂłB

               g߂̃R}h `a'(apply: p) łB

          7.10.1.  

               `̓rŊ┠󔠂ɏo킷Ƃ邾낤B
          uĂꏊɗĂꍇɂ͊gR}hu#lootvɂāA
           ĂƂɂ `a'(apply: p) R}hŊJ
          ƂłBȂ󔠂ɂ͑̂ɂČĂ A
           ͏dĉ^тɂ̂łB `a'(apply: p) R}
          hŌ⌮JgA `^D'R}hŏRƂ΂Ag
          R }h``#force''ɂ蕐gĂJ肷邱Ƃŕ󔠂
          ͂ɂ͂ɒuȂĂ͂ȂȂB

               󔠂ɂ㩂d|Ă̂A͂ӂ
          J肵ƂɕsȎNBgR}h``#untrap''ɂ
          ă`FbNA㩂ɂȂ悤݂邱ƂłB

          7.11.   (`"')

               ͎wւƑς悭ĂA΂΂Ƒ傫Ȍ  
             BwւƓ悤ɖɂ͂낢Ȗ@̓
          ALvȂ̂LQȂ̂āAgɂ邱Ƃɂ͂ 
          B

               ͈ɂ邱ƂłȂB

                 g߂̃R}h͎wւ̏ꍇƓ `P'(put on:
          )  `R'(remove: ͂) łB


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              28



          7.12.   (`*')

               ΂̒ɂ͉l̂̂AlŔB΂͍Y
           @ƂĂƂċɂ߂ČʓIȂłBl̂
          ΂EoɏĂΓ_ɉZB

               ̏Ȑ΂΂ɕނ邪Ảl͂قƂǂȂB
           A S Ă̐΂(XOĂȂ)eƂėLł
          B]Ɋׂœ邱Ƃ\łB

          7.13.  傫Ȋ (``')

               ⋐΂͓ɗLpł͂ȂAʓIɏd̂łB\
          ́A̒͌ǂł͂ȂłB

               ȃq[}mCh(l₻̒)͋΂𕐊Ƃėp
          ƂłB

          7.14.   (`$')

               ͓_ɉZA܂Xł͋ŕ𔃂ƂłBA
          ɂ͂Ȃ̎ɉe邩Ȃ̉(X
          ͕ʂƂ)B


          8.  I

               P NetHack ɏ邾ł͖łȂꕔ̃vC [
          ́A vCɐ݂邱Ƃɒ킵ĂB̒̈ꕔ
          Q[ɂĎIɋL^AQ[ł #conduct R} 
          h ŊmFłB܂Q[Iɂ\Bɔ悤
          ȍsƁA͂₻͕̒\ȂB̒ɏ 
           邱ƂɂāAvC[͒ǉ``錠''𓾂B
          ȂA̐ɏ]ƂȂQ[ɏ邱ƂSɗL 
          łAQ[ɏ߂ď܂ł͕ʂ̒͊֌WȂB

               ̂͐HוɊւ̂łBłȒ͐H
          Ȃ̒łB͐HȂłԐł邪A K
          v   B]āAݕɑ΂Ă͉̐ȂBႦh{
          ĂłB_ɋFċQ̂Ƃ͂ȂHוɊ 
          钧ɂᔽȂB

               ȍؐH`҂͓ꂽHוHׂȂB{I
          h{͉ʕƖ؂łBubu(`b')A[[(`j')A׋(`F')
           ؂Ƃ݂ȂBlԂ̐HɂgĂȂ̂B
          oXANAuHv(ۖ)Aj[VAb[V 
           B̐ɕωĂƂ́AȂǂ̕ʏłȂ
          ȍؐH`җp̐HƂĈBA 
          HȂ̒ɂ͔邱Ƃɒӂ邱ƁB

               ؐH`҂͓HׂȂBA̕YH
          邱Ƃ͌ȍؐH`҂قǂ͌ȂBĽȍؐH` 
          ĤׂɒǉāAubNvȊÕv(`P')AA
          ꂽHו (肢NbL[ƃpP[L)A瑢ꂽ


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              29



          Hו (N[pCƃLfB[o[)AC[[Hׂ邱
          ƂłBƂ͍ؐH`҂Ƃ݂ȂB

               Hׂ邱Ƃ͌ȍؐH`ҁAؐH`ҁAHȂ̒
           Bɂ͂قALȊỎ̎̂ʋlA{Ō
          邻̑̓̂܂܂ށBωɁuݍŏvU 
           ̂͂̉̎̂ĤׂƂ݂ȂBA؁Ałł
          ̂AłɕωĐHׂA}Cht 
          C [ɕωĔ]Hׂ邱Ƃ͓HׂƂ݂ȂBA
          X͓̕Ƃ݂ȂB

               Ɋւ炸As\ȕAHׂƊ댯Ȃ̂
          B ɑ΂āuݍŏvU邱Ƃ́Ả
          ̂ĤׂƂ݂ȂBuiȍؐH`(``vegan'')vƂ
          t ͐HוɊւ镶ł̂ݗp邱ƂɒӂĂقB
          ꂽ(A̗؁AApA)ggɂ 
           邱Ƃ͐ɈᔽȂB܂Au~NF́v͕sȔ
          Fł͂邪A܂ł킯ł͂Ȃ̂ŁAȍؐH` 
                  B X  ChvC[`
          ``fruits''́AႦuځvł낤u|[N`bvv 
          낤AȍؐH`҂̐ɈᔽȂB

               __҂͏@ے肷B܂A#pray(F), #offer(
          ), #turn (ŝ̂߂), mɑ΂ #chat(b)
           ͂łȂBꕔ̓ǎ҂͕ƂmŃvĈ̐
          ĂƎ咣邩ȂAł̓vC[̑I ]
          n cĂBCF_[̖_ɕ̂̓Q[ɏ
          邽߂ɕKvȂ̂Őɂ͔Ȃ̂ƂB܂A{_ m
           ₻̑̏@I݂bt𕷂Ăɂ͔ȂB^
          __҂͌t͕AɂȂʂȈӖoȂB

               قƂǂ̃vC[͕(邢͕Ƃđ邱 
          lĂ铹)ɐ키B̈͂̂悤ȕɂ
          g킸ɃQ[ɏ邱ƂłB𓊂A˂ A
          R 肷̂͋B܂AAA邢͂̑̃ACe
          gAfrŐ키ƂB

               NetHack ɂāAa`҂͑̉EĂ͂ȂȂ( 
          ƁA̎ɂČol𓾂Ă͂ȂȂ)B͓ɓ
          ł邪A̎iɂČol𓾂邱Ƃ͉\łB

               ӎ҂͓ǂݏłȂBɂ͈ȉ̍sׂ܂܂B
          ǂށAǂށA肢NbL[̃bZ[WǂށATVc
          ̕ǂށAA``x''ꕶ(ӎ҂̓`IȃTC)
          O ̕ށBł镶ǂނƂƁAQ[ɏ邽
          ɐ΂ɕKvȃACeǂނƂ͐ɂ͔Ȃ   B
          Q[ JnɎĂ銪Ǝ̓emĂ邱Ƃ
          ю̒ḿAQ[JnȑOɋt狳̂Ƃ݂ȂA 
          ɂ͔Ȃ̂ƂB

               ̑ɂׂ̍Q[ƂċL^钧킪B
          ͋sE邱Ƃ\łBɃvĈ 
           B  sE@^ꂽƂA ``none''(܂``
          '')ƓƁAsEȂ܂܂ɂ邱ƂłBȂ̓ACe


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              30



          𓯂O[v̑̃ACeɕω (``polypiling'')A
          ̏EEŎ̑̂𑼂̐ɕς(``polyself'') 
          B ̌ʂpȂƂ͂ꂼ꒧Ƃ݂ȂBŌɁA
          Ȃ͂Ƃǂ肢ȂĂ炤ƂBȂ̃ACe 
          킸ɃvĈ͈̒łAȂ(Ƃ
          łƂĂ)ŃvĈ̒łBACe肤
          @ ^ꂽƂA ``nothing''܂``Ȃ''ƓƁA
          Ȃ܂܂ɂ邱ƂłB


