









				 |̖{ւ̏
			       (NetHack KChubN)


				   Eric S. Raymond
		     (o[W 3.4 ̂߂̍L͈͂ȍZƊg[)



	  1.  ͂߂

	       ŋ߁AȂ͓X̎dɖȂAh鎩
	  CBŋߐAȂ閲͒TA݁A\RA 
	   ̂łAȂɂ̗͂R͂Ƃ͂킩
	  BȂ̖͂ۂɂ͐܂Ă̂ƌ 
	    āA Ȃ܂łɂĖY悤ƂĂ̂ł͂Ȃ
	  AƎvBAȂ͔ыNāA̒̓Â 
	  p ̌ɐł悤ɌAŋ͂ȉ̑NȋL
	  Ƃđ吺ŋ񂾁BȂ̖ɏove͖{Ȃ̂ 
	  ?	 ɁApЂ̋߂̕svcȓAɓƂ~Ȃ
	  BłAȂ͂̂悤ȍlAAɓċA 
	   lX̘bvoƂœǂoBA
	  Ȃ͖̒ɏoĂsvcȏꏊ{߂Ƃv} 
	   ȂȂBƂĂA`҂͍ŏɂ̓ʂĂ
	  Aɖ߂ė鎞̕TɂȂĂ悤Ɍ 
	  B߂ėȂl͊FAPɂ܂`𑱂Ă邾Ȃ̂ł?


	       Őq˂邤ɁAȂ͂\ɂBCF_[
	   Ƃ̂Aɓ邱ƂłȂA΂炵
	  Y炷ƌ̂BȂƂ`ł́A 
	   ̂͐_s̑̂ƂĂ炵B
	  ͋|̖{̉[AQwi̒JzǂɂƂ 
	  \ łB`𕷂uԁAȂ͎ɂ͓AɓĔނ̘b
	  Ă閂{߂ׂ[Ŗm̂Ȃ炩̗R 
	  m MBȂ͂Ƃ̗͂^łȂĂAȂƂ`
	  kn̂̋VlɂȂ̋zŔ荞߂邾낤ƍl B
	   ̒ŏoĂ낵AsvcȉɏoƂł΂Ȃ
	  łBȂ͒n̈hōŌ̏h΍B h
	   ǂɌfꂽ̃IbYΉقǁAȂ͈ӋC
	  B


	       NƁAȂ͏iW߁AȂ͓AɌė
	   B̗𑱂ċ|̖{ւ̓Ñ̈
	  ւƂǂ蒅BXĂ̂œŃLv   
	  A ̖͍LXƂ̉ŖɏABȂ͓
	  W߁Aƒnł̍ŌɂȂ邩ȂHς A
	  AւƓĂB



	  NetHack Guidebook						  1





	  NetHack Guidebook						  2



	  2.  Ȃ芪

	        ĂȂ NetHack ƂQ[n߂邱ƂɂȂB
	  Ȃ̖ړI͎Ă̕W߁ACF_[̖ o
	  Aɂ͂̋|̖{琶ĒEo邱ƂłB

	       `ɂ邢낢ȍɑΉ邽߂̊e̔\͂͂́A
	  Ȃ̐ƏCsɂĕωB

	       lÊw(Archeologist) ͓Aɂđ̒m   
	  B ̂ߑf蓴Ał̕sȎԂ؂蔲邱Ƃ
	  Bނ͊wpÎ߂̒TsɓKďo 
	  B

		 ؐl(Barbarian) ͉nĂmłA퓬̂
	  ߂ɒbĂBނ͗ނ܂ȗ͂̋Avȍ 
	  Ƒ傫ȗ莝݂̌̂ĒTɏoB

		 A l(Caveman   Cavewoman)͂Ƃ킯͂Ă
	  AVΊ펞ɎgꂽďoB

	       (Healer)͈p򕨂ɂĐʂĂBC񕜂
	   Aɂa炰AAł𒆘a肷鍁
	  򑐂ɂďڂBĊgĐ̌NԂ 
	   łBނ͊JƈƂĂȂ悢V𓾂āA
	  AɓĂB

	       Rm(Knight) ͋Rmɒł邱ƂƖhقǗD 
	  邱ƂƂ_ŁAʂ̐mƂ͋ʂB

		 N(Monk)  ͏C҂łAiȓ̓IKƐ_IP
	  ɂāAȂłĝƓ悤ɐ키Ƃo B
	   N͖hȂA@コ邱ƂŖߍ킹Ă
	  B

	       mƓm(Priest  Priestess) ͐E̐młAƖh
	   @̋ƂgĐ`L߂Ƃ鐹młBF
	  ʂĐ_ƌ\͂ɂAނ͂΂Ί瓦邱Ƃ 
	  cAF͊炷ƂB

		W[(Ranger) ͂قƂǐXZ݂ƂAA͏X
	  ȂBAނ͒ǐՏpBsƋɁA|p̒B l
	  łB

		 (Rogue) ͕qŐgBƂɒD_łA㩂
	  łɏڂBނ̒͊PłA͔ȒƂȂB

		(Samurai) ͕̓{̐s̕lłBh͌y 
	  ŐĝȂɏGłĂȀȂ܂ꂽ  召  2{̓
	  ттĂB

		όq(Tourist) ͑z̋(ɍœKł)ƃNWbg J
	  [ hAʂ̐HAn}AčȃJďoBق
	  ǂ͎̉ʐ^ɎB̂̂łB


	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						  3



		L[(Valkyrie) ͗EȏmłBߍȃXJW
	  i rA̍Xňޏ͊拭ŁAɂςAgB
	  ƂƍIgɂĂB

		@g(Wizard)͖p̒mƂɑIєꂽ@̓ 
	   ĂAɂ̖@wɑ΂ēɑw[B͎セ
	  ŊȒPɑł|悤Ɏv邪Aoς񂾖@g͋ 
	  GłB

	       ܂ALN^[̎푰IԂƂłB

		h[t(Dwarf)	 ͐lԂGtA肵
	  ̂ŏvłBh[t̒ڂׂ͍̌@ƋH 
	   IZpłBh[t̖h̓Gt̃~XhƓƂ܂
	  ͂Ȃ܂łAɎiłB

		Gt(Elf)  ͋@qƐvAĉsqȊo  
	  B   ŋNǂȍׂȂƂނ̖ڂ𓦂邱Ƃ͂ł
	  BElC̔ނ̎Ɩh͗DGȂ̂łB

		m[(Gnome)  ̓h[tɏAh[tƎ
	   Bm[͏ň@tƂĒmAxƊ댯ŖĂ
	  閧̒nB|̖{ɍĂ邱ƂŒmB

		l(Human)  ͒nōłʓIȎ푰ŁA䂦ɑ̎푰Ɣ
	  r 鎞̊ƂȂĂBʂȔ\͎͂ĂȂA
	  EƂŐ邱ƂłB

		I[N(Orc)  ͎cŖ؂Ȏ푰ŁA(̃I[N܂)
	   ĂBɁAI[N̓GẗႢ䂦ɌA
	  킴킴@ĎEƂBI[Nɂč 
	  hƕ͈ʓIɕiB

	  3.  ʂɕ\̂̈Ӗ

	       ʏɂ͂Ȃ݂铴ÅKłłɒTI
	  n}ƁAŖڂɂĂBɐ[Ti߂ 
	  AēA͂̎pɂȂ̑Ỏʂɖ炩ɂĂB

	       NetHack	̑cł rogue ŏɌꂽƂÃXN[
	  w̓Rs[^t@^W[Q[̒łSƓ   
	   BȗXN[w͗OIȂ̂ƂނW
	  ƂȂBNetHack ͂̂΂炵`󂯌płB^I 
	  p   R}h͂Aʂ͂ŕ\eLXgAhx
	  `[Q[Ƃ͈قȂANetHack ̃R}hׂ͂ 1  2	 
	   ̃L[͂ŗ^Ǎʂ͉ʏɃOtBJɕ\
	  Bʂ͍Œ 80  24 s̑傫Bȏ 
	  傫Ă 80 ~ 21 ̗̈悾n}̕\ɎgB

	       NetHack ͓_≹̏؂āAڂ̕sRȐlłv
	  CłBڂ̕sRȐl̂߂NetHack̐ݒ@ɂẮA
	  ̃hLgŌqB




	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						  4



	       NetHack ̓vC邽тɐVA쐬B̂߉
	  Q[ɏƂ̂҂ɂA܂̃Q[͊y 
	  ɖ̂ƊB

	       NetHack ͂܂܂ȕ\̃IvV񋟂BIvV
	  Ȃ̃n[hEFA\tgEFA̔\͂ɈˑAvbgtH [
	     ܂܂łB܂܂ȃRpC̃IvV͎s
	  t@CꂽƂɂ̂݉\ƂȂBmNLN^C ^
	  tF [XAJ[LN^C^tF[XA^CƌĂ΂鏬
	  GpOtBJC^tF[X 3 ̕\@ B  2
	   ̃LN^C^tF[X̓tHg𑼂̕ɒu邱
	  ł邪AWݒł W ASCII LN^pđSĂ \
	    B ܂܂ȕ\̃IvV̓Q[eɂ͉e^
	  B^CF̓KChubNŕ\LłȂA͑SẴv b
	  g tH[ɋʂł͂Ȃ̂ŁAQ[ɕ\̂̐Ƃ
	  Ă̓mNLN^fBXvCŕ\W ASCII L
	  N^pB

	       NetHack	ŉNĂ̂𗝉ɂ́A܂ NetHack 
	  ͉ʂǂȂĂ̂𗝉ȂĂ͂ȂȂBNetHack  
	   ́AeLXgAhx`[Q[ɂuȂ́cv
	  悤ȕ͂̑łB} 1  NetHack ł͉ʂɉ\ 
	   ̈łBʂǂ̂悤ɕ\邩̓vbgz[
	  ˑB

	  --------------------------------------------------------------------
	   The bat bites!

	       ------
	       |....|	 ----------
	       |.<..|####...@...$.|
	       |....-#	 |...B....+
	       |....|	 |.d......|
	       ------	 -------|--



	   Player the Rambler	  St:12 Dx:7 Co:18 In:11 Wi:9 Ch:15  Neutral
	   Dlvl:1 $:0  HP:9(12) Pw:3(3) AC:10 Exp:1/19 T:257 Weak

	  --------------------------------------------------------------------
				      Figure 1


	  3.1.	Xe[^Xs(ʂ̉)

	       ʂ̉ 2 sɂ́AȂ݂̌̏Ԃ\Í̂悤ȏ 
	   fЂ܂܂ĂBǂ炩̍sʂ̕ȂƂ
	  S邱Ƃ͂łȂȂBȉɏԂ낢 
	   ڂӖ̂qׂ (RtBO[VɂẮA
	  ȉɈꗗĂԂڂׂ̂Ă\Ƃ͌ 
	  )B




	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						  5



	  OƃN(Rank)
	         ̃LN^(q̌oxɊÂ)Eƕʂ̓
	       B

	  (Strength)
	       Ȃ̃LN^̗͂̋̒lłA6 ̊{Iȑ
	       1   łBlԂ̃LN^[̏ꍇC͂̋ 3  18
	       ̊Ԃ̒lƂB̑̏ꍇC̐z邱Ƃ (
	         18/xx ̂悤ȓʂȗ͂𓾂邱ƂA@̗͂ʂ
	       z\͂^邱Ƃ)B͂̋̒l傫 
	       ǁAȂ̗͂͋B͎͂̋͗dǂꂾ܂
	       A킢łǂꂾ̃_[W^邩Aǂꂭ炢ו^
	       邩ɉeB

	  f(Dexterity)
	       f͐킢ɂ閽A㩂𓦂\AĂ̑
	       qKvƂd╨ɊpɈ邩Ȃǂ̂Ƃ
	       ɉe^B

	        v(Constitution) ϋv͉͂₻̑̈ɂX^~
	       ȉՂ񕜂\͂ɉeB

	  m(Intelligence)
	       m͎͂\͂▂@ǂޔ\͂ɉe^B

	  (Wisdom)
	       (ɖ@)IȌoɂ蓾B@̃Gl
	       M[ɉeB

	  (Charisma)
	       ͂͂̐Ȃɑ΂ĂƂԓxɉe^B
	       ɓX傪iɉeB

	  (Alignment)
	       ɂ	  (Lawful),	  (Neutral),
		(Chaotic) B΂΁A͑PAׂ͈ł 
	       邪A@ƓɈvƂ͌ȂBȂ̑
	       ̉̂Ȃɑ΂锽ɉe^BĂ
	       ͍DIł͂ȂA΂̑ɑ΂Ă͂Ȃ݂̑ɑ΂
	       ɂ߂čDIł炵B

	  K(Dungeon Level)
	       ǂꂾẢ[܂ōsBl 1 ŁA A
	       [sقǑ傫ȒlɂȂB̊K͓ʂŁA
	       ͂ȂOŎʂBCF_[̖͒n 20 K[
	       ̂ǂɂƍlĂB

	  (Gold)
	       ҂ɏĂ̗ʂłBȂǂɉB͊
	       ɓĂȂB

	  ̗(Hit Points)
	       ̗͂̌ݒlƍőlłB̗͂͂Ƃǂꂾ̃_[W
	       ƎʂB킢ŏقǒl͌B̗͂͋x


	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						  6



	       ▂@̃ACeɂ񕜂łBʂ̗̒̐͑
	       ̂Ƃ蓾őlłB

	  (Power)
	         Ɏg͂łB͎̂ɕKvȐ_̗
	       (mana: }i ) ǂقǂ邩B͂܂x邱
	       ɂ񕜂B

	  hl(Armor Class)
	       FDIȐ̍UhǂقǐH~߂邩
	       lłBقǖh͗LłAhl̒l
	       ɂȂ邱Ƃ\蓾B

	  ol(Experience)
	       ݂̌oxƌolłB`iނƌol𓾂邱
	       łBol̍vl܂ŒBƁAox
	       オBoςނɂA킢B@̍Uɂς
	       悤ɂȂB̃o[Wł͌ox\
	       B

