









                                 |̖{ւ̏
                               (NetHack KChubN)


                                   Eric S. Raymond
                     (o[W 3.4 ̂߂̍L͈͂ȍZƊg[)



          1.  ͂߂

               ŋ߁AȂ͓X̎dɖȂAh鎩
          CBŋߐAȂ閲͒TA݁A\RA 
           ̂łAȂɂ̗͂R͂Ƃ͂킩
          BȂ̖͂ۂɂ͐܂Ă̂ƌ 
            āA Ȃ܂łɂĖY悤ƂĂ̂ł͂Ȃ
          AƎvBAȂ͔ыNāA̒̓Â 
          p ̌ɐł悤ɌAŋ͂ȉ̑NȋL
          Ƃđ吺ŋ񂾁BȂ̖ɏove͖{Ȃ̂ 
          ?    閈ɁApЂ̋߂̕svcȓAɓƂ~Ȃ
          BłAȂ͂̂悤ȍlAAɓċA 
           lX̘bvoƂœǂoBA
          Ȃ͖̒ɏoĂsvcȏꏊ{߂Ƃv} 
           ȂȂBƂĂA`҂͍ŏɂ̓ʂĂ
          Aɖ߂ė鎞̕TɂȂĂ悤Ɍ 
          B߂ėȂl͊FAPɂ܂`𑱂Ă邾Ȃ̂ł?


               Őq˂邤ɁAȂ͂\ɂBCF_[
           Ƃ̂Aɓ邱ƂłȂA΂炵
          Y炷ƌ̂BȂƂ`ł́A 
           ̂͐_s̑̂ƂĂ炵B
          ͋|̖{̉[AQwi̒JzǂɂƂ 
          \ łB`𕷂uԁAȂ͎ɂ͓AɓĔނ̘b
          Ă閂{߂ׂ[Ŗm̂Ȃ炩̗R 
          m MBȂ͂Ƃ̗͂^łȂĂAȂƂ`
          kn̂̋VlɂȂ̋zŔ荞߂邾낤ƍl B
           ̒ŏoĂ낵AsvcȉɏoƂł΂Ȃ
          łBȂ͒n̈hōŌ̏h΍B h
           ǂɌfꂽ̃IbYΉقǁAȂ͈ӋC
          B


               NƁAȂ͏iW߁AȂ͓AɌė
           B̗𑱂ċ|̖{ւ̓Ñ̈
          ւƂǂ蒅BXĂ̂œŃLv   
          A ̖͍LXƂ̉ŖɏABȂ͓
          W߁Aƒnł̍ŌɂȂ邩ȂHς A
          AւƓĂB



          NetHack Guidebook                                               1





          NetHack Guidebook                                               2



          2.  Ȃ芪

                ĂȂ NetHack ƂQ[n߂邱ƂɂȂB
          Ȃ̖ړI͎Ă̕W߁ACF_[̖ o
          Aɂ͂̋|̖{琶ĒEo邱ƂłB

               `ɂ邢낢ȍɑΉ邽߂̊e̔\͂͂́A
          Ȃ̐ƏCsɂĕωB

               lÊw(Archeologist) ͓Aɂđ̒m   
          B ̂ߑf蓴Ał̕sȎԂ؂蔲邱Ƃ
          Bނ͊wpÎ߂̒TsɓKďo 
          B

                 ؐl(Barbarian) ͉nĂmłA퓬̂
          ߂ɒbĂBނ͗ނ܂ȗ͂̋Avȍ 
          Ƒ傫ȗ莝݂̌̂ĒTɏoB

                 A l(Caveman   Cavewoman)͂Ƃ킯͂Ă
          AVΊ펞ɎgꂽďoB

               (Healer)͈p򕨂ɂĐʂĂBC񕜂
           Aɂa炰AAł𒆘a肷鍁
          򑐂ɂďڂBĊgĐ̌NԂ 
           łBނ͊JƈƂĂȂ悢V𓾂āA
          AɓĂB

               Rm(Knight) ͋Rmɒł邱ƂƖhقǗD 
          邱ƂƂ_ŁAʂ̐mƂ͋ʂB

                 N(Monk)  ͏C҂łAiȓ̓IKƐ_IP
          ɂāAȂłĝƓ悤ɐ키Ƃo B
           N͖hȂA@コ邱ƂŖߍ킹Ă
          B

               mƓm(Priest  Priestess) ͐E̐młAƖh
           @̋ƂgĐ`L߂Ƃ鐹młBF
          ʂĐ_ƌ\͂ɂAނ͂΂Ί瓦邱Ƃ 
          cAF͊炷ƂB

                W[(Ranger) ͂قƂǐXZ݂ƂAA͏X
          ȂBAނ͒ǐՏpBsƋɁA|p̒B l
          łB

                 (Rogue) ͕qŐgBƂɒD_łA㩂
          łɏڂBނ̒͊PłA͔ȒƂȂB

                (Samurai) ͕̓{̐s̕lłBh͌y 
          ŐĝȂɏGłĂȀȂ܂ꂽ  召  2{̓
          ттĂB

                όq(Tourist) ͑z̋(ɍœKł)ƃN  Wb g
          J[ hAʂ̐HAn}AčȃJďoB
          Ƃǂ͎̉ʐ^ɎB̂̂łB


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                               3



                L[(Valkyrie) ͗EȏmłBߍȃXJW
          i rA̍Xňޏ͊拭ŁAɂςAgB
          ƂƍIgɂĂB

                @g(Wizard)͖p̒mƂɑIєꂽ@̓ 
           ĂAɂ̖@wɑ΂ēɑw[B͎セ
          ŊȒPɑł|悤Ɏv邪Aoς񂾖@g͋ 
          GłB

               ܂ALN^[̎푰IԂƂłB

                h[t(Dwarf)  ͐lԂGtA肵
          ̂ŏvłBh[t̒ڂׂ͍̌@ƋH 
           IZpłBh[t̖h̓Gt̃~XhƓƂ܂
          ͂Ȃ܂łAɎiłB

                Gt(Elf)  ͋@qƐvAĉsqȊo  
          B   ŋNǂȍׂȂƂނ̖ڂ𓦂邱Ƃ͂ł
          BElC̔ނ̎Ɩh͗DGȂ̂łB

                m[(Gnome)  ̓h[tɏAh[tƎ
           Bm[͏ň@tƂĒmAxƊ댯ŖĂ
          閧̒nB|̖{ɍĂ邱ƂŒmB

                l(Human)  ͒nōłʓIȎ푰ŁA䂦ɑ̎푰Ɣ
          r 鎞̊ƂȂĂBʂȔ\͎͂ĂȂA
          EƂŐ邱ƂłB

                I[N(Orc)  ͎cŖ؂Ȏ푰ŁA(̃I[N܂)
           ĂBɁAI[N̓GẗႢ䂦ɌA
          킴킴@ĎEƂBI[Nɂč 
          hƕ͈ʓIɕiB

          3.  ʂɕ\̂̈Ӗ

               ʏɂ͂Ȃ݂铴ÅKłłɒTI
          n}ƁAŖڂɂĂBɐ[Ti߂ 
          AēA͂̎pɂȂ̑Ỏʂɖ炩ɂĂB

               NetHack  ̑cł rogue ŏɌꂽƂÃXN[
          w̓Rs[^t@^W[Q[̒łSƓ   
           BȗXN[w͗OIȂ̂ƂނW
          ƂȂBNetHack ͂̂΂炵`󂯌płB^I 
          p   R}h͂Aʂ͂ŕ\eLXgAhx
          `[Q[Ƃ͈قȂANetHack ̃R}hׂ͂ 1  2  
           ̃L[͂ŗ^Ǎʂ͉ʏɃOtBJɕ\
          Bʂ͍Œ 80  24 s̑傫Bȏ 
          傫Ă 80 ~ 21 ̗̈悾n}̕\ɎgB

               NetHack ͓_≹̏؂āAڂ̕sRȐlłv
          CłBڂ̕sRȐl̂߂NetHack̐ݒ@ɂẮA
          ̃hLgŌqB




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                               4



               NetHack ̓vC邽тɐVA쐬B̂߉
          Q[ɏƂ̂҂ɂA܂̃Q[͊y 
          ɖ̂ƊB

               NetHack ͂܂܂ȕ\̃IvV񋟂BIvV
          Ȃ̃n[hEFA\tgEFA̔\͂ɈˑAvbg tH[
             ܂܂łB܂܂ȃRpC̃IvV͎s
          t@CꂽƂɂ̂݉\ƂȂBmNLN^C ^
          tF[ XAJ[LN^C^tF[XA^CƌĂ΂鏬
          GpOtBJC^tF[X 3 ̕\@ B  2
           ̃LN^C^tF[X̓tHg𑼂̕ɒu邱
          ł邪AWݒł W ASCII LN^pđSĂ \
            B ܂܂ȕ\̃IvV̓Q[eɂ͉e^
          B^CF̓KChubNŕ\LłȂA͑SẴv b
          g tH[ɋʂł͂Ȃ̂ŁAQ[ɕ\̂̐Ƃ
          Ă̓mNLN^fBXvCŕ\W ASCII L
          N^pB

               NetHack  ŉNĂ̂𗝉ɂ́A܂ NetHack 
          ͉ʂǂȂĂ̂𗝉ȂĂ͂ȂȂBNetHack  
           ́AeLXgAhx`[Q[ɂuȂ́cv
          悤ȕ͂̑łB} 1  NetHack ł͉ʂɉ\ 
           ̈łBʂǂ̂悤ɕ\邩̓vbgz[
          ˑB

          --------------------------------------------------------------------
           The bat bites!

               ------
               |....|    ----------
               |.<..|####...@...$.|
               |....-#   |...B....+
               |....|    |.d......|
               ------    -------|--



           Player the Rambler     St:12 Dx:7 Co:18 In:11 Wi:9 Ch:15  Neutral
           Dlvl:1 $:0  HP:9(12) Pw:3(3) AC:10 Exp:1/19 T:257 Weak

          --------------------------------------------------------------------
                                      Figure 1


          3.1.  Xe[^Xs(ʂ̉)

               ʂ̉ 2 sɂ́AȂ݂̌̏Ԃ\Í̂悤ȏ 
           fЂ܂܂ĂBǂ炩̍sʂ̕ȂƂ
          S邱Ƃ͂łȂȂBȉɏԂ낢 
           ڂӖ̂qׂ (RtBO[VɂẮA
          ȉɈꗗĂԂڂׂ̂Ă\Ƃ͌ 
          )B




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                               5



          OƃN(Rank)
                 ̃LN^(q̌oxɊÂ)Eƕʂ̓
               B

          (Strength)
               Ȃ̃LN^̗͂̋̒lłA6 ̊{Iȑ
               1   łBlԂ̃LN^[̏ꍇA͂̋ 3  18
               ̊Ԃ̒lƂB̑̏ꍇA̐z邱Ƃ (
                 18/xx ̂悤ȓʂȗ͂𓾂邱ƂA@̗͂ʂ
               z\͂^邱Ƃ)B͂̋̒l傫 
               ǁAȂ̗͂͋B͎͂̋͗dǂꂾ܂
               A킢łǂꂾ̃_[W^邩Aǂꂭ炢ו^
               邩ɉeB

          f(Dexterity)
               f͐킢ɂ閽A㩂𓦂\AĂ̑
               qKvƂd╨ɊpɈ邩Ȃǂ̂Ƃ
               ɉe^B

          ϋv(Constitution)
               ϋv͉͂₻̑̈ɂX^~ȉՂ񕜂\
               ͂ɉeB

          m(Intelligence)
               m͎͂\͂ǂޔ\͂ɉe^B

          (Wisdom)
               (ɖ@)IȌoɂ蓾B@̃Gl
               M[ɉeB

          (Charisma)
               ͂͂̐Ȃɑ΂ĂƂԓxɉe^B
               ɓX傪iɉeB

          (Alignment)
               ɂ   (Lawful),   (Neutral),
                (Chaotic) B΂΁A͑PAׂ͈ł 
               邪A@ƓɈvƂ͌ȂBȂ̑
               ̉̂Ȃɑ΂锽ɉe^BĂ
               ͍DIł͂ȂA΂̑ɑ΂Ă͂Ȃ݂̑ɑ΂
               ɂ߂čDIł炵B

          K(Dungeon Level)
               ǂꂾẢ[܂ōsBl 1 ŁA A
               [sقǑ傫ȒlɂȂB̊K͓ʂŁA
               ͂ȂOŎʂBCF_[̖͒n 20 K[
               ̂ǂɂƍlĂB

          (Gold)
               ҂ɏĂ݂̐łBȂǂɉB͊
               ɓĂȂB

          ̗(Hit Points)
               ̗͂̌ݒlƍőlłB̗͂͂Ƃǂꂾ̃_[W


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                               6



               ƎʂB킢ŏقǒl͌B̗͂͋x
               ▂@̃ACeɂ񕜂łBʂ̗̒̐͑
               ̂Ƃ蓾őlłB

          (Power)
                 Ɏg͂łB͎̂ɕKvȐ_̗
               (mana: }i ) ǂقǂ邩B͂܂x邱
               ɂ񕜂B

          hl(Armor Class)
               FDIȐ̍UhǂقǐH~߂邩
               lłBقǖh͗LłAhl̒l
               ɂȂ邱Ƃ\蓾B

          ol(Experience)
               ݂̌oxƌolłB`iނƌol𓾂邱
               łBol̍vl܂ŒBƁAox
               オBoςނɂA킢B@̍Uɂς
               悤ɂȂB̃o[Wł͌ox\
               B

          (Time)
               o߂^[łB time IvVÎƂɕ\
               B

          (Hunger status)
               ݂̕łB  (Satiated) 
                ӂӂ(Fainting) P ܂ł̒lƂBʂȂ\
               ȂB

               ̑ɂԂ\̌ɕ\邱Ƃ
          ȂBĂƂɂ ConfAaĈƂɂ  FoodPois
          ܂ IllAڂȂƂɂ BlindA῝򂪂Ƃ StunA
          oĂƂ Hallu ƕ\B

          3.2.  bZ[Ws(ʂ̏㕔)

               ʂ̍ŏs͎oIɕ\łȂƂ郁bZ[W
           ߂ɎgBŏs``--More--''\ꂽƂ́Â
          ɂɃbZ[WĂ邯ǂ݂̃bZ[W܂m 
           ǂނ悤ĂƂƂłB̃bZ[Wǂނ߂
          ͒PɃXy[XL[΂悢B

          3.3.  n}(ʂ̂̑̕)

               ʂ̂̑́̕AȂ݂Kł܂łɒTI
           ̒n}łBʏ̃V{͂ꂼꉽ\Ă
          B\V{̂́A܂܂ȃOtBbN I
          v Vݒ肷邱Ƃɂĕς邱ƂłBłȂ
          Wݒ̃V{pBɕWݒ̃V{̈Ӗ 
          B

          -  |
               ̕ǁA܂͊JA܂͕ (|)B


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                               7



          .    ̏AXA܂͔̂ȂoB

          #     ʘHAS̖_A؁A邢͑䏊̗(䂪Cv
               gĂƂ) ܂͒ˋ

          >    Ki:̊Kւ̒ʘHB

          <    Ki:̊Kւ̒ʘHB

          +    A܂͊wKł邩Ȃ̏ꂽB

          @    Ȃ̃LN^[A܂͐lԁB

          $    ݂̎RB

          ^    (ЂƂєΕ\)B

          )    B

          [    ܂͂Ȃ炩̖hB

          %    H(qIłƂ͌Ȃ)B

          ?    B

          /    B

          =    wցB

          !    B

          (    ֗ȃACe(͂AAvc)B

          "