          9.  IvV

               lɂ͂ꂼꂢ낢ȍD݂ NetHack ̗Vѕ 
           قȂĂ̂ŁANetHack ̐U镑ύX邽ߐݒłI
          vVB

          9.1.  IvV̐ݒ

               IvVݒ肷@ɂ͂BQ[ `O'  R
          } hgƂɂđSẴIvV邱ƂłÂ
          ƂǂύXłB܂Aϐ``NETHACKOPTIONS''ݒt@ C
           ŎIɐݒ肷邱ƂłBNetHack ̃o[WɂĂ
          Q[JnOɃIvVݒ肷邱ƂłvO 
          邱ƂB

          9.2.  ϐ NETHACKOPTIONS g

               ϐ NETHACKOPTIONS ɂ͂낢ȃIvV̏lJ
          }ŋ؂ė񋓂ݒ肷BIvV̂̂̂ 
          P ɃIIt̑Ił邾łB̃IvVXg
          ɓƃIɂȂAIvV̑O `!' ``no''ƃI
          t ɂȂB̑̃IvVł͐ݒlƂĕ񂪕KvłB
          ̃IvVݒ肷ɂ̓IvVAR܂̓C R[
           LAݒl̏œ͂΂悢Bݒl͎̃J}͕
          ̍Ō܂łƂȂB

               Ⴆ``autoquiver''I A``autopickup''  I tA  O
          ``Blue  Meanie'' ɁAt[c``papaya''ɂȂ悤Ɋϐ
          ݒ肷ɂ csh ł͎̃R}h͂΂悢B (!͓ꕶ 
          Ȃ̂ŃGXP[vĂKv邱Ƃɒ)

               % setenv NETHACKOPTIONS "autoquiver,\!autopickup,name:Blue Meanie,fruit:papaya"

          sh ܂ ksh ł

               $ NETHACKOPTIONS="autoquiver,!autopickup,name:Blue Meanie,fruit:papaya"
               $ export NETHACKOPTIONS

          Ƃ΂悢B

          9.3.  ݒt@Cg

                t@C̒`#'Ŏn܂s̓RgƂĈB
          t@C̒``OPTION=''Ŏn܂s͊ϐ``NETHACKOPTIONS''


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              31



              @  I v V   L q Ă̂ƌȂB
          ``DUNGEON=''A``EFFECTS=''A``MONSTERS=''A``OBJECTS=''A``TRAPS=''A``BOULDER=''
          Ŏn܂s͂ꂼ dungeon A effects A monsters A objects A
          traps A boulder
           IvVƂĈ邪A̎w@́AݎgĂtH
           ĝɎgLN^R[h 10 i̗łB
          ̗ 0 w肷ƁA̍ڂ͕ύXȂB̋@\ I v
          V̕@ł͗płȂB̗͊es̍Ō`\'邱
          ɂĕsɓn邱ƂłB

               RpC AUTOPICKUP_EXCEPTIONS IvVݒ肳 
           ƁA ``AUTOPICKUP_EXCEPTION=''Ŏn܂sɂ pickup_type
          IvV̗O`łB

               Wݒ̐ݒt@C OS ɂĈ   A   
          ``NETHACKOPTIONS''  i擪`@'t邱ƂŁjgpݒ
          t@Cw肷邱ƂłB

          9.4.  JX^}CYIvV

               ȉɂ낢ȃIvV̖B܂ɒ
           ͖̕Bȉ̃IvV̂ɂĂ͖
          ƂȂĂIvVB

          align
            X^[g̑(align:lawful, align:neutral,  align:chaotic)B
             ̈ꕶŎw肷邱ƂłBWݒł̓_ɑI
            B `O' R}hŐݒ肷邱Ƃ͂łȂB

          autodig
            @邽߂̓ɂĂāA@邱Ƃłn`Ɉړ 
            ƂƂAIɌ@iWݒ̓ItjB

          autoopen
            ɌĕƎłJiWݒ̓IjB

          autopickup
             ɂ̂IɏEiWݒ̓IjB̐U镑
            JX^}CY邽߂ɂ pickup_types QƂ邱ƁB

          autoquiver
            ̃IvV͖̎`f'(fire:̒ɂ̂𔭎
             ) R}hsɂǂ邩߂BIȂAR
            s[^͓KȕɓB̎A􂢁AjA @A
            򉻁A̐Ȃǂ͍lȂ̂Œӂ邱ƁB`Q'R
            }hgĎ̍DȕɓB镐   
            ÃIvVIt̎͑`t'(throw:𓊂)R}
            hsB (Wݒ̓It)

          boulder
            \̂ɗpLN^iWݒ͊\L N
            ^jB




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              32



          catname
            X^[g̔L̖O(: catname:Morris)B `O' R}hŐݒ肷
            邱Ƃ͂łȂB

          character
            LN^̃^Cvݒ肷(:``character:Monk'')B  ``role''
            I v V   łBEƂݒ肷邻̑̕@ɂ
            ``name''IvVQƂ̂ƁB ``random''ȊO͍̕ŏ
             1 ŔʂB

          checkpoint
            v ONbVɕł悤ɊKړ閈
            ԂZ[uiWݒ̓IjB

          color
            FXȉ╨⓴A̒n`J[ŕ\ (} C N  R 
            s[^ł͕Wݒ̓I)B

          checkspace
            t@CޑOɃfBXN̋󂫗eʂ`FbN(Wݒ
            ̓I)BZ[ut@C⃌xt@Ĉ߂Ɏgp[eBV
            2GBȏ̋󂫗eʂꍇÃIvVItȂ
            ΂ȂȂȂB̃IvV̓RpCMFLOPPY
            `ĂƂ̂ݓKpB

          cmdassist
             肪ȃ~XoƂɐVKvC[̂߂ɒǉ̃R}
            h⏕bZ[W\(Wݒ̓I)B

          confirm
            ybgAXȂ̍UĂȂU悤Ƃ 
            ɊmF(Wݒ̓I)B

          DECgraphics
             A  \ɗp镶ȂgłׂĒ`ɁA
            DEC VT-xxx/DEC Rainbow/ANSI rZbg炠炩ߗp 
             ݒgp(Wݒ̓It)B̃IvV͂܂^[~
            iK؂ȃOtBbNLN^悤ݒ肷B 
            A ȂŃOtBbN㏑ݒ肷Ƃɂ
            ȂĂ͂ȂB

          disclose
            Q[Iɕ\𐧌䂷(Wݒ́ASĂ\  
            )Bݒł͈̂ȉ̒ʂB

                 i - ̊Ӓ
                 a - ̌J
                 v - ގ̈ꗗ
                 g - E
                 c - 

             ꂼ̕\ɑ΂āȂOɂǂ̂悤ɐUw镶
            邱ƂłB̈Ӗ͈ȉ̂ƂB



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              33



                 y - mF邪AWݒ̓CGXɂB
                 n - mF邪AWݒ̓m[ɂB
                 + - mFȂɕ\B
                 - - mFȂŔ\ƂB

            (: ``disclose:yi na +v -g -c'') ̂悤ɐݒ肵ꍇA 
              m F  (Wݒ̓CGX)B ͊mF(Wݒ
            m[)B ގ͊mFȂɕ\B E͊mF
            ɔ\ƂB ͊mFɔ\ƂBގ
            ꗗ㩂⓯mɂĎ񂾉܂ނƂɒӁB

          dogname
            X^[ǧ̖O(: dogname:Fang)B `O' R}hŐݒ肷
            Ƃ͂łȂB

          dumpfile
            Q[ǏJot@CB %n}Ngp
            ƂŃvCLN^ɒu邱ƂłB̃Q[ 
             ̃fBNgɃt@Co߁A݌v
            BʏUnixVXeɂ/tmpw肷B

          dungeon
            {\̂߂̃OtBbNV{ݒ肷 ( W    
            `` |--------||.-|++##.##<><>_|\\#{}.}..## #}'')  dungeon   Iv
            V͕Wݒ̑̕ɒn}`̂Ɏgp 1   
            41 ̕BWݒ̑̕ɂŐݒ肵
            gēA̒n}\AWݒ͎̕gȂB 
             Ȃ̃VFʈ镶gȂÃLN
            ^GXP[vKv邩ȂƂɒӁB