	  (Time)
	       o߂^[łB time IvVÎƂɕ\
	       B

	  (Hunger status)
	       ݂̕łB  (Satiated) 
		ӂӂ(Fainting) P ܂ł̒lƂBʂȂ\
	       ȂB

	       ̑ɂԂ\̌ɕ\邱Ƃ
	  ȂBĂƂɂ ConfAaĈƂɂ  FoodPois
	  ܂ IllAڂȂƂɂ BlindA῝򂪂Ƃ StunA
	  oĂƂ Hallu ƕ\B

	  3.2.	bZ[Ws(ʂ̏㕔)

	       ʂ̍ŏs͎oIɕ\łȂƂ郁bZ[W
	   ߂ɎgBŏs``--More--''\ꂽƂ́Â
	  ɂɃbZ[WĂ邯ǂ݂̃bZ[W܂m 
	   ǂނ悤ĂƂƂłB̃bZ[Wǂނ߂
	  ͒PɃXy[XL[΂悢B

	  3.3.	n}(ʂ̂̑̕)

	       ʂ̂̑́̕AȂ݂Kł܂łɒTI
	   ̒n}łBʏ̃V{͂ꂼꉽ\Ă
	  B\V{̂́A܂܂ȃOtBbN I
	  v Vݒ肷邱Ƃɂĕς邱ƂłBłȂ
	  Wݒ̃V{pBɕWݒ̃V{̈Ӗ 
	  B

	  -  |
	       ̕ǁA܂͊JA܂͕ (|)B



	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						  7



	  .    ̏AXA܂͔̂ȂoB

	  #     HAS̖_A؁A邢͑䏊̗(䂪Cv
	       gĂƂ) ܂͒ˋ

	  >    Ki:̊Kւ̒ʘHB

	  <    Ki:̊Kւ̒ʘHB

	  +    A܂͊wKł邩Ȃ̏ꂽ@B

	  @    Ȃ̃LN^[A܂͐lԁB

	  $    ̎RB

	  ^    (ЂƂєΕ\)B

	  )    B

	  [    ܂͂Ȃ炩̖hB

	  %    H(qIłƂ͌Ȃ)B

	  ?    B

	  /    B

	  =    wցB

	  !    B

	  (    ֗ȃACe(͂AAvc)B

	  "

	  *     ΂܂͊(MdȂ̂ȂAl̂Ȃ̂
	       Ȃ)B

	  `    A܂͒B

	  0    SB

	  _    ՒdA܂͓S̍B

	  {    

	  }    ܂A܂͖xA܂͗n̊CB

	  \    ؂ȉ

	  a-zA-Z т̑̃V{
	       ̕Ƃ̑̂̃V{͋|̖{̂낢
	       ȏZl\Bނ͕s@ňӂɖĂ邩m
	       ̂ŌxȂ΂ȂȂBAƂɂ͉̎菕ɂȂ


	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						  8



	       ƂB

	  I    ̃}[N͓A邢͂̑̌ȂŌɂ
	       ꏊɕ\B͂łɈړĂ邩Ȃ
	       Ƃɒӂ邱ƁBł'F''m'̃R}h֗낤B

	       ̃V{ׂċLKv͂ȂB`/' R}hł
	  ̃V{\m邱Ƃł(ڍׂ͎̍ Q   
	  )B


	  4.  R}h

	       R}h 1  2 ̃L[͂sƂŎsB
	  ̃R}hAႦ``search''͂ȏ NetHack ɏ^
	   KvȂB̃R}h͗ႦΕgp镨Ȃǂ̏
	  ɗ^KvB炳ȂKvƂR}h 
	  ΂ẮA NetHack ͑Ij[̓R}hCvvg
	  ̂ꂩ\Bǂ炪\邩͎Ƃ menustyle I
	  vVǂ̂悤ɐݒ肵ɂB

	       Ⴆ ``What do you want to use? [a-zA-Z ?*]'' Ƃ`
	  ₪悭邪A͂ȂɎĂ镨̂ǂIԂ 
	  q ˂̂łB̎ɂāua-zA-Zv͂ȂIׂ鎝
	  ̖ژ^LłB `?' ͂Ƃ̖̕ژ^ꗗA
	   X ̋L\Ă̂m邱ƂłB̗ł́A`*'
	  B͈ꗗɂ͕\Ă炸Aʏ킻̃R}hł̎g p
	   z肵ĂȂłAgƎv΂IԂƂł邱
	  ĂB`*' ͂ƂׂĂ̖̎ژ^\A X
	   ׂĂɂĂ̖ژ^Lm邱ƂłBlČ
	  ̃R}hgȂƂɂƂɂ ESC L[΃R}h
	  I邱ƂłB

	       R}h̒ɂ́ȂOɐ͂邱ƂŉJԂ
	  Ƃł̂BႦ΁u10sv 10 ̒T\ĂB
	   number_pad IvVÎƂɂ͐̑O `n' ͂
	  Ȃ΂ȂȂB܂̗ł͑Ɂun 10svƓ͂Ȃ
	   ȂȂBs邱ƂӖȃR}hł͖͂
	  BɁAړR}h̑Oɓ̕(vtBbNX)t 
	   ƂɂĂ܂܂Ȉړ@Ƃ邱Ƃł(q)BJ
	  񐔂vtBbNX߂ɂ ESC L[΂悢B

	       R}ḧꗗ͂Ȃ蒷AQ[ `?' R}hg p
	   ăwvj[邱ƂɂAłR}ḧꗗ
	  ƂłBȉ̓R}ḧꗗłB

	  ?    wvj[: \\ȃwvʂ̂ 1  \  
	       B

	  /    V{Ӗ邩Bw肷ɂ͏ꏊA
	       ̓V{(邢͒PS)͂邩I邱Ƃ
	       B




	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						  9



	          w  ́A K    u܂ŃJ[\ړĂ
	  `.'A`,'A`;'A`:'̂ǂꂩƂɂčsȂB `.' 
	  ƁAI񂾏ꏊŕ\ĂV{̐\A help
	  IvVIȂꍇɂĂ``More info?''(ڍׂ?)Ǝ
	   Aꂩ炳ɑ̏ꏊw肷邱ƂłB `,'
	  ƁAV{̐\邪Aڍ׏͕\ȂB  `;'
	    ƁA ڍ׏͕\ꂸAɑ̏ꏊ̎włȂB
	  `:'ƁA(Ȃ)mFȂŏڍ׏񂪕\Bꏊ
	  IԎ ESC L[ƂɂẴR}h𒆒fłA `?'
	  Ƃǂ̂悤ɓ삷邩̊ȒPȐ\BꏊłȂ 
	  Ow肵ꍇ́Aɂ̖Oɑ΂ǉ񂪕\B

	  &    R}h̓B

	  <    ̊K֍s(Ki͂ɂƂ)B

	  >    ̊K֍s(Ki͂ɂƂ)B

	  [yuhjklbn]
	       w 肵ֈi(} 2 Q)B̕ɉƊ
	       Ă邩oĂƂ́Aړ̂ł͂ȂƐ키
	       ɂȂBƐ키ƂɂȂ̂͂̈ړ̃R}h
	       B̑̃R}h(q)́uSvłB

				   y  k	 u	      7	 8  9
				    \ | /	       \ | /
				   h- . -l	      4- . -6
				    / | \	       / | \
				   b  j	 n	      1	 2  3
					     (number_pad ÎƂ)

					 Figure 2


	  [YUHJKLBN]
	       ǂɓ˂邩ɏՓ˂܂Ŏw肵ɐiށB

	  m[yuhjklbn]
	       vtBbNX: EA (ƂɉƎv
	       ĂĂ)肹ɈړB

	  F[yuhjklbn]
	       vtBbNX: (ɉƗ\zĂ邾ł)
	       Ɛ키

	  M[yuhjklbn]
	       vtBbNX: E킸ɉֈړB

	  g[yuhjklbn]
	       vtBbNX: ܂ňړB

	  G[yuhjklbn] or <CONTROL->[yuhjklbn]
	       vtBbNX: 'g' ƓBʘH̕_ł͎~  
	       B


	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 10



	  _    w  ꂽʒu܂ŁAŒZASYpĈړB
	       `G'R}hƂقړŒ~B}EXɑΉĂ 
	        ́A݈ʒu 2 }Xȏ͂Ȃꂽʒu}EXŃNbN
	       Ƃɂ̃R}hB

	  .    xeB1 ^[ȂB

	  a    (͂AAvc)p(g)B

	  A    1 ܂͕̐gɂĂ(hȂ)͂B h 
	       1 ͂Ƃɂ 'T'(take off: h͂)AAN
	       ZT 1 ͂Ƃ 'R'(remove: ANZT  
	       )gpB

	  ^A   1 ÕR}hJԂB

	  c    B

	  C    X̉ɖOtB

	  ^C   pjbN{^BQ[B

	  d    ɒuB:ud7av a Ƃ 7 ɒuƂ
	       ӖB

	  D    ̕ɒuB``What kinds of things do  you  want
	       to drop?[!%= aium]'' (ǂ̎ނ̂̂u܂?)  ̎
	       ΂āA0 ȏ̃̕V{͂邱ƂœB  
	       `a', `i', `m', `u' ̌ɓ͂邱ƂłB

		    Da - mFȂɂׂĂ̕ɒuB
		    Di - uOɎmFB
		    Du - (XɂƂ)̕ɒuB
		    Dm - uIԂ̂Ƀj[pB
		    D%u - ̐HɒuB

	  ^D   (ʂ͔)RB

	  e    HHׂB

	  E      b Z[WݍށB``Elbereth'' Ƃݍ
	       ƁAẲ͂Ȃɔ𒧂ŗȂȂ (
	        ȂUƂ͏Ă܂)B́Aꑧꂽ
	       ƂɂȂȂ֗łB (̋@\̓RpCɍ폜
	       Ă邩mȂ̂ŁAȂ̃o[WŕK@\
	       Ƃ͌ȂB)

		    E- - ق̒ɎwŏB

	  f    ɓĂ̂𔭎˂B˂̂͗\`Q'R} 
	       hőI邱Ƃo邵A autoquiver IvVݒ肳
	       Ăꍇ́ARs[^[ɎIɓKȂ̂ݒ肳
	       ƂłB



	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 11



	  i    ̖ژ^(Ă镨ׂ)\B

	  I    ̖ژ^̂w肵ꕔ\B

		    I* - ̂΂ׂĕ\B
		    Iu - ׂ̕ĕ\B
		    Ix - gĂ܂ׂĕ\B
		    I$ - 𐔂B

	  o    JB

	  O    I v Vݒ肷B݂̃IvV̒l̈ꗗ\
	       B (o^Cv邩NbN邱Ƃɂ) X
	         IvVIŁAقƂǂ̒lύX邱Ƃł
	       Bu[lłȂIvV̏ꍇ́AɃj[ o 
	       AvvgoBݒ\ȃIvV͂̃KChubN
	       ̌قǂɈꗗBIvV͒ʏ `O' R}hł 
	       AQ[n߂Oɐݒ肷Bq̃IvV̍QƂ
	       ƁB

	  p    𕥂B

	  P    wցA邢͂̑̑iiAډBjgɂB

	  ^P   1 ÕbZ[Wx\ ( ^P ͂
	       ɑÕbZ[Wɕ\)B

	  q    ށB

	  Q    ɓ̂IBőÎ`f'R} h
	        ˂邱ƂłB (o[W 3.3 ȑOł͂̃R}
	       h̓Q[̂A̋@\`#quit'Ɉړ 
	       )

	  r    ▂@ǂށB

	  R    iiwցAȂǁj͂B

	  ^R   ʂ`B

	  s    ͂̉B㩂TBɂ͕ʉTKv
	       B

	  S    Q[Z[uāAfBQ[͎vCɎI
	       B

	  t    𓊂B܂͖Ȃǂ𔭎˂B

	  T    h͂B

	  ^T   e|[g\͂΃e|[gB

	  v    o[Wԍ\B



	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 12



	  V    ̃Q[̗\B

	  w    B

		    w- - ƂĉfɂȂB

	  W

	  x    Ă镐\̕ƌB\͓̕񓁗U
	       ŗpB\̕킪ȂĂ͎s( 
	       Ă̂\ɂāAfɂȂ)ƂɒӁB

	  X    qT()[hɓB

	  ^X   Ȃ̖OAEƁA푰AʁAсÃQ[ɂ
	       邳܂܂Ȑ_̖O\B

	  z    UBɐUꍇ́A`.'gB

	  Z    BɎƂ́AƂ`.' g
	       B

	  ^Z   Q[ꎞ~(WuRg[@\̂ UNIX(R) o
	       [Ŵ)B

	  :    ɉ邩B

	  ;    ĂV{\B

	  ,    EB

	  @    autopickup IvṼIEIt؂ւB

	  ^    ܂łɔ㩂̎ނ𒲂ׂB

	  )    Ă镐\B

	  [    tĂh\B

	  =    ͂߂Ăwւ\B

	  "    tĂ閂\B

	  (    gĂ铹\B

	  *    Ă̂\B 5 ̃R}hɂ 
	       ́B

	  $    Ă𐔂B



	  __________
	  (R)UNIX is a registered trademark of AT&T.


	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 13



	  +    mĂ̈ꗗ\B̃R}hɂāA
	       \鏇Ԃς邱ƂłBj[`ŕ\
	       A܂ڂ̎IAɓւI
	       邱ƂɂďԂւBɓւꍇ͂
	       ̑JԂB

	  \    ܂łɂǂȎނ̕\B

	  !    VFɔB

	  #    g R}hsBȏォ番悤 NetHack ̍
	       ׂ͂Ă̕gʂĂ܂̂ŁA܂pɂɎg
	       ȂR}h͂̂悤ɂēꂽBǂ̊gR}h
	       gp\́AQ[̃RpCɂǂ̋@\Lɂꂽ
	       ɂB

	  #adjust
	        ̖ژ^LύX( fixinv IvVuIv̎
	       ɕ֗ł)B

	  #chat
	       NƘbB

	  #conduct
	       ǂ̒킪܂Ă邩\Bڂ͌qu
	       vCv̏͂QƂ邱ƁB

	  #dip ɐZB

	  #enhance
	       ̋Zʂ߂Aׂ肷B

	  #force
	       JB

	  #invoke
	       ʂȔ\͂𔭓B

	  #jump
	       ʂ̏ꏊփWvB

	  #loot
	         ̂΂ɂ鏰ɒuĂ锠⊓A܂͂Ȃׂ̗
	       Ăn̈Ƃ̒g𒲂ׂB

	  #monster
	       (̎pɕωĂ鎞)̓\͂gB

	  #name
	       ╨̎ނɖOtB

	  #offer
	       _ɂɂB



	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 14



	  #pray
	       _ɋFď߂B

	  #quit
	       Q[Z[uɃvOIB

	  #ride
	       ɏ(邢͏̂߂)B

	  #rub v΂B

	  #sit B

	  #turn
	       s̉ǂB

	  #twoweapon
	       񓁗퓬̃IEIt؂ւB񓁗ɓK؂ȕg
	       ƁBȂΎIɃItɂȂB

	  #untrap
	       (㩁AA)㩂͂B

	  #version
	        ̃o[W NetHack RpCƂ̃IvV
	       \B

	  #wipe
	       @B

	  #?   wvj[: p\ȊgR}ḧꗗ\B

	       Ȃ̃L[{[hɃ^L[ (ʂ̃L[ƈꏏɉƂ
	  ẴL[`^'[ 8A܂`']rbgZbg)
	  ΁AR}h̓^L[ƈꏏɉƂɂđ g
	   R }  h N邱ƂłB NT, OS/2, PC NetHack ł
	  'Alt' L[̖ړIɎg.

