









				 |̖{ւ̏
			       (NetHack KChubN)


				   Eric S. Raymond
		     (o[W 3.4 ̂߂̍L͈͂ȍZƊg[)



	  1.  ͂߂

	       ŋ߁AȂ͓X̎dɖȂAh鎩
	  CBŋߐAȂ閲͒TA݁A\RA 
	   ̂łAȂɂ̗͂R͂Ƃ͂킩
	  BȂ̖͂ۂɂ͐܂Ă̂ƌ 
	    āA Ȃ܂łɂĖY悤ƂĂ̂ł͂Ȃ
	  AƎvBAȂ͔ыNāA̒̓Â 
	  p ̌ɐł悤ɌAŋ͂ȉ̑NȋL
	  Ƃđ吺ŋ񂾁BȂ̖ɏove͖{Ȃ̂ 
	  ?	 閈ɁApЂ̋߂̕svcȓAɓƂ~Ȃ
	  BłAȂ͂̂悤ȍlAAɓċA 
	   lX̘bvoƂœǂoBA
	  Ȃ͖̒ɏoĂsvcȏꏊ{߂Ƃv} 
	   ȂȂBƂĂA`҂͍ŏɂ̓ʂĂ
	  Aɖ߂ė鎞̕TɂȂĂ悤Ɍ 
	  B߂ėȂl͊FAPɂ܂`𑱂Ă邾Ȃ̂ł?


	       Őq˂邤ɁAȂ͂\ɂBCF_[
	   Ƃ̂Aɓ邱ƂłȂA΂炵
	  Y炷ƌ̂BȂƂ`ł́A 
	   ̂͐_s̑̂ƂĂ炵B
	  ͋|̖{̉[AQwi̒JzǂɂƂ 
	  \ łB`𕷂uԁAȂ͎ɂ͓AɓĔނ̘b
	  Ă閂{߂ׂ[Ŗm̂Ȃ炩̗R 
	  m MBȂ͂Ƃ̗͂^łȂĂAȂƂ`
	  kn̂̋VlɂȂ̋zŔ荞߂邾낤ƍl B
	   ̒ŏoĂ낵AsvcȉɏoƂł΂Ȃ
	  łBȂ͒n̈hōŌ̏h΍B h
	   ǂɌfꂽ̃IbYΉقǁAȂ͈ӋC
	  B


	       NƁAȂ͏iW߁AȂ͓AɌė
	   B̗𑱂ċ|̖{ւ̓Ñ̈
	  ւƂǂ蒅BXĂ̂œŃLv   
	  A ̖͍LXƂ̉ŖɏABȂ͓
	  W߁Aƒnł̍ŌɂȂ邩ȂHς A
	  AւƓĂB



	  NetHack Guidebook						  1





	  NetHack Guidebook						  2



	  2.  Ȃ芪

	        ĂȂ NetHack ƂQ[n߂邱ƂɂȂB
	  Ȃ̖ړI͎Ă̕W߁ACF_[̖ o
	  Aɂ͂̋|̖{琶ĒEo邱ƂłB

	       `ɂ邢낢ȍɑΉ邽߂̊e̔\͂͂́A
	  Ȃ̐ƏCsɂĕωB

	       lÊw(Archeologist) ͓Aɂđ̒m   
	  B ̂ߑf蓴Ał̕sȎԂ؂蔲邱Ƃ
	  Bނ͊wpÎ߂̒TsɓKďo 
	  B

		 ؐl(Barbarian) ͉nĂmłA퓬̂
	  ߂ɒbĂBނ͗ނ܂ȗ͂̋Avȍ 
	  Ƒ傫ȗ莝݂̌̂ĒTɏoB

		 A l(Caveman   Cavewoman)͂Ƃ킯͂Ă
	  AVΊ펞ɎgꂽďoB

	       (Healer)͈p򕨂ɂĐʂĂBC񕜂
	   Aɂa炰AAł𒆘a肷鍁
	  򑐂ɂďڂBĊgĐ̌NԂ 
	   łBނ͊JƈƂĂȂ悢V𓾂āA
	  AɓĂB

	       Rm(Knight) ͋Rmɒł邱ƂƖhقǗD 
	  邱ƂƂ_ŁAʂ̐mƂ͋ʂB

		 N(Monk)  ͏C҂łAiȓ̓IKƐ_IP
	  ɂāAȂłĝƓ悤ɐ키Ƃo B
	   N͖hȂA@コ邱ƂŖߍ킹Ă
	  B

	       mƓm(Priest  Priestess) ͐E̐młAƖh
	   @̋ƂgĐ`L߂Ƃ鐹młBF
	  ʂĐ_ƌ\͂ɂAނ͂΂Ί瓦邱Ƃ 
	  cAF͊炷ƂB

		W[(Ranger) ͂قƂǐXZ݂ƂAA͏X
	  ȂBAނ͒ǐՏpBsƋɁA|p̒B l
	  łB

		 (Rogue) ͕qŐgBƂɒD_łA㩂
	  łɏڂBނ̒͊PłA͔ȒƂȂB

		(Samurai) ͕̓{̐s̕lłBh͌y 
	  ŐĝȂɏGłĂȀȂ܂ꂽ  召  2{̓
	  ттĂB

		όq(Tourist) ͑z̋(ɍœKł)ƃN  Wb g
	  J[ hAʂ̐HAn}AčȃJďoB
	  Ƃǂ͎̉ʐ^ɎB̂̂łB


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						  3



		L[(Valkyrie) ͗EȏmłBߍȃXJW
	  i rA̍Xňޏ͊拭ŁAɂςAgB
	  ƂƍIgɂĂB

		@g(Wizard)͖p̒mƂɑIєꂽ@̓ 
	   ĂAɂ̖@wɑ΂ēɑw[B͎セ
	  ŊȒPɑł|悤Ɏv邪Aoς񂾖@g͋ 
	  GłB

	       ܂ALN^[̎푰IԂƂłB

		h[t(Dwarf)  ͐lԂGtA肵
	  ̂ŏvłBh[t̒ڂׂ͍̌@ƋH 
	   IZpłBh[t̖h̓Gt̃~XhƓƂ܂
	  ͂Ȃ܂łAɎiłB

		Gt(Elf)  ͋@qƐvAĉsqȊo  
	  B   ŋNǂȍׂȂƂނ̖ڂ𓦂邱Ƃ͂ł
	  BElC̔ނ̎Ɩh͗DGȂ̂łB

		m[(Gnome)  ̓h[tɏAh[tƎ
	   Bm[͏ň@tƂĒmAxƊ댯ŖĂ
	  閧̒nB|̖{ɍĂ邱ƂŒmB

		l(Human)  ͒nōłʓIȎ푰ŁA䂦ɑ̎푰Ɣ
	  r 鎞̊ƂȂĂBʂȔ\͎͂ĂȂA
	  EƂŐ邱ƂłB

		I[N(Orc)  ͎cŖ؂Ȏ푰ŁA(̃I[N܂)
	   ĂBɁAI[N̓GẗႢ䂦ɌA
	  킴킴@ĎEƂBI[Nɂč 
	  hƕ͈ʓIɕiB

	  3.  ʂɕ\̂̈Ӗ

	       ʏɂ͂Ȃ݂铴ÅKłłɒTI
	  n}ƁAŖڂɂĂBɐ[Ti߂ 
	  AēA͂̎pɂȂ̑Ỏʂɖ炩ɂĂB

	       NetHack	̑cł rogue ŏɌꂽƂÃXN[
	  w̓Rs[^t@^W[Q[̒łSƓ   
	   BȗXN[w͗OIȂ̂ƂނW
	  ƂȂBNetHack ͂̂΂炵`󂯌płB^I 
	  p   R}h͂Aʂ͂ŕ\eLXgAhx
	  `[Q[Ƃ͈قȂANetHack ̃R}hׂ͂ 1  2  
	   ̃L[͂ŗ^Ǎʂ͉ʏɃOtBJɕ\
	  Bʂ͍Œ 80  24 s̑傫Bȏ 
	  傫Ă 80 ~ 21 ̗̈悾n}̕\ɎgB

	       NetHack ͓_≹̏؂āAڂ̕sRȐlłv
	  CłBڂ̕sRȐl̂߂NetHack̐ݒ@ɂẮA
	  ̃hLgŌqB




	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						  4



	       NetHack ̓vC邽тɐVA쐬B̂߉
	  Q[ɏƂ̂҂ɂA܂̃Q[͊y 
	  ɖ̂ƊB

	       NetHack ͂܂܂ȕ\̃IvV񋟂BIvV
	  Ȃ̃n[hEFA\tgEFA̔\͂ɈˑAvbg tH[
	     ܂܂łB܂܂ȃRpC̃IvV͎s
	  t@CꂽƂɂ̂݉\ƂȂBmNLN^C ^
	  tF[ XAJ[LN^C^tF[XA^CƌĂ΂鏬
	  GpOtBJC^tF[X 3 ̕\@ B  2
	   ̃LN^C^tF[X̓tHg𑼂̕ɒu邱
	  ł邪AWݒł W ASCII LN^pđSĂ \
	    B ܂܂ȕ\̃IvV̓Q[eɂ͉e^
	  B^CF̓KChubNŕ\LłȂA͑SẴv b
	  g tH[ɋʂł͂Ȃ̂ŁAQ[ɕ\̂̐Ƃ
	  Ă̓mNLN^fBXvCŕ\W ASCII L
	  N^pB

	       NetHack	ŉNĂ̂𗝉ɂ́A܂ NetHack 
	  ͉ʂǂȂĂ̂𗝉ȂĂ͂ȂȂBNetHack  
	   ́AeLXgAhx`[Q[ɂuȂ́cv
	  悤ȕ͂̑łB} 1  NetHack ł͉ʂɉ\ 
	   ̈łBʂǂ̂悤ɕ\邩̓vbgz[
	  ˑB

	  --------------------------------------------------------------------
	   The bat bites!