          *     ΂܂͊(MdȂ̂ȂAl̂Ȃ̂
               Ȃ)B

          `    A܂͒B

          0    SB

          _    ՒdA܂͓S̍B

          {    

          }    ܂A܂͖xA܂͗n̊CB

          \    ؂ȉ

          a-zA-Z т̑̃V{
               ̕Ƃ̑̂̃V{͋|̖{̂낢
               ȏZl\Bނ͕s@ňӂɖĂ邩m
               ̂ŌxȂ΂ȂȂBAƂɂ͉̎菕ɂȂ


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                               8



               ƂB

          I    ̃}[N͓A邢͂̑̌ȂŌɂ
               ꏊɕ\B͂łɈړĂ邩Ȃ
               Ƃɒӂ邱ƁBł'F''m'̃R}h֗낤B

               ̃V{ׂċLKv͂ȂB`/' R}hł
          ̃V{\m邱Ƃł(ڍׂ͎̍ Q   
          )B


          4.  R}h

               R}h 1  2 ̃L[͂sƂŎsB
          ̃R}hAႦ``search''͂ȏ NetHack ɏ^
           KvȂB̃R}h͗ႦΕgp镨Ȃǂ̏
          ɗ^KvB炳ȂKvƂR}h 
          ΂ẮA NetHack ͑Ij[̓R}hCvvg
          ̂ꂩ\Bǂ炪\邩͎Ƃ menustyle I
          vVǂ̂悤ɐݒ肵ɂB

               Ⴆ ``What do you want to use? [a-zA-Z ?*]'' Ƃ`
          ₪悭邪A͂ȂɎĂ镨̂ǂIԂ 
          q ˂̂łB̎ɂāua-zA-Zv͂ȂIׂ鎝
          ̖ژ^LłB `?' ͂Ƃ̖̕ژ^ꗗA
           X ̋L\Ă̂m邱ƂłB̗ł́A`*'
          B͈ꗗɂ͕\Ă炸Aʏ킻̃R}hł̎g p
           z肵ĂȂłAgƎv΂IԂƂł邱
          ĂB`*' ͂ƂׂĂ̖̎ژ^\A X
           ׂĂɂĂ̖ژ^Lm邱ƂłBlČ
          ̃R}hgȂƂɂƂɂ ESC L[΃R}h
          I邱ƂłB

               R}h̒ɂ́ȂOɐ͂邱ƂŉJԂ
          Ƃł̂BႦ΁u10sv 10 ̒T\ĂB
           number_pad IvVÎƂɂ͐̑O `n' ͂
          Ȃ΂ȂȂB܂̗ł͑Ɂun 10svƓ͂Ȃ
           ȂȂBs邱ƂӖȃR}hł͖͂
          BɁAړR}h̑Oɓ̕(vtBbNX)t 
           ƂɂĂ܂܂Ȉړ@Ƃ邱Ƃł(q)BJ
          񐔂vtBbNX߂ɂ ESC L[΂悢B

               R}ḧꗗ͂Ȃ蒷AQ[ `?' R}hg p
           ăwvj[邱ƂɂAłR}ḧꗗ
          ƂłBȉ̓R}ḧꗗłB

          ?    wvj[: \\ȃwvʂ̂ 1  \  
               B

          /    V{Ӗ邩Bw肷ɂ͏ꏊA
               ̓V{(邢͒PS)͂邩I邱Ƃ
               B




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                               9



                  w  ́A K    u܂ŃJ[\ړĂ
          `.'A`,'A`;'A`:'̂ǂꂩƂɂčsȂB `.' 
          ƁAI񂾏ꏊŕ\ĂV{̐\A help
          IvVIȂꍇɂĂ``More info?''(ڍׂ?)Ǝ
           Aꂩ炳ɑ̏ꏊw肷邱ƂłB `,'
          ƁAV{̐\邪Aڍ׏͕\ȂB `;' 
            ƁA ڍ׏͕\ꂸAɑ̏ꏊ̎włȂB
          `:'ƁA(Ȃ)mFȂŏڍ׏񂪕\Bꏊ
          IԎ ESC L[ƂɂẴR}h𒆒fłA `?'
          Ƃǂ̂悤ɓ삷邩̊ȒPȐ\BꏊłȂ 
          Ow肵ꍇ́Aɂ̖Oɑ΂ǉ񂪕\B

          &    R}h̓B

          <    ̊K֍s(Ki͂ɂƂ)B

          >    ̊K֍s(Ki͂ɂƂ)B

          [yuhjklbn]
               w 肵ֈi(} 2 Q)B̕ɉƊ
               Ă邩oĂƂ́Aړ̂ł͂ȂƐ키
               ɂȂBƐ키ƂɂȂ̂͂̈ړ̃R}h
               B̑̃R}h(q)́uSvłB

                                   y  k  u            7  8  9
                                    \ | /              \ | /
                                   h- . -l            4- . -6
                                    / | \              / | \
                                   b  j  n            1  2  3
                                             (number_pad ÎƂ)

                                         Figure 2


          [YUHJKLBN]
               ǂɓ˂邩ɏՓ˂܂Ŏw肵ɐiށB

          m[yuhjklbn]
               vtBbNX: EA (ƂɉƎv
               ĂĂ)肹ɈړB

          F[yuhjklbn]
               vtBbNX: (ɉƗ\zĂ邾ł)
               Ɛ키

          M[yuhjklbn]
               vtBbNX: E킸ɉֈړB

          g[yuhjklbn]
               vtBbNX: ܂ňړB

          G[yuhjklbn] or <CONTROL->[yuhjklbn]
               vtBbNX: 'g' ƓBʘH̕_ł͎~  
               B


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              10



          _    w肳ꂽʒu܂ŁAŒZASYpĈړB
               ŹAȂmĂ(A܂͈ȑOɒʂ)n}z
               uɌvZBmĂ铹ȂꍇAɐs
               B `G'R}hƂقړŒ~邪A `M'R}h
               ƓlɕEȂňړB

          .    xeB1 ^[ȂB

          a    (͂AAvc)p(g)B

          A    1   ܂͕̐gɂĂ(hȂ)͂Bh
               1 ͂Ƃɂ 'T'(take off: h͂)AAN
               Z T  1 ͂Ƃ 'R'(remove: ANZT͂
               )gpB

          ^A   1 ÕR}hJԂB

          c    B

          C    X̉ɖOtB

          ^C   pjbN{^BQ[B

          d    ɒuB:ud7av a Ƃ 7 ɒuƂ
               ӖB

          D      ̕ɒuB``What kinds of things do you want
               to drop?[!%= BUCXaium]'' (ǂ̎ނ̂̂u܂?)  ̎
               ɑ΂āA0 ȏ̃̕V{͂邱ƂœB
               `a', `i', `m', `u' ̌ɓ͂邱ƂłB 
               āA jꂽ(B)/ĂȂ(U)/ꂽ(C)ACew
               肷邱ƂłB

                    DB  - jĂƔĂ镨SĂɒuB
                    DU  - ĂȂƔĂ镨SĂɒuB
                    DC  - ĂƔĂ镨SĂɒuB
                    DX  - j/􂢂ĂȂSĂɒuB
                    Da - mFȂɂׂĂ̕ɒuB
                    Di - uOɎmFB
                    Du - (XɂƂ)̕ɒuB
                    Dm - uIԂ̂Ƀj[pB
                    D%u - ̐HɒuB

          ^D   (ʂ͔)RB

          e    HHׂB

          E    ɃbZ[WݍށB``Elbereth'' Ƃ   
               ƁAẲ͂Ȃɔ𒧂ŗȂȂ (
               ȂUƕ͏Ă܂)B́Aꑧ 
               ƂɂȂȂ֗łB (̋@\̓RpCɍ폜
               Ă邩mȂ̂ŁAȂ̃o[WŕK@\
               Ƃ͌ȂB)



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              11



                    E- - ق̒ɎwŏB

          f     ɓĂ̂𔭎˂B˂̂͗\`Q'R}
               hőI邱Ƃo邵A autoquiver IvVݒ肳
               Ăꍇ́ARs[^[ɎIɓKȂ̂ݒ肳
               ƂłB

          i    ̖ژ^(Ă镨ׂ)\B

          I    ̖ژ^̂w肵ꕔ\B

                    I* - ̂΂ׂĕ\B
                    Iu - ׂ̕ĕ\B
                    Ix - gĂ܂ׂĕ\B
                    I$ - 𐔂B

          o    JB

          O    IvVݒ肷B݂̃IvV̒l̈ꗗ\  
               B  (o^Cv邩NbN邱Ƃɂ)ύX
               IvVIŁAقƂǂ̒lύX邱Ƃ  
               B u[ lłȂIvV̏ꍇ́AɃj[o
               AvvgoBݒ\ȃIvV͂̃KChubN
                قǂɈꗗBIvV͒ʏ `O' R}hł͂
               AQ[n߂Oɐݒ肷Bq̃IvV̍QƂ
               ƁB

          p    𕥂B

          P    wցA邢͂̑̑iiAډBjgɂB

          ^P   1 ÕbZ[Wx\B ^P ͂
                  O  b Z[ W ɕ\B̐U镑
               msg_windows IvVɂĕωB

          q    (AȂ)ށB

          Q    ɓ̂IBőÎ`f'R} h
                ˂邱ƂłB (o[W 3.3 ȑOł͂̃R}
               h̓Q[̂A̋@\`#quit'Ɉړ 
               )

          r    ǂށB

          R    iiwցAȂǁj͂B

          ^R   ʂ`B

          s    ͂̉B㩂TBɂ͕ʉTKv
               B

          S    Q[Z[uāAfBQ[͎vCɎI
               B



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              12



          t    𓊂B܂͖Ȃǂ𔭎˂B

          T    h͂B

          ^T   e|[g\͂΃e|[gB

          v    o[Wԍ\B

          V    ̃Q[̗\B

          w    B

                    w- - ƂĉfɂȂB

          W

          x    Ă镐\̕ƌB\͓̕񓁗U
               ŗpB\̕킪ȂĂ͎s( 
               Ă̂\ɂāAfɂȂ)ƂɒӁB

          X    qT()[hɓB

          ^X   Ȃ̖OAEƁA푰AʁAсÃQ[ɂ
               邳܂܂Ȑ_̖O\B

          z    UBɐUꍇ́A`.'gB

          Z    BɎƂ́AƂ`.' g
               B

          ^Z    Q[  ꎞ~(WuRg[@\̂ UNIX(R)
               o[Ŵ)B

          :    ɉ邩B

          ;    ĂV{\B

          ,    EB`m'̌ɉƂɂāAݒɊւ炸I 
               j[\B

          @    autopickup IvṼIEIt؂ւB

          ^    ܂łɔ㩂̎ނ𒲂ׂB

          )    Ă镐\B

          [    tĂh\B

          =    ͂߂Ăwւ\B



          __________
          (R)UNIX is a registered trademark of AT&T.


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              13



          "    tĂ閂\B

          (    gĂ铹\B

          *     Ă̂\B 5 ̃R}hɂ
               ́B

          $    Ă݂𐔂B

          +    mĂ̈ꗗ\B̃R}hɂāA
               \鏇Ԃς邱ƂłBj[`ŕ\
               A܂ڂ̎IAɓւI
               邱ƂɂďԂւBɓւꍇ͂
               ̑JԂB

          \    ܂łɂǂȎނ̕\B

          !    VFɔB

          #    gR}hsBȏォ番悤 NetHack ̍ 
               ׂ͂Ă̕gʂĂ܂̂ŁA܂pɂɎg
               ȂR}h͂̂悤ɂēꂽBǂ̊gR}h
               gp\́AQ[̃RpCɂǂ̋@\Lɂꂽ
               ɂB

          #adjust
               ̖ژ^LύX( fixinv IvVuIv̎ 
               ɕ֗ł)B

          #chat
               NƘbB

          #conduct
               ǂ̒킪܂Ă邩\Bڂ͌qu
               vCv̏͂QƂ邱ƁB

          #dip ɐZB

          #enhance
               ̋Zʂ߂Aׂ肷B

          #force
               JB

          #invoke
               ʂȔ\͂𔭓B

          #jump
               ʂ̏ꏊփWvB

          #loot
               Ȃ̂΂ɂ鏰ɒuĂ锠⊓A܂͂Ȃ  
               Ăn̈Ƃ̒g𒲂ׂB



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              14



          #monster
               (̎pɕωĂ鎞)̓\͂gB

          #name
               ╨̎ނɖOtB

          #offer
               _ɂɂB

          #pray
               _ɋFď߂B

          #quit
               Q[Z[uɃvOIB

          #ride
               ɏ(邢͏̂߂)B

          #rub v΂B

          #sit B

          #turn
               s̉ǂB

          #twoweapon
               񓁗퓬̃IEIt؂ւB񓁗ɓK؂ȕg
               ƁBȂΎIɃItɂȂB

          #untrap
               (㩁AA)㩂͂B

          #version
               ̃o[W NetHack RpCƂ̃IvV 
               \B

          #wipe
               @B

          #?   wvj[: p\ȊgR}ḧꗗ\B

               Ȃ̃L[{[hɃ^L[ (ʂ̃L[ƈꏏɉƂ
          ẴL[`^'[ 8A܂`']rbgZbg)
           ΁AR}h̓^L[ƈꏏɉƂɂđ̊g
          R}hN邱ƂłB NT, OS/2,  PC  NetHack    
          'Alt' L[̖ړIɎg.