	  M-?  #? (ΉĂȂvbgz[)

	  M-2  #twoweapon (number_pad It̏ꍇ)

	  M-a  #adjust

	  M-c  #chat

	  M-d  #dip

	  M-e  #enhance

	  M-f  #force

	  M-i  #invoke



	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 15



	  M-j  #jump

	  M-l  #loot

	  M-m  #monster

	  M-n  #name

	  M-o  #offer

	  M-p  #pray

	  M-q  #quit

	  M-r  #rub

	  M-s  #sit

	  M-t  #turn

	  M-u  #untrap

	  M-v  #version

	  M-w  #wipe

	       number_pad IvVÎƂ́Aɉ 
	  R}hLɂȂB

	  h    wvj[: ``?'' ƓlɃwvj[\B

	  j    ʂ̏ꏊփWvBu#jumpvuM-jvƓB

	  k    (ʏ͔)RB'^D' ƓB

	  l      ̂΂ɂ鏰ɒuĂ锠⊓A܂͂Ȃׂ̗
	       Ăn̈Ƃ̒g𒲂ׂBu#lootvuM-lvƓB

	  N    ╨̎ނɖOtBu#namevuM-nvƓB

	  u    㩁AA󔠂Ȃǂ̎d|ꂽ㩂   B u#untrapv 
	       uM-uvƓB


	  5.  ƒʘH

	       A̕ʘH͖肪Ă邱Ƃ邵AĂ
	  ƂB̂Ă镔Ŏ̎ɓ镔͉ 
	  \BÂƂł͎ 1 ̋ԂBǂʘH
	  ͉ʂɕ\ꂽ܂܂ɂȂB

	       BʘH͕\ȂB `s'(search: T) R} h
	  Ŕ邱ƂłB



	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 16



	  5.1.	o

	       o͕ƒʘHڑ̂łBo̒ɂ͔̂
	  ̂B̂Ƃɂ͂̂܂ܒʂ蔲邱ƂłB 
	   oɂ͔邪A̔͊JĂ邩AĂ邩A
	  Ă邩̂ꂩłB     J    
	  `o'(open:    J  )  R }hpBĂєɂ
	  `c'(close: ) R}hpB

	       ɏĂƂ `a'(apply: p) R}h
	  ŏ͂gA`^D'(kick: R) R}hŔRj邱
	  ƂŒʂ邱ƂłB

	       JɎ΂߂邱Ƃ͂łȂB邢͐
	   ^ɋߕtȂ΂ȂȂB̂Ȃoɂ͂̂悤
	  ͂ȂB

	       ͉ߏôɖɗBẲ͔J邱
	   łȂBǂ̉ɂƂĂ͔JKvȂ
	  Ȃ(: S͔ʂ蔲邱Ƃł)B

	       B͕\ȂB `s'(search: T) R}h 
	  邱ƂłBxƕʂ̔ƓlɂȂB

	  5.2.	 (`^')

	       `҂ׂ悤Ƃ㩂ÂɂB
	  ႦΗɗƏôɐ^[̊Ԃ̏ꂩ瓮 
	  Ȃł낤BɒN𓥂ݓĈ邩A`s'(search:
	  T) R}hŌ邩ď߂㩂͕\B㩂 a
	  H ɂȂ邱ƂB͔ɗLȖhpłBÓTIR
	  s[^Q[łuqɔԁvɂʂȃ_Wւ̕ 
	   ݂B̃_Wł̖ړI͑𗎂ɓ邱
	  łBTdɐǂ݂΁ASĂ̊K͑qɔԂ̓`̃[ŃN 
	  A łBsl܂Ă܂`҂̂߂ɂ̏Mp
	  ӂĂ邪A͉^ቺĂ܂B

	  5.3.	Ki (`<', `>')

	       ʓIɓÅeKɂ́AO̊Kւ̏Ki('<')ƁÅK 
	  ̉Ki('>')ЂƂBAOBႦ΁AA
	  ̔rI󂢊KłȂ͓̉KiK𔭌邾 B
	   Ƃ͓ȂłAЂƂ̓m[̍BƂĒm
	  nтɑĂB̍B͍Ōɂ͍s~܂ɂȂĂāA 
	   T(Ȃ邱ƂIꍇ)A̓Aɂ܂
	  ߂ėKvB

	       KigA邢͑̊KɈړ㩂Ɉ|ꍇA
	     łK͔񊈐āAfBXÑt@Cɒ
	  B̖KꂽKɍĂіKꂽꍇAfBXÑt@Cǂݍ 
	  čĊB߂ĖKKɈړꍇÅK(قƂ
	  ̊K͈ꂩAuʂȁvK̓ev[gAúvK( q)
	   ̓t@Cǂݍ) Vɍ쐬B݂͌̊K
	  ̂sB̊Kɂ͎̂~܂ĂB


	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 17



	       ʁAȂKigƁAȂ͖ړInőΉKȉ
	   BAybg(q)Ƃ̉͂ȂKi
	  ~肵ɂĂāAẌ̂ȂƓւ 
	   BȂꍇAybg₻̑̉KȉɌA
	  Ȃ͂̂΂ɌB

	  5.4.	͂ (`<', `>')

	       ͂͊KiƓڂłAKq̓̎ނ̓Q[
	  قƂǋʂłȂB


	  6.  

	       ʏɂ͂Ȃ猩\ȂAЂƂ
	  ƈł̒ŉƂ΂o킷ƂɂȂ邩Ȃ̂Œ 
	   KvłB@̃ACe̒ɂ́AȂ𔭌
	  OɂȂ𔭌̂ɖ𗧂(̔\͂ɑ
	  ϗDĂB)

	       `/'  R}h `;' R}hʏɕ\ĂɊ
	  𓾂̂ɗpB `C' R}h͉ɖO
	   pẢ鎞ɁA𑼂̂̂ƌ
	  Ƃɕ֗łBOƂăXy[Xw肷ƁAȑOɂ 
	  OƂɂȂB

	       g R}hu#chatvɂāAאڂƌ𗬂łB
	  ۂ̑䎌͑IłȂ(ƁAȂׂ邩͑I
	   )AX Oracle of Delphi(ft@C̐_a)Ƃ
	  b邱Ƃ́ALvȌʂ炷B


	  6.1.	퓬

	       Ɛ킢Ƃɂ́APɂ̉ɌĈړ
	   悤ɂ΂悢B̉͂Ȃ킢𒧂܂ȂA
	  ƂCɂ邱Ƃ͂ȂB𗧂ĂƑϊ댯ȉB uO
	  \ZvɂvƂƂ킴YꂸɁB

	       Ȃ(A܂͂ȂڂȂ)ꍇA
	  ƂȂvʒu`I'̕\B̋
	   ƂƁAĂ鎞Ɠ悤ɂȂ͉ɍU悤
	  ƂBAړĂ܂ĂAȂ̍U 
	     ؂邱ƂɂȂBłɈړĂ܂Ăƍl
	  A킢Ȃꍇ́A `m'R}hgƂŐ키ƂȂ 
	   BtɁAɉ邩ǂ킩ȂǂƂɂ
	  Čꍇ́A `F'R}hgB

	  6.2.	ybg

	       Ȃ͎e(`d')AqL(`f')A|j[(`u')̂ꂩƂƂ 
	  Q [n߂BȂ̃ybg͂ȂƂƂɓA܂悢A
	  Ɛ키Bybg͂ȂƓlɐ̂т邽߂̐HK v  
	  B ybg͐VNȎ₻̑̓ɂĂBybg


	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 18



	  ̂ƂCłAybg炵ĂƎv 
	  A Ȃڂ^邱ƂłB̂߂ɂ͐Hyb
	  gɌēĂ΂悢BƌPꂽybg͂ 
	  󋵂̂Ƃŋɂ߂ėplB

	       ybg|ĂɂČoςłB܂Ԃ
	  ƂɐA̗͂⑊ɗ^_[WB߂̂ 
	   Ȃybg̕낤Ax̒ႢLN^
	  ɂƂĂ͖ɗ낤B

	       Ȃ̊KֈړƂAׂɃybgAĂ΃ybg
	   ȂɂĈړBuɂƖ쐶Ă܂
	  ȂBlɁAȂ̈ʒuς悤㩂ɂ 
	  ꍇ (Ⴆ΁AgbvhAŉ̊Kɗꍇ)Aׂɂybg
	  ĂAׂɂȂybg͎cBybg 
	   悤㩂ɂ邱ƂBȂ͂Ƃ̎Ƀybgׂ̗
	  ĂꏏɈړ邱Ƃ͂ȂB

	  6.3.	Rn

	       _Wɂ邠̐́AȂƔ\  
	   Ă΁A邱ƂłB쐶̐ɂȂ邱Ƃ[
	  ͍̂łB̓A̎͋͊֌Włグ 
	   @̗͂ɗȂ΂ȂȂBAUȂ̎xz
	  ɒuȂA `#ride'R}hŏ~肷邱ƂłB 
	   ēAړ@́Agړ̂ƓłB
	  n}ɕ\̂͂ȂĂ铮łB

	       nZp`#enhance'R}hŊǗ邱ƂłBڂ
	  q镐̋Zp̏͂QƂ邱ƁB

	  6.4.	[̊K

	       ` ҂̗HƂ̎(邢͂͐܂ςÔȂ
	  gł邱Ƃ)Ȁiɏo킷ȂBH
	   EƂ͓Â낭قƂǃ_[W󂯂Ȃ̂
	  ȒPɓ邱ƂłBȂ͎񂾖`҂̏iD 
	   łB͎Ă邱ƂBȑO̖`҂
	  ɓ炵߂̂ɂׂ͂Ēӂ𕥂˂΂ȂȂB͂ 
	  pjA̒ȌɐĂ邩炾B


	  7.  

	       A̒ŉꍇAEƎv̂͂悭
	  邱ƂłB NetHack ł͂̏̕ʂ邱ƂɂĎIɏE
	  Ƃł( autopickup IvV(q)ItɂȂĂƂ
	  `m' vtBbNX (Oq)pĈړƂ͂̌    
	  )A܂ `,' R}hgĎ蓮ŏEƂłB

	       Ƃɂ́ANetHack ͂Ȃɂ̂悤ɍA
	  ȏEƂ͂łȂȂBłȂ NetHack ͂̕
	  Ȃ̉וɉAE\B



	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 19



	       ɘAāAו̏ddȂBǂꂾ̏d
	  ̕^ׂ邩͋ؗ͂Ƒϋv͂ɂB͂قǁAו̏d e
	   ͏ȂBłAA̒Ăו̏d
	  ȂɕSɂȂƂB͓݂ȂAJ[ 
	   ȂĂ葽̐HKvƂȂBčŏIIɂ͉וd
	  ĉ̂ĂȂƓȂȂĂ܂B

	       NetHack ł͉ו̏dǂꂭ炢e^邩Ă
	   B   s  \`Burdened', `Stressed', `Strained',
	  `Overtaxed',`Overloaded' ̕\Ȃ̏ԂĂB

	       EƂA̕ɂ͖ژ^L蓖ĂBɊւ
	   ̃R}h͂Ȃǂ̕ĝq˂ĂB
	  ̂̕IԂ悤 NetHack q˂ĂƂ́Aʖژ^L
	    ꗗ\Ă̒I(Oq̃R}h̍QƂ̂
	  )B

	       ̕AႦΕނ̂悤ȕ́AǂȂ̂ȒPɋ
	   tB̑̕AႦΊ␅͂̎ނɉĂ
	  낢ȖOtĂB 1 ̃Q[̊Ԃ͓O
	   ͓ނ̕łBɕt閼O̓Q[ƂɈ
	  ̂ɂȂB

	       ̂悤ȕgǍʂ炩ȏꍇ NetHack
	   ꂪł邩ĂĂB̌ʂ܂薾炩ł
	  ꍇ͂̎̕ނƖt邩q˂ĂB̂ߌ Ȃ
	  ĂvoƂłB܂ł``#name''R}hg
	  ēl̂ƂłAނׂ̕ĂɖOtX̕ 
	  OtłBłɖOĂ̂``#name''g
	  ꍇAVOƂăXy[Xw肷邱ƂɂāAȑO 
	  OƂłB

	  7.1.	􂢂Əj

	         낢ȕ́AƂꂪɗ̂
	  ƂĂ􂢂Ă邩mȂB􂢂 
	   镨gƂꂪtĂ܂Ƃ͍ł悭錋ʂ
	  B􂢂Ă镐Ƃ͎ɒtĂ ܂
	   ȂȂB􂢂Ă镨gɂƕʂ̕@
	  ͂͂ƂłȂBɁA􂢂Ă镐h 
	   K  ƌ킯ł͂ȂĂ̏ꍇ̖͂^Ă
	  āAłȂ퓬̌͂B̑̎􂢂 
	   镨́A܂ɗȂ܂͂̑̓_ŊQyڂ
	  肷邾낤B