	       ------
	       |....|	 ----------
	       |.<..|####...@...$.|
	       |....-#	 |...B....+
	       |....|	 |.d......|
	       ------	 -------|--



	   Player the Rambler	  St:12 Dx:7 Co:18 In:11 Wi:9 Ch:15  Neutral
	   Dlvl:1 $:0  HP:9(12) Pw:3(3) AC:10 Exp:1/19 T:257 Weak

	  --------------------------------------------------------------------
				      Figure 1


	  3.1.	Xe[^Xs(ʂ̉)

	       ʂ̉ 2 sɂ́AȂ݂̌̏Ԃ\Í̂悤ȏ 
	   fЂ܂܂ĂBǂ炩̍sʂ̕ȂƂ
	  S邱Ƃ͂łȂȂBȉɏԂ낢 
	   ڂӖ̂qׂ (RtBO[VɂẮA
	  ȉɈꗗĂԂڂׂ̂Ă\Ƃ͌ 
	  )B




	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						  5



	  OƃN(Rank)
	         ̃LN^(q̌oxɊÂ)Eƕʂ̓
	       B

	  (Strength)
	       Ȃ̃LN^̗͂̋̒lłA6 ̊{Iȑ
	       1   łBlԂ̃LN^[̏ꍇC͂̋ 3  18
	       ̊Ԃ̒lƂB̑̏ꍇC̐z邱Ƃ (
	         18/xx ̂悤ȓʂȗ͂𓾂邱ƂA@̗͂ʂ
	       z\͂^邱Ƃ)B͂̋̒l傫 
	       ǁAȂ̗͂͋B͎͂̋͗dǂꂾ܂
	       A킢łǂꂾ̃_[W^邩Aǂꂭ炢ו^
	       邩ɉeB

	  f(Dexterity)
	       f͐킢ɂ閽A㩂𓦂\AĂ̑
	       qKvƂd╨ɊpɈ邩Ȃǂ̂Ƃ
	       ɉe^B

	        v(Constitution) ϋv͉͂₻̑̈ɂX^~
	       ȉՂ񕜂\͂ɉeB

	  m(Intelligence)
	       m͎͂\͂▂@ǂޔ\͂ɉe^B

	  (Wisdom)
	       (ɖ@)IȌoɂ蓾B@̃Gl
	       M[ɉeB

	  (Charisma)
	       ͂͂̐Ȃɑ΂ĂƂԓxɉe^B
	       ɓX傪iɉeB

	  (Alignment)
	       ɂ   (Lawful),   (Neutral),
		(Chaotic) B΂΁A͑PAׂ͈ł 
	       邪A@ƓɈvƂ͌ȂBȂ̑
	       ̉̂Ȃɑ΂锽ɉe^BĂ
	       ͍DIł͂ȂA΂̑ɑ΂Ă͂Ȃ݂̑ɑ΂
	       ɂ߂čDIł炵B

	  K(Dungeon Level)
	       ǂꂾẢ[܂ōsBl 1 ŁA A
	       [sقǑ傫ȒlɂȂB̊K͓ʂŁA
	       ͂ȂOŎʂBCF_[̖͒n 20 K[
	       ̂ǂɂƍlĂB

	  (Gold)
	       ҂ɏĂ݂̐łBȂǂɉB͊
	       ɓĂȂB

	  ̗(Hit Points)
	       ̗͂̌ݒlƍőlłB̗͂͂Ƃǂꂾ̃_[W
	       ƎʂB킢ŏقǒl͌B̗͂͋x


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						  6



	       ▂@̃ACeɂ񕜂łBʂ̗̒̐͑
	       ̂Ƃ蓾őlłB

	  (Power)
	         Ɏg͂łB͎̂ɕKvȐ_̗
	       (mana: }i ) ǂقǂ邩B͂܂x邱
	       ɂ񕜂B

	  hl(Armor Class)
	       FDIȐ̍UhǂقǐH~߂邩
	       lłBقǖh͗LłAhl̒l
	       ɂȂ邱Ƃ\蓾B

	  ol(Experience)
	       ݂̌oxƌolłB`iނƌol𓾂邱
	       łBol̍vl܂ŒBƁAox
	       オBoςނɂA킢B@̍Uɂς
	       悤ɂȂB̃o[Wł͌ox\
	       B

	  (Time)
	       o߂^[łB time IvVÎƂɕ\
	       B

	  (Hunger status)
	       ݂̕łB  (Satiated) 
		ӂӂ(Fainting) P ܂ł̒lƂBʂȂ\
	       ȂB

	       ̑ɂԂ\̌ɕ\邱Ƃ
	  ȂBĂƂɂ ConfAaĈƂɂ  FoodPois
	  ܂ IllAڂȂƂɂ BlindA῝򂪂Ƃ StunA
	  oĂƂ Hallu ƕ\B

	  3.2.	bZ[Ws(ʂ̏㕔)

	       ʂ̍ŏs͎oIɕ\łȂƂ郁bZ[W
	   ߂ɎgBŏs``--More--''\ꂽƂ́Â
	  ɂɃbZ[WĂ邯ǂ݂̃bZ[W܂m 
	   ǂނ悤ĂƂƂłB̃bZ[Wǂނ߂
	  ͒PɃXy[XL[΂悢B

	  3.3.	n}(ʂ̂̑̕)

	       ʂ̂̑́̕AȂ݂Kł܂łɒTI
	   ̒n}łBʏ̃V{͂ꂼꉽ\Ă
	  B\V{̂́A܂܂ȃOtBbN I
	  v Vݒ肷邱Ƃɂĕς邱ƂłBłȂ
	  Wݒ̃V{pBɕWݒ̃V{̈Ӗ 
	  B

	  -  |
	       ̕ǁA܂͊JA܂͕ (|)B



	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						  7



	  .    ̏AXA܂͔̂ȂoB

	  #	ʘHAS̖_A؁A邢͑䏊̗(䂪Cv
	       gĂƂ) ܂͒ˋ

	  >    Ki:̊Kւ̒ʘHB

	  <    Ki:̊Kւ̒ʘHB

	  +    A܂͊wKł邩Ȃ̏ꂽ@B

	  @    Ȃ̃LN^[A܂͐lԁB

	  $    ݂̎RB

	  ^    (ЂƂєΕ\)B

	  )    B

	  [    ܂͂Ȃ炩̖hB

	  %    H(qIłƂ͌Ȃ)B

	  ?    B

	  /    B

	  =    wցB

	  !    B

	  (    ֗ȃACe(͂AAvc)B

	  "

	  *	΂܂͊(MdȂ̂ȂAl̂Ȃ̂
	       Ȃ)B

	  `    A܂͒B

	  0    SB

	  _    ՒdA܂͓S̍B

	  {    

	  }    ܂A܂͖xA܂͗n̊CB

	  \    ؂ȉ

	  a-zA-Z т̑̃V{
	       ̕Ƃ̑̂̃V{͋|̖{̂낢
	       ȏZl\Bނ͕s@ňӂɖĂ邩m
	       ̂ŌxȂ΂ȂȂBAƂɂ͉̎菕ɂȂ


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						  8



	       ƂB

	  I    ̃}[N͓A邢͂̑̌ȂŌɂ
	       ꏊɕ\B͂łɈړĂ邩Ȃ
	       Ƃɒӂ邱ƁBł'F''m'̃R}h֗낤B

	       ̃V{ׂċLKv͂ȂB`/' R}hł
	  ̃V{\m邱Ƃł(ڍׂ͎̍ Q   
	  )B


	  4.  R}h

	       R}h 1  2 ̃L[͂sƂŎsB
	  ̃R}hAႦ``search''͂ȏ NetHack ɏ^
	   KvȂB̃R}h͗ႦΕgp镨Ȃǂ̏
	  ɗ^KvB炳ȂKvƂR}h 
	  ΂ẮA NetHack ͑Ij[̓R}hCvvg
	  ̂ꂩ\Bǂ炪\邩͎Ƃ menustyle I
	  vVǂ̂悤ɐݒ肵ɂB

	       Ⴆ ``What do you want to use? [a-zA-Z ?*]'' Ƃ`
	  ₪悭邪A͂ȂɎĂ镨̂ǂIԂ 
	  q ˂̂łB̎ɂāua-zA-Zv͂ȂIׂ鎝
	  ̖ژ^LłB `?' ͂Ƃ̖̕ژ^ꗗA
	   X ̋L\Ă̂m邱ƂłB̗ł́A`*'
	  B͈ꗗɂ͕\Ă炸Aʏ킻̃R}hł̎g p
	   z肵ĂȂłAgƎv΂IԂƂł邱
	  ĂB`*' ͂ƂׂĂ̖̎ژ^\A X
	   ׂĂɂĂ̖ژ^Lm邱ƂłBlČ
	  ̃R}hgȂƂɂƂɂ ESC L[΃R}h
	  I邱ƂłB