          M-?  #? (ΉĂȂvbgz[)

          M-2  #twoweapon (number_pad It̏ꍇ)

          M-a  #adjust




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              15



          M-c  #chat

          M-d  #dip

          M-e  #enhance

          M-f  #force

          M-i  #invoke

          M-j  #jump

          M-l  #loot

          M-m  #monster

          M-n  #name

          M-o  #offer

          M-p  #pray

          M-q  #quit

          M-r  #rub

          M-s  #sit

          M-t  #turn

          M-u  #untrap

          M-v  #version

          M-w  #wipe

               number_pad  IvVÎƂ́Aɉ
          R}hLɂȂB

          h    wvj[: ``?'' ƓlɃwvj[\B

          j    ʂ̏ꏊփWvBu#jumpvuM-jvƓB

          k    (ʏ͔)RB'^D' ƓB

          l    Ȃ̂΂ɂ鏰ɒuĂ锠⊓A܂͂Ȃ  
               Ăn̈Ƃ̒g𒲂ׂBu#lootvuM-lvƓB

          N    ╨̎ނɖOtBu#namevuM-nvƓB

          u     㩁A A   Ȃǂ̎d|ꂽ㩂͂Bu#untrapv
               uM-uvƓB




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              16



          5.  ƒʘH

               A̕ʘH͖肪Ă邱Ƃ邵AĂ
           ƂB̂Ă镔Ŏ̎ɓ镔͉ʂ
          \BÂƂł͎ 1 ̋ԂBǂʘH
          ͉ʂɕ\ꂽ܂܂ɂȂB

               B ʘH͕\ȂB `s'(search: T) R}h
          Ŕ邱ƂłB

          5.1.  o

               o͕ƒʘHڑ̂łBo̒ɂ͔̂
           ̂B̂Ƃɂ͂̂܂ܒʂ蔲邱ƂłB̑
          ̏oɂ͔邪A̔͊JĂ邩AĂ邩A 
                   ꂩłBĂJɂ
          `o'(open: J) R}hpBĂ       
          `c'(close: ) R}hpB

               ɏĂƂ `a'(apply: p) R}h
          ŏ͂gA`^D'(kick: R) R}hŔRj邱
          ƂŒʂ邱ƂłB

               JɎ΂߂邱Ƃ͂łȂB邢͐
          ^ɋߕtȂ΂ȂȂB̂Ȃoɂ͂̂悤 
          ͂ȂB

               ͉ߏôɖɗBẲ͔J邱
          ƂłȂBǂ̉ɂƂĂ͔JKv 
          Ȃ(: S͔ʂ蔲邱Ƃł)B

               B ͕\ȂB `s'(search: T) R}h
          邱ƂłBxƕʂ̔ƓlɂȂB

          5.2.   (`^')

               `҂ׂ悤Ƃ㩂ÂɂB
           ΗɗƏôɐ^[̊Ԃ̏ꂩ瓮Ȃ
          Ȃł낤BɒN𓥂ݓĈ邩A`s'(search:
          T ) R}hŌ邩ď߂㩂͕\B㩂̉a
          HɂȂ邱ƂB͔ɗLȖhpłBÓTIR 
          s[ ^Q[łuqɔԁvɂʂȃ_Wւ̕
          ꓹ݂B̃_Wł̖ړI͑𗎂ɓ邱 
           BTdɐǂ݂΁ASĂ̊K͑qɔԂ̓`̃[ŃN
          AłBsl܂Ă܂`҂̂߂ɂ̏M p
          ӂĂ邪A͉^ቺĂ܂B

          5.3.  Ki (`<', `>')

                ʓIɓÅeKɂ́AO̊Kւ̏Ki('<')ƁÅK
          ̉Ki('>')ЂƂBAOBႦ΁AA
           rI󂢊KłȂ͓̉KiK𔭌邾낤B
          ЂƂ͓ȂłAЂƂ̓m[̍BƂĒm 
          n тɑĂB̍B͍Ōɂ͍s~܂ɂȂĂāA


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              17



          T(Ȃ邱ƂIꍇ)A̓Aɂ 
          ߂ėKvB

               KigA邢͑̊KɈړ㩂Ɉ|ꍇA
          ܂܂łK͔񊈐āAfBXÑt@Cɒ   
          B ̖KꂽKɍĂіKꂽꍇAfBXÑt@Cǂݍ܂
          čĊB߂ĖKKɈړꍇÅK(قƂ
           K͈ꂩAuʂȁvK̓ev[gAúvK(q)
          ꍇ̓t@Cǂݍ) Vɍ쐬B݂͌̊K 
          ̂sB̊Kɂ͎̂~܂ĂB

               ʁAȂKigƁAȂ͖ړInőΉKȉ
          ɌBAybg(q)Ƃ̉͂ȂKi 
           ~肵ɂĂāAẌ̂ȂƓւ邱
          ƂBȂꍇAybg₻̑̉KȉɌ A
          Ȃ͂̂΂ɌB

          5.4.  ͂ (`<', `>')

               ͂͊KiƓڂłAKq̓̎ނ̓Q[
          قƂǋʂłȂB

          5.5.  XƔ

               XhÂ΂ɓX傪āAɂ̕uĂ镔
          ɍs邱ƂBEāA`p'R}hgƂŕ
          ƂłBEOɁȀɗ``#chat''R}hg
           ƂŒlimFłBxOɕgƎ؋ɂȂA
          X͍x܂ł͓X̊OɏoĂȂȂB

               X̒ɂƂɕ𗎂ƂŕXɔ邱ƂłB
           pi񎦂A邩ǂmF邩APɓX傪
          ȂƂm炳(ʓIɁAXŔĂ镨Ɠނ̕
          Ώۂł)B

               RŕX̒ɗĂ܂ƁAX͕ʑ㏞ȂɏL
          咣B߂߂ɂ͔߂KvB

               X͎sɂȂ邱ƂBȂꍇA𔄂낤
           ƌ̑ɐMp݂ĂBMp݂͕𔃂
          Ɏg邪AXłLłB̓X͈󂯂ȂB  (
           {ŁuNWbgJ[hvɓ邱Ƃ邪AXŎg
          ƂĂ͂ȂBX͎󂯓ȂB)

               `$'R}hgƁA^ł݂̐(΂  
          Ă̂͏)ƂƂɁAMp݂Ε\B
          `Iu'R}h͖̕(܂XL镨)̈ꗗ()\ 
          B `Ix'R}h͎gĂ܂̑̈ꗗ()\
          B

          5.5.1.  X̓Ȑ

               X̂͈̐ӊOȂ̂ȂB



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              18



          * ACe̒li͐FXȗvfɂėlXɕωB

          * X̓hÄ̏ꏊ͓X̊OƂĈB

          * X͂Ȃ̂悤ɒӐ[Ă邪AʓIɂ 
            ̏҂ɂĂ͖B

          *  X"closed for inventory"(uÎߕXv)̏ꍇA҂Ă
            ĂJX͂ȂB

          * X͗Ⴆi͊ĂVACeׂ邱Ƃ͂ȂB


          6.  

               ʏɂ͂Ȃ猩\ȂAЂƂ
           ƈł̒ŉƂ΂o킷ƂɂȂ邩Ȃ̂Œ
          KvłB@̃ACe̒ɂ́AȂ𔭌 
          OɂȂ𔭌̂ɖ𗧂(̔\͂ɑ
          ϗDĂB)

               `/' R}h `;' R}hʏɕ\Ă 
          𓾂̂ɗpB `C' R}h͉ɖO
          ɗpẢ鎞ɁA𑼂̂̂ƌ 
           ɕ֗łBOƂăXy[Xw肷ƁAȑOɂ
          OƂɂȂB

               gR}hu#chatvɂāAאڂƌ𗬂łB 
          ۂ̑䎌͑IłȂ(ƁAȂׂ邩͑I
          Ȃ)AX Oracle of Delphi(ft@C̐_a)Ƃ 
          b邱Ƃ́ALvȌʂ炷B


          6.1.  퓬

               Ɛ킢Ƃɂ́APɂ̉ɌĈړ
          悤ɂ΂悢B̉͂Ȃ킢𒧂܂ȂA 
           ƂCɂ邱Ƃ͂ȂB𗧂ĂƑϊ댯ȉBuO
          \ZvɂvƂƂ킴YꂸɁB

               Ȃ(A܂͂ȂڂȂ)ꍇA
          ƂȂvʒu`I'̕\B̋
          ƂƁAĂ鎞Ɠ悤ɂȂ͉ɍU 
           BAړĂ܂ĂAȂ̍U
          ͋؂邱ƂɂȂBłɈړĂ܂Ă   l
          A 킢Ȃꍇ́A `m'R}hgƂŐ키ƂȂړ
          łBtɁAɉ邩ǂ킩ȂǂƂɂ 
          Čꍇ́A `F'R}hgB

          6.2.  ybg

                Ȃ͎e(`d')AqL(`f')A|j[(`u')̂ꂩƂƂ
          Q[n߂BȂ̃ybg͂ȂƂƂɓA܂悢A 
             Bybg͂ȂƓlɐ̂т邽߂̐HKvƂ


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              19



          Bybg͐VNȎ₻̑̓ɂĂByb g
           ƂCłAybg炵ĂƎv
          AȂڂ^邱ƂłB̂߂ɂ͐H yb
          g ɌēĂ΂悢BƌPꂽybg͂
          󋵂̂Ƃŋɂ߂ėplB

               ybg|ĂɂČoςłB܂Ԃ
           ɐA̗͂⑊ɗ^_[WB߂̂
          ͂Ȃybg̕낤Ax̒ႢLN ^
          ɂƂĂ͖ɗ낤B

               Ȃ̊KֈړƂAׂɃybgAĂ΃ybg
          ȂɂĈړBuɂƖ쐶Ă܂ 
           ȂBlɁAȂ̈ʒuς悤㩂ɂ
          ꍇ (Ⴆ΁AgbvhAŉ̊Kɗꍇ)Aׂɂybg
           ĂAׂɂȂybg͎cBybgł
          ̂悤㩂ɂ邱ƂBȂ͂Ƃ̎Ƀybg̗ 
          ĂꏏɈړ邱Ƃ͂ȂB

          6.3.  Rn

               _  Wɂ邠̐́AȂƔ\͂
          Ă΁A邱ƂłB쐶̐ɂȂ邱Ƃ [
           ͍̂łB̓A̎͋͊֌Włグ
          ɖ@̗͂ɗȂ΂ȂȂBAUȂ̎x z
           ɒuȂA `#ride'R}hŏ~肷邱ƂłB
          ɏēAړ@́Agړ̂Ɠł B
          n}ɕ\̂͂ȂĂ铮łB

               nZp`#enhance'R}hŊǗ邱ƂłBڂ
          q镐̋Zp̏͂QƂ邱ƁB

          6.4.  [̊K

               `҂̗HƂ̎(邢͂͐܂ςÔ 
          gł邱Ƃ)Ȁiɏo킷ȂBH
          EƂ͓Â낭قƂǃ_[W󂯂Ȃ 
           Pɓ邱ƂłBȂ͎񂾖`҂̏iD
          łB͎Ă邱ƂBȑO̖`҂ 
           炵߂̂ɂׂ͂Ēӂ𕥂˂΂ȂȂB͂
          pjA̒ȌɐĂ邩炾B


          7.  

               A̒ŉꍇAEƎv̂͂悭
          邱ƂłB NetHack ł͂̏̕ʂ邱ƂɂĎIɏE
          Ƃł( autopickup IvV(q)ItɂȂĂƂ
          `m'   v  tBbNX (Oq)pĈړƂ͂̌ł͂
          )A܂ `,' R}hgĎ蓮ŏEƂłB

               Ƃɂ́ANetHack ͂Ȃɂ̂悤ɍA
          ȏEƂ͂łȂȂBłȂ NetHack ͂̕
          Ȃ̉וɉAE\B


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              20



               ɘAāAו̏ddȂBǂꂾ̏d
           ^ׂ邩͋ؗ͂Ƒϋv͂ɂB͂قǁAו̏d̉e
          ͏ȂBłAA̒Ăו d
           ȂɕSɂȂƂB͓݂ȂAJ[
          ȂĂ葽̐HKvƂȂBčŏIIɂ͉וd 
          ĉ̂ĂȂƓȂȂĂ܂B

               NetHack ł͉ו̏dǂꂭ炢e^邩Ă
          Bŉsɕ\    `Burdened',  `Stressed',  `Strained',
          `Overtaxed',`Overloaded' ̕\Ȃ̏ԂĂB

               EƂA̕ɂ͖ژ^L蓖ĂBɊւ
          鑽̃R}h͂Ȃǂ̕ĝq˂ĂB 
          ̂̕IԂ悤 NetHack q˂ĂƂ́Aʖژ^L
          ̈ꗗ\Ă̒I(Oq̃R}h̍Q  
          )B

               ̕AႦΕނ̂悤ȕ́AǂȂ̂ȒPɋ
          ʂtB̑̕AႦΊ␅͂̎ނɉ 
          낢ȖOtĂB 1 ̃Q[̊Ԃ͓O
          ͓ނ̕łBɕt閼O̓Q[Ƃ 
          ̂ɂȂB

               ̂悤ȕgǍʂ炩ȏꍇ NetHack
          ꂪł邩ĂĂB̌ʂ܂薾炩 
           ꍇ͂̎̕ނƖt邩q˂ĂB̂ߌɂȂ
          ĂvoƂłB܂ł``#name''R}hg
           l̂ƂłAނׂ̕ĂɖOtX̕
          OtłBłɖOĂ̂``#name''g
           AVOƂăXy[Xw肷邱ƂɂāAȑO
          OƂłB

          7.1.  􂢂Əj

               Ȃ낢ȕ́AƂꂪɗ  
           ƂĂ􂢂Ă邩mȂB􂢂
          镨gƂꂪtĂ܂Ƃ͍ł悭錋 
           B􂢂Ă镐Ƃ͎ɒtĂ܂
          ĎȂȂB􂢂Ă镨gɂƕʂ̕@ 
           ͂ƂłȂBɁA􂢂Ă镐h
          ͕Kƌ킯ł͂ȂĂ̏ꍇ̖͂^   
          āA łȂ퓬̌͂B̑̎􂢂
          Ă镨́A܂ɗȂ܂͂̑̓_ŊQy 
          肷邾낤B

               ܂jĂ镨BjĂ镨͎􂢂
          ĂȂʂ̕ɔׂċǂɗBႦΏjꂽ 
          ͈Ɉw̃_[W^邱Ƃł邾낤B

                @ gƕɎ􂢂􂢂肷邱Ƃł
          B̂߂ƂtĂ܂ĂA􂢂Ă͂ 
           łBm͐􂢂jɕqȂ̂ŁA̐EƂ̖`҂
          eՂɎĂ̂邱ƂłB



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              21



               Ȃ̖̎ژ^̒Ŏ􂢂Ă邩ǂ
           ͖ژ^̂Ȃœɉ̐ȂBǂȏԂɂ邩mĂ
          镨͖ژ^ꗗŁucursed(ꂽ)vuuncursed(Ă )v
          ublessed(jꂽ)vȂǂ̌t̐ɗ^B

          7.2.   (`)')

               |̖{ɏZނقƂǂׂẲ́A`XƌΌ
          ȂȂEƂ邾낤B̐g(ɉEĂ
          ܂)߂ɂȂ͕KvƂBȂł̓|Cgɂ 1
          ` 2 ̃_[W (炩̉Z邩mȂ)^邱 
           łȂBAAN͗OłBN͕gčU
          fōUyɑ傫ȃ_[W^邱Ƃ 
          B

               ɂ͒Ȗ⌕̂悤ȐU񂷂߂̂̂ƁA⑄̂悤
          邽߂̂̂BŉɑŌ^邽߂ɂ́A 
           ɂĉU邩ɓȂ΂ȂȂB
          ɂ́APɑ𓊂悤ɑI邾ł悢B| 
           ˂ɂ́A܂|ɎĂ𓊂΂悢BNX{E
           crossbow bolt(NX{Ep̑)𔭎˂邽߂̂̂ł B
          Ί͊(΂̂悤)̑̐΂𓊂邽߂ɗpB

                ͂̂镐ɂ́uǉ\́v(U\͂ƌƂŐƕ
          蓾)tĂAUɓ\Ɨ^
          _ [WɒǉB̖͂𑪒肷ɂ́AȂ炩̕@
          @gĊӒ肷邵ȂB͎̕K̂悤Ȃ   _
          [W󂯂₷B̂悤ȁuHv_[W͏C\łB

               U  ܂ɖ邩ƁAɂǂꂭ炢̃_
          [W^邩́A̗vfɂČ肳Bɂ͈ 
           ̂: ̎ށA̕i(͂╅H)AoxA
          ́AqAו̏dAZ(q)B̖hl(ʓIȖh䗦B
          h𒅂邱ƂɂƂ͌Ȃ)vf̈łB܂A
          ̕ɑ΂ēɑϐB

               ͕̕Ў莝ł邪A肪KvȕB莝
           ̕Ə𓯎ɎƂ͂łȂBЎ莝̕Ă
          ꍇAЂƂ̕\ƂďĂāA `x'R} h
           gĂ镐ƌ邱ƂłBɁu񓁗퓬vZ
          \̋ZʂꍇA̕𓯎  g       B
          `#twoweapon' gR}hœ񓁗퓬邩ǂ؂ւ
          Bꕔ̃LN^[(ႦΖؐl)̋Z\Ă B
           Ƃ̋Z\ĂĂAxɓ̕gƂЂƂ
          gȂɔׂēGɖmɃyieB󂯂B

               S̕Ȃ邩ȂB邽
           ɂ́ÂIԎ`-'IԂA邢`A'R}h
          ̑̐gɂĂ̂ÔƓɌݎgĂ镐 O
          ƂłB

               AD&D vCƂ̂ǎ҂͂Ct낤AAD&D ɓo
          ꂵ NetHack ɂĂɂ_[W ^ 
          B܂ǂmĂȂ( aklys(ALX), lucern hammer(