            ̃IvVŐݒ肳镶́A݂ł͒ʏ C Ŏg
               ŃGXP[v邱ƂɒӂȂĂ͂ȂȂB
            `\' ̌͂̂̂̕̕ƂĎ舵A  v 
            tBb N X ƂĂ͈ȂƂƂłB]āA`\' 
            `\\' ƂKvBȃGXP[v`ł `\m' ͌
            ̃^rbgIɂA

            V {͈ȉ̏łFA(c)A()ÅpA
            E̊pÅpAE̊p, ǂ̌AT ̕ǁAt T 
            ǁA T̕, E T ̕ǁÂȂoAJ
            (c)AJ(), (c)A()AS _A
            ؁A ̏AÂʘHA邢ʘH, ւ̊KiAւ̊KiA
            ւ̂͂Aւ̂͂AՒdA, ʍAAA 
               xA XAnA~Ă钵ˋ(c)A~Ă钵ˋ(
            )AオĂ钵ˋ(c)AオĂ钵ˋ()ACA_A
            

             lp̕\𓾂邽߂ɂ͊p T ̕ǂ '+' g
            悢mȂB̃[Xł͐VV{ 
            Â݂̂č\\̂ŒӁB

            `O' R}hŐݒ肷邱Ƃ͂łȂB




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              34



          effects
              \     ̃OtBbNV{ݒ肷 (Wݒ
            ``|-\\/*!)(0#@*/-\\||\\-//-\\| |\\-/'').  effects IvV 
             Wݒ̑̕ɒn}`̂Ɏgp 1-29 ̕
            B̕ dungeon IvVƓlɏB

            V{͈ȉ̏łF(c)A()A(ォE
            )A(Eォ獶)A@AJ̃tbVAu[
            ()Au[(E)A@hɗp 4 ̋LAݍ܂
            ƂɎg 8 ̋LAɗp 9 ̋LB  3
            LN^ 3 񂩂ȂA̒S͂ 3 ~ 3 ̔z̒S
            ȂB

            ̃[Xł͐VV{Â݂̂č\ 
            \̂ŒӁB

            `O' R}hŐݒ肷邱Ƃ͂łȂB

          extmenu
            g R}hC^[tF[XALȃR}ḧꗗj[
            o悤ɕύXBL[͂́AŌ Enter KvȂ
              O͓`IȃC^[tF[Xƌ݊B tty C^[
            tF[XɂĂB(Wݒ̓It)

          female
            ``gender:female'' ̌ÂʖB `O' R}hŐݒ肷邱Ƃ͂ł
            ȂB

          fixinv
            ̖ژ^LƕƂ̑Ή͂̕ɒuĂωȂ(W
            ݒ̓I)BItɂƂ͕ɒuƂ̖̕ژ^Lȍ~
            ̋LƕƂ̑Ή 1 B

          fruit
             Ȃ̍D̉ʕɂȂł̖Oݒ肷(:fruit:mango)
            (Wݒ́uslime moldv)B NetHack ŎXgÎ
            IȖȌtłB slime mold(lolo)ƐH~
            킭Hוɂׂł낤B apples(S)Aoranges(I  
            W)A  pears( m  )A  bananas(oii)A melons () 
            NetHack ɂ݂͂Ă̂ŁAݒ肵Ă͂ȂȂB

          gender
            Jn̐(gender:male ܂ gender:female).  ŏ̈ꕶ
            w 肷邱ƂłB ``male''  ``female'' IvVw
            ĂĂA ``gender'' IvVD悳BWݒł K
            ؂Ȑʂ_ɑIB `O' R}hŐݒ肷邱Ƃ͂
            ȂB

          help
            `/' R}hgĒׂĂ镨ɂĉ炩̏   
            A 邩ǂq˂(Wݒ̓I)BwvoȂ
            悤ɂ ``More info?'' Ƃvvgɔς킳Ȃ 
             ŁAf𒲂ׂ邱ƂłB͋[dv
            Ă܂mȂƂӖB


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              35



          hilite_pet
            ybg𓯎̓王oIɋʂ(Wݒ̓It)BeL X
            gEBhE\ł color It̂Ƃɋ\B X̃^C
            gpƂ́An[g̋LybgɂB

          horsename
            Jn̔n̖O (:``horsename:Trigger'').  `O' R }
            hŐݒ肷邱Ƃ͂łȂB

          IBMgraphics
             AAʁA㩂̕\ɗp镶ȂgłׂĒ`
            ɁA IBM g ASCII Zbg炠炩ߗpӂꂽ 
            gp (Wݒ̓It)B̃IvV͂܂^[~iK
            ؂ȃOtBbNLN^悤ݒ肷BȂ킿A 
             ̃OtBbNŏ㏑ݒ肷ƂɂȂ
            ͂ȂB

          ignintr
            u[N܂ފ荞ݐM𖳎(Wݒ̓It)B

          legacy
            Q[JnɐbZ[W\(Wݒ̓I)B

          lit_corridor
            ڂ₠Ȃ̃LN^ĂɂČʘH \
             (Wݒ̓It)B

          lootabc
             JƂ`o', `i', `b'ł͂Ȃ`a', `b', `c'̃L[g
            (Wݒ̓It)B

          mail
            Q[Ƀ[zB悤ɂ(Wݒ̓I)B

          male
            ``gender:male'' ̌ÂȂʖB `O' R}hŐݒ肷邱Ƃ
            łȂB

          menustyle
            낢ȃACew肷Ƃ(Ƃ DropR}h)ɗp
            C^tF[X̐Bl   tradional,  combination,  partial,
            full   4 ̃^Cv̍ŏ̈ꕶw肷B ``tradional''
            Âo[WŗBꗘpł̂ŁA̎ނ   
            ́A   I  ނɓĂ͂܂SĂ̕mFB
            ``combination''͑I̎ނ͂邪A
             Ă͂܂镨mFőÎł͂ȂAj[`
            IB ``partial''͕̎ނIԂƂAɑS 
            \ꂽj[\B ``full''͕̎ނ̕
            ̂ɁAŏɕ̎ނ̃j[\AꂩI 
            ނɓĂ͂܂镨̃j[\B

          menu_deselect_all
            j[̑SĂ̍ڂIɂL[B Amiga, Gem, X11, tty
            ĂB(Wݒ `-')


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              36



          menu_deselect_page
            j[̂Aݕ\ĂSĂ̍ڂ I    
            L[B Amiga, Gem, tty ŎĂB(Wݒ `\')

          menu_first_page
            j[̍ŏ̃y[WֈړL[B Amiga, Gem, tty Ŏ
            ĂB(Wݒ `^')

          menu_headings
            j[̂ڂĂ镔ǂ̂悤ɕ\邩 w  
            Bl 'bold'(), 'inverse'(]), 'underline'()̂
            ꂩłB.  SẴ|[gŎۂɎOSẴ^Cv\ł
            킯ł͂ȂB

          menu_invert_all
            j[̑SĂ̍ڂ̑IԂ𔽓]L[B Amiga, Gem, X11,
            tty ŎĂB(Wݒ `@')

          menu_invert_page
            j[݂̌̃y[W̑SĂ̍ڂ̑IԂ𔽓]   L[B
            Amiga, Gem, tty ŎĂB(Wݒ `~')

          menu_last_page
            j[̍Ō̃y[WֈړL[B Amiga, Gem, tty Ŏ
            ĂB(Wݒ '|')

          menu_next_page
            j[̎̃y[WֈړL[B Amiga, Gem, tty Ŏ
            ĂB(Wݒ `>')

          menu_previous_page
            j[̑Õy[WֈړL[B Amiga, Gem, tty Ŏ
            ĂB(Wݒ `<')

          menu_search
            j[ŌsL[B Amiga, Gem, X11 ŎĂ B(
            Wݒ `:')

          menu_select_all
             j[̑SĂ̍ڂIɂL[B Amiga, Gem, X11, tty 
            ĂB(Wݒ `.')