	       R}h̒ɂ́ȂOɐ͂邱ƂŉJԂ
	  Ƃł̂BႦ΁u10sv 10 ̒T\ĂB
	   number_pad IvVÎƂɂ͐̑O `n' ͂
	  Ȃ΂ȂȂB܂̗ł͑Ɂun 10svƓ͂Ȃ
	   ȂȂBs邱ƂӖȃR}hł͖͂
	  BɁAړR}h̑Oɓ̕(vtBbNX)t 
	   ƂɂĂ܂܂Ȉړ@Ƃ邱Ƃł(q)BJ
	  񐔂vtBbNX߂ɂ ESC L[΂悢B

	       R}ḧꗗ͂Ȃ蒷AQ[ `?' R}hg p
	   ăwvj[邱ƂɂAłR}ḧꗗ
	  ƂłBȉ̓R}ḧꗗłB

	  ?    wvj[: \\ȃwvʂ̂ 1  \  
	       B

	  /    V{Ӗ邩Bw肷ɂ͏ꏊA
	       ̓V{(邢͒PS)͂邩I邱Ƃ
	       B




	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						  9



	          w  ́A K    u܂ŃJ[\ړĂ
	  `.'A`,'A`;'A`:'̂ǂꂩƂɂčsȂB `.' 
	  ƁAI񂾏ꏊŕ\ĂV{̐\A help
	  IvVIȂꍇɂĂ``More info?''(ڍׂ?)Ǝ
	   Aꂩ炳ɑ̏ꏊw肷邱ƂłB `,'
	  ƁAV{̐\邪Aڍ׏͕\ȂB `;' 
	    ƁA ڍ׏͕\ꂸAɑ̏ꏊ̎włȂB
	  `:'ƁA(Ȃ)mFȂŏڍ׏񂪕\Bꏊ
	  IԎ ESC L[ƂɂẴR}h𒆒fłA `?'
	  Ƃǂ̂悤ɓ삷邩̊ȒPȐ\BꏊłȂ 
	  Ow肵ꍇ́Aɂ̖Oɑ΂ǉ񂪕\B

	  &    R}h̓B

	  <    ̊K֍s(Ki͂ɂƂ)B

	  >    ̊K֍s(Ki͂ɂƂ)B

	  [yuhjklbn]
	       w 肵ֈi(} 2 Q)B̕ɉƊ
	       Ă邩oĂƂ́Aړ̂ł͂ȂƐ키
	       ɂȂBƐ키ƂɂȂ̂͂̈ړ̃R}h
	       B̑̃R}h(q)́uSvłB

				   y  k  u	      7  8  9
				    \ | /	       \ | /
				   h- . -l	      4- . -6
				    / | \	       / | \
				   b  j  n	      1  2  3
					     (number_pad ÎƂ)

					 Figure 2


	  [YUHJKLBN]
	       ǂɓ˂邩ɏՓ˂܂Ŏw肵ɐiށB

	  m[yuhjklbn]
	       vtBbNX: EA (ƂɉƎv
	       ĂĂ)肹ɈړB

	  F[yuhjklbn]
	       vtBbNX: (ɉƗ\zĂ邾ł)
	       Ɛ키

	  M[yuhjklbn]
	       vtBbNX: E킸ɉֈړB

	  g[yuhjklbn]
	       vtBbNX: ܂ňړB

	  G[yuhjklbn] or <CONTROL->[yuhjklbn]
	       vtBbNX: 'g' ƓBʘH̕_ł͎~  
	       B


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 10



	  _    w肳ꂽʒu܂ŁAŒZASYpĈړB
	       ŹAȂmĂ(A܂͈ȑOɒʂ)n}z
	       uɌvZBmĂ铹ȂꍇAɐs
	       B `G'R}hƂقړŒ~邪A `M'R}h
	       ƓlɕEȂňړB

	  .    xeB1 ^[ȂB

	  a    (͂AAvc)p(g)B

	  A    1   ܂͕̐gɂĂ(hȂ)͂Bh
	       1 ͂Ƃɂ 'T'(take off: h͂)AAN
	       Z T  1 ͂Ƃ 'R'(remove: ANZT͂
	       )gpB

	  ^A   1 ÕR}hJԂB

	  c    B

	  C    X̉ɖOtB

	  ^C   pjbN{^BQ[B

	  d    ɒuB:ud7av a Ƃ 7 ɒuƂ
	       ӖB

	  D	 ̕ɒuB``What kinds of things do you want
	       to drop?[!%= BUCXaium]'' (ǂ̎ނ̂̂u܂?)  ̎
	       ɑ΂āA0 ȏ̃̕V{͂邱ƂœB
	       `a', `i', `m', `u' ̌ɓ͂邱ƂłB 
	       āA jꂽ(B)/ĂȂ(U)/ꂽ(C)ACew
	       肷邱ƂłB

		    DB	- jĂƔĂ镨SĂɒuB
		    DU	- ĂȂƔĂ镨SĂɒuB
		    DC	- ĂƔĂ镨SĂɒuB
		    DX	- j/􂢂ĂȂSĂɒuB
		    Da - mFȂɂׂĂ̕ɒuB
		    Di - uOɎmFB
		    Du - (XɂƂ)̕ɒuB
		    Dm - uIԂ̂Ƀj[pB
		    D%u - ̐HɒuB

	  ^D   (ʂ͔)RB

	  e    HHׂB

	  E    ɃbZ[WݍށB``Elbereth'' Ƃ   
	       ƁAẲ͂Ȃɔ𒧂ŗȂȂ (
	       ȂUƕ͏Ă܂)B́Aꑧ 
	       ƂɂȂȂ֗łB (̋@\̓RpCɍ폜
	       Ă邩mȂ̂ŁAȂ̃o[WŕK@\
	       Ƃ͌ȂB)



	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 11



		    E- - ق̒ɎwŏB

	  f	ɓĂ̂𔭎˂B˂̂͗\`Q'R}
	       hőI邱Ƃo邵A autoquiver IvVݒ肳
	       Ăꍇ́ARs[^[ɎIɓKȂ̂ݒ肳
	       ƂłB

	  i    ̖ژ^(Ă镨ׂ)\B

	  I    ̖ژ^̂w肵ꕔ\B

		    I* - ̂΂ׂĕ\B
		    Iu - ׂ̕ĕ\B
		    Ix - gĂ܂ׂĕ\B
		    I$ - 𐔂B

	  o    JB

	  O    IvVݒ肷B݂̃IvV̒l̈ꗗ\  
	       B  (o^Cv邩NbN邱Ƃɂ)ύX
	       IvVIŁAقƂǂ̒lύX邱Ƃ  
	       B u[ lłȂIvV̏ꍇ́AɃj[o
	       AvvgoBݒ\ȃIvV͂̃KChubN
	        قǂɈꗗBIvV͒ʏ `O' R}hł͂
	       AQ[n߂Oɐݒ肷Bq̃IvV̍QƂ
	       ƁB

	  p    𕥂B

	  P    wցA邢͂̑̑iiAډBjgɂB

	  ^P   1 ÕbZ[Wx\B ^P ͂
	          O  b Z[ W ɕ\B̐U镑
	       msg_windows IvVɂĕωB

	  q    (CȂ)ށB

	  Q    ɓ̂IBőÎ`f'R} h
	        ˂邱ƂłB (o[W 3.3 ȑOł͂̃R}
	       h̓Q[̂A̋@\`#quit'Ɉړ 
	       )

	  r    ▂@ǂށB

	  R    iiwցAȂǁj͂B

	  ^R   ʂ`B

	  s    ͂̉B㩂TBɂ͕ʉTKv
	       B

	  S    Q[Z[uāAfBQ[͎vCɎI
	       B



	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 12



	  t    𓊂B܂͖Ȃǂ𔭎˂B

	  T    h͂B

	  ^T   e|[g\͂΃e|[gB

	  v    o[Wԍ\B

	  V    ̃Q[̗\B

	  w    B

		    w- - ƂĉfɂȂB

	  W

	  x    Ă镐\̕ƌB\͓̕񓁗U
	       ŗpB\̕킪ȂĂ͎s( 
	       Ă̂\ɂāAfɂȂ)ƂɒӁB

	  X    qT()[hɓB

	  ^X   Ȃ̖OAEƁA푰AʁAсÃQ[ɂ
	       邳܂܂Ȑ_̖O\B

	  z    UBɐUꍇ́A`.'gB

	  Z    BɎƂ́AƂ`.' g
	       B

	  ^Z	Q[  ꎞ~(WuRg[@\̂ UNIX(R)
	       o[Ŵ)B

	  :    ɉ邩B

	  ;    ĂV{\B

	  ,    EB`m'̌ɉƂɂāAݒɊւ炸I 
	       j[\B

	  @    autopickup IvṼIEIt؂ւB

	  ^    ܂łɔ㩂̎ނ𒲂ׂB

	  )    Ă镐\B

	  [    tĂh\B

	  =    ͂߂Ăwւ\B



	  __________
	  (R)UNIX is a registered trademark of AT&T.


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 13



	  "    tĂ閂\B

	  (    gĂ铹\B

	  *	Ă̂\B 5 ̃R}hɂ
	       ́B

	  $    Ă݂𐔂B

	  +    mĂ̈ꗗ\B̃R}hɂāA
	       \鏇Ԃς邱ƂłBj[`ŕ\
	       A܂ڂ̎IAɓւI
	       邱ƂɂďԂւBɓւꍇ͂
	       ̑JԂB