	       ܂jĂ镨BjĂ镨͎􂢂
	   Ȃʂ̕ɔׂċǂɗBႦΏjꂽ
	  ͈Ɉw̃_[W^邱Ƃł邾낤B

	       @gƕɎ􂢂􂢂肷邱Ƃ  
	  B ̂߂ƂtĂ܂ĂA􂢂Ă͂
	  ƂłBm͐􂢂jɕqȂ̂ŁA̐EƂ̖` 
	  eՂɎĂ̂邱ƂłB



	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 20



	       Ȃ̖̎ژ^̒Ŏ􂢂Ă邩ǂ
	  ͖ژ^̂Ȃœɉ̐ȂBǂȏԂɂ邩m 
	   ͖ژ^ꗗŁucursed(ꂽ)vuuncursed(ĂȂ)v
	  ublessed(jꂽ)vȂǂ̌t̐ɗ^B

	  7.2.	 (`)')

	       |̖{ɏZނقƂǂׂẲ́A`XƌΌ
	  ȂȂEƂ邾낤B̐g(ɉEĂ
	  ܂)߂ɂȂ͕KvƂBȂł̓|Cgɂ 1
	  `  2 ̃_[W (炩̉Z邩mȂ)^邱
	  łȂBAAN͗OłBN͕gčU 
	   fōUyɑ傫ȃ_[W^邱Ƃ
	  B

	       ɂ͒Ȗ⌕̂悤ȐU񂷂߂̂̂ƁA⑄̂悤
	   邽߂̂̂BŉɑŌ^邽߂ɂ́A
	  ɂĉU邩ɓȂ΂Ȃ B
	   ɂ́APɑ𓊂悤ɑI邾ł悢B|
	  ˂ɂ́A܂|ɎĂ𓊂΂悢BNX{ E
	    crossbow bolt(NX{Ep̑)𔭎˂邽߂̂̂łB
	  Ί͊(΂̂悤)̑̐΂𓊂邽߂ɗpB

	       ͂̂镐ɂ́uǉ\́v(U\͂ƌƂŐƕ 
	  蓾)tĂAUɓ\Ɨ^
	  _[WɒǉB̖͂𑪒肷ɂ́AȂ炩̕@ 
	   @gĊӒ肷邵ȂB͎̕K̂悤Ȃ̃_
	  [W󂯂₷B̂悤ȁuHv_[W͏C\łB

	       U܂ɖ邩ƁAɂǂꂭ炢̃_
	  [ W^邩́A̗vfɂČ肳Bɂ͈ȉ
	  ̂: ̎ށA̕i(͂╅H)Ao x A 
	  ́AqAו̏dAZ(q)B̖hl(ʓIȖh䗦B
	  h𒅂邱ƂɂƂ͌Ȃ)vf̈łB܂A
	  ̕ɑ΂ēɑϐB

	       ͕̕Ў莝ł邪A肪KvȕB莝
	  ̕Ə𓯎ɎƂ͂łȂBЎ莝̕ 
	   ꍇAЂƂ̕\ƂďĂāA `x'R}h
	  ōgĂ镐ƌ邱ƂłBɁu񓁗퓬v Z
	  \  Z      A ̕𓯎ɎgƂłB
	  `#twoweapon' gR}hœ񓁗퓬邩ǂ؂ւ
	  B ꕔ̃LN^[(ႦΖؐl)̋Z\ĂB
	  Ƃ̋Z\ĂĂAxɓ̕gƂЂƂ 
	  gȂɔׂēGɖmɃyieB󂯂B

	       S̕Ȃ邩ȂB邽
	  ߂ɂ́ÂIԎ`-'IԂA邢`A'R}h 
	   ̑̐gɂĂ̂ÔƓɌݎgĂ镐O
	  ƂłB

	       AD&D vCƂ̂ǎ҂͂Ct낤AAD&D ɓo
	     NetHack ɂĂɂ_[W^
	  B܂ǂmĂ   (	aklys(A L  X),  lucern


	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 21



	  hammer(b cF n}[), bec-de-corbin(xbOEfERr)
	  Ȃ)̂ AD&D ̒ǉ[ł Unearthed Arcana ̕t^
	  ŏڂĂB

	        gR}h `w'(wield: )A `t'(throw: 
	  )A `f' (fire: 𔭎˂ЂƂ̕ @),	`Q'(quiver:
	  	)A	  `x'	  (exchange:	   	        	 
	  )A`#twoweapon'A`#enhance'(q) łB

	  7.2.1.  ̂𓊂邱ƂƔ˂邱

	       `t'R}hgƂɂāAǂȕł邱Ƃ 
	  B   R}hw肷ƁA镨q˂ĂB `?'
	  ƁA̒œ̂ɌĂȕ̈ꗗ  \   A
	  `*'ƁASĂ̎̈ꗗ\B𓊂邩w肵
	  A(ǂ̖ڕWɓ邩ł͂Ȃ)ǂ̕ɓ邩q   
	  B 邱Ƃł鋗́Aɕ̎ނƋؗ͂ɂB͎
	  邱Ƃł邪A|ēyɉ܂ŔсA 
	  Wɂ₷B

	       `Q'R }hŗ\ߍD݂́u˕vIĂA `f'R}
	  hœ邱ƂɂāA鑀ȒPɂ邱ƂoB 
	   lɓ͐q˂邪A `f'R}hgтɉ
	  邩w肷Kv͂ȂB autoquiver IvVI   
	  ƁA `Q'R}hŐݒ肵ȂȂɁA NetHack I
	  ɑ̕ĂB

	       --- --- xɕ̕𓊂邱ƂłLN^[  
	  B xɕ̖𑕓U(邢͈xɕ̕)A
	  ڕWɓĂ邱Ƃ͂₷dł͂ȂBW[͂̋Z\ D
	   Ă邵AK؂ȕ̋Z\ (|Ė˂Ȃ|̋Z\AN
	  X{DgȂNX{D̋Z\AXOĐ΂𓊂 
	   XŐZ\) ɂčx̋ZʂΑ̐EƂł
	  \łBȂ̃ACe𓯎ɓ邱Ƃł邩 
	  ^[ωB `t'R}h`f'R}h̑Oɐw肷邱
	  ƂɂāA˂鐔𖾎Iɐ邱     B  
	  ΁A``2f''( number_pad IvVI̎ɂ``n2f'')Ǝw肷
	  ƁAƂ 3 {ˉ\łő 2 {˂ȂBA 
	             w肵ꍇ (̗ł
	  ``4f'')́Aɐw肵ȂꍇƓlAۂɔˉ \ 
	  (ł 3 {)˂ȂBUJnȂASĂ
	  ACe͓ɔԁB 1 {ڂŉ|ȂAc͂
	  ̐܂ŔłƂɂȂB

	  7.2.2.  ̋Z

	        pł镐̋Z\͂܂܂ɈقȂĂB̋Z(Z
	  \)͂̕ǂꂭ炢܂邩ɉeBZ\̓Q[
	   ʂČコ邱Ƃo邪A͐EƂox═
	  ̎gp񐔂ɂB

	       Zʂ߂ɁA daggers A broadswords A  polearms
	   ɂ̃O[vɕĂBꂼ̃O[
	  vŋZʃxǂ܂ō߂邱Ƃo邩͐EƖɌ܂ 


	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 22



	  BႦΖ@g daggers  staves ɑ΂Ă͍xɒB
	  邱Ƃo邪A swords  bows ɑ΂Ă͂ł͂ȂB

	       `#enhance'gR}hŌ݂̕(Ǝ)̋Zʂ邱Ƃ
	   BɁAЂƂ܂͕̋Z\コ邱Ƃł
	  ԂȂAǂ̋Z\コ邩I邱ƂłBZ\̃ 
	  N "none"  (Z \        ƂłȂƂӖ
	  "restricted"(ꂽ) ƌĂ΂邱Ƃ)A "unskilled"(S
	  ), "basic"(), "skilled"(n), "expert"(GLXp[g)
	  BꂽZ\͒P`#enhance'R}hňꗗɕ\   
	  B	(_̉ɂ肠̋Z\̐邱ƂB
	  ̎ɂ͋Z\"unskilled"ƂȂAE"basic"܂łƂȂ) L 
	  N ^ [    ́A f  ł̐퓬}[VA[c̋Z\
	  ``master''(}X^[)``grand master''(Oh}X^[)ɂ܂ 
	  コ邱ƂłB

	       Z \x"restricted""unskilled"̕gƁA
	  ̖▽ɗ^_[ W  y i  eB   B
	  "basic"ł̓yieB{[iXȂB "skilled"ł͖Ɨ^
	  _[Wɂ₩ȃ{[iXB "expert"ł̓{[iX͑傫
	  ȂBUƁAgĂ镐ɊւZ\(ő
	  BĂȂȂ) コ邽߂̌Px𑝂₷`X B
	   ̌Px̃xɕKvȒlɒBƁA̋Z\ɂ莩M
	  Ă悤ɊƂB̎_`#enhance'R} 
	  h gƂɂĂЂƂ܂͕̋Z\コ邱Ƃł
	  BZ\͎Iɂ͌サȂBȂȂSĂ̋Z\x̍v 
	   ̂ŁAǂ̋Z\コāAǂ𖳎邩߂
	  Kv邩łB

	  7.3.	h (`[')

	       ̔FDIȂ̂Aɂ͐łB̂
	   U䂪gɂ͖hKvłBh̒ɂ͑̎
	  ̖hhʂɗDꂽB Armor class(AC)(h l)
	  ̖hʂ̎ړxłBhl (AC) AD&D ł̏ꍇƓ悤
	  ]B 10 hȂ̏ԂƓAlقǗD 
	  hł邱ƂB AD&D ɑ݂Z͂ NetHack ɂ
	  ĂhʂBȉ(sSł͂邪) e̊ZƂɋK
	  肳hl̈ꗗB

		  dragon scale mail(hS̗؊Z)		  1
		  plate mail(|S̊Z)				  3
		  crystal plate mail(̊Z)			  3
		  bronze plate mail(̊Z)			  4
		  splint mail(SЂ̊Z)				  4
		  banded mail(ы̊Z)				  4
		  dwarvish mithril-coat(h[t̃~X)	  4
		  elven mithril-coat(Gt̃~X)	  5
		  chain mail(т)			  5
		  orcish chain mail(I[N̍т)		  6
		  scale mail(؂̊Z)				  6
		  studded leather armor(etZ)		  7
		  ring mail(S̊Z)				  7



	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 23



		  orcish ring mail(I[N̓S̊Z)		  8
		  leather armor(Z)				  8
		  leather jacket(WPbg)			  9
		  no armor(ZȂ)				 10

	        ɑ̖h(: ACA|AN[N) gɂAhl
	  ̒l邱ƂłBeɓ镨 1 g
	   邱Ƃ͂łȂ (Z͈ꎮAN[N 1 A 1 A|
	   1 Ȃ)B

	       hɖ͂΂̖h̖hʂ͒ʏ̕ (
	     )ȂĂAɕtĂu{Lv(邢́|L
	  )̕hl̒lȂBႦ +1 т́Aʏ
	    тhʂAhl 1 PʕȂ 4
	  ɂȂBhgɂƒɖhlƁu{Lv̒l B
	   ꂽh͒ʏ핉̖(|L)ĂA͂
	  Ƃ͂łȂB

	       ̊Z͎K̂悤Ȃ̃_[W󂯂₷B̂悤
	  _[W͏C\łB@̂WhB

	       Zg߂̃R}h `W'(wear: ht)  `T'(take
	  off: h͂) łB `A'(remove all: SĂ͂)܂
	  ̐gɂ̓lAh͂̂ɎgpłB

	  7.4.	H (`%')

	       ̂тɂ͐HsłDԐHɂȂ܂
	  łƂ₪č|AXɉ쎀ւ̓ǂ邱ƂɂȂBۑ 
	   u  ĂȂƏł܂AHׂɂ͕sqɂȂH
	  BACX{bNXʂɓĂH͒ʏ͂܂ł܂ 
	  A ACX{bNX͏dAʂ͊Ĵɏ΂莞ԂKvł
	  B

	       Eƒʏ͂̎̂c邪ÁuHvɂȂB
	   ׂĂƌ킯ł͂Ȃ͐Hׂ邵Aɂ͐HׂƓ
	  ȗ͂̂B傴ςɌ΁uĤׂɂȂvƂ 
	  ƂłB

	       ؐH`̐EƂBؐH`̉͌ē̎
	  HׂȂBؐH`̃vC[͓̎̂Hׂ邱Ƃ 
	  邪AȂ炩̂肪ȂpB

	       furit IvVɂĂȂ̍D̐HɂȂł̖O
	   1 ݒ肷邱ƂłB


	       HHׂ邽߂̃R}h `e' łB

	  7.5.	 (`?')

	       ɂ͂낢ȕ\肪tĂ邪A͂炭
	  ̖ptɒׂƂđI񂾂̂ł낤 (:``READ ME'' 
	   ``THANX MAUD'' ̋tǂ݂Ƃ)B͓ǂނƏł( 


	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 24



	  @̎̏ĂȂ͏łȂ)B

	        ̒ōłpl̍̂scroll of identify(
	  ̊)łB͑̕ɂĂꂪł邩A􂢂
	   Ă邩jĂ邩AƉ͂𔭊ł邩mł
	  B̂̒mȂ͂̒ɂ͂̊Ȃł͉ł 
	  Ӓ肵̂B

	        C  f[ĂĂȂscroll of mail(莆̊
	  )nĂ邱Ƃ (̋@\LɂăRpC
	   o[W̏ꍇ)B NetHack ̃[zB@\̓VXẽ[
	  {bNXɓdq[ĂꍇɋNB̋@\ g
	  p ɂ͊ϐ``MAIL''ɂȂ̃[{bNX̃t@C
	  ݒ肵 NetHack ɐV[Tꏊm点KvB
	   ]ނȂΊϐ``MAILREADER''Ɏg[MvO
	  ̃t@Cݒ肷邱ƂłB̂Ƃ NetHack 炻̃v
	  O NĂ̊ǂނƂłB[Q[ɂ
	  ă_ɐo[W NetHack ł͂̊ϐ
	  ͖BCf[ mail IvVŃItɂłB

	       ǂނ߂̃R}h `r' łB

	  7.6.	 (`!')