          menu_select_page
            j[̂Aݕ\ĂSĂ̍ڂIɂ L[B
            Amiga, Gem, tty ŎĂB(Wݒ `,')

          monsters
             ̎ނ\̂ɎgpLN^w肷B (W
                     ``abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTU-
            VWXYZ@ '&;:~]'').   ̕ dungeon IvVƓlɏ
            BV{̏́A ant or other insect(a܂͑  
            ),  blob( u b u),  cockatrice( RJgX), dog or other
            canine(܂̓CkȂ̓), eye or sphere(ڂ܂͋),  cat
            or  other  feline( L ܂̓lRȂ̓), gremlin(O),


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              37



            humanoid(q[}mCh), imp or minor demon(Cv܂͉
            ), jelly([[), kobold(R{h), leprechaun(vR[),
            mimic(~~bN), nymph(jt), orc(I[N), piercer(  ),
            quadruped(l), rodent(ꖎ), arachnid or centipede(N
            ނ܂̓Jf), trapper or lurker above(gbp[܂̓[
            J[),  horse or unicorn(n܂̓jR[), vortex(Q), worm(
            [), xan or other mythical/fantastic insect(U܂͐_ b
             t@  ^ W[ ̍), light(), zruty(YeB), angelic
            being(VĝƂ), bat or bird(        ),
            centaur( P^EX), dragon(hS), elemental(), fun-
            gus or mold(LmR܂  [  h),  gnome( m[ ),  giant
            humanoid(  l),  invisible monster(Ȃ), jabberwock(
            WoEHbN), Keystone Kop(x), lich(b`), mummy(~C
            ),  naga( i[K), ogre(I[K), pudding or ooze(v܂
            E[Y), quantum mechanic(ʎq͊w),  rust  monster  or  disen-
            chanter or disintegrator(K̉Az̉܂͕ӂ̉),
            snake(wr), troll(g),  umber  hulk( A  o[ n  N),
            vampire( z  S),  wraith(  C X),  xorn( ][), apelike
            creature(̂悤Ȑ), zombie(]r), human or elf(lԂ܂
             G  t),  ghost( H ), golem(S[), demon(), sea
            monster(C̉), lizard(঒), long worm tail(O[ 
             K), mimic(~~bN) łB `O' R}hŐݒ肷邱Ƃ
            łȂB

          msghistory
             ^P ŌĂяo߂ɕۑĂŏs̃bZ[W̐(W
            ݒ 20)B `O' R}hŐݒ肷邱Ƃ͂łȂB

          msg_window
             ̃bZ[W̕\@ύX(_ł tty ɂ̂ݎ
            Ă)Bwłl͈ȉ̂ƂB

                 s - `single': 1 bZ[WB
                 c - `conbination': ŏ 2 bZ[W `single'Ǎ `full'B
                 f - `full': SʁBÂbZ[W (Wݒ)B
                 r - SʁBVbZ[WB

            ߋƂ̌݊̂߂ɁAlȂɂł(`full'Ƃ݂Ȃ)A 
            ł(`single'Ƃ݂Ȃ)B

          name
               ̃LN^̖Oݒ肷(Wݒ͂Ȃ [U
            )B -LƃLN^̐EƂ̓t(܂ -A  -B
            -C  -H -K -M -P -Ra -Ro -S -T -V -W ̂ǂꂩɕt)Ƃ
            ĐEƂݒ肷邱ƂłBEƂƂ -@ gp ƁA
            _ȂЂƂIɑIB `O' R}hŐݒ肷邱
            Ƃ͂łȂB

          newcolors
            tty|[gp̃J[pbgIWiNetHackpbg 
            lɐݒ肷B ÂDFƂĕ\ȂꍇA
            ̃IvV𖳌邱(Wݒ̓I)B `O' R}hŐ
            肷邱Ƃ͂łȂB



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              38



          news
            NetHack  ̃j[Xt@C΂ǂ(Wݒ̓I)B
            j[X̓Q[̍ŏɕ\̂ŁA `O' R}hł
            肷͖̂ӖłB

          null
            [ɃpfBÔ߂̃iLN^𑗂(Wݒ̓It)B

          number_pad
            ړ̂߂[yuhjklbn]̂ɐL[gp(Wݒ 0
            ܂̓It)B (number_pad:2 ͐̂ DOS ł̐U镑ɂB `5'
            `g'Ameta-`5'`G'Ameta-`0'`I'ƂȂB)

          objects
                 \      gݒ肷 (Wݒ
            ``])[="(%!?+/$*`0_.'')  ̕ dungeon IvVƓl
             BV{̏Ԃ́iƂȂ悤ȁjȕ
            ́AAhAwցAAHAHAAA A
            A݁A΂܂͐΁A΂܂͒ASAAŉtB `O' R
            }hŐݒ肷邱Ƃ͂łȂB

          packorder
            ̎ނ\      w   ( W    
            ``")[%?+!=/(*`0_'')B̃IvVɂ͂낢ȕ̎ނ\
            ̗ݒ肷Bݒ肳Ȃނ͈ȑȌōŌ \
            B

          paranoid_hit
            LɂƂAFDIȉUƂm``yes''Ɠ͂
            B ``y''ꕶ͕sB

          paranoid_quit
            LɂƂAQ[߂T[h       m
            ``yes''Ɠ͂B ``y''ꕶ͕sB

          paranoid_remove
            L ɂƂATRR}hɂďɃj[\B
            ͊OEłACeȂƂɂL 
            B

          perm_invent
              I Ȃ΁A݂̎ꗗɃEBhEɕ\Ă
            B̋@\ĂEBhEVXeł̂ݗLB

          pettype
            vCLN^NX̃^Cṽybggpł 
             ̃ybgw肷A܂͏̃ybgSw肵ȂB
            wô``cat'', ``dog'', ``none'' łB `O' R} h
            Őݒ肷邱Ƃ͂łȂB

          pickup_burden
             EɂŎw肵ו̏dx (Unburdened, Bur-
            dened, streSsed, straiNed, overTaxed, overLoaded) ȏ   
            ƁAs邩ǂmFB (Wݒ `S').


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              39



          pickup_dropped
             ̐^UIvV autopickup LłꍇA pick-
            up_types ɓĂ̂łĂAȂƂ͎̂I
            ɏEȂBl͖B

          pickup_thrown
            ̐^UIvV autopickup LłꍇA pickup_types
            ɓĂȂ̂łĂAȂ̂IɏE 
            Ǝ݂Bl͗LB

          pickup_types
            autopickup   IvVݒ肳Ă鎞ɏE̎ނw肷
            (Wݒ͑SĂ̎)BIRpCIvV   
            AUTOPICKUP_EXCEPTIONS w肳ĂƁA autopickup_exception
            sgƂ autopickup ̐U镑ׂłB

          pilesize
            "ɂ̂́DDD"̃gK[ƂȂACe   
            Bw\ȍŏ 1 ŁAw肷ƃACe̏ꍇ
            ł "ɂ̂́DDD" ꗗ\ȂB

          prayconfirm
            _ɋFOɊmF(Wݒ̓I)B

          preload_tiles
            MSDOS̃veNg[hŁA^CQ[̎n߂ɂ炩 RAM
               łǂ𐧌䂷BIɂƁA^CO
            tBbÑptH[}X܂邪A葽̃gp(
            Wݒ̓I)B `O' R}hŐݒ肷邱Ƃ͂łȂB

          pushweapon
            ɕĂ鎞 `w' (wield: ) R}hg
            ƂAɎĂ\̕ɐݒ肷(Wݒ  I
            t)B

          qwertz_layout
            R pCconfig.hQWERTZݒ肳Ă΁ÃIvV
            w肷邱ƂyL[zL[ւ邱ƂłB 
            ăL[{[hCAEg𑽏֗ɂB

          race
             I(: ``race:human'')BWݒ̓_łB
            `O' R}hŐݒ肷邱Ƃ͂łȂB

          rest_on_space
            Xy[XL[ `.'(rest: xe) R}hƂĎgp (W
            ݒ̓It)B

          role
            L  N ^          ( :``role:Samurai'')B
            ``character''IvVƓłBEƂݒ肷邻̑̕@
            ɂĂ``name''IvVQƂ̂ƁBʂ͐擪 1 
                          A   `r'         O      
            B``Rogue''A``Ranger''A``random''邩łB