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              22



          bcFn}[), bec-de-corbin(xbOEfERr) Ȃ) 
            AD&D ̒ǉ[ł Unearthed Arcana ̕t^ŏڂ
          ĂB

               gR}h `w'(wield: )A `t'(throw:  
           )A  `f' (fire: 𔭎˂ЂƂ̕@), `Q'(quiver:
          )A `x' (exchange: )A`#twoweapon'A`#enhance'(
          q) łB

          7.2.1.  ̂𓊂邱ƂƔ˂邱

               `t' R}hgƂɂāAǂȕł邱Ƃł
          B̃R}hw肷ƁA镨q˂ĂB `?'   
          ƁA ̒œ̂ɌĂȕ̈ꗗ\A `*'
          ƁASĂ̎̈ꗗ\B𓊂邩w肵 
          A( ǂ̖ڕWɓ邩ł͂Ȃ)ǂ̕ɓ邩q˂B
          邱Ƃł鋗́Aɕ̎ނƋؗ͂ɂB͎œ 
           Ƃł邪A|ēyɉ܂ŔсAڕW
          ₷B

               `Q'R}hŗ\ߍD݂́u˕vIĂA `f'R} 
          h œ邱ƂɂāA鑀ȒPɂ邱ƂoB
          Ɠlɓ͐q˂邪A `f'R}hgтɉ 
             w肷Kv͂ȂB autoquiver IvVIɂ
          ƁA `Q'R}hŐݒ肵ȂȂɁA NetHack I
          ɑ̕ĂB

               ---  ---  xɕ̕𓊂邱ƂłLN^[
          Bxɕ̖𑕓U(邢͈xɕ̕)A 
           WɓĂ邱Ƃ͂₷dł͂ȂBW[͂̋Z\ɗD
          Ă邵AK؂ȕ̋Z\ (|Ė˂Ȃ|̋Z\A N
           X{DgȂNX{D̋Z\AXOĐ΂𓊂
          XŐZ\) ɂčx̋ZʂΑ̐EƂł 
          \ łBȂ̃ACe𓯎ɓ邱Ƃł邩
          ^[ωB `t'R}h`f'R}h̑Oɐw肷邱
             āA    鐔𖾎Iɐ邱ƂłBႦ
          ΁A``2f''( number_pad IvVI̎ɂ``n2f'')Ǝw肷
          ƁA Ƃ 3 {ˉ\łő 2 {˂ȂBA
          ɔ˂ł鐔傫w肵ꍇ (̗    ``4f'')
          ́Aɐw肵ȂꍇƓlAۂɔˉ\Ȑ(
           3 {)˂ȂBUJnȂASẴACe 
          ͓ɔԁB 1 {ڂŉ|ȂAc͂̐܂
          łƂɂȂB

          7.2.2.  ̋Z

               pł镐̋Z\͂܂܂ɈقȂĂB̋Z( Z
          \)͂̕ǂꂭ炢܂邩ɉeBZ\̓Q[
          ʂČコ邱Ƃo邪A͐EƂox═ 
          ̎gp񐔂ɂB

               Z ʂ߂ɁA daggers A broadswords A polearms
          Ƃɂ̃O[vɕĂBꂼ̃O [
          v ŋZʃxǂ܂ō߂邱Ƃo邩͐EƖɌ܂Ă


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              23



          BႦΖ@g daggers  staves ɑ΂Ă͍xɒB
          邱Ƃo邪A swords  bows ɑ΂Ă͂ł͂ȂB

               `#enhance'gR}hŌ݂̕(Ǝ)̋Zʂ邱Ƃ
          łBɁAЂƂ܂͕̋Z\コ邱Ƃł 
           ȂAǂ̋Z\コ邩I邱ƂłBZ\̃
          N"none" (Z\コ邱           
          "restricted"(ꂽ) ƌĂ΂邱Ƃ)A "unskilled"(S
          ), "basic"(), "skilled"(n), "expert"(GLXp[g)
           B  ꂽZ\͒P`#enhance'R}hňꗗɕ\
          B (_̉ɂ肠̋Z\̐邱ƂB 
           ɂ͋Z\"unskilled"ƂȂAE"basic"܂łƂȂ) L
          N^[ɂẮAfł̐퓬 }[ V  A[ c  Z \ 
          ``master''( }X^[)``grand master''(Oh}X^[)ɂ܂Ō
          コ邱ƂłB

               Z\x"restricted""unskilled"̕gƁA 
           ▽ɗ^_[WɃyieBB "basic"
          ł̓yieB{[iXȂB "skilled"ł͖Ɨ^   _
          [Wɂ₩ȃ{[iXB "expert"ł̓{[iX͑傫
          BUƁAgĂ镐ɊւZ\(őɒB
           ȂȂ) コ邽߂̌Px𑝂₷`XB
          Px̃xɕKvȒlɒBƁA̋Z\ɂ莩M 
           悤ɊƂB̎_`#enhance'R}h
          gƂɂĂЂƂ܂͕̋Z\コ邱Ƃł B
          Z \͎Iɂ͌サȂBȂȂSĂ̋Z\x̍vɂ͐
          ̂ŁAǂ̋Z\コāAǂ𖳎邩߂K v
          邩łB

          7.3.  h (`[')

               ̔FDIȂ̂Aɂ͐łB̂
          ̍U䂪gɂ͖hKvłBh̒ɂ͑̎ 
           hhʂɗDꂽB Armor class(AC)(hl)
          ̖hʂ̎ړxłBhl (AC) AD&D ł̏ꍇƓ悤
          ] B 10 hȂ̏ԂƓAlقǗDꂽ
          hł邱ƂB AD&D ɑ݂Z͂ NetHack ɂ
          ĂhʂBȉ(sSł͂邪) e̊ZƂɋK
          肳hl̈ꗗB

                  dragon scale mail(hS̗؊Z)               1
                  plate mail(|S̊Z)                            3
                  crystal plate mail(̊Z)                    3
                  bronze plate mail(̊Z)                     4
                  splint mail(SЂ̊Z)                           4
                  banded mail(ы̊Z)                           4
                  dwarvish mithril-coat(h[t̃~X)     4
                  elven mithril-coat(Gt̃~X)          5
                  chain mail(т)                          5
                  orcish chain mail(I[N̍т)           6
                  scale mail(؂̊Z)                              6
                  studded leather armor(etZ)               7
                  ring mail(S̊Z)                             7



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              24



                  orcish ring mail(I[N̓S̊Z)              8
                  leather armor(Z)                             8
                  leather jacket(WPbg)                    9
                  no armor(ZȂ)                               10

               ɑ̖h(: ACA|AN[N) gɂAh l
          ̒l邱ƂłBeɓ镨 1 g
          ɂ邱Ƃ͂łȂ (Z͈ꎮAN[N 1 A 1 A |
           1 Ȃ)B

               h ɖ͂΂̖h̖hʂ͒ʏ̕ǂ(
          ͈)ȂĂAɕtĂu{Lv(邢́|L)
           hl̒lȂBႦ +1 т́Aʏ̍
          тhʂAhl 1 PʕȂ 4  
           BhgɂƒɖhlƁu{Lv̒lB
          ꂽh͒ʏ핉̖(|L)ĂA͂ 
          Ƃ͂łȂB

               ̊Z͎K̂悤Ȃ̃_[W󂯂₷B̂悤
          _[W͏C\łB@̂WhB

               Zg߂̃R}h `W'(wear: ht)  `T'(take
          off: h͂) łB `A'(remove all: SĂ͂)܂
          ̐gɂ̓lAh͂̂ɎgpłB

          7.4.  H (`%')

               ̂тɂ͐HsłBԐHɂȂ܂
           Ƃ₪č|AXɉ쎀ւ̓ǂ邱ƂɂȂBۑ
          uĂȂƏł܂AHׂɂ͕sqɂȂH   
          B ACX{bNXʂɓĂH͒ʏ͂܂ł܂Ȃ
          AACX{bNX͏dAʂ͊Ĵɏ΂莞ԂKv 
          B

               Eƒʏ͂̎̂c邪ÁuHvɂȂB
          ׂĂƌ킯ł͂Ȃ͐Hׂ邵Aɂ͐HׂƓ 
           ͂̂B傴ςɌ΁uĤׂɂȂvƂ
          ƂłB

               ؐH`̐EƂBؐH`̉͌ē̎
           HׂȂBؐH`̃vC[͓̎̂Hׂ邱Ƃ
          邪AȂ炩̂肪ȂpB

               furit IvVɂĂȂ̍D̐HɂȂł̖O
           1 ݒ肷邱ƂłB


               HHׂ邽߂̃R}h `e' łB

          7.5.   (`?')

               ɂ͂낢ȕ\肪tĂ邪A͂炭
          ̖ptɒׂƂđI񂾂̂ł낤 (:``READ ME'' 
            ``THANX MAUD'' ̋tǂ݂Ƃ)B͓ǂނƏł(


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              25



          @̎̏ĂȂ͏łȂ)B

               ̒ōłpl̍̂scroll of identify( 
          ̊)łB͑̕ɂĂꂪł邩A􂢂
          Ă邩jĂ邩AƉ͂𔭊ł邩m 
          B ̂̒mȂ͂̒ɂ͂̊Ȃł͉ł邩
          Ӓ肵̂B

               Cf[ĂĂȂscroll of mail(莆̊)
           nĂ邱Ƃ (̋@\LɂăRpCĂ
          o[W̏ꍇ)B NetHack ̃[zB@\̓VXẽ[ 
          {b NXɓdq[ĂꍇɋNB̋@\gp
          ɂ͊ϐ``MAIL''ɂȂ̃[{bNX̃t@C 
          肵 NetHack ɐV[Tꏊm点KvB܂
          ]ނȂΊϐ``MAILREADER''Ɏg[MvO 
          t@Cݒ肷邱ƂłB̂Ƃ NetHack 炻̃vO
          NĂ̊ǂނƂłB[Q[ɂ 
          ă_ɐo[W NetHack ł͂̊ϐ
          BCf[ mail IvVŃItɂłB

               ǂނ߂̃R}h `r' łB

          7.6.   (`!')

               ͏тɓĂt̂̐FɂċʂB͈
          ނƏłĂ܂B

               Ȑ͐łB͂΂ΏjĂ􂢂
          Ă肵āAsȐɂȂ肷Bs̉ 
          ƂĐ͗LQȂ̂ŁAs̉ɓ(`t')ƗL
          Bɑ̕Z(``#dip'')̂ւLvłB

               ނ߂̃R}h `q'(quaff: ) łB

          7.7.   (`/')

               @̏͒ʏ퉽͂𔭊B̒ɂ͕̂
           ȀꍇUwȂĂ͂ȂȂB
          ɌĐU邱Ƃł(Ƃ `.'  `s' ͂)A 
           ͂΂΋ȍsׂƂȂB̑̏ɂ͕ȂAU
          q˂ĂȂB񂪌͂𔭊񐔂͏񂲂ƂɕsŁA 
          gxɂ̉񐔂 1 B

               ̖@̗ʂȂȂƁAʏ͏gpĂNȂB
          Ȃ玞܁AŌ̈ꈬ̖͂g񂩂 
           \łBƏ͉Ă܂B͓K؂Ȗ
          @ɂčď[U邱Ƃł邪AƏ񂪔Ă 
           \B\͍ŏ͔ɏAɉx
          ď[U邲Ƃɑ傫ȂB

               \sȂȍsׂł͂邪AǂɂȂȂȂƂɂ͏
           󂷂ƂB͎Cȍsׂł͂ȂBsƂ
          AjIȖ@̃GlM[邩łB



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              26



               SɊӒ肵ꍇÄꗗł͊ʂ̒ɒǉ
           񂪕\B͍ď[Uꂽ񐔁ARA݂̎gp\
          ȉ񐔂łB񂪖ꂽꍇɂ͎gp\ȉ񐔂 -1    
          B

               g߂̃R}h `z'(zap: U) łB󂷂ɂ
          `a' (apply: g)łB

          7.8.  w (`=')

               wւ͑ϖɗłBƂ̂⊪̂悤
           ͂ߐɂȂ̂ƈႢAwւ̖͔͂rIPvI
          邩炾B

               wւ͂߂邱ƂɂĂ̖͔͂Bwւ̖͗
          w 1 Av 2 ͂߂邱Ƃ͂łȂB

               ܂Ă̎wւ͐gɂƕ̌ȂB
          ͎wւ̎ނɂĈقȂB

               wւg߂̃R}h `P'(put on: wւ   )   
          `R'(remove: wւ͂) łB

          7.9.   (`+')

               ͋͂Ȗ@L傫Ȗ{łB`r'(read: ǂ) R
          }hŊwԂƎ̒mǂݎɓ](čŌɂ͓
          ߂ȂȂ)AȂ΂݂͕̎šʂɏIB􂢂
          ꂽm̋y΂Ȃ_̌Ñ㕶ŋLꂽǂ 
          NԂɊQyԉ\I

                 Ƃ(wł鎞)ɂ͂t邱Ƃ
          BȂ̌oxł͉y΂ȂxȎ悤Ǝ 
           AΉ^CvɊւZ\ႩAЂǂĂ
          ƂɎ肷ƁÂɕKvȃGlM[ 
          ԂQɏIĂ܂ƂB

               邱Ƃ́A@̃GlM[ĂыNĂ𐸐_
          ̂̂ɏW邱ƂłBȂg̓o閂@ G
          l M[JAAĎƔĂ܂B
          ɂ͗KKvłBKĂ΁Aꂼ̎̈ Z
          \ ͌サĂBȂAԂoɂĂꂼ̎
          ɊւL͔AxwԕKvłĂ邾낤B

               ŵ̏ꍇAw肷Kv  
          B Ƃ`.'܂`s'w肷邱ƂŎgɑ΂Ď
          邱ƂłBA͂΂΋ȍsׂłBw 
          ̂Ȃ̏ꍇAw肷Kv͂ȂB

                 Knx̖ʂŃO[vĂ̂ƓlAO
          [vĂB̂ɐƁÃO[v 
          P ƂɂȂB\ȋZ\Ύ̌ʂ߁As̉
          \߂邱ƂłBZ\Xbg͕XLƋLB(``
          ̋Z''̍QƂ̂)


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              27



               @ɂ͎RɈړłȂ΂ȂȂB܂A
          ̎ނ̊Z𒅂ĂƖ@̂W邾낤B

               ǂނ߂̃R}h͊ǂނƂƓ `r'(read:
          ǂ) łB `+' R}hɂAmĂƂ̃xA
          Aꗗ\B `Z'(cast: ) R}hɂ
          B

          7.10.   (`(')

               ͂낢ȖړIɎgXGȕłBȂǂƓ
          Ɏgp񐔂ɐ̂镨BႦ΃v͂΂炭 R
           sĂ܂B̑̓̒ɂ͗e܂܂ĂAo
          ꂷ邱ƂłB

               g߂̃R}h `a'(apply: p) łB

          7.10.1.  