	       ͏тɓĂt̂̐FɂċʂB͈
	  ނƏłĂ܂B

	       Ȑ͐łB͂΂ΏjĂ􂢂
	   Ă肵āAsȐɂȂ肷Bs̉
	  ƂĐ͗LQȂ̂ŁAs̉ɓ(`t')ƗL
	  Bɑ̕Z(``#dip'')̂ւLvłB

	       ނ߂̃R}h `q'(quaff: ) łB

	  7.7.	 (`/')

	       @̏͒ʏ퉽͂𔭊D̒ɂ͕̂
	  ̂ȀꍇUwȂĂ͂ȂȂB 
	   ĐU邱Ƃł(Ƃ `.'  `s' ͂)A
	  ͂΂΋ȍsׂƂȂB̑̏ɂ͕ȂA U
	   q˂ĂȂB񂪌͂𔭊񐔂͏񂲂ƂɕsŁA
	  gxɂ̉񐔂 1 B

	       ̖@̗ʂȂȂƁAʏ͏gpĂNȂB
	   Ȃ玞܁AŌ̈ꈬ̖͂g񂩂邱
	  Ƃ\łBƏ͉Ă܂B͓K؂ 
	  @ ɂčď[U邱Ƃł邪AƏ񂪔Ă܂
	  \B\͍ŏ͔ɏAɉx 
	  ď[U邲Ƃɑ傫ȂB

	       \sȂȍsׂł͂邪AǂɂȂȂȂƂɂ͏
	  󂷂ƂB͎Cȍsׂł͂ȂBs 
	  AjIȖ@̃GlM[邩łB



	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 25



	       SɊӒ肵ꍇÄꗗł͊ʂ̒ɒǉ
	  񂪕\B͍ď[Uꂽ񐔁ARA݂̎gp \
	     łB񂪖ꂽꍇɂ͎gp\ȉ񐔂 -1 ɂ
	  B

	       g߂̃R}h `z'(zap: U) łB󂷂ɂ
	  `a' (apply: g)łB

	  7.8.	w (`=')

	       wւ͑ϖɗłBƂ̂⊪̂悤
	  ͂ߐɂȂ̂ƈႢAwւ̖͔͂rIPvI 
	  邩炾B

	       wւ͂߂邱ƂɂĂ̖͔͂Bwւ̖͗
	  w 1 Av 2 ͂߂邱Ƃ͂łȂB

	       ܂Ă̎wւ͐gɂƕ̌ȂB
	  ͎wւ̎ނɂĈقȂB

	       w   g  ߂̃R}h `P'(put on: wւ͂߂) 
	  `R'(remove: wւ͂) łB

	  7.9.	@ (`+')

	       @͋͂Ȗ@L傫Ȗ{łB`r'(read: ǂ) R
	  }hŊwԂƎ̒mǂݎɓ](čŌɂ͓
	  ߂ȂȂ)AȂ΂݂͕̎šʂɏIB􂢂
	   @m̋y΂Ȃ_̌Ñ㕶ŋLꂽ@ǂނ
	  NԂɊQyԉ\I

	       Ƃ(wł鎞)ɂ͂t邱  
	  B Ȃ̌oxł͉y΂ȂxȎ悤Ǝ
	  AΉ^CvɊւZ\ႩAЂǂ 
	   ƂɎ肷ƁÂɕKvȃGlM[
	  ԂQɏIĂ܂ƂB

	       邱Ƃ́A@̃GlM[ĂыNĂ𐸐_
	   ̂̂ɏW邱ƂłBȂg̓o閂@̃G
	  lM[JAAĎƔĂ܂B 
	   ɂ͗KKvłBKĂ΁Aꂼ̎̈̋Z
	  \͌サĂBȂAԂoɂĂꂼ̎ 
	  ɊւL͔AxwԕKvłĂ邾낤B

	       w  ̂̏ꍇAw肷Kv
	  BƂ`.'܂`s'w肷邱ƂŎgɑ΂Ď 
	   邱ƂłBA͂΂΋ȍsׂłBw
	  ̂Ȃ̏ꍇAw肷Kv͂ȂB

	       킪Knx̖ʂŃO[vĂ̂ƓlAO
	  [ vĂB̂ɐƁÃO[vP
	  ƂɂȂB\ȋZ\Ύ̌ʂ߁As̉ \
	  ߂邱ƂłBZ\Xbg͕XLƋLB(``
	  ̋Z''̍QƂ̂)


	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 26



	       @ɂ͎RɈړłȂ΂ȂȂB܂A
	  ̎ނ̊Z𒅂ĂƖ@̂W邾낤B

	       @ǂނ߂̃R}h͊ǂނƂƓ `r'(read:
	  ǂ) łB `+' R}hɂAmĂƂ̃xC
	  Cꗗ\B `Z'(cast: ) R}hɂ
	  B

	  7.10.	  (`(')

	       ͂낢ȖړIɎgXGȕłBȂǂƓ
	   Ɏgp񐔂ɐ̂镨BႦ΃v͂΂炭ƔR
	  sĂ܂B̑̓̒ɂ͗e܂܂ĂAo 
	  ꂷ邱ƂłB

	       g߂̃R}h `a'(apply: p) łB

	  7.10.1.  

	       `̓rŊ┠Ђɏo킷Ƃł낤B
	   u ĂꏊɗĂꍇɂ͊gR}hu#lootvɂ
	  āA܂ĂƂɂ `a'(apply: p) R}h J
	   邱ƂłBȂЂɂ͂΂ΏĂA
	  ͏dĉ^тɂ̂łBЂ͎ɎƂ͂łȂ 
	   ̂ŁA͂(`a'(apply: p) R}hŌ
	  gA `^D'R}hŏRƂ΂ A g  R } 
	  h``#force''ɂ蕐gĂJȂǂ̕@ɂ)ɂ͏
	  uȂĂ͂ȂȂB

	       Ђɂ㩂d|Ă̂A͂ӂ
	  J肵ƂɕsȏoNBgR}h``#untrap''
	  ă`FbN㩂ɂȂ悤݂邱ƂłB

	  7.11.	  (`"')

	       ͎wւƑς悭ĂA΂΂Ƒ傫Ȍ  
	     BwւƓ悤ɖɂ͂낢Ȗ@̓
	  ALvȂ̂LQȂ̂āAgɂ邱Ƃɂ͂ 
	  B

	       ͈ɂ邱ƂłȂB

	         g߂̃R}h͎wւ̏ꍇƓ `P'(put on:
	  wւ͂߂)  `R'(remove: wւ͂) łB

	  7.12.	  (`*')

	       ΂̒ɂ͉l̂̂AlŔB΂͍Y
	   @ƂĂƂċɂ߂ČʓIȂłBl̂
	  ΂EoɏĂΓ_ɉZB

	       ̏Ȑ΂΂ɕނ邪Ảl͂قƂǂȂB
	   A S Ă̐΂(XOĂȂ)eƂėLł
	  B]Ɋׂœ邱Ƃ\łB


	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 27



	  7.13.	 傫Ȋ (``')

	       ⋐΂͓ɗLpł͂ȂAʓIɏd̂łB
	  Ƃ͈قȂƂ\łB

	       ȃq[}mCh(l₻̒)͋΂𕐊Ƃėp
	  ƂłB

	  7.14.	  (`$')

	       ͓_ɉZA܂Xł͋ŕ𔃂ƂłB{
	  ɂ͂Ȃ̎ɉe邩Ȃ̉(X
	  ͕ʂƂ)B


	  8.  vC

	       __҂͏@ے肷B܂A#pray(F), #offer(
	  ), #turn (ŝ̂߂), mɑ΂ #chat(b)
	  Ƃ͂łȂBꕔ̓ǎ҂̓NmŃvĈ̐ 
	   ĂƎ咣邩ȂAł̓vC[̑I̗]
	  ncĂBCF_[̖_ɕ̂̓Q[ɏ 
	   ߂ɕKvȂ̂Őɂ͔Ȃ̂ƂB܂A{_m
	  ₻̑̏@I݂bt𕷂Ăɂ͔ȂB^ 
	  __҂͌t͕CɂȂʂȈӖoȂB

	        Ƃǂ̃vC[͕(邢͕Ƃđ邱Ƃ
	  lĂ铹)ɐ키B̈͂̂悤ȕɂ
	  g 킸ɃQ[ɏ邱ƂłB𓊂A˂A
	  R肷̂͋B܂AAA邢͂̑̃AC e
	  gAfrŐ키ƂB

	       NetHack	ɂāAa`҂͑̉EĂ͂ȂȂ(
	  ƁA̎ɂČol𓾂Ă͂ȂȂ)B͓ɓ
	  ł邪A̎iɂČol𓾂邱Ƃ͉\łB

	       ӎ҂͓ǂݏłȂBɂ͈ȉ̍sׂ܂܂B
	  ǂށA@ǂށA肢NbL[̃bZ[WǂށATVc
	  ̕ǂށAA``x''ꕶ(ӎ҂̓`IȃTC)
	  O̕ށBł镶ǂނƂƂƁAQ[ɏ 
	   ɐ΂ɕKvȃACeǂނƂ͐ɂ͔Ȃ̂ƂB
	  Q[JnɎĂ銪Ɩ@̓emĂ邱Ƃ 
	   ̒ḿAQ[JnȑOɋt狳̂Ƃ݂ȂA
	  ɂ͔Ȃ̂ƂB

	       ̑ɂׂ킪B͋sE邱Ƃ\
	   BɃvĈƂ݂ȂBȂ̓ACe
	  O[v̑̃ACeɕω (``polypiling'')Aω
	  E EŎ̑̂𑼂̐ɕς(``polyself'')łB
	  ̌ʂpȂƂ͂ꂼ꒧Ƃ݂ȂBŌɁA 
	   Ƃǂ肢ȂĂ炤ƂBȂ̃ACe킸
	  ɃvĈ͈̒łAȂ(Ƃɏ
	  ƂĂ)ŃvĈ̒łB



	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 28



	  9.  IvV

	       l ɂ͂ꂼꂢ낢ȍD݂ NetHack ̗Vѕꂼ
	  قȂĂ̂ŁANetHack ̐U镑ύX邽ߐݒł I
	  vVB

	  9.1.	IvV̐ݒ

	       I vVݒ肷@ɂ͂BQ[ `O' R
	  }hgƂɂđSẴIvV邱ƂłA 
	   ǂύXłB܂Aϐ``NETHACKOPTIONS''ݒt@C
	  ŎIɐݒ肷邱ƂłBNetHack ̃o[Wɂ 
	  Q [JnOɃIvVݒ肷邱ƂłvO
	  邱ƂB

	  9.2.	ϐ NETHACKOPTIONS g

	       ϐ NETHACKOPTIONS ɂ͂낢ȃIvV̏lJ
	   }ŋ؂ė񋓂ݒ肷BIvV̂̂̂̂
	  PɃIIt̑Ił邾łB̃IvVX g
	  ɓƃIɂȂAIvV̑O `!' ``no''ƃI
	  tɂȂB̑̃IvVł͐ݒlƂĕ񂪕Kvł B
	   ̃IvVݒ肷ɂ̓IvVAR܂̓CR[
	  LAݒl̏œ͂΂悢Bݒl͎̃J} 
	  ̍Ō܂łƂȂB

	         ``autoquiver'' I A``autopickup'' I tAO
	  ``Blue Meanie'' ɁAt[c``papaya''ɂȂ悤Ɋϐ 
	   肷ɂ csh ł͎̃R}h͂΂悢B (!͓ꕶ
	  Ȃ̂ŃGXP[vĂKv邱Ƃɒ)

	       % setenv NETHACKOPTIONS "autoquiver,\!autopickup,name:Blue Meanie,fruit:papaya"

	  sh ܂ ksh ł

	       $ NETHACKOPTIONS="autoquiver,!autopickup,name:Blue Meanie,fruit:papaya"
	       $ export NETHACKOPTIONS

	  Ƃ΂悢B

	  9.3.	ݒt@Cg

	       ݒt@C̒``OPTION=''Ŏn܂s͊ ``NETHACK-
	  OPTIONS''    @ŃIvVLqĂ̂ƌȂB
	  ``DUNGEON=''A``EFFECTS=''A``MONSTERS=''A``OB-
	  JECTS=''A``TRAPS=''A``BOULDER=''Ŏn܂s͂ꂼ dungeon A
	  effects A monsters A objects A traps A boulder
	   IvVƂĈ邪A̎w@́AݎgĂtH
	   ĝɎgLN^R[h 10 i̗łB
	  ̗͊es̍Ō`\'邱Ƃɂĕsɓn邱Ƃł
	  B `#'Ŏn܂s̓RgƂĈB

	       W      t@C OS ɂĈقȂ邪A
	  ``NETHACKOPTIONS''Łi擪`@'t邱ƂŁjgp  


	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 29



	  t@Cw肷邱ƂłB

	  9.4.	JX^}CYIvV

	       ȉɂ낢ȃIvV̖B܂ɒ
	  ͖̕Bȉ̃IvV̂ɂĂ 
	  ƂȂĂIvVB

	  align
	       X ^ [g̑(align:lawful, align:neutral, align:chaot-
	       ic)Bŏ̈ꕶŎw肷邱ƂłBWݒł̓ _
	       ɑIB `O' R}hŐݒ肷邱Ƃ͂łȂB

	  autodig
	       @邽߂̓ɂĂāA@邱Ƃłn`Ɉړ
	       ƂƂAIɌ@iWݒ̓ItjB

	  autopickup
	       ړɂ̂IɏEiWݒ̓IjB

	  autoquiver
	       ̃IvV͖̎`f'(fire:̒ɂ 
	          )R}hsɂǂ邩߂BI
	       ARs[^[͓KȕɓB̎A􂢁A
	       j A @A򉻁A̐Ȃǂ͍lȂ̂Œӂ邱
	       ƁB`Q'R}hgĎ̍Dȕ   
	       B    킪ȂÃIvVIt̎͑
	       `t'(throw:𓊂)R}hsB (Wݒ I
	       t)