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              40



          runmode
            u܂Ƃ߂Ĉړv(shift+control+ňړ邩As
            R}h}EX̃NbNgꍇ) Ƃɂǂꂭ炢̕p x
            Œn}XV邩𐧌䂷Bݒ\Ȓl͈ȉ̒ʂB

                 teleport - ړĂn}XVB
                 run - 7 炢ɒn}XVB
                 walk - 1 ɒn}XVB
                 crawl - ``walk'' ƓlAɂ΂炭~B

             ̃IvV͉ʕ\ɂ̂݉eAۂ̈ړʂɂ͉e
            ȂBWݒ `run' łBo[W 3.4.1 ȑO   `tele-
            port'  ݂̂łBʂmFł邩ǂ͎gĂł[
            ̎ނɈˑB

          safe_pet
            ybg(ybgƒm)UĂ܂̂h(Wݒ  I
            )B

          scores
             ɃXRAXĝǂ̕邩𐧌䂷 (F``scores:5
            top scores/4 around my score/own scores'')Bꂼ̕ 
            ̕ (`t', `a', `o')݂̂KvłB

          showborn
            Q[ IɁu|ꗗvɂĐA|
            ƈقȂꍇ݈̂ꏏɕ\B

          showexp
            ŉsɌ݂̌o_\(Wݒ̓It)B

          showrace
            Ȃ\ƂɁAEƂɑΉ}[Nł͂ȂA푰 
             }[Nŕ\(Wݒ̓It)B̐ݒ͕\ɂp
            AQ[ƂĂ͉ςȂƂɒӁB

          showscore
            ŉsɌ݂̃XRA\(Wݒ̓It)B

          silent
            [̃r[v炳Ȃ(Wݒ̓I)B

          sortpack
            ̖ژ^\Ƃޖɉו̓eבւ (W 
            ̓I)B

          sound
            Ȃ̃LN^̂Ɋւ郁bZ[W\(W
            ݒ̓I)B̓Rs[^̉o͋@\Ƃ͉̊֌WȂ
             Ƃɒӂ邱ƁB̃IvV͕IɂvC[̐
            䉺ɂBႦ΁AĂԂ͂̃IvV͎IɃI t
            ɂAڊo߂ƃIɂȂB




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              41



          sparkle
             (₠Ȃ)U󂯁AɒRꍇɉʌʂ\
             (Wݒ̓I)B

          standout
            ``--More--''𑾎ŕ\(Wݒ̓I)B

          suppress_alert
            Õo[WύXꂽ@\ɑ΂Ēӂ𑣂bZ[W 
            \     悤ɂ NetHack ̃o[Wݒ肷B (:
            ``suppress_alert:3.3.1'') ̂悤Ɏw肷 3.3.1 ȑOɕύX
            ꂽ@\ɑ΂钍ӃbZ[W͕\ȂB

          time
              sɃQ[Ōo߂Ԃ^[ŕ\(Wݒ̓I
            t)B

          timed_delay
            ╨̂̈ړȂǁAʂ\邽߂ɂƎԑ҂ 
             AȃLN^ʂɑ邩Ƀ^C}[gpB
            (tty C^tF[Xɂ̂ݓKpB X11 C^tF[X͏ 
            ^ C}[gpBWݒ̓^C}[ɂ鎞ԑ҂gݍ
            ĂȂ΃I)

          tombstone
            񂾂Ƃ΂\(Wݒ̓I)B

          toptenwin
            Q[I̕\Wo͂̂NetHack̃EBhEɕ\
             (Wݒ̓It)B̃IvVݒ肷ƃEBhEg
            o[W NetHack ł͋NeEBhEƂ͕ʂ̃EBh
            E ɃXRAXg\BAXRAXg̓Q[I
            ƃ^[~iEBhEɂ͎cȂB

          traps
            㩂̎ނ\̂ɎgpLN^w肷B(Wݒ
            ``^^^^^^^^^^^^^^^^^"^^^^'').   traps IvV͕Wݒ̕
            ̑㩂`̂Ɏgp 1  22 ̕B
                 dungeon IvVƓB̕
            dungeon IvVƓlɏB

            V{̏́A arrow trap(), dart trap(  ),
            falling  rock  trap(   ), squeaky board(ޔ), bear
            trap(F), land mine(n), rolling boulder trap( ),
            sleeping  gas  trap(   KX), rust trap(H), fire
            trap(΂), pit(), spiked pit(gQ     ),
            hole( ), trap door(), teleportation trap(uԈړ),
            level teleporter(ʂ̊Kւ̏uԈړ), magic portal(@̓
            ),  web(  ̑), statue trap(), magic trap(@
            ), anti-magic field(@Ԃ), polymorph trap(   
            )B

            `O' R}hŐݒ肷邱Ƃ͂łȂB



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              42



          travel
            g xR}hLɂ(Wݒ̓I)B̃IvV
            Itɂ邱ƂɂāAn}EBhENbN 
            ƂɂāA]܂Ȃړ悤Ƃ邱ƂhƂłB

          verbose
            Q[̃Rgڍׂɕ\(Wݒ̓I)B

          windowtype
            E ChEVXegp邩ǂuttyv܂́uX11vőI
            iWݒ̓o[WɂjB `O' R}hŐݒ肷邱
            Ƃ͂łȂB

          win_edge
            ttyɂ郁j[уeLXgEBhEɂāAE񂹂ł
            Ȃ񂹂ŕ\B (Wݒ̓It)

          9.5.  EChEVXeŐpJX^}CYIvV

               ȉ͂ȂIEBhD^Cv̓JX^}CY
           ύX邽߂ɗplXȃIvV̐łB镶
          ͓Kɐ؂l߂BSẴEBhD^Cvɑ΂Ă S
           ̃IvVLƂ킯ł͂ȂB̃IvVݒ
          ꂽƂAEBhD^Cv̐ݒ󂯕tȂA 
            B 󂯕tȂȂAPɖB݂̃EB
          hD^CvőΉĂIvV́AIvVꗗ\ (`O') 
          \Bꕔ̃IvV`O'R}hœIɕύXłB

          align_message
            bZ[WEBhEǂɒu(top, bottom, left, right)

          align_status
            Xe[^XEBhEǂɒu(top, bottom, left, right)

          ascii_map
            \ȂASCIILN^}bv\

          color
            ÁAA̍\vfJ[ŕ\

          eight_bit_tty
            8 rbgLN^(Ⴆ traps IvVŎw肵)
            ܂܃^[~iɕ\(Wݒ̓It)B

          font_map
            }bvEBhE\tHg

          font_menu
            j[\tHg

          font_message
            bZ[W\tHg




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              43



          font_status
            Xe[^X\tHg

          font_text
            eLXg\tHg

          font_size_map
            }bvEBhE\tHgTCY

          font_size_menu
            j[EBhE\tHgTCY

          font_size_message
            bZ[WEBhE\tHgTCY

          font_size_status
            Xe[^XEBhE\tHgTCY

          font_size_text
            eLXgEBhE\tHgTCY

          fullscreen
            EBhEłȂʑŜŕ\悤Ǝ݂

          hilite_pet
            ybgڗ悤ɕ\(Wݒ̓It)B̃IvV 
            U 镑͎gĂEBhEVXeɈˑBeLXgEB
            hȄꍇAPx]ɗpB^C̏ꍇA 
            Iɂ̓ybg̋߂Ƀn[g}[N\B

          large_font
            傫tHggB

          map_mode
            w肳ꂽ@Ń}bv\B

          mouse_support
            ͂ƈړɃ}EXg悤ɂB

          player_selection
            LN^IɃ_CAO{bNXmFʂp

          popup_dialog
            ͎Ƀ|bvAbv_CAO{bNXp

          preload_tiles
            ^ C    ɗ\ߓǂݍłBႦ΁AveNg[
            hMSDOSł̏ꍇAQ[JnɃ^C RAM ɗ\ߓǂݍނ 
             𐧌䂷B\ߓǂݍނƃ^COtBbN̐\͌シ
            邪A葽̃ (Wݒ̓I)B `O' R} 
            hŐݒ肷邱Ƃ͂łȂB