               `̓rŊ┠Ђɏo킷Ƃł낤B
          ͒uĂꏊɗĂꍇɂ͊gR}hu#lootv  
          āA ܂ĂƂɂ `a'(apply: p) R}hŊJ
          邱ƂłBȂЂɂ͂΂ΏĂ A
           ͏dĉ^тɂ̂łBЂ͎ɎƂ͂łȂ
          Ȃ̂ŁA͂(`a'(apply: p) R}hŌ 
               g A `^D'R}hŏRƂ΂AgR}
          h``#force''ɂ蕐gĂJȂǂ̕@ɂ)ɂ͏
          uȂĂ͂ȂȂB

               Ђɂ㩂d|Ă̂A͂ӂ
          J肵ƂɕsȏoNBgR}h``#untrap''
          ă`FbN㩂ɂȂ悤݂邱ƂłB

          7.11.   (`"')

                 ͎wւƑς悭ĂA΂΂Ƒ傫Ȍ͂
          ĂBwւƓ悤ɖɂ͂낢Ȗ@̓   
          A LvȂ̂LQȂ̂āAgɂ邱Ƃɂ͂
          B

               ͈ɂ邱ƂłȂB

               g߂̃R}h͎wւ̏ꍇƓ  `P'(put  on:
          wւ͂߂)  `R'(remove: wւ͂) łB

          7.12.   (`*')

               ΂̒ɂ͉l̂̂AlŔB΂͍Y
          @ƂĂƂċɂ߂ČʓIȂłBl̂ 
          ΂EoɏĂΓ_ɉZB

               ̏Ȑ΂΂ɕނ邪Ảl͂قƂǂȂB
          ASĂ̐΂(XOĂȂ)eƂėL   
          B]Ɋׂœ邱Ƃ\łB


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              28



          7.13.  傫Ȋ (``')

               ⋐΂͓ɗLpł͂ȂAʓIɏd̂łB
          Ƃ͈قȂƂ\łB

               ȃq[}mCh(l₻̒)͋΂𕐊Ƃėp
          ƂłB

          7.14.   (`$')

               ͓_ɉZA܂Xł͋ŕ𔃂ƂłB{
          ɂ͂Ȃ̎ɉe邩Ȃ̉(X
          ͕ʂƂ)B


          8.  vC

               P  NetHack ɏ邾ł͖łȂꕔ̃vC[
          ́AvCɐ݂邱Ƃɒ킵ĂB̒̈ꕔ 
          Q[ ɂĎIɋL^AQ[ł #conduct R}
          hŊmFłB܂Q[Iɂ\Bɔ 
           sƁA͂₻͕̒\ȂBl ̒ɏ
          邱ƂɂāAvC[͒ǉ``錠''   
          B ȂA̐ɏ]ƂȂQ[ɏ邱ƂS
          LłAŏɃQ[ɏƂ͕ʂ̒͊֌W 
          B

               ̂͐HוɊւ̂łBłȒ͐H
          Ȃ̒łB͐HȂłԐł邪A K
          v   B]āAݕɑ΂Ă͉̐ȂBႦh{
          ĂłB_ɋFċQ̂Ƃ͂ȂHוɊ 
          钧ɂᔽȂB

               ȍؐH`҂͓ꂽHוHׂȂB{I
          h{͉ʕƖ؂łBubu(`b')A[[(`j')A׋(`F')
           ؂Ƃ݂ȂBlԂ̐HɂgĂȂ̂B
          oXANAuHv(ۖ)Aj[VAb[V 
           B̐ɕωĂƂ́AȂǂ̕ʏłȂ
          ȍؐH`җp̐HƂĈBA 
          HȂ̒ɂ͔邱Ƃɒӂ邱ƁB

               ؐH`҂͓HׂȂBA̕YH
          邱Ƃ͌ȍؐH`҂قǂ͌ȂBĽȍؐH` 
          ĤׂɒǉāAubNvȊÕv(`P')AA
          ꂽHו (肢NbL[ƃpP[L)A瑢ꂽ
          Hו (N[pCƃLfB[o[)AC[[Hׂ邱
          ƂłBN͍ؐH`҂Ƃ݂ȂB

               Hׂ邱Ƃ͌ȍؐH`ҁAؐH`ҁAHȂ̒
           Bɂ͂قALȊỎ̎̂ʋlA{Ō
          邻̑̓̂܂܂ށBωɁuݍŏvU 
           ̂͂̉̎̂ĤׂƂ݂ȂBA؁Ałł
          ̂AłɕωĐHׂA}Cht 
          C [ɕωĔ]Hׂ邱Ƃ͓HׂƂ݂ȂBA


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              29



          X͓̕Ƃ݂ȂB

               Ɋւ炸As\ȕAHׂƊ댯Ȃ̂
          B ɑ΂āuݍŏvU邱Ƃ́Ả
          ̂ĤׂƂ݂ȂBuiȍؐH`(``vegan'')vƂ
          t ͐HוɊւ镶ł̂ݗp邱ƂɒӂĂقB
          ꂽ(A̗؁AApA)ggɂ 
           邱Ƃ͐ɈᔽȂB܂Au~NF́v͕sȔ
          Fł͂邪A܂ł킯ł͂Ȃ̂ŁAȍؐH` 
                  B X  ChvC[`
          ``fruits''́AႦuځvł낤u|[N`bvv 
          낤AȍؐH`҂̐ɈᔽȂB

               __҂͏@ے肷B܂A#pray(F), #offer(
          ), #turn (ŝ̂߂), mɑ΂ #chat(b)
           ͂łȂBꕔ̓ǎ҂̓NmŃvĈ̐
          ĂƎ咣邩ȂAł̓vC[̑I ]
          n cĂBCF_[̖_ɕ̂̓Q[ɏ
          邽߂ɕKvȂ̂Őɂ͔Ȃ̂ƂB܂A{_ m
           ₻̑̏@I݂bt𕷂Ăɂ͔ȂB^
          __҂͌t͕AɂȂʂȈӖoȂB

               قƂǂ̃vC[͕(邢͕Ƃđ邱 
          lĂ铹)ɐ키B̈͂̂悤ȕɂ
          g킸ɃQ[ɏ邱ƂłB𓊂A˂ A
          R 肷̂͋B܂AAA邢͂̑̃ACe
          gAfrŐ키ƂB

               NetHack ɂāAa`҂͑̉EĂ͂ȂȂ( 
          ƁA̎ɂČol𓾂Ă͂ȂȂ)B͓ɓ
          ł邪A̎iɂČol𓾂邱Ƃ͉\łB

               ӎ҂͓ǂݏłȂBɂ͈ȉ̍sׂ܂܂B
          ǂށAǂށA肢NbL[̃bZ[WǂށATVc
          ̕ǂށAA``x''ꕶ(ӎ҂̓`IȃTC)
          O ̕ށBł镶ǂނƂƁAQ[ɏ邽
          ɐ΂ɕKvȃACeǂނƂ͐ɂ͔Ȃ   B
          Q[ JnɎĂ銪Ǝ̓emĂ邱Ƃ
          ю̒ḿAQ[JnȑOɋt狳̂Ƃ݂ȂA 
          ɂ͔Ȃ̂ƂB

               ̑ɂׂ̍Q[ƂċL^钧킪B
          ͋sE邱Ƃ\łBɃvĈ 
           B  sE@^ꂽƂA ``none''(܂``
          '')ƓƁAsEȂ܂܂ɂ邱ƂłBȂ̓ACe
          𓯂O[v̑̃ACeɕω (``polypiling'')A
          ̏EEŎ̑̂𑼂̐ɕς(``polyself'') 
          B ̌ʂpȂƂ͂ꂼ꒧Ƃ݂ȂBŌɁA
          Ȃ͂Ƃǂ肢ȂĂ炤ƂBȂ̃ACe 
          킸ɃvĈ͈̒łAȂ(Ƃ
          łƂĂ)ŃvĈ̒łBACe肤
          @ ^ꂽƂA ``nothing''܂``Ȃ''ƓƁA
          Ȃ܂܂ɂ邱ƂłB



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              30



          9.  IvV

               lɂ͂ꂼꂢ낢ȍD݂ NetHack ̗Vѕ 
           قȂĂ̂ŁANetHack ̐U镑ύX邽ߐݒłI
          vVB

          9.1.  IvV̐ݒ

               IvVݒ肷@ɂ͂BQ[ `O'  R
          } hgƂɂđSẴIvV邱ƂłÂ
          ƂǂύXłB܂Aϐ``NETHACKOPTIONS''ݒt@ C
           ŎIɐݒ肷邱ƂłBNetHack ̃o[WɂĂ
          Q[JnOɃIvVݒ肷邱ƂłvO 
          邱ƂB

          9.2.  ϐ NETHACKOPTIONS g

               ϐ NETHACKOPTIONS ɂ͂낢ȃIvV̏lJ
          }ŋ؂ė񋓂ݒ肷BIvV̂̂̂ 
          P ɃIIt̑Ił邾łB̃IvVXg
          ɓƃIɂȂAIvV̑O `!' ``no''ƃI
          t ɂȂB̑̃IvVł͐ݒlƂĕ񂪕KvłB
          ̃IvVݒ肷ɂ̓IvVAR܂̓C R[
           LAݒl̏œ͂΂悢Bݒl͎̃J}͕
          ̍Ō܂łƂȂB

               Ⴆ``autoquiver''I A``autopickup''  I tA  O
          ``Blue  Meanie'' ɁAt[c``papaya''ɂȂ悤Ɋϐ
          ݒ肷ɂ csh ł͎̃R}h͂΂悢B (!͓ꕶ 
          Ȃ̂ŃGXP[vĂKv邱Ƃɒ)

               % setenv NETHACKOPTIONS "autoquiver,\!autopickup,name:Blue Meanie,fruit:papaya"

          sh ܂ ksh ł

               $ NETHACKOPTIONS="autoquiver,!autopickup,name:Blue Meanie,fruit:papaya"
               $ export NETHACKOPTIONS

          Ƃ΂悢B

          9.3.  ݒt@Cg

                t@C̒`#'Ŏn܂s̓RgƂĈB
          t@C̒``OPTION=''Ŏn܂s͊ϐ``NETHACKOPTIONS''
              @  I v V   L q Ă̂ƌȂB
          ``DUNGEON=''A``EFFECTS=''A``MONSTERS=''A``OBJECTS=''A``TRAPS=''A``BOULDER=''
          Ŏn܂s͂ꂼ dungeon A effects A monsters A objects A
          traps A boulder
           IvVƂĈ邪A̎w@́AݎgĂtH
           ĝɎgLN^R[h 10 i̗łB
          ̗ 0 w肷ƁA̍ڂ͕ύXȂB̋@\ I v
          V̕@ł͗płȂB̗͊es̍Ō`\'邱
          ɂĕsɓn邱ƂłB



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              31



               RpC AUTOPICKUP_EXCEPTIONS IvVݒ肳 
           ƁA ``AUTOPICKUP_EXCEPTION=''Ŏn܂sɂ pickup_type
          IvV̗O`łB

               Wݒ̐ݒt@C OS ɂĈ   A   
          ``NETHACKOPTIONS''  i擪`@'t邱ƂŁjgpݒ
          t@Cw肷邱ƂłB

          9.4.  JX^}CYIvV

               ȉɂ낢ȃIvV̖B܂ɒ
           ͖̕Bȉ̃IvV̂ɂĂ͖
          ƂȂĂIvVB

          align
            X^[g̑(align:lawful, align:neutral,  align:chaotic)B
             ̈ꕶŎw肷邱ƂłBWݒł̓_ɑI
            B `O' R}hŐݒ肷邱Ƃ͂łȂB

          autodig
            @邽߂̓ɂĂāA@邱Ƃłn`Ɉړ 
            ƂƂAIɌ@iWݒ̓ItjB

          autoopen
            ɌĕƎłJiWݒ̓IjB

          autopickup
             ɂ̂IɏEiWݒ̓IjB̐U镑
            JX^}CY邽߂ɂ pickup_types QƂ邱ƁB

          autoquiver
            ̃IvV͖̎`f'(fire:̒ɂ̂𔭎
             ) R}hsɂǂ邩߂BIȂAR
            s[^[͓KȕɓB̎A􂢁A j A 
            @A  A ̐Ȃǂ͍lȂ̂Œӂ邱ƁB
            `Q'R}hgĎ̍DȕɓB镐킪
            ȂÃIvVIt̎͑`t'(throw:𓊂)
            R}hsB (Wݒ̓It)

          boulder
            \̂ɗpLN^iWݒ͊\L N
            ^jB

          catname
            X^[g̔L̖O(: catname:Morris)B `O' R}hŐݒ肷
            邱Ƃ͂łȂB

          character
            LN^[̃^ C v     ( :``character:Monk'')B
            ``role'' IvVƓłBEƂݒ肷邻̑̕@ɂ
            Ă``name''IvVQƂ̂ƁB ``random''ȊO̕
            ŏ 1 ŔʂB




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              32



          checkpoint
            v ONbVɕł悤ɊKړ閈
            ԂZ[uiWݒ̓IjB

          color
            FXȉ╨⓴A̒n`J[ŕ\ (} C N  R 
            s[^ł͕Wݒ̓I)B

          checkspace
            t@CޑOɃfBXN̋󂫗eʂ`FbN(Wݒ
            ̓I)BZ[ut@C⃌xt@Ĉ߂Ɏgp[eBV
            2GBȏ̋󂫗eʂꍇÃIvVItȂ
            ΂ȂȂȂB̃IvV̓RpCMFLOPPY
            `ĂƂ̂ݓKpB

          cmdassist
             肪ȃ~XoƂɐVKvC[̂߂ɒǉ̃R}
            h⏕bZ[W\(Wݒ̓I)B

          confirm
            ybgAXȂ̍UĂȂU悤Ƃ 
            ɊmF(Wݒ̓I)B

          DECgraphics
             A  \ɗp镶ȂgłׂĒ`ɁA
            DEC VT-xxx/DEC Rainbow/ANSI rZbg炠炩ߗp 
             ݒgp(Wݒ̓It)B̃IvV͂܂^[~
            iK؂ȃOtBbNLN^[悤ݒ肷B 
             AȂŃOtBbN㏑ݒ肷Ƃɂ
            ȂĂ͂ȂB

          disclose
            Q[Iɕ\𐧌䂷(Wݒ́ASĂ\  
            )Bݒł͈̂ȉ̒ʂB

                 i - ̊Ӓ
                 a - ̌J
                 v - ގ̈ꗗ
                 g - E
                 c - 

             ꂼ̕\ɑ΂āȂOɂǂ̂悤ɐUw镶
            邱ƂłB̈Ӗ͈ȉ̂ƂB

                 y - mF邪AWݒ̓CGXɂB
                 n - mF邪AWݒ̓m[ɂB
                 + - mFȂɕ\B
                 - - mFȂŔ\ƂB

            (: ``disclose:yi na +v -g -c'') ̂悤ɐݒ肵ꍇA 
              m F  (Wݒ̓CGX)B ͊mF(Wݒ
            m[)B ގ͊mFȂɕ\B E͊mF
            ɔ\ƂB ͊mFɔ\ƂBގ
            ꗗ㩂⓯mɂĎ񂾉܂ނƂɒӁB


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              33



          dogname
            X^[ǧ̖O(: dogname:Fang)B `O' R}hŐݒ肷
            Ƃ͂łȂB

          dumpfile
            Q[ǏJot@CB %n}Ngp
            ƂŃvCLN^[ɒu邱ƂłB̃Q[ 
             ̃fBNgɃt@Co߁C݌v
            BʏUnixVXeɂ/tmpw肷B

          dungeon
            {\̂߂̃OtBbNV{ݒ肷 ( W    
            `` |--------||.-|++##.##<><>_|\\#{}.}..## #}'')  dungeon   Iv
            V͕Wݒ̑̕ɒn}`̂Ɏgp 1   
            41 ̕BWݒ̑̕ɂŐݒ肵
            gēA̒n}\AWݒ͎̕gȂB 
             Ȃ̃VFʈ镶gȂÃLN
            ^GXP[vKv邩ȂƂɒӁB

            ̃IvVŐݒ肳镶́A݂ł͒ʏ C Ŏg
               ŃGXP[v邱ƂɒӂȂĂ͂ȂȂB
            `\' ̌͂̂̂̕̕ƂĎ舵A  v 
            tBb N X ƂĂ͈ȂƂƂłB]āA`\' 
            `\\' ƂKvBȃGXP[v`ł `\m' ͌
            ̃^rbgIɂA