	  BIOS
	       ɉʂAړɃJ[\L[g悤ɃL[{
	       [hǂނ߂ɁA IBM-PC ݊ BIOS ROM gpĂ}V
	         BIOS R[gpB (Wݒ̓ItBOS/2 , PC, 
	        ST NetHack ̂)

	  boulder
	       \̂ɗpLN^iWݒ͊\L
	       N^jB

	  catname
	       X ^[g̔L̖O(: catname:Morris)B `O' R}hŐ
	       肷邱Ƃ͂łȂB

	  character
	       LN^[̃^Cv     (:``character:Monk'')B
	       ``role''IvVƓłBEƂݒ肷邻̑̕@
	       Ă``name''IvVQƂ̂ƁB ``random''ȊO 
	       ͍ŏ 1 ŔʂB

	  checkpoint
	       vONbVɕł悤ɊKړ閈
	       ɏԂZ[uiWݒ̓IjB



	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 30



	  color
	       FXȉ╨⓴A̒n`J[ŕ\ (}CN R 
	       s[^ł͕Wݒ̓I)B

	  checkspace
	       t@ CޑOɃfBXN̋󂫗eʂ`FbN(W
	       ݒ̓I)BZ[ut@C⃌xt@Ĉ߂Ɏgp [
	       eB V2GBȏ̋󂫗eʂꍇÃIvVI
	       tȂ΂ȂȂȂB̃IvV̓RpC
	       MFLOPPY`ĂƂ̂ݓKpB

	  confirm
	       ybgAXȂ̍UĂȂU悤Ƃ
	       ɊmF(Wݒ̓I)B

	  DECgraphics
	       A̕\ɗp镶ȂgłׂĒ`ɁA
	       DEC VT-xxx/DEC Rainbow/ANSI rZbg炠炩ߗp
	       ꂽݒgp(Wݒ̓It)B̃IvV͂܂^
	       [ ~ iK؂ȃOtBbNLN^[悤ݒ肷
	       BȂ킿AȂŃOtBbN㏑ݒ肷
	       ƂɂȂĂ͂ȂB

	  disclose
	       Q [Iɕ\𐧌䂷(Wݒ́ASĂ\
	       )Bݒł͈̂ȉ̒ʂB

		    i - ̊Ӓ
		    a - ̌J
		    v - ގ̈ꗗ
		    g - E
		    c - 

	       ꂼ̕\ɑ΂āȂOɂǂ̂悤ɐUw
	       邱ƂłB̈Ӗ͈ȉ̂ƂB

		    y - mF邪AWݒ̓CGXɂB
		    n - mF邪AWݒ̓m[ɂB
		    + - mFȂɕ\B
		    - - mFȂŔ\ƂB

	       (:  ``disclose:yi na +v -g -c'') ̂悤ɐݒ肵ꍇA
	       ͊mF(Wݒ̓CGX)B ͊mF(Wݒ
	        m[)B ގ͊mFȂɕ\B E
	       mFɔ\ƂB ͊mFɔ\ƂB 
	       ̈ꗗ㩂⓯mɂĎ񂾉܂ނƂɒ
	       ӁB

	  dogname
	       X^[ǧ̖O(: dogname:Fang)B `O' R}hŐ 
	       邱Ƃ͂łȂB

	  dungeon
	        { \̂߂̃OtBbNV{ݒ肷 (Wݒ


	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 31



	       `` |--------||.-|++##.##<><>_|\\#{}.}..## #}'') dungeon Iv
	       V ͕Wݒ̑̕ɒn}`̂Ɏgp 1 
	        41 ̕BWݒ̑̕ɂŐݒ
	       gēA̒n}\AWݒ͎̕g
	       ȂBȂ̃VFʈ镶gȂA
	        L N^GXP[vKv邩ȂƂɒ
	       ӁB

	       ̃IvVŐݒ肳镶́A݂ł͒ʏ C  
	       gŃGXP[v邱ƂɒӂȂĂ͂Ȃ
	       B `\' ̌͂̂̂̕̕ƂĎ舵A 
	        v  tBb NXƂĂ͈ȂƂƂłB]
	       āA`\'  `\\' ƂKvBȃGXP[v`ł
	       `\m' ͌̃̕^rbgIɂA

	       V  {͈ȉ̏łFA(c)A()A
	       pAE̊pÅpAE̊p, ǂ̌AT ̕ǁAt T
	        ̕ǁA T̕, E T ̕ǁÂȂ
	       oAJ(c)AJ(),  (c)A   
	       ()AS̖_A؁ȀAÂʘHA邢ʘH, ւ̊K
	       iAւ̊KiAւ̂͂Aւ̂͂AՒdA, ʍA
	         A A   ܂܂͖xAXAnA~Ă钵
	       (c)A~Ă钵ˋ()AオĂ钵ˋ(c)Aオ
	       Ă钵ˋ()ACA_A

	         lp̕\𓾂邽߂ɂ͊p T ̕ǂ '+' 
	       g悢mȂB̃[Xł͐VV{
	       Â݂̂č\\̂ŒӁB

	       `O' R}hŐݒ肷邱Ƃ͂łȂB

	  effects
	         \  ̂߂̃OtBbNV{ݒ肷 (Wݒ
	       ``|-\\/*!)(0#@*/-\\||\\-//-\\| |\\-/'').  effects IvV
	       ͕Wݒ̑̕ɒn}`̂Ɏgp 1-29 
	       ̕B̕ dungeon IvVƓlɏ 
	       B

	       V {͈ȉ̏łF(c)A()A(ォ
	       E)A(Eォ獶)A@AJ̃tb VA
	       u [  ()Au[(E)A@hɗp 4 ̋L
	       Aݍ܂ꂽƂɎg 8 ̋LAɗp 9 
	       ̋LB 3 LN^ 3 񂩂ȂA̒S͂ 3
	       ~ 3 ̔z̒SɂȂB

	       ̃[Xł͐VV{Â݂̂č\
	       \̂ŒӁB

	       `O' R}hŐݒ肷邱Ƃ͂łȂB

	  extmenu
	       gR}hC^[tF[XALȃR}ḧꗗj[
	       o悤ɕύXBL[͂́AŌ Enter Kv 
	         ƈȊO͓`IȃC^[tF[Xƌ݊B tty


	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 32



	       C^[tF[XɂĂB(Wݒ̓It)

	  female
	       ``gender:female'' ̌ÂʖB `O' R}hŐݒ肷邱 
	       łȂB

	  fixinv
	           ^LƕƂ̑Ή͂̕ɒuĂω
	       (Wݒ̓I)BItɂƂ͕ɒuƂ̖̕
	       ^Lȍ~̋LƕƂ̑Ή 1 B

	  fruit
	       Ȃ̍D̉ʕɂȂł̖Oݒ肷(:fruit:man-
	       go) (Wݒ́uslime moldv)B NetHack ŎXg 
	        ÎIȖȌtłB slime mold(lolo)
	       ƐH~̂킭Hוɂׂ    B  apples( 
	       S)Aoranges(I  W)A pears(mȂ)A bananas(oii)A
	       melons ()  NetHack ɂ݂͂Ă̂ŁAݒ 
	       Ă͂ȂȂB

	  gender
	       J n̐(gender:male ܂ gender:female).	 ŏ̈ꕶ
	       Ŏw肷邱ƂłB ``male''  ``female'' IvV
	       w肵ĂĂA ``gender'' IvVD悳BW
	       ł͓K؂Ȑʂ_ɑIB `O' R}hŐ 
	       邱Ƃ͂łȂB

	  help
	       `/' R}hgĒׂĂ镨ɂĉ炩̏񂪂
	       A邩ǂq˂(Wݒ̓I)Bwvo
	       悤ɂ ``More info?'' Ƃvvgɔς킳Ȃ
	       Ȃ̂ŁAf𒲂ׂ邱ƂłB͋[
	       dvȏĂ܂mȂƂӖB

	  hilite_pet
	       ybg𓯎̓王oIɋʂ(Wݒ̓It)BeL
	       XgEBhE\ł color It̂Ƃɋ\   B
	       X̃^CgpƂ́An[g̋LybgɂB

	  horsename
	       Jn̔n̖O (:``horsename:Trigger'').  `O' R
	       }hŐݒ肷邱Ƃ͂łȂB

	  IBMgraphics
	       AAʁA㩂̕\ɗp镶ȂgłׂĒ`
	       ɁA IBM g ASCII Zbg炠炩ߗpӂꂽ
	       ݒgp (Wݒ̓It)B̃IvV͂܂^[ ~
	       iK؂ȃOtBbNLN^[悤ݒ肷B
	       Ȃ킿AȂ̃OtBbNŏ㏑ݒ肷Ƃ
	       ȂĂ͂ȂB

	  ignintr
	       u[N܂ފ荞ݐM𖳎(Wݒ̓It)B



	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 33



	  legacy
	       Q[JnɐbZ[W\(Wݒ̓I)B

	  lit_corridor
	       ڂ₠Ȃ̃LN^ĂɂČʘH
	       \ (Wݒ̓It)B

	  mail
	       Q[Ƀ[zB悤ɂ(Wݒ̓I)B

	  male
	       ``gender:male'' ̌ÂȂʖB `O' R}hŐݒ肷 
	       Ƃ͂łȂB

	  menustyle
	           ȃIuWFNgw肷Ƃ(Ƃ DropR}
	       h)ɗpC^tF[X̐Bl   tradional,  combina-
	       tion,  partial,	full   4 ̃^Cv̍ŏ̈ꕶw肷
	       B ``tradional''͌Âo[WŗBꗘpł̂ŁA
	       ̎ނ̓́AɑI񂾎ނɓĂ͂܂SĂ̕
	       mFB ``combination''͑I̎ނ
	       ͂邪AɓĂ͂܂镨mFőI
	       ł͂ȂAj[`őIB ``partial''͕̎ނI
	       ԂƂAɑSĂ̕\ꂽj[\B
	       ``full''͕̎ނ͂̂̕ɁAŏɕ̎  
	       j[\AꂩIނɓĂ͂܂镨̃j[
	       \B

	  menu_deselect_all
	       j[̑SĂ̍ڂIɂL[B	 Amiga,	 Gem,  X11,
	       ttyŎĂB(Wݒ `-')

	  menu_deselect_page
	       j[̂Aݕ\ĂSĂ̍ڂIɂL
	       [B Amiga, Gem, tty ŎĂB(Wݒ `\')

	  menu_first_page
	       j[̍ŏ̃y[WֈړL[B Amiga, Gem, tty  
	       ĂB(Wݒ `^')

	  menu_invert_all
	        j [̑SĂ̍ڂ̑IԂ𔽓]L[B Amiga, Gem,
	       X11, tty ŎĂB(Wݒ `@')

	  menu_invert_page
	       j[݂̌̃y[W̑SĂ̍ڂ̑IԂ𔽓]L[B
	       Amiga, Gem, tty ŎĂB(Wݒ `~')

	  menu_last_page
	        j[̍Ō̃y[WֈړL[B Amiga, Gem, tty Ŏ
	       ĂB(Wݒ '|')

	  menu_next_page
	       j[̎̃y[WֈړL[B Amiga, Gem, tty Ŏ 


	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 34



	       ĂB(Wݒ `>')

	  menu_previous_page
	        j[̑Õy[WֈړL[B Amiga, Gem, tty Ŏ
	       ĂB(Wݒ `<')

	  menu_search
	       j[ŌsL[B Amiga, Gem, X11 Ŏ   
	       B(Wݒ `:')

	  menu_select_all
	        j[̑SĂ̍ڂIɂL[B Amiga, Gem, X11, tty
	       ŎĂB(Wݒ `.')

	  menu_select_page
	       j[̂Aݕ\ĂSĂ̍ڂIɂ  L
	       [B Amiga, Gem, tty ŎĂB(Wݒ `,')

	  monsters
	       ̎ނ\̂ɎgpLN^w肷B (W
	       			    				 
	       ``abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ@ '&;:~]'').
	       ̕ dungeon IvVƓlɏBV{ 
	          ́A  ant  or other insect(a邢͂̑̍),
	       blob(ubu),	cockatrice(R J g  X),  dog  or  other
	       canine(܂͂̑̃CkȂ̓), eye or sphere(ڂ܂
	       ), feline(L), gremlin(O), humanoid(l),	imp
	       or  minor  demon(C  v    ዉ), jelly([[),
	       kobold(R{h), leprechaun(vR[), mimic(~~bN),
	       nymph(j  t),	 orc(I [ N),	 piercer(  h  ),
	       quadruped(l), rodent(l), spider(), trapper	 or
	       lurker  above(g b p [  ͓Vɐނ), horse or
	       unicorn(n܂̓jR[), vortex(Q), worm( [ ),
	       xan  or other mythical/fantastic insect(U܂͂̑̕s
	       vcȍ ),  light( C g),	zruty(Y  eB),  angelic
	       being(V g    ȑ), bat or bird(RE܂͒),
	       centaur(P^EX), dragon(), elemental(G^ ),
	       fungus or mold(JrRP), gnome(m[), giant humanoid(
	       ^l), invisible monster(Ȃ), jabberwock(W o
	       [EHbN), Keystone Kop(L[Xg[Rbv), lich(b`),
	       mummy(~C), naga(i [ K),  ogre(I [ K),	pudding	 or
	       ooze(X C), quantum mechanic(ʎq͊w), rust monster(K
	       ̉), snake(), troll(g[), umber hulk(Ao[n
	       N), vampire(opCA), wraith(CX), xorn(][), yeti
	       or ape or other large beast(CGeB܂͉܂͂̑̑
	        ȏb), zombie(]r), human(l), ghost(H), golem(S
	       [), demon(), sea monster(C̉), lizard(gJQ),
	       long worm tail(O[̐K), mimic(~~bN) `O' R}
	       hŐݒ肷邱Ƃ͂łȂB

	  msghistory
	        ^P ŌĂяo߂ɕۑĂŏs̃b Z [ W 
	       (Wݒ 20)B `O' R}hŐݒ肷邱Ƃ͂łȂB



	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 35



	  msg_window
	       ^P  ŕ\ߋ̃bZ[WAsł͂ȂSʂ
	       \ (tty ł̂ݎĂ)B

	  name
	       Ȃ̃LN^̖Oݒ肷(Wݒ͂Ȃ [U
	       [ )B	 -LƃLN^̐EƂ̓t(܂
	       -A -B -C -H -K -M -P -Ra -Ro -S -T -V -W ̂ǂꂩɕt 
	       ) ƂɂĐEƂݒ肷邱ƂłBEƂƂ -@ 
	       gpƁA_ȂЂƂIɑIB `O' R }
	       hŐݒ肷邱Ƃ͂łȂB

	  news
	       NetHack	 j [Xt@C΂ǂ(Wݒ̓I
	       )Bj[X̓Q[̍ŏɕ\̂ŁA `O' R}h
	       ݒ肷͖̂ӖłB

	  null
	       [   pfBÔ߂̃iLN^𑗂(Wݒ̓I
	       t)B

	  number_pad
	       ړ̂߂[yuhjklbn]̂ɐL[gp(W 
	       ̓It)B

	  objects
	            \   鎞Ɏgݒ肷 (Wݒ
	       ``])[="(%!?+/$*`0_.'')  ̕ dungeon IvV 
	       lɏBV{̏Ԃ́iƂȂ悤ȁj
	       ȕ́AAhAwցAAHAHAAA
	       @AA݁A΂܂͐΁A΂܂͒ASAA
	       tB `O' R}hŐݒ肷邱Ƃ͂łȂB

	  packorder
	       ̎ނ\Ƃ    w   (W    
	       ``")[%?+!=/(*`0_'').  ̃IvVɂ͂낢ȕ̎ނ
	       \̗ݒ肷Bݒ肳Ȃނ͈ȑȌō
	       ɕ\B

	  perm_invent
	       IȂ΁A݂̎ꗗɃEBhEɕ\Ă
	       B̋@\ĂEBhEVXeł̂ݗLB

	  pettype
	       vCLN^NX̃^Cṽybggpł
	       ɏ̃ybgw肷A܂͏̃ybgSw肵
	       Bwô``cat'', ``dog'', ``none'' łB `O' R
	       }hŐݒ肷邱Ƃ͂łȂB

	  pickup_burden
	         E ɂŎw肵ו̏dx (Unburdened,
	       Burdened, streSsed, straiNed, overTaxed, overLoaded) ȏ 
	       ȂƁAs邩ǂmFB (Wݒ `S').