          scroll_amount
            scroll_margin  IvVŎw肳ꂽʒuɗƂɁAǂꂾ


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              44



            ̐XN[邩w肷B

          scroll_margin
            EBhE̒[炱Ŏw肳ꂽ}XɂȂ܂̓J[\ 
            ړƂɁAʂXN[B

          softkeyboard

          splash_screen
            NɃXvbVXN[\(Wݒ̓I)

          tiled_map
            \Ȃ^C}bv\

          tile_file
            Wݒ㏑ʂ̃^Ct@C̖O

          tile_height
            ^C\łł̃^C̍

          tile_width
            ^C\łł̃^C̕

          use_inverse
            Q[w肵Ƃɉʂ𔽓]

          vary_msgcount
            bZ[WEBhEɈxɕ\郁bZ[W̐

          windowcolors
            \ȂEBhEw肵OiF/wiFŕ\

          wraptext

          9.6.  vbgtH[ŗL̐ݒIvV

               ȉ͓̃vbgtH[ŃJX^}CYU镑̕ύX
          邽߂ɗpIvV̐łB

          altkeyhandler
            L[͂ DLL I(Win32 tty NetHack ̂)B DLL  
             ÓA.dll ̊gqpXŎw肷B `O' R}hŐݒ
            邱Ƃ͂łȂB

          altmeta
            (Wݒ̓IB AMIGA NetHack ̂)B

          BIOS
            ɉʂAړɃJ[\L[g悤ɃL[ {[
            h ǂނ߂ɁA IBM-PC ݊ BIOS ROM gpĂ}V
            BIOS R[gpB (Wݒ̓ItBOS/2 , PC,    ST
            NetHack ̂)




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              45



          flush
            (Wݒ̓ItB AMIGA NetHack ̂)B

          MACgraphics
            (Wݒ̓IB Mac NetHack ̂)B

          page_wait
            (Wݒ̓IB Mac NetHack ̂)B

          rawio
            raw(cbreak łȂ) [hgpāA荂ȏo͂Ɩ̋N
            Ȃ͂ (MS-DOS ł̓v^Ȃɂ    
            `^P'  v^o͂̃gOƂ݂ȂĂ܂Ƃ) (W
            ̓It)B: DEC Rainbow ł͂ꂪÎƂ̓nOAbv
            Ă܂B `O' R}hŐݒ肷邱Ƃ͂łȂB

          soundcard
            (Wݒ̓IB PC NetHack ̂)B `O' R}hŐݒ肷邱
            ͂łȂB

          subkeyvalue
            (Win32 tty NetHack ̂)BۃL[{[h̖␳̂ 
            邽߂ɁA OS  NetHack ɕԂL[͂̒lύX邽߂Ɏg
            pB OPTIONS=subkeyvalue:171/92 ƂƁAƂ 171 
            悤ƂĂꍇA NetHack  92 ԂBKvȂA
            subkeyvalue sݒt@CɏĂ悢B `O' R}hŐݒ
            邱Ƃ͂łȂB

          video
            g prfI[hݒ肷(PC NetHack ̂)Bl `autode-
            tect', `default', `vga' ̂ꂩłB `vga' (    VGA
            n[hEFAƂ`autodetect')ɐݒ肷ƁA\Ƀ^C
            pB `O' R}hŐݒ肷邱Ƃ͂łȂB

          videocolors
            NO_TERMgpĂPCVXẽJ[pbgZbg (W
            ݒ́u4-2-6-1-5-3-15-12-10-14-9-13-11v)(PC NetHack ̂)B
            V{̏Ԃ́AԁE΁EFEE}[^EVAEP E
            P  ԁE P  ΁E  FEPEP}[^EPVAB
            TTY_GRAPHICSVIDEOSHADESLɂԂŃRpC̃V
            X e ł͂3F`\BV{̏Ԃ́AԁE΁EFE
            E}[^EVAEDFEEPԁEP΁EFEP E
            P}[^EPVAĔB `O' R}hŐݒ肷邱Ƃ
            łȂB

          videoshades
            3 iK̗p\ȃOCXP[ݒ肷 (Wݒ   ``dark
            normal  light''  PC  Nethack̂)BQ[ʂɂꍇ
            ́AR̃XP[𒲐Ă݂邱ƁBł܂   
            A!colorĂ݂邱ƁB `O' R}hŐݒ肷邱Ƃ
            łȂB





          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              46



          9.7.  EO̐ݒ

               IRpCIvVƂ AUTOPICKUP_EXCEPTIONS  
           B  ̃IvV`ăRpCꂽoCȉꍇA
          autopickup IvV̐U镑 pickup_types IvVg
          邱ƂłB

               autopickup_exception  sݒt@CɏƂŁAE
          ƂƂɃ`FbNׂp^[`łB

          autopickup_exception
            pickup_types IvV̗Oݒ肷B  autopickup_exception
            I v V ͂Ȃ̈ʒuɂ镨̂̐̒P`Ɉvp
            ^[w肷B 1-80 ̕łׂłB

               p^[ł͈ȉ̓ꕶgB

                 *--- 0 ȏ̕Ƀ}b`B
                 ?--- Cӂ 1 Ƀ}b`B

               ɁAp^[̐擪ɒuꍇɓʈ镶
          B

               < - ȉ̃p^[Ɉv镨̂͏ɏEB
               > - ȉ̃p^[Ɉv镨̂͌ďEȂB

               `O' IvVŐݒ肷邱Ƃł邪Aݒ̓Z[uE[h
          Ƃɂ͕ۑȂB

               ȉ autopickup_exceptions ̗łB


          L̗̍ŏ̂̂́ASĂ̖IɏEBԖڂ̗́A 
           ͎E̗OƂBṒ̗AĂƂ킩Ă
          ͎̂E̗OƂB `ďEȂ'[` E '
          [ɗD悷B

          9.8.  ̐ݒ

               b Z[ WEBhEɕ\ꂽbZ[W[U`̃p
          ^[ƈvƂɓ̉t@C炷Ƃ   v
          bgtH[B݂̂ƂAQt, win32tty, win32gui [
          UɑΉĂB

               [UƃbZ[W̊֘AtɊւݒt@Cڂ͈
          ̂ƂłB

          SOUNDDIR
            t@ĈfBNg

          SOUND
             t@Cƃ[Uw肷郁bZ[Wp^[֘At鍀
            ځBe SOUND ڂ͈ȉ̍ڂɕB



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              47



                 MESG       - bZ[WEBhEw (3.4 ł͂ɑΉĂ)
                 pattern    - }b`p^[
                 sound file - 炷t@C
                 volume     - t@C炷Ƃ̉

               p^[̐mȏ̓vbgtH[ ``K\'' p
             NetHack ̓p^[}b`O@\p邩ɂĕς
          B ``K\'' }b`O NetHack p^[}b`O
           Ă邪AT[hp[eBCuKvȃvbgtH[
          B ``K\'' Ɋւ͂ǂ̂ƂQƂ 
          ƁB ǂ̃p^[}b`OpĂ邩 #version R}
          hŊmFłB

               NetHack ̓p^[}b`O[`͈ȉ̓ꕶp
          B

                 *--- 0 ȏ̕Ƀ}b`B
                 ?--- Cӂ 1 Ƀ}b`B

               ȉ NetHack p^[}b`O@\płB

                   SOUND=MESG "*chime of a cash register*" "gong.wav" 50

              "chime of a cash register" ܂ރbZ[Wɔ
          "gong.wav" 炷Bݒt@Cɂ͕ SOUND ݒ 
          łB

          9.9.  oQ҂NetHackvC邽߂̐ݒ

               NetHack  ͓A̒n}̂ɕW ASCII LN^
          g悤ɐݒ肷邱ƂłBɂA MS-DOS ł  NetHack
           ܂͓_ZppΖڂ̕sRȐlłSɃvC
          \łBvC[͂̉ʓǂݎVXeɊւ\ 
           mKvŁA㉺EɈꕶړ@mȂ΂
          Ȃ낤BʓǂݎVXě\͂m邱ƂȂ 
          l BvCOɂ̃KChubN\ɓǂ߂΁Aʂ̃
          CAEgǂȊ킩邾낤B܂A PC J[\̈ʒu 
           ~߂邱ƂłKvB͎̃LN^̈ʒu
          ĂB `@'͑̃q[}mCh\킷̂ɂp   
          ŁA  ̈ʒuT̂`@'邾ł͕s\łB
          ɁAȂĂʒu PC J[\̈ʒu̕Iȍsƌ m
           @\Kv낤B̋@\̓XN[Ŝɂǂ̂悤ȃAC
          e邩𔻕ʂ̂ɕ֗łB