	  \    ܂łɂǂȎނ̕\B

	  !    VFɔB

	  #    gR}hsBȏォ番悤 NetHack ̍ 
	       ׂ͂Ă̕gʂĂ܂̂ŁA܂pɂɎg
	       ȂR}h͂̂悤ɂēꂽBǂ̊gR}h
	       gp\́AQ[̃RpCɂǂ̋@\Lɂꂽ
	       ɂB

	  #adjust
	       ̖ژ^LύX( fixinv IvVuIv̎ 
	       ɕ֗ł)B

	  #chat
	       NƘbB

	  #conduct
	       ǂ̒킪܂Ă邩\Bڂ͌qu
	       vCv̏͂QƂ邱ƁB

	  #dip ɐZB

	  #enhance
	       ̋Zʂ߂Aׂ肷B

	  #force
	       JB

	  #invoke
	       ʂȔ\͂𔭓B

	  #jump
	       ʂ̏ꏊփWvB

	  #loot
	       Ȃ̂΂ɂ鏰ɒuĂ锠⊓A܂͂Ȃ  
	       Ăn̈Ƃ̒g𒲂ׂB



	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 14



	  #monster
	       (̎pɕωĂ鎞)̓\͂gB

	  #name
	       ╨̎ނɖOtB

	  #offer
	       _ɂɂB

	  #pray
	       _ɋFď߂B

	  #quit
	       Q[Z[uɃvOIB

	  #ride
	       ɏ(邢͏̂߂)B

	  #rub v΂B

	  #sit B

	  #turn
	       s̉ǂB

	  #twoweapon
	       񓁗퓬̃IEIt؂ւB񓁗ɓK؂ȕg
	       ƁBȂΎIɃItɂȂB

	  #untrap
	       (㩁AA)㩂͂B

	  #version
	       ̃o[W NetHack RpCƂ̃IvV 
	       \B

	  #wipe
	       @B

	  #?   wvj[: p\ȊgR}ḧꗗ\B

	       Ȃ̃L[{[hɃ^L[ (ʂ̃L[ƈꏏɉƂ
	  ẴL[`^'[ 8A܂`']rbgZbg)
	   ΁AR}h̓^L[ƈꏏɉƂɂđ̊g
	  R}hN邱ƂłB NT, OS/2,	PC  NetHack    
	  'Alt' L[̖ړIɎg.

	  M-?  #? (ΉĂȂvbgz[)

	  M-2  #twoweapon (number_pad It̏ꍇ)

	  M-a  #adjust




	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 15



	  M-c  #chat

	  M-d  #dip

	  M-e  #enhance

	  M-f  #force

	  M-i  #invoke

	  M-j  #jump

	  M-l  #loot

	  M-m  #monster

	  M-n  #name

	  M-o  #offer

	  M-p  #pray

	  M-q  #quit

	  M-r  #rub

	  M-s  #sit

	  M-t  #turn

	  M-u  #untrap

	  M-v  #version

	  M-w  #wipe

	       number_pad  IvVÎƂ́Aɉ
	  R}hLɂȂB

	  h    wvj[: ``?'' ƓlɃwvj[\B

	  j    ʂ̏ꏊփWvBu#jumpvuM-jvƓB

	  k    (ʏ͔)RB'^D' ƓB

	  l    Ȃ̂΂ɂ鏰ɒuĂ锠⊓A܂͂Ȃ  
	       Ăn̈Ƃ̒g𒲂ׂBu#lootvuM-lvƓB

	  N    ╨̎ނɖOtBu#namevuM-nvƓB

	  u	㩁A A   Ȃǂ̎d|ꂽ㩂͂Bu#untrapv
	       uM-uvƓB




	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 16



	  5.  ƒʘH

	       A̕ʘH͖肪Ă邱Ƃ邵AĂ
	   ƂB̂Ă镔Ŏ̎ɓ镔͉ʂ
	  \BÂƂł͎ 1 ̋ԂBǂʘH
	  ͉ʂɕ\ꂽ܂܂ɂȂB

	       B ʘH͕\ȂB `s'(search: T) R}h
	  Ŕ邱ƂłB

	  5.1.	o

	       o͕ƒʘHڑ̂łBo̒ɂ͔̂
	   ̂B̂Ƃɂ͂̂܂ܒʂ蔲邱ƂłB̑
	  ̏oɂ͔邪A̔͊JĂ邩AĂ邩A 
	           ꂩłBĂJɂ
	  `o'(open: J) R}hpBĂ       
	  `c'(close: ) R}hpB

	       ɏĂƂ `a'(apply: p) R}h
	  ŏ͂gA`^D'(kick: R) R}hŔRj邱
	  ƂŒʂ邱ƂłB

	       JɎ΂߂邱Ƃ͂łȂB邢͐
	  ^ɋߕtȂ΂ȂȂB̂Ȃoɂ͂̂悤 
	  ͂ȂB

	       ͉ߏôɖɗBẲ͔J邱
	  ƂłȂBǂ̉ɂƂĂ͔JKv 
	  Ȃ(: S͔ʂ蔲邱Ƃł)B

	       B ͕\ȂB `s'(search: T) R}h
	  邱ƂłBxƕʂ̔ƓlɂȂB

	  5.2.	 (`^')

	       `҂ׂ悤Ƃ㩂ÂɂB
	   ΗɗƏôɐ^[̊Ԃ̏ꂩ瓮Ȃ
	  Ȃł낤BɒN𓥂ݓĈ邩A`s'(search:
	  T ) R}hŌ邩ď߂㩂͕\B㩂̉a
	  HɂȂ邱ƂB͔ɗLȖhpłBÓTIR 
	  s[ ^Q[łuqɔԁvɂʂȃ_Wւ̕
	  ꓹ݂B̃_Wł̖ړI͑𗎂ɓ邱 
	   BTdɐǂ݂΁ASĂ̊K͑qɔԂ̓`̃[ŃN
	  AłBsl܂Ă܂`҂̂߂ɂ̏M p
	  ӂĂ邪A͉^ቺĂ܂B

	  5.3.	Ki (`<', `>')

	        ʓIɓÅeKɂ́AO̊Kւ̏Ki('<')ƁÅK
	  ̉Ki('>')ЂƂBAOBႦ΁AA
	   rI󂢊KłȂ͓̉KiK𔭌邾낤B
	  ЂƂ͓ȂłAЂƂ̓m[̍BƂĒm 
	  n тɑĂB̍B͍Ōɂ͍s~܂ɂȂĂāA


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 17



	  T(Ȃ邱ƂIꍇ)A̓Aɂ 
	  ߂ėKvB

	       KigA邢͑̊KɈړ㩂Ɉ|ꍇA
	  ܂܂łK͔񊈐āAfBXÑt@Cɒ   
	  B ̖KꂽKɍĂіKꂽꍇAfBXÑt@Cǂݍ܂
	  čĊB߂ĖKKɈړꍇÅK(قƂ
	   K͈ꂩAuʂȁvK̓ev[gAúvK(q)
	  ꍇ̓t@Cǂݍ) Vɍ쐬B݂͌̊K 
	  ̂sB̊Kɂ͎̂~܂ĂB

	       ʁAȂKigƁAȂ͖ړInőΉKȉ
	  ɌBAybg(q)Ƃ̉͂ȂKi 
	   ~肵ɂĂāAẌ̂ȂƓւ邱
	  ƂBȂꍇAybg₻̑̉KȉɌ A
	  Ȃ͂̂΂ɌB

	  5.4.	͂ (`<', `>')

	       ͂͊KiƓڂłAKq̓̎ނ̓Q[
	  قƂǋʂłȂB

	  5.5.	XƔ

	       XhÂ΂ɓX傪āAɂ̕uĂ镔
	  ɍs邱ƂDEāA`p'R}hgƂŕ
	  ƂłDEOɁȀɗ``#chat''R}hg
	   ƂŒlimFłDxOɕgƎ؋ɂȂA
	  X͍x܂ł͓X̊OɏoĂȂȂD

	       X̒ɂƂɕ𗎂ƂŕXɔ邱ƂłD
	   pi񎦂A邩ǂmF邩APɓX傪
	  ȂƂm炳(ʓIɁAXŔĂ镨Ɠނ̕
	  Ώۂł)B

	       RŕX̒ɗĂ܂ƁAX͕ʑ㏞ȂɏL
	  咣D߂߂ɂ͔߂KvD

	       X͎sɂȂ邱ƂBȂꍇA𔄂낤
	   ƌ̑ɐMp݂ĂBMp݂͕𔃂
	  Ɏg邪AXłLłB̓X͈󂯂ȂB  (
	   {ŁuNWbgJ[hvɓ邱Ƃ邪AXŎg
	  ƂĂ͂ȂBX͎󂯓ȂB)

	       `$'R}hgƁA^ł݂̐(΂  
	  Ă̂͏)ƂƂɁAMp݂Ε\B
	  `Iu'R}h͖̕(܂XL镨)̈ꗗ()\ 
	  B `Ix'R}h͎gĂ܂̑̈ꗗ()\
	  B

	  5.5.1.  X̓Ȑ

	       X̂͈̐ӊOȂ̂ȂB



	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 18



	  * ACe̒li͐FXȗvfɂėlXɕωB

	  * X̓hÄ̏ꏊ͓X̊OƂĈB

	  * X͂Ȃ̂悤ɒӐ[Ă邪AʓIɂ 
	    ̏҂ɂĂ͖B

	  *  X"closed for inventory"(uÎߕXv)̏ꍇA҂Ă
	    ĂJX͂ȂB

	  * X͗Ⴆi͊ĂVACeׂ邱Ƃ͂ȂB


	  6.  