	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 36



	  pickup_types
	       autopickup  IvVݒ肳Ă鎞ɏE̎ނw
	       (Wݒ͑SĂ̎)B

	  prayconfirm
	       _ɋFOɊmF(Wݒ̓I)B

	  preload_tiles
	       MSDOS̃veNg[hŁA^CQ[̎n߂ɂ炩 
	       RAM ɓǂݍłǂ𐧌䂷BIɂƁA^C
	       OtBbÑptH[}X܂邪A葽̃g
	       p (Wݒ̓I)B `O' R}hŐݒ肷邱Ƃ͂ł
	       B

	  pushweapon
	       ɕĂ鎞 `w' (wield: ) R}h 
	       g ƂAɎĂ\̕ɐݒ肷(W
	       ̓It)B

	  race
	       푰I(: ``race:human'')BWݒ̓_  
	       B `O' R}hŐݒ肷邱Ƃ͂łȂB

	  rawio
	       raw(cbreak  łȂ) [hgpāA荂ȏo͂Ɩ
	       NȂ͂ (MS-DOS ł̓v^Ȃɂ 
	         `^P' v^o͂̃gOƂ݂ȂĂ܂Ƃ)
	       (Wݒ̓It)B: DEC Rainbow ł͂ꂪÎƂ̓n
	        O Ab vĂ܂B `O' R}hŐݒ肷邱Ƃ͂ł
	       B

	  rest_on_space
	       Xy[XL[ `.'(rest: xe) R}hƂĎg p  
	       (Wݒ̓It)B

	  role
	       L  N ^ [  ^Cvݒ肷 (:``role:Samurai'')B
	       ``character''IvVƓłBEƂݒ肷邻̑ 
	       @ɂĂ``name''IvVQƂ̂ƁBʂ͐擪 1
	                   A   `r'  	 O  	 
	       B``Rogue''A``Ranger''A``random''邩łB

	  safe_pet
	       yb g(ybgƒm)UĂ܂̂h(Wݒ
	       I)B

	  scores
	       ŌɃXRAXg              
	       (F``scores:5 top scores/4 around my score/own scores'')B
	       ꂼ̍̕ŏ̕ (`t', `a', `o')݂̂KvłB

	  showexp
	       ŉsɌ݂̌o_\(Wݒ̓It)B



	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 37



	  showscore
	       ŉsɌ݂̃XRA\(Wݒ̓It)B

	  silent
	       [̃r[v炳Ȃ(Wݒ̓I)B

	  sortpack
	       ̖ژ^\Ƃޖɉו̓eבւ (W
	       ݒ̓I)B

	  sparkle
	       (₠Ȃ)U󂯁AɒRꍇɉʌʂ\
	        (Wݒ̓I)B

	  standout
	       ``--More--''𑾎ŕ\(Wݒ̓It)B

	  suppress_alert
	       Õo[WύXꂽ@\ɑ΂Ēӂ𑣂bZ[W
	       \Ȃ悤ɂ NetHack ̃o[Wݒ肷B (:
	       ``suppress_alert:3.3.1'')  ̂悤Ɏw肷 3.3.1 ȑO
	       ύXꂽ@\ɑ΂钍ӃbZ[W͕\ȂB

	  time
	       ŉsɃQ[Ōo߂Ԃ^[ŕ\(Wݒ 
	       It)B

	  timed_delay
	       ╨̂̈ړȂǁAʂ\邽߂ɂƎԑ҂
	       ƂAȃLN^ʂɑ邩Ƀ^C}[gp
	       B  (tty C^tF[Xɂ̂ݓKpB X11 C^tF[
	       X͏Ƀ^C}[gpBWݒ̓^C}[ɂ鎞ԑ҂
	       gݍ܂ĂȂ΃I)

	  tombstone
	       񂾂Ƃ΂\(Wݒ̓I)B

	  toptenwin
	       Q [I̕\Wo͂̂NetHack̃EBhE
	       \ (Wݒ̓It)B̃IvVݒ肷ƃEB 
	       h Ego[W NetHack ł͋NeEBhEƂ
	       ʂ̃EBhEɃXRAXg\BAXRAX
	       g̓Q[Iƃ^[~iEBhEɂ͎cȂB

	  traps
	       㩂̎ނ\̂ɎgpLN^w肷B(W 
	         ``^^^^^^^^^^^^^^^^^"^^^^'').  traps IvV͕W
	       ̑̕㩂`̂Ɏgp 1  22 ̕ 
	        B̕ dungeon IvVƓB
	       ̕ dungeon IvVƓlɏB

	       V{̏́A arrow trap(), dart trap(   
	       ), falling rock trap(◎), squeaky board(ޔ),
	       bear trap(F), land mine(n), rolling boulder  trap(


	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 38



	         ), sleeping gas trap(KX), rust trap(H
	       ), fire trap(΂), pit(), spiked pit(gQ炯
	        ), hole(), trap door(), teleportation trap(u
	       Ԉړ), level teleporter(ʂ̊Kւ̏uԈړ), magic
	       portal( @  ), web(̑), statue trap(),
	       magic trap(@), anti-magic field( @    ),
	       polymorph trap(ω)B

	       `O' R}hŐݒ肷邱Ƃ͂łȂB

	  verbose
	       Q[̃Rgڍׂɕ\(Wݒ̓I)B

	  videocolors
	       NO_TERM gpĂPCVXẽJ[pbgZbg
	       (Wݒ́u4-2-6-1-5-3-15-12-10-14-9-13-11v)BV{ 
	       Ԃ́AԁE΁EFEE}[^EVAEPEPԁE
	       P΁EFEPEP}[^EPVAB `O' R} 
	       hŐݒ肷邱Ƃ͂łȂB

	  videoshades
	       R i K ̗p\ȃOCXP[ݒ肷 (Wݒ PC
	       Nethack̂``dark normal light'')BQ[ʂɂ 
	       ꍇ́AR̃XP[𒲐Ă݂邱ƁBł܂
	       ȂA!colorĂ݂邱ƁB `O' R}hŐݒ 
	       邱Ƃ͂łȂB

	  windowtype
	       EChEVXegp邩ǂuttyv܂́uX11v
	       IiWݒ̓o[WɂjB `O' R}hŐ 
	       邱Ƃ͂łȂB

	  9.5.	EChEVXeŐpJX^}CYIvV

	       ȉ͂ȂIEBhD^Cv̓JX^}CY
	  ĕύX邽߂ɗplXȃIvV̐łB镶 
	   ͓Kɐ؂l߂BSẴEBhD^Cvɑ΂ĂS
	  ẴIvVLƂ킯ł͂ȂB̃IvV 
	   ꂽƂAEBhD^Cv̐ݒ󂯕tȂA
	  B󂯕tȂȂAPɖB  EB 
	  hD ^CvőΉĂIvV́AIvVꗗ\ (`O')
	  \Bꕔ̃IvV`O'R}hœIɕύXłB

	  align_message
	       bZ[WEBhEǂɒu(top, bottom, left, right)

	  align_status
	       Xe[^XEBhEǂɒu(top, bottom, left, right)

	  ascii_map
	       \ȂASCIILN^}bv\

	  color
	       ÁAA̍\vfJ[ŕ\


	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 39



	  eight_bit_tty
	       8rbgLN^(Ⴆ traps IvVŎw肵)
	       ̂܂܃^[~iɕ\(Wݒ̓It)B

	  font_map
	       }bvEBhE\tHg

	  font_menu
	       j[\tHg

	  font_message
	       bZ[W\tHg

	  font_status
	       Xe[^X\tHg

	  font_text
	       eLXg\tHg

	  font_size_map
	       }bvEBhE\tHgTCY

	  font_size_menu
	       j[EBhE\tHgTCY

	  font_size_message
	       bZ[WEBhE\tHgTCY

	  font_size_status
	       Xe[^XEBhE\tHgTCY

	  font_size_text
	       eLXgEBhE\tHgTCY

	  hilite_pet
	       ybgڗ悤ɕ\(Wݒ̓It)B̃IvV
	       ̐U镑͎gĂEBhEVXeɈˑBeLXg
	       EB  hȄꍇAPx]ɗpB^C̏
	       AʓIɂ̓ybg̋߂Ƀn[g}[N\B

	  large_font
	       傫tHgg

	  map_mode
	       w肳ꂽ@Ń}bv\

	  player_selection
	       LN^[IɃ_CAO{bNXmFʂp

	  popup_dialog
	       ͎Ƀ|bvAbv_CAO{bNXp

	  preload_tiles
	       ^Cɗ\ߓǂݍłBႦ΁AveNg  [


	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 40



	       hMSDOSł̏ꍇAQ[JnɃ^C RAM ɗ\ߓǂݍނ
	       ǂ𐧌䂷B\ߓǂݍނƃ^COtBbN̐\͌
	        邪A葽̃ (Wݒ̓I)B `O'
	       R}hŐݒ肷邱Ƃ͂łȂB

	  scroll_margin

	  splash_screen
	       NɃXvbVXN[\(Wݒ̓I)

	  tiled_map
	       \Ȃ^C}bv\

	  tile_file
	       Wݒ㏑ʂ̃^Ct@C̖O

	  tile_height
	       ^C\łł̃^C̍

	  tile_width
	       ^C\łł̃^C̕

	  use_inverse
	       Q[w肵Ƃɉʂ𔽓]

	  vary_msgcount
	       bZ[WEBhEɈxɕ\郁bZ[W̐

	  windowcolors
	       \ȂEBhEw肵OiF/wiFŕ\

	  9.6.	oQ҂NetHackvC邽߂̐ݒ

	       NetHack ͓A̒n}̂ɕW ASCII LN^[ 
	   g      肷邱ƂłBɂA MS-DOS ł
	  NetHack ͉܂͓_ZppΖڂ̕sRȐlł S
	   vC\łBvC[͂̉ʓǂݎVXeɊ
	  \ȒmKvŁA㉺EɈꕶړ@m 
	   ΂ȂȂ낤BʓǂݎVXě\͂m邱Ƃ
	  Ȃ艿lBvCOɂ̃KChubN\ɓǂ ΁A
	   ʂ̃CAEgǂȊ킩邾낤B܂A PC J[\
	  ̈ʒu˂~߂邱ƂłKvB͎̃LN ^
	  [ ̈ʒuĂB `@'͑̃q[}mCh\킷̂ɂp
	  ̂ŁÄʒuT̂`@'邾ł͕s\  
	  B ɁAȂĂʒu PC J[\̈ʒu̕Iȍs
	  ƌm点@\Kv낤B̋@\̓XN[Ŝɂǂ 
	  ȃACe邩𔻕ʂ̂ɕ֗łB

	       ꂽ[U[Ȃ defaults.nhC邱Ƃ͓Ȃ
	  AS҂͏Ђł܂dȂB NetHack ̑S
	     z z  	NHAccess.nh  t@C܂܂ĂB
	  default.nht@C̃t@CƓւ邱ƂɂAڂ̕s 
	  R ȐlvCł悤ȐݒɂȂBt@CC邱ƂQ
	  [̂̂ɊꂽȂAD݂ɍ悤ɐݒύX 


	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 41



	  vƂ낤B̂߂̐ NHAccess.nh ̂̂Ɋ܂܂Ă
	  BQ[̃ANZVreBɍłe^ݒ͈ȉ̂ 
	  :

	  IBMgraphics
	         I v V RgAEg邱Ƃɂ IBM O
	       tBbN𖳌ɂB

	  menustyle:traditional
	       ͉VXe𗘗p鏕ɂȂB

	  number_pad
	       ̔vO number-pad ʂ̊mFɗpB
	        A number_pad IvVItɂāA`I Rogue 
	       R}hgƁB

	  Character graphics
	       defaults.nh t@C̉̕ɂSẴLN ^ [ O 
	       tBbNݒRgAEgB̂قƂǂ NetHack
	       ̕WłAW ASCII LN^[pA̕\ g
	       LN^[ZbĝÂLN^[ŒuB
	       ̃LN^[͉ʓǂݎVXeς킹邾낤B

	  10.  _

	       NetHack ͐ݒɂāAȂ̋@Bɂ鍂_̈ꗗ܂
	   _҂̈ꗗ쐬B҂̐ݒɂȂĂꍇAQ[
	  Ō܂ŏIꍇ̃}V 1 ̃AJEgɂ 1	 
	   ̈ꗗɂ͍ڂȂBȂ̈ꗗɍڂĂ鑼̒N
	  荂_ƂA͂Ȃ̑O̓_荂 _
	     Ƃɂ̂݁Äꗗׂ̂ʒuɂȂ̖O
	  B_܂ōڂ邩RpCɐݒłB