               ꂽ[UȂ defaults.nhC邱Ƃ͓Ȃ낤
          AS҂͏Ђł܂dȂB NetHack ̑SĂ
          zzɂ NHAccess.nhƂt@C܂܂ĂB default.nh
          t@ C̃t@CƓւ邱ƂɂAڂ̕sRȐlv
          Cł悤ȐݒɂȂBt@CC邱ƂQ[ 
           ɊꂽȂAD݂ɍ悤ɐݒύXƎvƂ
          낤B̂߂̐ NHAccess.nh ̂̂Ɋ܂܂ĂBQ[
          ̃ANZVreBɍłe^ݒ͈ȉ̂̂ł:




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              48



          IBMgraphics
            ̃IvVRgAEg邱Ƃɂ IBM OtBbN
            𖳌ɂB

          menustyle:traditional
            ͉VXe𗘗p鏕ɂȂB

          number_pad
            ̔vO number-pad ʂ̊mFɗpB 
            A number_pad IvVItɂāA`I Rogue R}
            hgƁB

          Character graphics
            defaults.nh t@C̉̕ɂSẴLN^OtBb N
            ݒRgAEgB̂قƂǂ NetHack ̕Wł
            AW ASCII LN^pA̕\gLN^Zb
            g ̂ÂLN^ŒuB̃LN^͉
            ǂݎVXeς킹邾낤B

          10.  _

               NetHack ͐ݒɂāAȂ̋@Bɂ鍂_̈ꗗ܂
           _҂̈ꗗ쐬B҂̐ݒɂȂĂꍇAQ[
          Ō܂ŏIꍇ̃}V 1 ̃AJEgɂ 1  
           ̈ꗗɂ͍ڂȂBȂ̈ꗗɍڂĂ鑼̒N
          荂_ƂA͂Ȃ̑O̓_荂 _
             Ƃɂ̂݁Äꗗׂ̂ʒuɂȂ̖O
          B_܂ōڂ邩RpCɐݒłB

               _͎ɌolA험iABKƃQ[̏IɊ
           ĂBQ[ꍇɂ͎ĂSzɂĒEo
          łB|̖{̒ŎEꂽꍇɂ́AS[ 
           Ă 90% Mhɓ`(`҂͖S[𔭌
          ꍇɂ͎萔邱ƂmĂ)B]ĉɂɈ
           ĉ^ΐcƂ邩AĂ̎_ŎĂ
          镨ŏI邩͂Ȃ߂邱ƂłBꍇ͂ 
           ɂ邱ƂłBĐc΂ɑ
          邱Ƃł邩mȂB

               PɌ_ł̍_ҁE_̈ꗗꍇɂ͂قƂ
          ̃o[Wł nethack -s all Ɠ͂΂悢B


          11.  T[h

               NetHack ͕GœQ[łBS҂͐c邷ׂm
          ȂƂɋCÂA|ɂÂĂ܂ȂB 
           邱Ƃ͂ȂB`铴AɁuTv́uv[h
          ꍇɂ́A_̈ꗗɍڂȂƂƂɑȂf b
          g ƈւɑÕZ[ut@CcĂsgƂȂꂽ
          ̂łB

               T[hɓɂ 2 ʂ̕@B1 ̓Q[̊J n
           -X XCb`t邱ƂłB 1 ̓Q[̃vC


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              49



          `X' R}h͂邱ƂłBT[hœ鑼̗_ 
          _ȓǎҏNm߂ė~B


          12.  NWbg

               ŏ hack ƂQ[́Ao[NC UNIX ̃Q[ rogue
          fƂĂB̃hLg̑啔 Michael C. Toy  
          Kenneth  C.  R.  C.  Arnold ̎ɂȂ A Guide to the Dungeons of
          Doom(^̓Aւ̏) }Xp̂łB܂ꕔ
            Ken  Arromdee   ɂ Further Exploration of the Dungeons of
          Doom(^̓A̐[ւ̒T) ̂ĂB

               NetHack ͕ǂ艽\l̐lX̎ɂĊꂽB
          ̓Q[̊J̉ߒł̎ȏołB


               Jay Fenlason  Kenny Woodland, Mike Thome, Jon Payne ̏
          𓾂āAŏ Hack B

               Andries Brouwer ̓vO啝ɏ Hack Ƃ
            قȂQ[ɎdďグA UNIX }Vp(ȂƂ)3
          o[W(1.0.1A1.0.2A1.0.3) Usenet Ŕ\B

               Don G. Kneller  Hack 1.0.3  Microsoft C gp   MS-
          DOS  ֈڐA PC HACK 1.01e 쐬Bo[W 1.03g ł DEC
          Rainbow ̃OtBbNT|[gAďȂƂ 4   
          o[W(3.0A3.2A 3.51A3.6)쐬B

               R.  Black     PC  HACK  3.51  Lattice C gp Atari
          520/1040ST ֈڐA ST Hack 1.03 쐬B

               Mike Stephenson ͂̂낢ȃo[WĂ 1  
           A̒ǉvfƍ킹 NetHack o[W 1.4 쐬
          Bɔނ͉l̐lXɍƂ𕪒S NetHack 1.4 ̊g
          fobOsA NetHack o[W 2.2  2.3 𔭕\B

                ɂ̌AMike  Ken Arromdee, Jean-Christophe Collet,
          Steve Creps, Eric HendricksonAIzchak MillerAJohn RupleyA  Mike
          ThreepointAJanet Walz ܂ރ`[𗦂ăQ[̑啝ȏ
          sȂA NetHack 3.0c 쐬B

               NetHack 3.0  Eric R. Smith ɂ Atari ցA Timo  Haku-
          linen     OS/2 ցA David Gentzel ɂ VMS ֈڐA
          B 3 l Kevin Darcy ͂̌͊J`[ɉA  3.0
          ̂̌̂̉ł쐬B

               Olaf  Seibert     NetHack 2.3  3.0  Amiga ֈڐAB
          Norm MeluchAStephen SpackmanAPierre Martineau  PC NetHack 3.0
             ̃I[o[C[`݌vB Johnny Lee  NetHack
          3.0  Macintosh ֈڐABނ͑̂܂܂ȓA}jA
          Ƃ PCAMacintoshAAmiga ̈ڐAł̊g𑱂A 3.0 ̂̌
          ̉ł쐬B



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              50



               Mike Stephenson[_[ƂAIzchak MillerJanet Walz̏
               Ken Arromdee, David Cohrs, Jean-Christophe Collet,
          Kevin Darcy, Matt Day, Timo Hakulinen, Steve Linhart, Dean Luick,
          Pat Rankin, Eric Raymond, Eric Smith ܂ސ`[ 3.0̓O
          IȌsȂBނ̓Q[fUCč\zAR[h 
           B_WAVfBXvCAꂼ
          LN^̓ʂ̃NGXgAVGhQ[Ƃ̑̑ 
          VvfǉA NetHack 3.1𐧍삵B

               Ken  Lorber,  Gregg Wonderly, Greg Olson  Richard Addison,
          Mike Passaretti, Olaf Seibert ̏؂ Amiga p NetHack 3.1
          쐬B

               Norm  Meluch     Kevin Smolkowski  Carl Schelin, Stephen
          Spackman, Steve VanDevender, Paul Winner ̏؂   NetHack
          3.1  PC ɈڐAB

               Jon Watte  Hao-yang Wang  Ross Brown, Mike Engber, David
          Hairston,  Michael  Hamel,  Jonathan  Handler,  Johnny  Lee,  Tim
          Lennan, Rob Menke, Andy Swanson ̏؂ MPW p Macintosh
          p NetHack 3.1 쐬B̍쐬ɁABarton House  Think  C
          pB