	       ʏɂ͂Ȃ猩\ȂAЂƂ
	   ƈł̒ŉƂ΂o킷ƂɂȂ邩Ȃ̂Œ
	  KvłB@̃ACe̒ɂ́AȂ𔭌 
	  OɂȂ𔭌̂ɖ𗧂(̔\͂ɑ
	  ϗDĂB)

	       `/' R}h `;' R}hʏɕ\Ă 
	  𓾂̂ɗpB `C' R}h͉ɖO
	  ɗpẢ鎞ɁA𑼂̂̂ƌ 
	   ɕ֗łBOƂăXy[Xw肷ƁAȑOɂ
	  OƂɂȂB

	       gR}hu#chatvɂāAאڂƌ𗬂łB 
	  ۂ̑䎌͑IłȂ(ƁAȂׂ邩͑I
	  Ȃ)AX Oracle of Delphi(ft@C̐_a)Ƃ 
	  b邱Ƃ́ALvȌʂ炷B


	  6.1.	퓬

	       Ɛ킢Ƃɂ́APɂ̉ɌĈړ
	  悤ɂ΂悢B̉͂Ȃ킢𒧂܂ȂA 
	   ƂCɂ邱Ƃ͂ȂB𗧂ĂƑϊ댯ȉBuO
	  \ZvɂvƂƂ킴YꂸɁB

	       Ȃ(A܂͂ȂڂȂ)ꍇA
	  ƂȂvʒu`I'̕\B̋
	  ƂƁAĂ鎞Ɠ悤ɂȂ͉ɍU 
	   BAړĂ܂ĂAȂ̍U
	  ͋؂邱ƂɂȂBłɈړĂ܂Ă   l
	  A 킢Ȃꍇ́A `m'R}hgƂŐ키ƂȂړ
	  łBtɁAɉ邩ǂ킩ȂǂƂɂ 
	  Čꍇ́A `F'R}hgB

	  6.2.	ybg

	        Ȃ͎e(`d')AqL(`f')A|j[(`u')̂ꂩƂƂ
	  Q[n߂BȂ̃ybg͂ȂƂƂɓA܂悢A 
	     Bybg͂ȂƓlɐ̂т邽߂̐HKvƂ


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 19



	  Bybg͐VNȎ₻̑̓ɂĂByb g
	   ƂCłAybg炵ĂƎv
	  AȂڂ^邱ƂłB̂߂ɂ͐H yb
	  g ɌēĂ΂悢BƌPꂽybg͂
	  󋵂̂Ƃŋɂ߂ėplB

	       ybg|ĂɂČoςłB܂Ԃ
	   ɐA̗͂⑊ɗ^_[WB߂̂
	  ͂Ȃybg̕낤Ax̒ႢLN ^
	  ɂƂĂ͖ɗ낤B

	       Ȃ̊KֈړƂAׂɃybgAĂ΃ybg
	  ȂɂĈړBuɂƖ쐶Ă܂ 
	   ȂBlɁAȂ̈ʒuς悤㩂ɂ
	  ꍇ (Ⴆ΁AgbvhAŉ̊Kɗꍇ)Aׂɂybg
	   ĂAׂɂȂybg͎cBybgł
	  ̂悤㩂ɂ邱ƂBȂ͂Ƃ̎Ƀybg̗ 
	  ĂꏏɈړ邱Ƃ͂ȂB

	  6.3.	Rn

	       _  Wɂ邠̐́AȂƔ\͂
	  Ă΁A邱ƂłB쐶̐ɂȂ邱Ƃ [
	   ͍̂łB̓A̎͋͊֌Włグ
	  ɖ@̗͂ɗȂ΂ȂȂBAUȂ̎x z
	   ɒuȂA `#ride'R}hŏ~肷邱ƂłB
	  ɏēAړ@́Agړ̂Ɠł B
	  n}ɕ\̂͂ȂĂ铮łB

	       nZp`#enhance'R}hŊǗ邱ƂłBڂ
	  q镐̋Zp̏͂QƂ邱ƁB

	  6.4.	[̊K

	       `҂̗HƂ̎(邢͂͐܂ςÔ 
	  gł邱Ƃ)Ȁiɏo킷ȂBH
	  EƂ͓Â낭قƂǃ_[W󂯂Ȃ 
	   Pɓ邱ƂłBȂ͎񂾖`҂̏iD
	  łB͎Ă邱ƂBȑO̖`҂ 
	   炵߂̂ɂׂ͂Ēӂ𕥂˂΂ȂȂB͂
	  pjA̒ȌɐĂ邩炾B


	  7.  

	       A̒ŉꍇAEƎv̂͂悭
	  邱ƂłB NetHack ł͂̏̕ʂ邱ƂɂĎIɏE
	  Ƃł( autopickup IvV(q)ItɂȂĂƂ
	  `m'	v  tBbNX (Oq)pĈړƂ͂̌ł͂
	  )A܂ `,' R}hgĎ蓮ŏEƂłB

	       Ƃɂ́ANetHack ͂Ȃɂ̂悤ɍA
	  ȏEƂ͂łȂȂBłȂ NetHack ͂̕
	  Ȃ̉וɉAE\B


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 20



	       ɘAāAו̏ddȂBǂꂾ̏d
	   ^ׂ邩͋ؗ͂Ƒϋv͂ɂB͂قǁAו̏d̉e
	  ͏ȂBłAA̒Ăו d
	   ȂɕSɂȂƂB͓݂ȂAJ[
	  ȂĂ葽̐HKvƂȂBčŏIIɂ͉וd 
	  ĉ̂ĂȂƓȂȂĂ܂B

	       NetHack ł͉ו̏dǂꂭ炢e^邩Ă
	  Bŉsɕ\    `Burdened',  `Stressed',	`Strained',
	  `Overtaxed',`Overloaded' ̕\Ȃ̏ԂĂB

	       EƂA̕ɂ͖ژ^L蓖ĂBɊւ
	  鑽̃R}h͂Ȃǂ̕ĝq˂ĂB 
	  ̂̕IԂ悤 NetHack q˂ĂƂ́Aʖژ^L
	  ̈ꗗ\Ă̒I(Oq̃R}h̍Q  
	  )B

	       ̕AႦΕނ̂悤ȕ́AǂȂ̂ȒPɋ
	  ʂtB̑̕AႦΊ␅͂̎ނɉ 
	  낢ȖOtĂB 1 ̃Q[̊Ԃ͓O
	  ͓ނ̕łBɕt閼O̓Q[Ƃ 
	  ̂ɂȂB

	       ̂悤ȕgǍʂ炩ȏꍇ NetHack
	  ꂪł邩ĂĂB̌ʂ܂薾炩 
	   ꍇ͂̎̕ނƖt邩q˂ĂB̂ߌɂȂ
	  ĂvoƂłB܂ł``#name''R}hg
	   l̂ƂłAނׂ̕ĂɖOtX̕
	  OtłBłɖOĂ̂``#name''g
	   AVOƂăXy[Xw肷邱ƂɂāAȑO
	  OƂłB

	  7.1.	􂢂Əj

	       Ȃ낢ȕ́AƂꂪɗ  
	   ƂĂ􂢂Ă邩mȂB􂢂
	  镨gƂꂪtĂ܂Ƃ͍ł悭錋 
	   B􂢂Ă镐Ƃ͎ɒtĂ܂
	  ĎȂȂB􂢂Ă镨gɂƕʂ̕@ 
	   ͂ƂłȂBɁA􂢂Ă镐h
	  ͕Kƌ킯ł͂ȂĂ̏ꍇ̖͂^   
	  āA łȂ퓬̌͂B̑̎􂢂
	  Ă镨́A܂ɗȂ܂͂̑̓_ŊQy 
	  肷邾낤B