            V {͈ȉ̏łFA(c)A()ÅpA
            E̊pÅpAE̊p, ǂ̌AT ̕ǁAt T 
            ǁA T̕, E T ̕ǁÂȂoAJ
            (c)AJ(), (c)A()AS _A
            ؁A ̏AÂʘHA邢ʘH, ւ̊KiAւ̊KiA
            ւ̂͂Aւ̂͂AՒdA, ʍAAA 
               xA XAnA~Ă钵ˋ(c)A~Ă钵ˋ(
            )AオĂ钵ˋ(c)AオĂ钵ˋ()ACA_A
            

             lp̕\𓾂邽߂ɂ͊p T ̕ǂ '+' g
            悢mȂB̃[Xł͐VV{ 
            Â݂̂č\\̂ŒӁB

            `O' R}hŐݒ肷邱Ƃ͂łȂB

          effects
              \     ̃OtBbNV{ݒ肷 (Wݒ
            ``|-\\/*!)(0#@*/-\\||\\-//-\\| |\\-/'').  effects IvV 
             Wݒ̑̕ɒn}`̂Ɏgp 1-29 ̕
            B̕ dungeon IvVƓlɏB

            V{͈ȉ̏łF(c)A()A(ォE
            )A(Eォ獶)A@AJ̃tbVAu[
            ()Au[(E)A@hɗp 4 ̋LAݍ܂
            ƂɎg 8 ̋LAɗp 9 ̋LB  3
            LN^ 3 񂩂ȂA̒S͂ 3 ~ 3 ̔z̒S
            ȂB


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              34



            ̃[Xł͐VV{Â݂̂č\ 
            \̂ŒӁB

            `O' R}hŐݒ肷邱Ƃ͂łȂB

          extmenu
            g R}hC^[tF[XALȃR}ḧꗗj[
            o悤ɕύXBL[͂́AŌ Enter KvȂ
              O͓`IȃC^[tF[Xƌ݊B tty C^[
            tF[XɂĂB(Wݒ̓It)

          female
            ``gender:female'' ̌ÂʖB `O' R}hŐݒ肷邱Ƃ͂ł
            ȂB

          fixinv
            ̖ژ^LƕƂ̑Ή͂̕ɒuĂωȂ(W
            ݒ̓I)BItɂƂ͕ɒuƂ̖̕ژ^Lȍ~
            ̋LƕƂ̑Ή 1 B

          fruit
             Ȃ̍D̉ʕɂȂł̖Oݒ肷(:fruit:mango)
            (Wݒ́uslime moldv)B NetHack ŎXgÎ
            IȖȌtłB slime mold(lolo)ƐH~
            킭Hוɂׂł낤B apples(S)Aoranges(I  
            W)A  pears( m  )A  bananas(oii)A melons () 
            NetHack ɂ݂͂Ă̂ŁAݒ肵Ă͂ȂȂB

          gender
            Jn̐(gender:male ܂ gender:female).  ŏ̈ꕶ
            w 肷邱ƂłB ``male''  ``female'' IvVw
            ĂĂA ``gender'' IvVD悳BWݒł K
            ؂Ȑʂ_ɑIB `O' R}hŐݒ肷邱Ƃ͂
            ȂB

          help
            `/' R}hgĒׂĂ镨ɂĉ炩̏   
            A 邩ǂq˂(Wݒ̓I)BwvoȂ
            悤ɂ ``More info?'' Ƃvvgɔς킳Ȃ 
             ŁAf𒲂ׂ邱ƂłB͋[dv
            Ă܂mȂƂӖB

          hilite_pet
            ybg𓯎̓王oIɋʂ(Wݒ̓It)BeL X
            gEBhE\ł color It̂Ƃɋ\B X̃^C
            gpƂ́An[g̋LybgɂB

          horsename
            Jn̔n̖O (:``horsename:Trigger'').  `O' R }
            hŐݒ肷邱Ƃ͂łȂB

          IBMgraphics
             AAʁA㩂̕\ɗp镶ȂgłׂĒ`
            ɁA IBM g ASCII Zbg炠炩ߗpӂꂽ 


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              35



            gp (Wݒ̓It)B̃IvV͂܂^[~iK
            ؂ȃOtBbNLN^[悤ݒ肷BȂ킿A 
             ̃OtBbNŏ㏑ݒ肷ƂɂȂ
            Ă͂ȂB

          ignintr
            u[N܂ފ荞ݐM𖳎(Wݒ̓It)B

          legacy
            Q[JnɐbZ[W\(Wݒ̓I)B

          lit_corridor
            ڂ₠Ȃ̃LN^ĂɂČʘH \
             (Wݒ̓It)B

          lootabc
             JƂ`o', `i', `b'ł͂Ȃ`a', `b', `c'̃L[g
            (Wݒ̓It)B

          mail
            Q[Ƀ[zB悤ɂ(Wݒ̓I)B

          male
            ``gender:male'' ̌ÂȂʖB `O' R}hŐݒ肷邱Ƃ
            łȂB

          menustyle
            낢ȃIuWFNgw肷Ƃ(Ƃ DropR}h)ɗp
            C^tF[X̐Bl tradional, combination, partial,
            full   4 ̃^Cv̍ŏ̈ꕶw肷B ``tradional''
            Âo[WŗBꗘpł̂ŁA̎ނ   
            ́A   I  ނɓĂ͂܂SĂ̕mFB
            ``combination''͑I̎ނ͂邪A
             Ă͂܂镨mFőÎł͂ȂAj[`
            IB ``partial''͕̎ނIԂƂAɑS 
            \ꂽj[\B ``full''͕̎ނ̕
            ̂ɁAŏɕ̎ނ̃j[\AꂩI 
            ނɓĂ͂܂镨̃j[\B

          menu_deselect_all
            j[̑SĂ̍ڂIɂL[B Amiga, Gem, X11, tty
            ĂB(Wݒ `-')

          menu_deselect_page
            j[̂Aݕ\ĂSĂ̍ڂ I    
            L[B Amiga, Gem, tty ŎĂB(Wݒ `\')

          menu_first_page
            j[̍ŏ̃y[WֈړL[B Amiga, Gem, tty Ŏ
            ĂB(Wݒ `^')

          menu_headings
            j[̂ڂĂ镔ǂ̂悤ɕ\邩 w  
            Bl 'bold'(), 'inverse'(]), 'underline'()̂


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              36



            ꂩłB.  SẴ|[gŎۂɎOSẴ^Cv\ł
            킯ł͂ȂB

          menu_invert_all
            j[̑SĂ̍ڂ̑IԂ𔽓]L[B Amiga, Gem, X11,
            tty ŎĂB(Wݒ `@')

          menu_invert_page
            j[݂̌̃y[W̑SĂ̍ڂ̑IԂ𔽓]   L[B
            Amiga, Gem, tty ŎĂB(Wݒ `~')

          menu_last_page
            j[̍Ō̃y[WֈړL[B Amiga, Gem, tty Ŏ
            ĂB(Wݒ '|')

          menu_next_page
            j[̎̃y[WֈړL[B Amiga, Gem, tty Ŏ
            ĂB(Wݒ `>')

          menu_previous_page
            j[̑Õy[WֈړL[B Amiga, Gem, tty Ŏ
            ĂB(Wݒ `<')

          menu_search
            j[ŌsL[B Amiga, Gem, X11 ŎĂ B(
            Wݒ `:')

          menu_select_all
             j[̑SĂ̍ڂIɂL[B Amiga, Gem, X11, tty 
            ĂB(Wݒ `.')

          menu_select_page
            j[̂Aݕ\ĂSĂ̍ڂIɂ L[B
            Amiga, Gem, tty ŎĂB(Wݒ `,')

          monsters
             ̎ނ\̂ɎgpLN^w肷B (W
                     ``abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTU-
            VWXYZ@ '&;:~]'').   ̕ dungeon IvVƓlɏ
            BV{̏́A ant or other insect(a邢͂̑
              ), blob(ubu), cockatrice(RJgX), dog or other
            canine(܂͂̑̃CkȂ̓), eye or sphere(ڂ܂ 
            ),  feline( L),  gremlin(O), humanoid(l), imp or
            minor demon(Cv܂͒ዉ), jelly([[), kobold(R{
            h),  leprechaun(vR[), mimic(~~bN), nymph(jt),
            orc(I[N), piercer(˂h), quadruped( l    ),
            rodent(l), arachnid or centipede(܂̓Jf), trapper or
            lurker above(gbp[܂͓Vɐނ), horse or unicorn(
            n܂̓jR[), vortex(Q), worm([), xan or other
            mythical/fantastic insect(U܂͂̑̕s v c   ),
            light(  C g), zruty(YeB), angelic being(Vĝ悤ȑ
            ), bat or bird(RE܂͒), centaur(P  ^ E  X),
            dragon( ),  elemental( G^), fungus or mold(JrR
            P), gnome(m[ ),  giant  humanoid(  ^ l ),  invisible


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              37



            monster(  Ȃ), jabberwock(Wo[EHbN), Keystone
            Kop(L[Xg[Rbv), lich(b`), mummy(~C), naga(i[
            K), ogre(I[K), pudding or ooze(XC), quantum mechanic(
            ʎq͊w), rust monster(K̉), snake(), troll(g[ ),
            umber  hulk( A o[nN), vampire(opCA), wraith(C
            X), xorn(][), apelike creature(̂悤Ȑ),  zombie(
            ]  r),  human(l), ghost(H), golem(S[), demon(
            ), sea monster(C̉), lizard(gJQ), long worm tail(
            O[̐K), mimic(~~bN) `O' R}hŐݒ肷邱Ƃ͂
            ȂB

          msghistory
             ^P ŌĂяo߂ɕۑĂŏs̃bZ[W̐(W
            ݒ 20)B `O' R}hŐݒ肷邱Ƃ͂łȂB

          msg_window
             ̃bZ[W̕\@ύX(_ł tty ɂ̂ݎ
            Ă)Bwłl͈ȉ̂ƂB

                 s - `single': 1 bZ[W (WݒB 3.4.0 ȑOł̐U镑ł)
                 c - `conbination': ŏ 2 bZ[W `single'Ǎ `full'B
                 f - `full': SʁBÂbZ[WB
                 r - SʁBVbZ[WB

            ߋƂ̌݊̂߂ɁAlȂɂł(`full'Ƃ݂Ȃ)A 
            ł(`single'Ƃ݂Ȃ)B

          name
             Ȃ̃LN^̖Oݒ肷(Wݒ͂Ȃ [U[
            )B -LƃLN^̐EƂ̓t(܂ -A  -B
            -C  -H -K -M -P -Ra -Ro -S -T -V -W ̂ǂꂩɕt)Ƃ
            ĐEƂݒ肷邱ƂłBEƂƂ -@ gp ƁA
            _ȂЂƂIɑIB `O' R}hŐݒ肷邱
            Ƃ͂łȂB

          newcolors
            tty|[gp̃J[pbgIWiNetHackpbg 
            lɐݒ肷B ÂDFƂĕ\ȂꍇA
            ̃IvV𖳌邱(Wݒ̓I)B `O' R}hŐ
            肷邱Ƃ͂łȂB

          news
            NetHack  ̃j[Xt@C΂ǂ(Wݒ̓I)B
            j[X̓Q[̍ŏɕ\̂ŁA `O' R}hł
            肷͖̂ӖłB

          null
            [ɃpfBÔ߂̃iLN^𑗂(Wݒ̓It)B

          number_pad
            ړ̂߂[yuhjklbn]̂ɐL[gp(Wݒ 0
            ܂̓It)B (number_pad:2 ͐̂ DOS ł̐U镑ɂB `5'
            `g'Ameta-`5'`G'Ameta-`0'`I'ƂȂB)



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              38



          objects
                 \      gݒ肷 (Wݒ
            ``])[="(%!?+/$*`0_.'')  ̕ dungeon IvVƓl
             BV{̏Ԃ́iƂȂ悤ȁjȕ
            ́AAhAwցAAHAHAAA A
            A݁A΂܂͐΁A΂܂͒ASAAŉtB `O' R
            }hŐݒ肷邱Ƃ͂łȂB

          packorder
            ̎ނ\      w   ( W    
            ``")[%?+!=/(*`0_'').   ̃IvVɂ͂낢ȕ̎ނ\
            ̗ݒ肷Bݒ肳Ȃނ͈ȑȌōŌ 
            \B

          perm_invent
              I Ȃ΁A݂̎ꗗɃEBhEɕ\Ă
            B̋@\ĂEBhEVXeł̂ݗLB

          pettype
            vCLN^NX̃^Cṽybggpł 
             ̃ybgw肷A܂͏̃ybgSw肵ȂB
            wô``cat'', ``dog'', ``none'' łB `O' R} h
            Őݒ肷邱Ƃ͂łȂB

          pickup_burden
             EɂŎw肵ו̏dx (Unburdened, Bur-
            dened, streSsed, straiNed, overTaxed, overLoaded) ȏ   
            ƁAs邩ǂmFB (Wݒ `S').

          pickup_thrown
            ̐^UIvV autopickup LłꍇA pickup_types
            ɓĂȂ̂łĂAȂ̂IɏE 
            Ǝ݂Bl͗LB

          pickup_types
            autopickup   IvVݒ肳Ă鎞ɏE̎ނw肷
            (Wݒ͑SĂ̎)BIRpCIvV   
            AUTOPICKUP_EXCEPTIONS w肳ĂƁA autopickup_exception
            sgƂ autopickup ̐U镑ׂłB

          prayconfirm
            _ɋFOɊmF(Wݒ̓I)B

          preload_tiles
            MSDOS̃veNg[hŁA^CQ[̎n߂ɂ炩 RAM
               łǂ𐧌䂷BIɂƁA^CO
            tBbÑptH[}X܂邪A葽̃gp(
            Wݒ̓I)B `O' R}hŐݒ肷邱Ƃ͂łȂB

          pushweapon
            ɕĂ鎞 `w' (wield: ) R}hg
            ƂAɎĂ\̕ɐݒ肷(Wݒ  I
            t)B



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              39



          race
             I(: ``race:human'')BWݒ̓_łB
            `O' R}hŐݒ肷邱Ƃ͂łȂB

          rest_on_space
            Xy[XL[ `.'(rest: xe) R}hƂĎgp (W
            ݒ̓It)B

          role
            L  N ^[  ^ C v  ݒ肷 (:``role:Samurai'')B
            ``character''IvVƓłBEƂݒ肷邻̑̕@
            ɂĂ``name''IvVQƂ̂ƁBʂ͐擪 1 
                          A   `r'         O      
            B``Rogue''A``Ranger''A``random''邩łB

          runmode
            u܂Ƃ߂Ĉړv(shift+control+ňړ邩As
            R}h}EX̃NbNgꍇ) Ƃɂǂꂭ炢̕p x
            Œn}XV邩𐧌䂷Bݒ\Ȓl͈ȉ̒ʂB

                 teleport - ړĂn}XVB
                 run - 7 炢ɒn}XVB
                 walk - 1 ɒn}XVB
                 crawl - ``walk'' ƓlAɂ΂炭~B