	       _͎ɌolA험iABKƃQ[̏IɊ
	   ĂBQ[ꍇɂ͎ĂSzɂĒEo
	  łB|̖{̒ŎEꂽꍇɂ́AS[ 
	   Ă 90% Mhɓ`(`҂͖S[𔭌
	  ꍇɂ͎萔邱ƂmĂ)B]ĉɂɈ
	   ĉ^ΐcƂ邩AĂ̎_ŎĂ
	  镨ŏI邩͂Ȃ߂邱ƂłBꍇ͂ 
	   ɂ邱ƂłBĐc΂ɑ
	  邱Ƃł邩mȂB

	       PɌ_ł̍_ҁE_̈ꗗꍇɂ͂قƂ
	  ̃o[Wł nethack -s all Ɠ͂΂悢B


	  11.  T[h

	       NetHack ͕GœQ[łBS҂͐c邷ׂm
	  ȂƂɋCÂA|ɂÂĂ܂ȂB 
	   邱Ƃ͂ȂB`铴AɁuTv́uv[h
	  ꍇɂ́A_̈ꗗɍڂȂƂƂɑȂf b
	  g ƈւɑÕZ[ut@CcĂsgƂȂꂽ


	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 42



	  ̂łB

	       T[hɓɂ 2 ʂ̕@B1 ̓Q[̊J n
	   -X XCb`t邱ƂłB 1 ̓Q[̃vC
	  `X' R}h͂邱ƂłBT[hœ鑼̗_ 
	  _ȓǎҏNm߂ė~B


	  12.  NWbg

	       ŏ hack ƂQ[́Ao[NC UNIX ̃Q[ rogue
	  fƂĂB̃hLg̑啔 Michael C. Toy	 
	  Kenneth  C.  R.  C.  Arnold ̎ɂȂ A Guide to the Dungeons of
	  Doom(^̓Aւ̏) }Xp̂łB܂ꕔ
	    Ken  Arromdee    Further Exploration of the Dungeons of
	  Doom(^̓A̐[ւ̒T) ̂ĂB

	       NetHack ͕ǂ艽\l̐lX̎ɂĊꂽB
	  ̓Q[̊J̉ߒł̎ȏołB


	       Jay Fenlason  Kenny Woodland, Mike Thome, Jon Payne ̏
	  𓾂āAŏ Hack B

	       Andries Brouwer ̓vO啝ɏ Hack Ƃ
	    قȂQ[ɎdďグA UNIX }Vp(ȂƂ)3
	  o[W(1.0.1A1.0.2A1.0.3) Usenet Ŕ\B

	       Don G. Kneller  Hack 1.0.3  Microsoft C gp 	MS-
	  DOS  ֈڐA PC HACK 1.01e 쐬Bo[W 1.03g ł DEC
	  Rainbow ̃OtBbNT|[gAďȂƂ 4 ̃o
	  [W(3.0A3.2A 3.51A3.6)쐬B

	       R.  Black    PC  HACK	3.51   Lattice C gp Atari
	  520/1040ST ֈڐA ST Hack 1.03 쐬B

	       Mike Stephenson ͂̂낢ȃo[WĂ 1  
	   A̒ǉvfƍ킹 NetHack o[W 1.4 쐬
	  Bɔނ͉l̐lXɍƂ𕪒S NetHack 1.4 ̊g
	  fobOsA NetHack o[W 2.2  2.3 𔭕\B

	        ɂ̌AMike  Ken Arromdee, Jean-Christophe Collet,
	  Steve Creps, Eric HendricksonAIzchak MillerAJohn RupleyA  Mike
	  ThreepointAJanet Walz ܂ރ`[𗦂ăQ[̑啝ȏ
	  sȂA NetHack 3.0c 쐬B

	       NetHack 3.0  Eric R. Smith ɂ Atari ցA Timo  Haku-
	  linen	    OS/2 ցA David Gentzel ɂ VMS ֈڐA
	  B 3 l Kevin Darcy ͂̌͊J`[ɉA	3.0
	  ̂̌̂̉ł쐬B

	       Olaf  Seibert    NetHack  2.3  3.0  Amiga ֈڐAB
	  Norm MeluchAStephen SpackmanAPierre Martineau  PC NetHack 3.0
	     ̃I[o[C[`݌vB Johnny Lee  NetHack


	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 43



	  3.0  Macintosh ֈڐABނ͑̂܂܂ȓA̎傽Ƃ
	   PCAMacintoshAAmiga ̈ڐAł̊g𑱂A 3.0 ̂̌̂
	  ̉ł쐬B

	       Mike Stephenson[_[ƂAIzchak MillerJanet Walz̏
	     	 Ken Arromdee, David Cohrs, Jean-Christophe Collet,
	  Kevin Darcy, Matt Day, Timo Hakulinen, Steve Linhart, Dean Luick,
	  Pat Rankin, Eric Raymond, Eric Smith ܂ސ`[ 3.0̓O
	  IȌsȂBނ̓Q[fUCč\zAR[h 
	   B_WAVfBXvCAꂼ
	  LN^[̓ʂ̃NGXgAVGhQ[Ƃ̑̑ 
	  ̐VvfǉA NetHack 3.1𐧍삵B

	       Ken  Lorber,  Gregg Wonderly, Greg Olson  Richard Addison,
	  Mike Passaretti, Olaf Seibert ̏؂ Amiga p NetHack 3.1
	  쐬B

	       Norm  Meluch  	 Kevin	Smolkowski  Carl Schelin, Stephen
	  Spackman, Steve VanDevender, Paul Winner ̏؂   NetHack
	  3.1  PC ɈڐAB

	       Jon Watte  Hao-yang Wang  Ross Brown, Mike Engber, David
	  Hairston,  Michael  Hamel,  Jonathan	Handler,  Johnny  Lee,	Tim
	  Lennan, Rob Menke, Andy Swanson ̏؂ MPW p Macintosh
	  p NetHack 3.1 쐬B̍쐬ɁABarton House  Think  C
	  pB

	       Timo  Hakulinen	  NetHack  3.1   OS/2 ɈڐAB Eric
	  Smith  NetHack 3.1  Atari ɈڐAB Pat Rankin	   Joshua
	  Delahunty  ̏؂ VMS  NetHack 3.1 쐬B Michael
	  Allison  NetHack 3.1  Windows NT ɈڐAB

	       Dean Luick  David Cohrs ̏؂ X11  p	 NetHack3.1
	    B Warwick Allison  Atari p NetHack ̃^Co[
	  W쐬Bނ͌Ƀ^CJ`[Ɋ񑡂A^CT |
	  [g͑̃vbgtH[ɂǉꂽB

	       Michael	Allison,  Ken Arromdee, David Cohrs, Jessie Collet,
	  Steve Creps, Kevin Darcy, Timo  Hakulinen,  Steve  Linhart,  Dean
	  Luick,  Pat  Rankin, Eric Smith, Mike Stephenson, Janet Walz, and
	  Paul Winner Ȃ 3.2̊J`[ o[W 3.2  1996	 N
	  4 Ƀ[XB

	       o [W 3.2 ͊J`[Ă 10 N̂̂
	  Bނ̃Q[ւ̍vɂċLƁA13 l̏̊J`[
	   S͂̃[X̊Jn̍ŏ̎_܂Ń`[ɎcĂB
	  A 3.1.3  3.2 ̊ԂɁAJ`[̑nn҂̈lł Izchak
	  Miller mƐffASȂB̃[X͊J`[
	  шڐA`[ނɕꂽB

	       NetHack 3.1  3.2 ̎ɁAQ[ɔMlQ[ 
	  Ɏg̕ύXuvɔ\B




	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 44



	       Tom  Proudfoot  Yuval Oren  NetHack++ 쐬A͂
	   NetHack-- ɉꂽBƂ͓  ɁAStephen  White	 
	  NetHack  Plus	  쐬B Tom Proudfoot ͌ NetHack Plus 
	  NetHack-- 𓝍A SLASH 쐬B  Larry  Stewart-Zerba	 
	  Warwick  Allison ͎rVXeǂ Wizard Patch 쐬
	  B Warwick Allison  NetHack  Qt C^[tF[Xg 
	  ɕύXB

	       Warren  Cheung   SLASH  Wizard Patch 𓝍 Slash'em
	  쐬A Kevin Hugo ̗͂؂āA̗vfǉB  Kevin
	  ͌ɊJ`[ɉÃACfA NetHack 3.3 ɓ
	  B

	       3.2 ̍ŏIo[W̓oOCłł 3.2.3 łB 
	  2000	N  ΍̂߂ 3.3.0 Ɠ 1999 N 12 ɔ\
	  B

	       Michael Allison, Ken Arromdee, David Cohrs,  Jessie  Collet,
	  Steve	 Creps, Kevin Darcy, Timo Hakulinen, Kevin Hugo, Steve Lin-
	  hart, Ken Lorber,  Dean  Luick,  Pat	Rankin,	 Eric  Smith,  Mike
	  Stephenson,  Janet  Walz, Paul Winner Ȃ 3.3 ̊J`[
	  1999 N 12  3.3.0A 2000 N 8  3.3.1 [XB

	       o[W 3.3 ͑̐Vvf񋟂B܂A푰ƐE 
	   ŏ̃o[WłBEƂƂẴGt͍폜A
	  ̈ƂȂB܂Ah[tAm[AI[N푰ƂĒ 
	   ꂽBNƃW[̓EƂƂĒǉꂽBɁA
	  ɏ邱Ƃoŏ̃o[WłAꂽS 
	  o OEFuTCgŌ\ŏ̃o[WłBoOXg
	  ɐLтĂɂւ炸A 3.3  1 NƂŏ\ 
	  肵ĂƂؖB

	       3.4 J`[ Michael Allison, Ken Arromdee, David Cohrs,
	  Jessie Collet, Kevin Hugo, Ken Lorber, Dean  Luick,  Pat  Rankin,
	  Mike Stephenson, Janet Walz, and Paul Winner ŊJnA NetHack
	  3.4.0 [XO 2002 N 3   Warwick Allison B

	       o[W 3.3 ƓlɁAlXȐlX NetHack ̐FXȃvb
	  gtH[ւ̈ڐAsȂĂꂽB

	       Pat Rankin  3.4  VMS ւ̈ڐASB

	       Michael Allison  MS-DOS ł NetHack 3.4 ǗĂ B
	  Paul Winner  Yitzhak Sapir `ĂB

	       Dean  Luick, Mark Modrall, Kevin Hugo  3.4  Macintosh 
	  ̈ڐAƊgSB

	       Michael Allison, David Cohrs, Alex  Kompel,  Dion  Nicolaas,
	  Yitzhak  Sapir  3.4  Microsoft Windows vbgtH[ւ̈
	  AƊgSB Alex Kompel  Windows łւ V   O 
	  tBbNC^[tF[X񋟂B




	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 45



	       Ron Van Iwaarden  3.4  OS/2 łǗĂB

	       3.3.1  ŕ Amiga ւ̈ڐAƊg Janne Salmijarvi 
	  Teemu Suikki sĂB

	       3.3.1 ŕ Atari ł Christian ``Marvin'' Bressler 
	  ǗĂB

	       Ken  Lorber  ɂĊǗĂ NetHack ̃EFuTCg
	  http://www.nethack.org/ ɂB

		       - - - - - - - - - -

	       Xlbg[N̐Êǂ悤ȂAAQ[̉
	   菕悤ƂĂƂ킯悤ȏC𑗂Ă悱
	  BA̐_X́AƂɂ͂}̂łł׈ȘA 
	  ̖O𓴌A̎傽̈ꗗƂĂɋL̂B

		   Adam Aronow		 Helge Hafting		 Mike Engber
		   Alex Kompel	     Irina Rempt-Drijfhout	 Mike Gallop
		  Andreas Dorn		 Izchak Miller	       Mike Passaretti
		   Andy Church		 J. Ali Harlow	       Mike Stephenson
		  Andy Swanson		   Janet Walz		 Norm Meluch
		  Ari Huttunen		Janne Salmijarvi	Olaf Seibert
		  Barton House	     Jean-Christophe Collet	 Pat Rankin
	       Benson I. Margulies	 Jochen Erwied		 Paul Winner
		    Bill Dyer		  John Kallen	      Pierre Martineau
		Boudewijn Waijers	  John Rupley		 Ralf Brown
		    Bruce Cox		  John S. Bien	       Richard Addison
		 Bruce Holloway		   Johnny Lee	       Richard Beigel
		 Bruce Mewborne		   Jon W{tte	      Richard P. Hughey
		  Carl Schelin		Jonathan Handler	  Rob Menke
		   Chris Russo		Joshua Delahunty	Robin Johnson
		   David Cohrs		 Keizo Yamamoto	       Roland McGrath
		 David Damerell		   Ken Arnold	      Ron Van Iwaarden
		  David Gentzel		  Ken Arromdee		Ronnen Miller
		 David Hairston		   Ken Lorber		 Ross Brown
		   Dean Luick		 Ken Washikita	       Sascha Wostmann
		    Del Lamb		  Kevin Darcy		Scott Bigham
		  Deron Meranda		   Kevin Hugo	       Scott R. Turner
		  Dion Nicolaas		  Kevin Sitze	      Stephen Spackman
		 Dylan O'Donnell	Kevin Smolkowski	Stephen White
		   Eric Backus		  Kevin Sweet		 Steve Creps
		Eric Hendrickson	  Lars Huttar		Steve Linhart
		  Eric R. Smith		 Mark Gooderum	      Steve VanDevender
		 Eric S. Raymond	  Mark Modrall		Teemu Suikki
		  Erik Andersen		Marvin Bressler		 Tim Lennan
		Frederick Roeber	  Matthew Day	       Timo Hakulinen
		   Gil Neiger		  Merlyn LeRoy		  Tom Almy
		   Greg Laskin		Michael Allison		  Tom West
		   Greg Olson		  Michael Feir		Warren Cheung
		 Gregg Wonderly		 Michael Hamel	       Warwick Allison
		  Hao-yang Wang		Michael Sokolov		Yitzhak Sapir



	  NetHack 3.4					     March 20, 2002





	  NetHack Guidebook						 46



	  uhƐi͊eЂ̏W܂͓o^WłB























































	  NetHack 3.4					     March 20, 2002