	       ܂jĂ镨BjĂ镨͎􂢂
	  ĂȂʂ̕ɔׂċǂɗBႦΏjꂽ 
	  ͈Ɉw̃_[W^邱Ƃł邾낤B

	        @ gƕɎ􂢂􂢂肷邱Ƃł
	  B̂߂ƂtĂ܂ĂA􂢂Ă͂ 
	   łBm͐􂢂jɕqȂ̂ŁA̐EƂ̖`҂
	  eՂɎĂ̂邱ƂłB



	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 21



	       Ȃ̖̎ژ^̒Ŏ􂢂Ă邩ǂ
	   ͖ژ^̂Ȃœɉ̐ȂBǂȏԂɂ邩mĂ
	  镨͖ژ^ꗗŁucursed(ꂽ)vuuncursed(Ă )v
	  ublessed(jꂽ)vȂǂ̌t̐ɗ^B

	  7.2.	 (`)')

	       |̖{ɏZނقƂǂׂẲ́A`XƌΌ
	  ȂȂEƂ邾낤B̐g(ɉEĂ
	  ܂)߂ɂȂ͕KvƂBȂł̓|Cgɂ 1
	  ` 2 ̃_[W (炩̉Z邩mȂ)^邱 
	   łȂBAAN͗OłBN͕gčU
	  fōUyɑ傫ȃ_[W^邱Ƃ 
	  B

	       ɂ͒Ȗ⌕̂悤ȐU񂷂߂̂̂ƁA⑄̂悤
	  邽߂̂̂BŉɑŌ^邽߂ɂ́A 
	   ɂĉU邩ɓȂ΂ȂȂB
	  ɂ́APɑ𓊂悤ɑI邾ł悢B| 
	   ˂ɂ́A܂|ɎĂ𓊂΂悢BNX{E
	   crossbow bolt(NX{Ep̑)𔭎˂邽߂̂̂ł B
	  Ί͊(΂̂悤)̑̐΂𓊂邽߂ɗpB

	        ͂̂镐ɂ́uǉ\́v(U\͂ƌƂŐƕ
	  蓾)tĂAUɓ\Ɨ^
	  _ [WɒǉB̖͂𑪒肷ɂ́AȂ炩̕@
	  @gĊӒ肷邵ȂB͎̕K̂悤Ȃ   _
	  [W󂯂₷B̂悤ȁuHv_[W͏C\łB

	       U  ܂ɖ邩ƁAɂǂꂭ炢̃_
	  [W^邩́A̗vfɂČ肳Bɂ͈ 
	   ̂: ̎ށA̕i(͂╅H)AoxA
	  ́AqAו̏dAZ(q)B̖hl(ʓIȖh䗦B
	  h𒅂邱ƂɂƂ͌Ȃ)vf̈łB܂A
	  ̕ɑ΂ēɑϐB

	       ͕̕Ў莝ł邪A肪KvȕB莝
	   ̕Ə𓯎ɎƂ͂łȂBЎ莝̕Ă
	  ꍇAЂƂ̕\ƂďĂāA `x'R} h
	   gĂ镐ƌ邱ƂłBɁu񓁗퓬vZ
	  \̋ZʂꍇA̕𓯎  g       B
	  `#twoweapon' gR}hœ񓁗퓬邩ǂ؂ւ
	  Bꕔ̃LN^[(ႦΖؐl)̋Z\Ă B
	   Ƃ̋Z\ĂĂAxɓ̕gƂЂƂ
	  gȂɔׂēGɖmɃyieB󂯂B

	       S̕Ȃ邩ȂB邽
	   ɂ́ÂIԎ`-'IԂA邢`A'R}h
	  ̑̐gɂĂ̂ÔƓɌݎgĂ镐 O
	  ƂłB

	       AD&D vCƂ̂ǎ҂͂Ct낤AAD&D ɓo
	  ꂵ NetHack ɂĂɂ_[W ^ 
	  B܂ǂmĂȂ( aklys(ALX), lucern hammer(


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 22



	  bcFn}[), bec-de-corbin(xbOEfERr) Ȃ) 
	    AD&D ̒ǉ[ł Unearthed Arcana ̕t^ŏڂ
	  ĂB

	       gR}h `w'(wield: )A `t'(throw:  
	   )A  `f' (fire: 𔭎˂ЂƂ̕@), `Q'(quiver:
	  )A `x' (exchange: )A`#twoweapon'A`#enhance'(
	  q) łB

	  7.2.1.  ̂𓊂邱ƂƔ˂邱

	       `t' R}hgƂɂāAǂȕł邱Ƃł
	  B̃R}hw肷ƁA镨q˂ĂB `?'   
	  ƁA ̒œ̂ɌĂȕ̈ꗗ\A `*'
	  ƁASĂ̎̈ꗗ\B𓊂邩w肵 
	  A( ǂ̖ڕWɓ邩ł͂Ȃ)ǂ̕ɓ邩q˂B
	  邱Ƃł鋗́Aɕ̎ނƋؗ͂ɂB͎œ 
	   Ƃł邪A|ēyɉ܂ŔсAڕW
	  ₷B

	       `Q'R}hŗ\ߍD݂́u˕vIĂA `f'R} 
	  h œ邱ƂɂāA鑀ȒPɂ邱ƂoB
	  Ɠlɓ͐q˂邪A `f'R}hgтɉ 
	     w肷Kv͂ȂB autoquiver IvVIɂ
	  ƁA `Q'R}hŐݒ肵ȂȂɁA NetHack I
	  ɑ̕ĂB

	       ---  ---  xɕ̕𓊂邱ƂłLN^[
	  Bxɕ̖𑕓U(邢͈xɕ̕)A 
	   WɓĂ邱Ƃ͂₷dł͂ȂBW[͂̋Z\ɗD
	  Ă邵AK؂ȕ̋Z\ (|Ė˂Ȃ|̋Z\A N
	   X{DgȂNX{D̋Z\AXOĐ΂𓊂
	  XŐZ\) ɂčx̋ZʂΑ̐EƂł 
	  \ łBȂ̃ACe𓯎ɓ邱Ƃł邩
	  ^[ωB `t'R}h`f'R}h̑Oɐw肷邱
	     āA    鐔𖾎Iɐ邱ƂłBႦ
	  ΁A``2f''( number_pad IvVI̎ɂ``n2f'')Ǝw肷
	  ƁA Ƃ 3 {ˉ\łő 2 {˂ȂBA
	  ɔ˂ł鐔傫w肵ꍇ (̗    ``4f'')
	  ́Aɐw肵ȂꍇƓlAۂɔˉ\Ȑ(
	   3 {)˂ȂBUJnȂASẴACe 
	  ͓ɔԁB 1 {ڂŉ|ȂAc͂̐܂
	  łƂɂȂB

	  7.2.2.  ̋Z

	       pł镐̋Z\͂܂܂ɈقȂĂB̋Z( Z
	  \)͂̕ǂꂭ炢܂邩ɉeBZ\̓Q[
	  ʂČコ邱Ƃo邪A͐EƂox═ 
	  ̎gp񐔂ɂB

	       Z ʂ߂ɁA daggers A broadswords A polearms
	  Ƃɂ̃O[vɕĂBꂼ̃O [
	  v ŋZʃxǂ܂ō߂邱Ƃo邩͐EƖɌ܂Ă


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 23



	  BႦΖ@g daggers  staves ɑ΂Ă͍xɒB
	  邱Ƃo邪A swords  bows ɑ΂Ă͂ł͂ȂB

	       `#enhance'gR}hŌ݂̕(Ǝ)̋Zʂ邱Ƃ
	  łBɁAЂƂ܂͕̋Z\コ邱Ƃł 
	   ȂAǂ̋Z\コ邩I邱ƂłBZ\̃
	  N"none" (Z\コ邱           
	  "restricted"(ꂽ) ƌĂ΂邱Ƃ)A "unskilled"(S
	  ), "basic"(), "skilled"(n), "expert"(GLXp[g)
	   B  ꂽZ\͒P`#enhance'R}hňꗗɕ\
	  B (_̉ɂ肠̋Z\̐邱ƂB 
	   ɂ͋Z\"unskilled"ƂȂAE"basic"܂łƂȂ) L
	  N^[ɂẮAfł̐퓬 }[ V  A[ c  Z \ 
	  ``master''( }X^[)``grand master''(Oh}X^[)ɂ܂Ō
	  コ邱ƂłB

	       Z\x"restricted""unskilled"̕gƁA 
	   ▽ɗ^_[WɃyieBB "basic"
	  ł̓yieB{[iXȂB "skilled"ł͖Ɨ^   _
	  [Wɂ₩ȃ{[iXB "expert"ł̓{[iX͑傫
	  BUƁAgĂ镐ɊւZ\(őɒB
	   ȂȂ) コ邽߂̌Px𑝂₷`XB
	  Px̃xɕKvȒlɒBƁA̋Z\ɂ莩M 
	   悤ɊƂB̎_`#enhance'R}h
	  gƂɂĂЂƂ܂͕̋Z\コ邱Ƃł B
	  Z \͎Iɂ͌サȂBȂȂSĂ̋Z\x̍vɂ͐
	  ̂ŁAǂ̋Z\コāAǂ𖳎邩߂K v
	  邩łB

	  7.3.	h (`[')