             ̃IvV͉ʕ\ɂ̂݉eAۂ̈ړʂɂ͉e
            ȂBWݒ `run' łBo[W 3.4.1 ȑO   `tele-
            port'  ݂̂łBʂmFł邩ǂ͎gĂł[
            ̎ނɈˑB

          safe_pet
            ybg(ybgƒm)UĂ܂̂h(Wݒ  I
            )B

          scores
             ɃXRAXĝǂ̕邩𐧌䂷 (F``scores:5
            top scores/4 around my score/own scores'')Bꂼ̕ 
            ̕ (`t', `a', `o')݂̂KvłB

          showborn
            Q[ IɁu|ꗗvɂĐA|
            ƈقȂꍇ݈̂ꏏɕ\B

          showexp
            ŉsɌ݂̌o_\(Wݒ̓It)B

          showrace
            Ȃ\ƂɁAEƂɑΉ}[Nł͂ȂA푰 
             }[Nŕ\(Wݒ̓It)B̐ݒ͕\ɂp
            AQ[ƂĂ͉ςȂƂɒӁB

          showscore
            ŉsɌ݂̃XRA\(Wݒ̓It)B



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              40



          silent
            [̃r[v炳Ȃ(Wݒ̓I)B

          sortpack
            ̖ژ^\Ƃޖɉו̓eבւ (W 
            ̓I)B

          sound
            Ȃ̃LN^[̂Ɋւ郁bZ[W\(W
            ݒ̓I)B̓Rs[^[̉o͋@\Ƃ͉̊֌W
             Ƃɒӂ邱ƁB̃IvV͕IɂvC[
            ̐䉺ɂBႦ΁AĂԂ͂̃IvV͎I 
            ItɂAڊo߂ƃIɂȂB

          sparkle
             (₠Ȃ)U󂯁AɒRꍇɉʌʂ\
             (Wݒ̓I)B

          standout
            ``--More--''𑾎ŕ\(Wݒ̓It)B

          suppress_alert
            Õo[WύXꂽ@\ɑ΂Ēӂ𑣂bZ[W 
            \     悤ɂ NetHack ̃o[Wݒ肷B (:
            ``suppress_alert:3.3.1'') ̂悤Ɏw肷 3.3.1 ȑOɕύX
            ꂽ@\ɑ΂钍ӃbZ[W͕\ȂB

          time
              sɃQ[Ōo߂Ԃ^[ŕ\(Wݒ̓I
            t)B

          timed_delay
            ╨̂̈ړȂǁAʂ\邽߂ɂƎԑ҂ 
             AȃLN^ʂɑ邩Ƀ^C}[gpB
            (tty C^tF[Xɂ̂ݓKpB X11 C^tF[X͏ 
            ^ C}[gpBWݒ̓^C}[ɂ鎞ԑ҂gݍ
            ĂȂ΃I)

          tombstone
            񂾂Ƃ΂\(Wݒ̓I)B

          toptenwin
            Q[I̕\Wo͂̂NetHack̃EBhEɕ\
             (Wݒ̓It)B̃IvVݒ肷ƃEBhEg
            o[W NetHack ł͋NeEBhEƂ͕ʂ̃EBh
            E ɃXRAXg\BAXRAXg̓Q[I
            ƃ^[~iEBhEɂ͎cȂB

          traps
            㩂̎ނ\̂ɎgpLN^w肷B(Wݒ
            ``^^^^^^^^^^^^^^^^^"^^^^'').   traps IvV͕Wݒ̕
            ̑㩂`̂Ɏgp 1  22 ̕B
                 dungeon IvVƓB̕
            dungeon IvVƓlɏB


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              41



            V{̏́A arrow trap(), dart trap(  ),
            falling  rock  trap( ◎), squeaky board(ޔ), bear
            trap(F), land mine(n), rolling boulder trap( ),
            sleeping  gas  trap(   KX), rust trap(H), fire
            trap(΂), pit(), spiked pit(gQ     ),
            hole( ), trap door(), teleportation trap(uԈړ),
            level teleporter(ʂ̊Kւ̏uԈړ), magic portal(@̓
            ),  web(  ̑), statue trap(), magic trap(@
            ), anti-magic field(@Ԃ), polymorph trap(   
            )B

            `O' R}hŐݒ肷邱Ƃ͂łȂB

          travel
            g xR}hLɂ(Wݒ̓I)B̃IvV
            Itɂ邱ƂɂāAn}EBhENbN 
            ƂɂāA]܂Ȃړ悤Ƃ邱ƂhƂłB

          verbose
            Q[̃Rgڍׂɕ\(Wݒ̓I)B

          windowtype
            E ChEVXegp邩ǂuttyv܂́uX11vőI
            iWݒ̓o[WɂjB `O' R}hŐݒ肷邱
            Ƃ͂łȂB

          win_edge
            ttyɂ郁j[уeLXgEBhEɂāAE񂹂ł
            Ȃ񂹂ŕ\B (Wݒ̓It)

          9.5.  EChEVXeŐpJX^}CYIvV

               ȉ͂ȂIEBhD^Cv̓JX^}CY
           ύX邽߂ɗplXȃIvV̐łB镶
          ͓Kɐ؂l߂BSẴEBhD^Cvɑ΂Ă S
           ̃IvVLƂ킯ł͂ȂB̃IvVݒ
          ꂽƂAEBhD^Cv̐ݒ󂯕tȂA 
            B 󂯕tȂȂAPɖB݂̃EB
          hD^CvőΉĂIvV́AIvVꗗ\ (`O') 
          \Bꕔ̃IvV`O'R}hœIɕύXłB

          align_message
            bZ[WEBhEǂɒu(top, bottom, left, right)

          align_status
            Xe[^XEBhEǂɒu(top, bottom, left, right)

          ascii_map
            \ȂASCIILN^}bv\

          color
            ÁAA̍\vfJ[ŕ\




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              42



          eight_bit_tty
            8 rbgLN^(Ⴆ traps IvVŎw肵)
            ܂܃^[~iɕ\(Wݒ̓It)B

          font_map
            }bvEBhE\tHg

          font_menu
            j[\tHg

          font_message
            bZ[W\tHg

          font_status
            Xe[^X\tHg

          font_text
            eLXg\tHg

          font_size_map
            }bvEBhE\tHgTCY

          font_size_menu
            j[EBhE\tHgTCY

          font_size_message
            bZ[WEBhE\tHgTCY

          font_size_status
            Xe[^XEBhE\tHgTCY

          font_size_text
            eLXgEBhE\tHgTCY

          fullscreen
            EBhEłȂʑŜŕ\悤Ǝ݂

          hilite_pet
            ybgڗ悤ɕ\(Wݒ̓It)B̃IvV 
            U 镑͎gĂEBhEVXeɈˑBeLXgEB
            hȄꍇAPx]ɗpB^C̏ꍇA 
            Iɂ̓ybg̋߂Ƀn[g}[N\B

          large_font
            傫tHggB

          map_mode
            w肳ꂽ@Ń}bv\B

          mouse_support
            ͂ƈړɃ}EXg悤ɂB

          player_selection
            LN^[IɃ_CAO{bNXmFʂp


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              43



          popup_dialog
            ͎Ƀ|bvAbv_CAO{bNXp

          preload_tiles
            ^ C    ɗ\ߓǂݍłBႦ΁AveNg[
            hMSDOSł̏ꍇAQ[JnɃ^C RAM ɗ\ߓǂݍނ 
             𐧌䂷B\ߓǂݍނƃ^COtBbN̐\͌シ
            邪A葽̃ (Wݒ̓I)B `O' R} 
            hŐݒ肷邱Ƃ͂łȂB

          scroll_amount
            scroll_margin  IvVŎw肳ꂽʒuɗƂɁAǂꂾ
            ̐XN[邩w肷B

          scroll_margin
            EBhE̒[炱Ŏw肳ꂽ}XɂȂ܂̓J[\ 
            ړƂɁAʂXN[B

          softkeyboard

          splash_screen
            NɃXvbVXN[\(Wݒ̓I)

          tiled_map
            \Ȃ^C}bv\

          tile_file
            Wݒ㏑ʂ̃^Ct@C̖O

          tile_height
            ^C\łł̃^C̍

          tile_width
            ^C\łł̃^C̕

          use_inverse
            Q[w肵Ƃɉʂ𔽓]

          vary_msgcount
            bZ[WEBhEɈxɕ\郁bZ[W̐

          windowcolors
            \ȂEBhEw肵OiF/wiFŕ\

          wraptext

          9.6.  vbgtH[ŗL̐ݒIvV

               ȉ͓̃vbgtH[ŃJX^}CYU镑̕ύX
          邽߂ɗpIvV̐łB

          altkeyhandler
            L[͂ DLL I(Win32 tty NetHack ̂)B DLL  
             ÓA.dll ̊gqpXŎw肷B `O' R}hŐݒ


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              44



            邱Ƃ͂łȂB

          altmeta
            (Wݒ̓IB AMIGA NetHack ̂)B

          BIOS
            ɉʂAړɃJ[\L[g悤ɃL[ {[
            h ǂނ߂ɁA IBM-PC ݊ BIOS ROM gpĂ}V
            BIOS R[gpB (Wݒ̓ItBOS/2 , PC,    ST
            NetHack ̂)

          flush
            (Wݒ̓ItB AMIGA NetHack ̂)B

          MACgraphics
            (Wݒ̓IB Mac NetHack ̂)B

          page_wait
            (Wݒ̓IB Mac NetHack ̂)B

          rawio
            raw(cbreak łȂ) [hgpāA荂ȏo͂Ɩ̋N
            Ȃ͂ (MS-DOS ł̓v^Ȃɂ    
            `^P'  v^o͂̃gOƂ݂ȂĂ܂Ƃ) (W
            ̓It)B: DEC Rainbow ł͂ꂪÎƂ̓nOAbv
            Ă܂B `O' R}hŐݒ肷邱Ƃ͂łȂB

          soundcard
            (Wݒ̓IB PC NetHack ̂)B `O' R}hŐݒ肷邱
            ͂łȂB

          subkeyvalue
            (Win32 tty NetHack ̂)BۃL[{[h̖␳̂ 
            邽߂ɁA OS  NetHack ɕԂL[͂̒lύX邽߂Ɏg
            pB OPTIONS=subkeyvalue:171/92 ƂƁAƂ 171 
            悤ƂĂꍇA NetHack  92 ԂBKvȂA
            subkeyvalue sݒt@CɏĂ悢B `O' R}hŐݒ
            邱Ƃ͂łȂB

          video
            g prfI[hݒ肷(PC NetHack ̂)Bl `autode-
            tect', `default', `vga' ̂ꂩłB `vga' (    VGA
            n[hEFAƂ`autodetect')ɐݒ肷ƁA\Ƀ^C
            pB `O' R}hŐݒ肷邱Ƃ͂łȂB

          videocolors
            NO_TERMgpĂPCVXẽJ[pbgZbg (W
            ݒ́u4-2-6-1-5-3-15-12-10-14-9-13-11v)(PC NetHack ̂)B
            V{̏Ԃ́AԁE΁EFEE}[^EVAEP E
            P  ԁE P  ΁E  FEPEP}[^EPVAB
            TTY_GRAPHICSVIDEOSHADESLɂԂŃRpC̃V
            X e ł͂3F`\BV{̏Ԃ́AԁE΁EFE
            E}[^EVAEDFEEPԁEP΁EFEP E
            P}[^EPVAĔB `O' R}hŐݒ肷邱Ƃ


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              45



            łȂB

          videoshades
            3 iK̗p\ȃOCXP[ݒ肷 (Wݒ   ``dark
            normal  light''  PC  Nethack̂)BQ[ʂɂꍇ
            ́AR̃XP[𒲐Ă݂邱ƁBł܂   
            A!colorĂ݂邱ƁB `O' R}hŐݒ肷邱Ƃ
            łȂB

          9.7.  EO̐ݒ

               IRpCIvVƂ AUTOPICKUP_EXCEPTIONS  
           B  ̃IvV`ăRpCꂽoCȉꍇA
          autopickup IvV̐U镑 pickup_types IvVg
          邱ƂłB

               autopickup_exception  sݒt@CɏƂŁAE
          ƂƂɃ`FbNׂp^[`łB

          autopickup_exception
            pickup_types IvV̗Oݒ肷B  autopickup_exception
            I v V ͂Ȃ̈ʒuɂ镨̂̐̒P`Ɉvp
            ^[w肷B 1-80 ̕łׂłB

               p^[ł͈ȉ̓ꕶgB

                 *--- 0 ȏ̕Ƀ}b`B
                 ?--- Cӂ 1 Ƀ}b`B

               ɁAp^[̐擪ɒuꍇɓʈ镶
          B

               < - ȉ̃p^[Ɉv镨̂͏ɏEB
               > - ȉ̃p^[Ɉv镨̂͌ďEȂB

               `O' IvVŐݒ肷邱Ƃł邪Aݒ̓Z[uE[h
          Ƃɂ͕ۑȂB

               ȉ autopickup_exceptions ̗łB


          L̗̍ŏ̂̂́ASĂ̖IɏEBԖڂ̗́A 
           ͎E̗OƂBṒ̗AĂƂ킩Ă
          ͎̂E̗OƂB `ďEȂ'[` E '
          [ɗD悷B

          9.8.  ̐ݒ

               bZ[WEBhEɕ\ꂽbZ[W[U[`̃p
          ^[ƈvƂɓ̉t@C炷Ƃ   v
          bgtH[B݂̂ƂAQt, win32tty, win32gui [
          U[ɑΉĂB




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              46



               [U[ƃbZ[W̊֘AtɊւݒt@Cڂ
          ȉ̂ƂłB

          SOUNDDIR
            t@ĈfBNg

          SOUND
             t@Cƃ[U[w肷郁bZ[Wp^[֘At
            ځBe SOUND ڂ͈ȉ̍ڂɕB

                 MESG       - bZ[WEBhEw (3.4 ł͂ɑΉĂ)
                 pattern    - }b`p^[
                 sound file - 炷t@C
                 volume     - t@C炷Ƃ̉

               p^[̐mȏ̓vbgtH[ ``K\'' p
             NetHack ̓p^[}b`O@\p邩ɂĕς
          B ``K\'' }b`O NetHack p^[}b`O
           Ă邪AT[hp[eBCuKvȃvbgtH[
          B ``K\'' Ɋւ͂ǂ̂ƂQƂ 
          ƁB ǂ̃p^[}b`OpĂ邩 #version R}
          hŊmFłB

               NetHack ̓p^[}b`O[`͈ȉ̓ꕶp
          B

                 *--- 0 ȏ̕Ƀ}b`B
                 ?--- Cӂ 1 Ƀ}b`B

               ȉ NetHack p^[}b`O@\płB

                   SOUND=MESG "*chime of a cash register*" "gong.wav" 50

              "chime of a cash register" ܂ރbZ[Wɔ
          "gong.wav" 炷Bݒt@Cɂ͕ SOUND ݒ 
          łB

          9.9.  oQ҂NetHackvC邽߂̐ݒ

               NetHack  ͓A̒n}̂ɕW ASCII LN^[
          g悤ɐݒ肷邱ƂłB   A  MS-DOS    
          NetHack  ͉܂͓_ZppΖڂ̕sRȐlłS
          ɃvC\łBvC[͂̉ʓǂݎVXe 
           \ȒmKvŁA㉺EɈꕶړ@m
          ΂ȂȂ낤BʓǂݎVXě\͂m邱 
           Ȃ艿lBvCOɂ̃KChubN\ɓǂ߂΁A
          ʂ̃CAEgǂȊ킩邾낤B܂A PC J[\ 
            u ˂~߂邱ƂłKvB͎̃LN
          ^[̈ʒuĂB `@'͑̃q[}mCh\킷̂ɂ p
          ̂ŁÄʒuT̂`@'邾ł͕s\ł
          BɁAȂĂʒu PC J[\̈ʒu̕I s
           m点@\Kv낤B̋@\̓XN[Ŝɂǂ̂
          ȃACe邩𔻕ʂ̂ɕ֗łB