               Timo  Hakulinen     NetHack  3.1  OS/2 ɈڐAB Eric
          Smith  NetHack 3.1  Atari ɈڐAB Pat Rankin    Joshua
          Delahunty  ̏؂ VMS  NetHack 3.1 쐬B Michael
          Allison  NetHack 3.1  Windows NT ɈڐAB

               Dean Luick  David Cohrs ̏؂ X11  p  NetHack3.1
            B Warwick Allison  Atari p NetHack ̃^Co[
          W쐬Bނ͌Ƀ^CJ`[Ɋ񑡂A^ C  T
          |[g͑̃vbgtH[ɂǉꂽB

               Michael  Allison,  Ken Arromdee, David Cohrs, Jessie Collet,
          Steve Creps, Kevin Darcy, Timo  Hakulinen,  Steve  Linhart,  Dean
          Luick,  Pat  Rankin, Eric Smith, Mike Stephenson, Janet Walz, and
          Paul Winner Ȃ 3.2̊J`[ o[W 3.2  1996  N
          4 Ƀ[XB

               o[ W 3.2 ͊J`[Ă 10 N̂̂
          Bނ̃Q[ւ̍vɂċLƁA13 l̏̊J`[
           S͂̃[X̊Jn̍ŏ̎_܂Ń`[ɎcĂB
          A 3.1.3  3.2 ̊ԂɁAJ`[̑nn҂̈lł Izchak
          Miller mƐffASȂB̃[X͊J`[
          шڐA`[ނɕꂽB

               NetHack 3.1  3.2 ̎ɁAQ[ɔMlQ[ 
          Ɏg̕ύXuvɔ\B

               Tom  Proudfoot  Yuval Oren  NetHack++ 쐬A͂
           NetHack-- ɉꂽBƂ͓Ɨ ɁAStephen  White   
          NetHack  Plus   쐬B Tom Proudfoot ͌ NetHack Plus 
          NetHack-- 𓝍A SLASH 쐬B Larry  Stewart-Zerba   
          Warwick  Allison ͎rVXeǂ Wizard Patch 쐬


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              51



          B Warwick Allison  NetHack  Qt C^[tF[Xg 
          ɕύXB

               Warren  Cheung   SLASH  Wizard Patch 𓝍 Slash'em
          쐬A Kevin Hugo ̗͂؂āA̗vfǉB  Kevin
          ͌ɊJ`[ɉÃACfA NetHack 3.3 ɓ
          B

               3.2 ̍ŏIo[W̓oOCłł 3.2.3 łB 
          2000   N ΍̂߂ 3.3.0 Ɠ 1999 N 12 ɔ\
          B

               Michael Allison, Ken Arromdee, David Cohrs,  Jessie  Collet,
          Steve  Creps, Kevin Darcy, Timo Hakulinen, Kevin Hugo, Steve Lin-
          hart, Ken Lorber,  Dean  Luick,  Pat  Rankin,  Eric  Smith,  Mike
          Stephenson,  Janet  Walz, Paul Winner Ȃ 3.3 ̊J`[
          1999 N 12  3.3.0A 2000 N 8  3.3.1 [XB

               o[W 3.3 ͑̐Vvf񋟂B܂A푰ƐE 
           ŏ̃o[WłBEƂƂẴGt͍폜A
          ̈ƂȂB܂Ah[tAm[AI[N푰ƂĒ 
           ꂽBƂƃW[̓EƂƂĒǉꂽBɁA
          ɏ邱Ƃoŏ̃o[WłAꂽS 
          o OEFuTCgŌ\ŏ̃o[WłBoOXg
          ɐLтĂɂւ炸A 3.3  1 NƂŏ\ 
          肵ĂƂؖB

               3.4 J`[ Michael Allison, Ken Arromdee, David Cohrs,
          Jessie Collet, Kevin Hugo, Ken Lorber, Dean  Luick,  Pat  Rankin,
          Mike Stephenson, Janet Walz, and Paul Winner ŊJnA NetHack
          3.4.0 [XO 2002 N 3   Warwick Allison B

               o[W 3.3 ƓlɁAlXȐlX NetHack ̐FXȃvb
          gtH[ւ̈ڐAsȂĂꂽB

               Pat Rankin  3.4  VMS ւ̈ڐASB

               Michael Allison  MS-DOS ł NetHack 3.4 ǗĂ B
          Paul Winner  Yitzhak Sapir `ĂB

               Dean  Luick, Mark Modrall, Kevin Hugo  3.4  Macintosh 
          ̈ڐAƊgSB

               Michael Allison, David Cohrs, Alex  Kompel,  Dion  Nicolaas,
          Yitzhak  Sapir  3.4  Microsoft Windows vbgtH[ւ̈
          AƊgSB Alex Kompel  Windows łւ V   O 
          tBbNC^[tF[X񋟂B Alex Kompel ͂܂A3.4.1 
          Windows CE ł񋟂B

               Ron Van Iwaarden  3.4  OS/2 łǗĂB

               3.3.1 ŕ Amiga ւ̈ڐAƊg Janne Salmijarvi  
          Teemu Suikki sĂB



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              52



               3.3.1 ŕ Atari ł Christian ``Marvin'' Bressler 
          ǗĂB

               Ken Lorber ɂĊǗĂ NetHack ̃EFuTC g 
          http://www.nethack.org/ ɂB

                    - - - - - - - - - -

               Xlbg[N̐Êǂ悤ȂAAQ[̉
          ̎菕悤ƂĂƂ킯悤ȏC𑗂Ă 
          B A̐_X́AƂɂ͂}̂łł׈ȘA
          ̖O𓴌A}jÄꗗƂĂɋL̂B

                    Adam Aronow            Izchak Miller         Mike Stephenson
                    Alex Kompel            J. Ali Harlow           Norm Meluch
                   Andreas Dorn              Janet Walz            Olaf Seibert
                    Andy Church           Janne Salmijarvi        Pasi Kallinen
                   Andy Swanson        Jean-Christophe Collet       Pat Rankin
                   Ari Huttunen            Jochen Erwied           Paul Winner
                   Barton House             John Kallen          Pierre Martineau
                Benson I. Margulies         John Rupley             Ralf Brown
                     Bill Dyer              John S. Bien            Ray Chason
                 Boudewijn Waijers           Johnny Lee          Richard Addison
                     Bruce Cox               Jon W{tte            Richard Beigel
                  Bruce Holloway          Jonathan Handler      Richard P. Hughey
                  Bruce Mewborne          Joshua Delahunty          Rob Menke
                   Carl Schelin            Keizo Yamamoto         Robin Johnson
                    Chris Russo              Ken Arnold         Roderick Schertler
                    David Cohrs             Ken Arromdee          Roland McGrath
                  David Damerell             Ken Lorber          Ron Van Iwaarden
                   David Gentzel           Ken Washikita          Ronnen Miller
                  David Hairston            Kevin Darcy             Ross Brown
                    Dean Luick               Kevin Hugo          Sascha Wostmann
                     Del Lamb               Kevin Sitze            Scott Bigham
                   Deron Meranda          Kevin Smolkowski       Scott R. Turner
                   Dion Nicolaas            Kevin Sweet          Stephen Spackman
                  Dylan O'Donnell           Lars Huttar           Stephen White
                    Eric Backus             Malcolm Ryan           Steve Creps
                 Eric Hendrickson          Mark Gooderum          Steve Linhart
                   Eric R. Smith            Mark Modrall        Steve VanDevender
                  Eric S. Raymond         Marvin Bressler          Teemu Suikki
                   Erik Andersen            Matthew Day             Tim Lennan
                 Frederick Roeber           Merlyn LeRoy          Timo Hakulinen
                    Gil Neiger            Michael Allison            Tom Almy
                    Greg Laskin             Michael Feir             Tom West
                    Greg Olson             Michael Hamel          Warren Cheung
                  Gregg Wonderly          Michael Sokolov        Warwick Allison
                   Hao-yang Wang            Mike Engber           Yitzhak Sapir
                   Helge Hafting            Mike Gallop
               Irina Rempt-Drijfhout      Mike Passaretti

          uhƐi͊eЂ̏W܂͓o^WłB




          NetHack 3.4                                      December 2, 2003