	       ̔FDIȂ̂Aɂ͐łB̂
	  ̍U䂪gɂ͖hKvłBh̒ɂ͑̎ 
	   hhʂɗDꂽB Armor class(AC)(hl)
	  ̖hʂ̎ړxłBhl (AC) AD&D ł̏ꍇƓ悤
	  ] B 10 hȂ̏ԂƓAlقǗDꂽ
	  hł邱ƂB AD&D ɑ݂Z͂ NetHack ɂ
	  ĂhʂBȉ(sSł͂邪) e̊ZƂɋK
	  肳hl̈ꗗB

		  dragon scale mail(hS̗؊Z)		  1
		  plate mail(|S̊Z)				  3
		  crystal plate mail(̊Z)			  3
		  bronze plate mail(̊Z)			  4
		  splint mail(SЂ̊Z) 			  4
		  banded mail(ы̊Z) 			  4
		  dwarvish mithril-coat(h[t̃~X)	  4
		  elven mithril-coat(Gt̃~X)	  5
		  chain mail(т)			  5
		  orcish chain mail(I[N̍т) 	  6
		  scale mail(؂̊Z)				  6
		  studded leather armor(etZ)		  7
		  ring mail(S̊Z)				  7



	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 24



		  orcish ring mail(I[N̓S̊Z)		  8
		  leather armor(Z)				  8
		  leather jacket(WPbg)			  9
		  no armor(ZȂ)				 10

	       ɑ̖h(: ACA|AN[N) gɂAh l
	  ̒l邱ƂłBeɓ镨 1 g
	  ɂ邱Ƃ͂łȂ (Z͈ꎮAN[N 1 A 1 A |
	   1 Ȃ)B

	       h ɖ͂΂̖h̖hʂ͒ʏ̕ǂ(
	  ͈)ȂĂAɕtĂu{Lv(邢́|L)
	   hl̒lȂBႦ +1 т́Aʏ̍
	  тhʂAhl 1 PʕȂ 4  
	   BhgɂƒɖhlƁu{Lv̒lB
	  ꂽh͒ʏ핉̖(|L)ĂA͂ 
	  Ƃ͂łȂB

	       ̊Z͎K̂悤Ȃ̃_[W󂯂₷B̂悤
	  _[W͏C\łB@̂WhB

	       Zg߂̃R}h `W'(wear: ht)  `T'(take
	  off: h͂) łB `A'(remove all: SĂ͂)܂
	  ̐gɂ̓lAh͂̂ɎgpłB

	  7.4.	H (`%')

	       ̂тɂ͐HsłDԐHɂȂ܂
	   Ƃ₪č|AXɉ쎀ւ̓ǂ邱ƂɂȂBۑ
	  uĂȂƏł܂AHׂɂ͕sqɂȂH   
	  B ACX{bNXʂɓĂH͒ʏ͂܂ł܂Ȃ
	  AACX{bNX͏dAʂ͊Ĵɏ΂莞ԂKv 
	  B

	       Eƒʏ͂̎̂c邪ÁuHvɂȂB
	  ׂĂƌ킯ł͂Ȃ͐Hׂ邵Aɂ͐HׂƓ 
	   ͂̂B傴ςɌ΁uĤׂɂȂvƂ
	  ƂłB

	       ؐH`̐EƂBؐH`̉͌ē̎
	   HׂȂBؐH`̃vC[͓̎̂Hׂ邱Ƃ
	  邪AȂ炩̂肪ȂpB

	       furit IvVɂĂȂ̍D̐HɂȂł̖O
	   1 ݒ肷邱ƂłB


	       HHׂ邽߂̃R}h `e' łB

	  7.5.	 (`?')

	       ɂ͂낢ȕ\肪tĂ邪A͂炭
	  ̖ptɒׂƂđI񂾂̂ł낤 (:``READ ME'' 
	    ``THANX MAUD'' ̋tǂ݂Ƃ)B͓ǂނƏł(


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 25



	  @̎̏ĂȂ͏łȂ)B

	       ̒ōłpl̍̂scroll of identify( 
	  ̊)łB͑̕ɂĂꂪł邩A􂢂
	  Ă邩jĂ邩AƉ͂𔭊ł邩m 
	  B ̂̒mȂ͂̒ɂ͂̊Ȃł͉ł邩
	  Ӓ肵̂B

	       Cf[ĂĂȂscroll of mail(莆̊)
	   nĂ邱Ƃ (̋@\LɂăRpCĂ
	  o[W̏ꍇ)B NetHack ̃[zB@\̓VXẽ[ 
	  {b NXɓdq[ĂꍇɋNB̋@\gp
	  ɂ͊ϐ``MAIL''ɂȂ̃[{bNX̃t@C 
	  肵 NetHack ɐV[Tꏊm点KvB܂
	  ]ނȂΊϐ``MAILREADER''Ɏg[MvO 
	  t@Cݒ肷邱ƂłB̂Ƃ NetHack 炻̃vO
	  NĂ̊ǂނƂłB[Q[ɂ 
	  ă_ɐo[W NetHack ł͂̊ϐ
	  BCf[ mail IvVŃItɂłB

	       ǂނ߂̃R}h `r' łB

	  7.6.	 (`!')

	       ͏тɓĂt̂̐FɂċʂB͈
	  ނƏłĂ܂B

	       Ȑ͐łB͂΂ΏjĂ􂢂
	  Ă肵āAsȐɂȂ肷Bs̉ 
	  ƂĐ͗LQȂ̂ŁAs̉ɓ(`t')ƗL
	  Bɑ̕Z(``#dip'')̂ւLvłB

	       ނ߂̃R}h `q'(quaff: ) łB

	  7.7.	 (`/')

	       @̏͒ʏ퉽͂𔭊D̒ɂ͕̂
	   ȀꍇUwȂĂ͂ȂȂB
	  ɌĐU邱Ƃł(Ƃ `.'  `s' ͂)A 
	   ͂΂΋ȍsׂƂȂB̑̏ɂ͕ȂAU
	  q˂ĂȂB񂪌͂𔭊񐔂͏񂲂ƂɕsŁA 
	  gxɂ̉񐔂 1 B

	       ̖@̗ʂȂȂƁAʏ͏gpĂNȂB
	  Ȃ玞܁AŌ̈ꈬ̖͂g񂩂 
	   \łBƏ͉Ă܂B͓K؂Ȗ
	  @ɂčď[U邱Ƃł邪AƏ񂪔Ă 
	   \B\͍ŏ͔ɏAɉx
	  ď[U邲Ƃɑ傫ȂB

	       \sȂȍsׂł͂邪AǂɂȂȂȂƂɂ͏
	   󂷂ƂB͎Cȍsׂł͂ȂBsƂ
	  AjIȖ@̃GlM[邩łB



	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 26



	       SɊӒ肵ꍇÄꗗł͊ʂ̒ɒǉ
	   񂪕\B͍ď[Uꂽ񐔁ARA݂̎gp\
	  ȉ񐔂łB񂪖ꂽꍇɂ͎gp\ȉ񐔂 -1    
	  B

	       g߂̃R}h `z'(zap: U) łB󂷂ɂ
	  `a' (apply: g)łB

	  7.8.	w (`=')

	       wւ͑ϖɗłBƂ̂⊪̂悤
	   ͂ߐɂȂ̂ƈႢAwւ̖͔͂rIPvI
	  邩炾B

	       wւ͂߂邱ƂɂĂ̖͔͂Bwւ̖͗
	  w 1 Av 2 ͂߂邱Ƃ͂łȂB

	       ܂Ă̎wւ͐gɂƕ̌ȂB
	  ͎wւ̎ނɂĈقȂB

	       wւg߂̃R}h `P'(put on: wւ   )	 
	  `R'(remove: wւ͂) łB

	  7.9.	@ (`+')

	       @͋͂Ȗ@L傫Ȗ{łB`r'(read: ǂ) R
	  }hŊwԂƎ̒mǂݎɓ](čŌɂ͓
	  ߂ȂȂ)AȂ΂݂͕̎šʂɏIB􂢂
	  ꂽ@m̋y΂Ȃ_̌Ñ㕶ŋLꂽ@ǂ 
	  NԂɊQyԉ\I

	         Ƃ(wł鎞)ɂ͂t邱Ƃ
	  BȂ̌oxł͉y΂ȂxȎ悤Ǝ 
	   AΉ^CvɊւZ\ႩAЂǂĂ
	  ƂɎ肷ƁÂɕKvȃGlM[ 
	  ԂQɏIĂ܂ƂB

	       邱Ƃ́A@̃GlM[ĂыNĂ𐸐_
	  ̂̂ɏW邱ƂłBȂg̓o閂@ G
	  l M[JAAĎƔĂ܂B
	  ɂ͗KKvłBKĂ΁Aꂼ̎̈ Z
	  \ ͌サĂBȂAԂoɂĂꂼ̎
	  ɊւL͔AxwԕKvłĂ邾낤B

	       ŵ̏ꍇAw肷Kv  
	  B Ƃ`.'܂`s'w肷邱ƂŎgɑ΂Ď
	  邱ƂłBA͂΂΋ȍsׂłBw 
	  ̂Ȃ̏ꍇAw肷Kv͂ȂB

	         Knx̖ʂŃO[vĂ̂ƓlAO
	  [vĂB̂ɐƁÃO[v 
	  P ƂɂȂB\ȋZ\Ύ̌ʂ߁As̉
	  \߂邱ƂłBZ\Xbg͕XLƋLB(``
	  ̋Z''̍QƂ̂)


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 27



	       @ɂ͎RɈړłȂ΂ȂȂB܂A
	  ̎ނ̊Z𒅂ĂƖ@̂W邾낤B

	       @ǂނ߂̃R}h͊ǂނƂƓ `r'(read:
	  ǂ) łB `+' R}hɂAmĂƂ̃xC
	  Cꗗ\B `Z'(cast: ) R}hɂ
	  B

	  7.10.   (`(')

	       ͂낢ȖړIɎgXGȕłBȂǂƓ
	  Ɏgp񐔂ɐ̂镨BႦ΃v͂΂炭 R
	   sĂ܂B̑̓̒ɂ͗e܂܂ĂAo
	  ꂷ邱ƂłB

	       g߂̃R}h `a'(apply: p) łB

	  7.10.1.  