          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              47



               ꂽ[U[Ȃ defaults.nhC邱Ƃ͓Ȃ
          AS҂͏Ђł܂dȂB NetHack ̑S
          ̌zzɂ NHAccess.nhƂt@ C        B
          default.nh t@C̃t@CƓւ邱ƂɂAڂ̕s
          RȐlvCł悤ȐݒɂȂBt@CC   
          Q[ ̂̂ɊꂽȂAD݂ɍ悤ɐݒύX
          ƎvƂ낤B̂߂̐ NHAccess.nh ̂̂Ɋ܂܂
           BQ[̃ANZVreBɍłe^ݒ͈ȉ̂
          ł:

          IBMgraphics
            ̃IvVRgAEg邱Ƃɂ IBM OtBbN
            𖳌ɂB

          menustyle:traditional
            ͉VXe𗘗p鏕ɂȂB

          number_pad
             ̔vO number-pad ʂ̊mFɗpB̏
            A number_pad IvVItɂāA`I Rogue R}
            hgƁB

          Character graphics
            defaults.nh  t@C̉̕ɂSẴLN^[OtBb
            NݒRgAEgB̂قƂǂ NetHack ̕W
             A W ASCII LN^[pA̕\gLN
            ^[ZbĝÂLN^[ŒuB̃L 
            N^[͉ʓǂݎVXeς킹邾낤B

          10.  _

               NetHack ͐ݒɂāAȂ̋@Bɂ鍂_̈ꗗ܂
          ͍_҂̈ꗗ쐬B҂̐ݒɂȂĂꍇAQ[ 
           ܂ŏIꍇ̃}V 1 ̃AJEgɂ 1 
          ̈ꗗɂ͍ڂȂBȂ̈ꗗɍڂĂ鑼 N
           荂_ƂA͂Ȃ̑O̓_荂_
          Ƃɂ̂݁Äꗗׂ̂ʒuɂȂ̖ O  
          B_܂ōڂ邩RpCɐݒłB

               _͎ɌolA험iABKƃQ[̏IɊ
          ĂBQ[ꍇɂ͎ĂSzɂĒE o
           B|̖{̒ŎEꂽꍇɂ́AS[
          ƎĂ 90% Mhɓ`(`҂͖S[ 
          ꍇɂ͎萔邱ƂmĂ)B]ĉɂɈ
          ĉ^ΐcƂ邩AĂ̎_Ŏ 
           ŏI邩͂Ȃ߂邱ƂłBꍇׂ͂
          ̋ɂ邱ƂłBĐc΂ɑ 
          邱Ƃł邩mȂB

               PɌ_ł̍_ҁE_̈ꗗꍇɂ͂قƂ
          ̃o[Wł nethack -s all Ɠ͂΂悢B





          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              48



          11.  T[h

               NetHack ͕GœQ[łBS҂͐c邷ׂm
           ȂƂɋCÂA|ɂÂĂ܂ȂB
          邱Ƃ͂ȂB`铴AɁuTv́uv[h 
           ꍇɂ́A_̈ꗗɍڂȂƂƂɑȂfb
          gƈւɑÕZ[ut@CcĂsgƂȂꂽ 
          ̂łB

               T [hɓɂ 2 ʂ̕@B1 ̓Q[̊Jn
           -X XCb`t邱ƂłB 1 ̓Q[̃vC
          `X'  R}h͂邱ƂłBT[hœ鑼̗_
          _ȓǎҏNm߂ė~B


          12.  NWbg

               ŏ hack ƂQ[́Ao[NC UNIX ̃Q[ rogue
           fƂĂB̃hLg̑啔 Michael C. Toy 
          Kenneth C. R. C. Arnold ̎ɂȂ A Guide  to  the  Dungeons  of
          Doom(^̓Aւ̏) }Xp̂łB܂ꕔ
           Ken Arromdee ɂ Further Exploration  of  the  Dungeons  of
          Doom(^̓A̐[ւ̒T) ̂ĂB

               NetHack ͕ǂ艽\l̐lX̎ɂĊꂽB
          ̓Q[̊J̉ߒł̎ȏołB


               Jay Fenlason  Kenny Woodland, Mike Thome, Jon Payne ̏
          𓾂āAŏ Hack B

               Andries Brouwer ̓vO啝ɏ Hack Ƃ
          ȂقȂQ[ɎdďグA UNIX }Vp(Ȃ  )3
          o[W(1.0.1A1.0.2A1.0.3) Usenet Ŕ\B

               Don  G.  Kneller  Hack 1.0.3  Microsoft C gp MS-
          DOS ֈڐA PC HACK 1.01e 쐬Bo[W 1.03g ł  DEC
          Rainbow   ̃OtBbNT|[gAďȂƂ 4 
          o[W(3.0A3.2A 3.51A3.6)쐬B

               R. Black  PC HACK 3.51  Lattice C   g p    Atari
          520/1040ST ֈڐA ST Hack 1.03 쐬B

               Mike  Stephenson ͂̂낢ȃo[WĂ 1 
          A̒ǉvfƍ킹 NetHack o[W 1.4 쐬 
          Bɔނ͉l̐lXɍƂ𕪒S NetHack 1.4 ̊g
          fobOsA NetHack o[W 2.2  2.3 𔭕\B

               ɂ̌AMike  Ken Arromdee, Jean-Christophe  Collet,
          Steve  Creps, Eric HendricksonAIzchak MillerAJohn RupleyA Mike
          ThreepointAJanet Walz ܂ރ`[𗦂ăQ[̑啝ȏ
          sȂA NetHack 3.0c 쐬B




          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              49



               NetHack  3.0  Eric R. Smith ɂ Atari ցA Timo Haku-
          linen ɂ OS/2 ցA David Gentzel ɂ VMS ֈ A  
          B  3 l Kevin Darcy ͂̌͊J`[ɉA 3.0
          ̂̌̂̉ł쐬B

               Olaf Seibert  NetHack 2.3  3.0  Amiga   A  B
          Norm MeluchAStephen SpackmanAPierre Martineau  PC NetHack 3.0
          ̂߂̃I[o[C[`݌vB Johnny Lee     NetHack
          3.0  Macintosh ֈڐABނ͑̂܂܂ȓA̎傽Ƃ
           PCAMacintoshAAmiga ̈ڐAł̊g𑱂A 3.0 ̂̌̂
          ̉ł쐬B

               Mike Stephenson[_[ƂAIzchak MillerJanet Walz̏
          ɂ Ken Arromdee,  David  Cohrs,  Jean-Christophe  Collet,
          Kevin Darcy, Matt Day, Timo Hakulinen, Steve Linhart, Dean Luick,
          Pat Rankin, Eric Raymond, Eric Smith ܂ސ`[ 3.0̓O
          I ȌsȂBނ̓Q[fUCč\zAR[h̑
          B_WAVfBXvCAꂼ 
          L N^[̓ʂ̃NGXgAVGhQ[Ƃ̑̑
          ̐VvfǉA NetHack 3.1𐧍삵B

               Ken Lorber, Gregg Wonderly, Greg Olson   Richard  Addison,
          Mike Passaretti, Olaf Seibert ̏؂ Amiga p NetHack 3.1
          쐬B

               Norm Meluch  Kevin Smolkowski    Carl  Schelin,  Stephen
          Spackman,  Steve  VanDevender, Paul Winner ̏؂ NetHack
          3.1  PC ɈڐAB

               Jon Watte  Hao-yang Wang  Ross Brown, Mike Engber, David
          Hairston,  Michael  Hamel,  Jonathan  Handler,  Johnny  Lee,  Tim
          Lennan, Rob Menke, Andy Swanson ̏؂ MPW p Macintosh
          p  NetHack 3.1 쐬B̍쐬ɁABarton House  Think C
          pB

               Timo Hakulinen  NetHack 3.1  OS/2   A  B  Eric
          Smith    NetHack 3.1  Atari ɈڐAB Pat Rankin  Joshua
          Delahunty ̏؂ VMS  NetHack 3.1 쐬B  Michael
          Allison  NetHack 3.1  Windows NT ɈڐAB

               Dean  Luick   David Cohrs ̏؂ X11 p NetHack3.1
          쐬B Warwick Allison  Atari p NetHack ̃^C  o[
          W   쐬Bނ͌Ƀ^CJ`[Ɋ񑡂A^CT
          |[g͑̃vbgtH[ɂǉꂽB

               Michael Allison, Ken Arromdee, David Cohrs,  Jessie  Collet,
          Steve  Creps,  Kevin  Darcy,  Timo Hakulinen, Steve Linhart, Dean
          Luick, Pat Rankin, Eric Smith, Mike Stephenson, Janet  Walz,  and
          Paul  Winner Ȃ 3.2̊J`[ o[W 3.2  1996 N
          4 Ƀ[XB

               o[W 3.2 ͊J`[Ă 10 N̂ 
          Bނ̃Q[ւ̍vɂċLƁA13 l̏̊J`[
          S͂̃[X̊Jn̍ŏ̎_܂Ń`[ɎcĂ B


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              50



          A 3.1.3  3.2 ̊ԂɁAJ`[̑nn҂̈lł Izchak
          MillermƐffASȂB̃[X͊J`[ 
          шڐA`[ނɕꂽB

               NetHack  3.1  3.2 ̎ɁAQ[ɔMlQ[
          Ɏg̕ύXuvɔ\B

               Tom Proudfoot  Yuval Oren  NetHack++ 쐬A 
             NetHack--   ɉꂽBƂ͓ƗɁAStephen White 
          NetHack Plus 쐬B Tom Proudfoot ͌ NetHack  Plus   
          NetHack--    A SLASH 쐬B Larry Stewart-Zerba 
          Warwick Allison ͎rVXeǂ Wizard Patch  
           B Warwick Allison  NetHack  Qt C^[tF[Xg
          ɕύXB

               Warren Cheung  SLASH  Wizard Patch 𓝍   Slash'em
           쐬A Kevin Hugo ̗͂؂āA̗vfǉB Kevin
          ͌ɊJ`[ɉÃACfA NetHack 3.3 ɓ
          B

               3.2  ̍ŏIo[W̓oOCłł 3.2.3 łB
          2000 N΍̂߂ 3.3.0 Ɠ 1999 N 12 ɔ \  
          B

               Michael  Allison,  Ken Arromdee, David Cohrs, Jessie Collet,
          Steve Creps, Kevin Darcy, Timo Hakulinen, Kevin Hugo, Steve  Lin-
          hart,  Ken  Lorber,  Dean  Luick,  Pat  Rankin,  Eric Smith, Mike
          Stephenson, Janet Walz, Paul Winner Ȃ 3.3 ̊J`[  
          1999 N 12  3.3.0A 2000 N 8  3.3.1 [XB

               o[ W 3.3 ͑̐Vvf񋟂B܂A푰ƐEƂ
          ŏ̃o[WłBEƂƂẴGt͍폜A 
           ̈ƂȂB܂Ah[tAm[AI[N푰ƂĒǉ
          ꂽBNƃW[̓EƂƂĒǉꂽB ɁA
           ɏ邱Ƃoŏ̃o[WłAꂽSĂ
          oOEFuTCgŌ\ŏ̃o[WłBoOX g
           ɐLтĂɂւ炸A 3.3  1 NƂŏ\
          肵ĂƂؖB

               3.4 J`[ Michael Allison, Ken Arromdee, David Cohrs,
          Jessie  Collet,  Kevin  Hugo, Ken Lorber, Dean Luick, Pat Rankin,
          Mike Stephenson, Janet Walz, and Paul Winner ŊJnA NetHack
          3.4.0 [XO 2002 N 3   Warwick Allison B

               o[W 3.3 ƓlɁAlXȐlX NetHack ̐FXȃvb
          gtH[ւ̈ڐAsȂĂꂽB

               Pat Rankin  3.4  VMS ւ̈ڐASB

               Michael  Allison  MS-DOS ł NetHack 3.4 ǗĂB
          Paul Winner  Yitzhak Sapir `ĂB

               Dean Luick, Mark Modrall, Kevin Hugo  3.4  Macintosh  
          ̈ڐAƊgSB


          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              51



               Michael  Allison,  David  Cohrs, Alex Kompel, Dion Nicolaas,
          Yitzhak Sapir  3.4  Microsoft Windows vbgtH[ւ 
          A  g   SB Alex Kompel  Windows łւ̐VO
          tBbNC^[tF[X񋟂B Alex Kompel ͂܂A3.4.1 
          Windows CE ł񋟂B

               Ron Van Iwaarden  3.4  OS/2 łǗĂB

               3.3.1  ŕ Amiga ւ̈ڐAƊg Janne Salmijarvi 
          Teemu Suikki sĂB

               3.3.1 ŕ Atari ł Christian ``Marvin'' Bressler 
          ǗĂB

               Ken  Lorber  ɂĊǗĂ NetHack ̃EFuTCg
          http://www.nethack.org/ ɂB

                    - - - - - - - - - -

               Xlbg[N̐Êǂ悤ȂAAQ[̉
           菕悤ƂĂƂ킯悤ȏC𑗂Ă悱
          BA̐_X́AƂɂ͂}̂łł׈ȘA 
          ̖O𓴌A̎傽̈ꗗƂĂɋL̂B

































          NetHack 3.4                                      December 2, 2003





          NetHack Guidebook                                              52



                    Adam Aronow            Izchak Miller         Mike Stephenson
                    Alex Kompel            J. Ali Harlow           Norm Meluch
                   Andreas Dorn              Janet Walz            Olaf Seibert
                    Andy Church           Janne Salmijarvi        Pasi Kallinen
                   Andy Swanson        Jean-Christophe Collet       Pat Rankin
                   Ari Huttunen            Jochen Erwied           Paul Winner
                   Barton House             John Kallen          Pierre Martineau
                Benson I. Margulies         John Rupley             Ralf Brown
                     Bill Dyer              John S. Bien            Ray Chason
                 Boudewijn Waijers           Johnny Lee          Richard Addison
                     Bruce Cox               Jon W{tte            Richard Beigel
                  Bruce Holloway          Jonathan Handler      Richard P. Hughey
                  Bruce Mewborne          Joshua Delahunty          Rob Menke
                   Carl Schelin            Keizo Yamamoto         Robin Johnson
                    Chris Russo              Ken Arnold         Roderick Schertler
                    David Cohrs             Ken Arromdee          Roland McGrath
                  David Damerell             Ken Lorber          Ron Van Iwaarden
                   David Gentzel           Ken Washikita          Ronnen Miller
                  David Hairston            Kevin Darcy             Ross Brown
                    Dean Luick               Kevin Hugo          Sascha Wostmann
                     Del Lamb               Kevin Sitze            Scott Bigham
                   Deron Meranda          Kevin Smolkowski       Scott R. Turner
                   Dion Nicolaas            Kevin Sweet          Stephen Spackman
                  Dylan O'Donnell           Lars Huttar           Stephen White
                    Eric Backus             Malcolm Ryan           Steve Creps
                 Eric Hendrickson          Mark Gooderum          Steve Linhart
                   Eric R. Smith            Mark Modrall        Steve VanDevender
                  Eric S. Raymond         Marvin Bressler          Teemu Suikki
                   Erik Andersen            Matthew Day             Tim Lennan
                 Frederick Roeber           Merlyn LeRoy          Timo Hakulinen
                    Gil Neiger            Michael Allison            Tom Almy
                    Greg Laskin             Michael Feir             Tom West
                    Greg Olson             Michael Hamel          Warren Cheung
                  Gregg Wonderly          Michael Sokolov        Warwick Allison
                   Hao-yang Wang            Mike Engber           Yitzhak Sapir
                   Helge Hafting            Mike Gallop
               Irina Rempt-Drijfhout      Mike Passaretti

          uhƐi͊eЂ̏W܂͓o^WłB

















          NetHack 3.4                                      December 2, 2003