	       `̓rŊ┠Ђɏo킷Ƃł낤B
	  ͒uĂꏊɗĂꍇɂ͊gR}hu#lootv  
	  āA ܂ĂƂɂ `a'(apply: p) R}hŊJ
	  邱ƂłBȂЂɂ͂΂ΏĂ A
	   ͏dĉ^тɂ̂łBЂ͎ɎƂ͂łȂ
	  Ȃ̂ŁA͂(`a'(apply: p) R}hŌ 
	       g A `^D'R}hŏRƂ΂AgR}
	  h``#force''ɂ蕐gĂJȂǂ̕@ɂ)ɂ͏
	  uȂĂ͂ȂȂB

	       Ђɂ㩂d|Ă̂A͂ӂ
	  J肵ƂɕsȏoNBgR}h``#untrap''
	  ă`FbN㩂ɂȂ悤݂邱ƂłB

	  7.11.   (`"')

	         ͎wւƑς悭ĂA΂΂Ƒ傫Ȍ͂
	  ĂBwւƓ悤ɖɂ͂낢Ȗ@̓   
	  A LvȂ̂LQȂ̂āAgɂ邱Ƃɂ͂
	  B

	       ͈ɂ邱ƂłȂB

	       g߂̃R}h͎wւ̏ꍇƓ  `P'(put	on:
	  wւ͂߂)  `R'(remove: wւ͂) łB

	  7.12.   (`*')

	       ΂̒ɂ͉l̂̂AlŔB΂͍Y
	  @ƂĂƂċɂ߂ČʓIȂłBl̂ 
	  ΂EoɏĂΓ_ɉZB

	       ̏Ȑ΂΂ɕނ邪Ảl͂قƂǂȂB
	  ASĂ̐΂(XOĂȂ)eƂėL   
	  B]Ɋׂœ邱Ƃ\łB


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 28



	  7.13.  傫Ȋ (``')

	       ⋐΂͓ɗLpł͂ȂAʓIɏd̂łB
	  Ƃ͈قȂƂ\łB

	       ȃq[}mCh(l₻̒)͋΂𕐊Ƃėp
	  ƂłB

	  7.14.   (`$')

	       ͓_ɉZA܂Xł͋ŕ𔃂ƂłB{
	  ɂ͂Ȃ̎ɉe邩Ȃ̉(X
	  ͕ʂƂ)B


	  8.  vC

	       P  NetHack ɏ邾ł͖łȂꕔ̃vC[
	  ́AvCɐ݂邱Ƃɒ킵ĂB̒̈ꕔ 
	  Q[ ɂĎIɋL^AQ[ł #conduct R}
	  hŊmFłB܂Q[Iɂ\Bɔ 
	   sƁA͂₻͕̒\ȂBl ̒ɏ
	  邱ƂɂāAvC[͒ǉ``錠''   
	  B ȂA̐ɏ]ƂȂQ[ɏ邱ƂS
	  LłAŏɃQ[ɏƂ͕ʂ̒͊֌W 
	  B

	       ̂͐HוɊւ̂łBłȒ͐H
	  Ȃ̒łB͐HȂłԐł邪A K
	  v   B]āAݕɑ΂Ă͉̐ȂBႦh{
	  ĂłB_ɋFċQ̂Ƃ͂ȂHוɊ 
	  钧ɂᔽȂB

	       ȍؐH`҂͓ꂽHוHׂȂB{I
	  h{͉ʕƖ؂łBubu(`b')A[[(`j')A׋(`F')
	   ؂Ƃ݂ȂBlԂ̐HɂgĂȂ̂B
	  oXANAuHv(ۖ)Aj[VAb[V 
	   B̐ɕωĂƂ́AȂǂ̕ʏłȂ
	  ȍؐH`җp̐HƂĈBA 
	  HȂ̒ɂ͔邱Ƃɒӂ邱ƁB

	       ؐH`҂͓HׂȂBA̕YH
	  邱Ƃ͌ȍؐH`҂قǂ͌ȂBĽȍؐH` 
	  ĤׂɒǉāAubNvȊÕv(`P')AA
	  ꂽHו (肢NbL[ƃpP[L)A瑢ꂽ
	  Hו (N[pCƃLfB[o[)AC[[Hׂ邱
	  ƂłBN͍ؐH`҂Ƃ݂ȂB

	       Hׂ邱Ƃ͌ȍؐH`ҁAؐH`ҁAHȂ̒
	   Bɂ͂قALȊỎ̎̂ʋlA{Ō
	  邻̑̓̂܂܂ށBωɁuݍŏvU 
	   ̂͂̉̎̂ĤׂƂ݂ȂBA؁Ałł
	  ̂AłɕωĐHׂA}Cht 
	  C [ɕωĔ]Hׂ邱Ƃ͓HׂƂ݂ȂBA


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 29



	  X͓̕Ƃ݂ȂB

	       Ɋւ炸As\ȕAHׂƊ댯Ȃ̂
	  B ɑ΂āuݍŏvU邱Ƃ́Ả
	  ̂ĤׂƂ݂ȂBuiȍؐH`(``vegan'')vƂ
	  t ͐HוɊւ镶ł̂ݗp邱ƂɒӂĂقB
	  ꂽ(A̗؁AApA)ggɂ 
	   邱Ƃ͐ɈᔽȂB܂Au~NF́v͕sȔ
	  Fł͂邪A܂ł킯ł͂Ȃ̂ŁAȍؐH` 
	          B X  ChvC[`
	  ``fruits''́AႦuځvł낤u|[N`bvv 
	  낤AȍؐH`҂̐ɈᔽȂB

	       __҂͏@ے肷B܂A#pray(F), #offer(
	  ), #turn (ŝ̂߂), mɑ΂ #chat(b)
	   ͂łȂBꕔ̓ǎ҂̓NmŃvĈ̐
	  ĂƎ咣邩ȂAł̓vC[̑I ]
	  n cĂBCF_[̖_ɕ̂̓Q[ɏ
	  邽߂ɕKvȂ̂Őɂ͔Ȃ̂ƂB܂A{_ m
	   ₻̑̏@I݂bt𕷂Ăɂ͔ȂB^
	  __҂͌t͕CɂȂʂȈӖoȂB

	       قƂǂ̃vC[͕(邢͕Ƃđ邱 
	  lĂ铹)ɐ키B̈͂̂悤ȕɂ
	  g킸ɃQ[ɏ邱ƂłB𓊂A˂ A
	  R 肷̂͋B܂AAA邢͂̑̃ACe
	  gAfrŐ키ƂB

	       NetHack ɂāAa`҂͑̉EĂ͂ȂȂ( 
	  ƁA̎ɂČol𓾂Ă͂ȂȂ)B͓ɓ
	  ł邪A̎iɂČol𓾂邱Ƃ͉\łB

	       ӎ҂͓ǂݏłȂBɂ͈ȉ̍sׂ܂܂B
	  ǂށA@ǂށA肢NbL[̃bZ[WǂށATVc
	  ̕ǂށAA``x''ꕶ(ӎ҂̓`IȃTC)
	  O ̕ށBł镶ǂނƂƁAQ[ɏ邽
	  ɐ΂ɕKvȃACeǂނƂ͐ɂ͔Ȃ   B
	  Q[ JnɎĂ銪Ɩ@̓emĂ邱Ƃ
	  ю̒ḿAQ[JnȑOɋt狳̂Ƃ݂ȂA 
	  ɂ͔Ȃ̂ƂB

	       ̑ɂׂ̍Q[ƂċL^钧킪B
	  ͋sE邱Ƃ\łBɃvĈ 
	   B  sE@^ꂽƂA ``none''(܂``
	  '')ƓƁAsEȂ܂܂ɂ邱ƂłBȂ̓ACe
	  𓯂O[v̑̃ACeɕω (``polypiling'')A
	  ̏EEŎ̑̂𑼂̐ɕς(``polyself'') 
	  B ̌ʂpȂƂ͂ꂼ꒧Ƃ݂ȂBŌɁA
	  Ȃ͂Ƃǂ肢ȂĂ炤ƂBȂ̃ACe 
	  킸ɃvĈ͈̒łAȂ(Ƃ
	  łƂĂ)ŃvĈ̒łBACe肤
	  @ ^ꂽƂA ``nothing''܂``Ȃ''ƓƁA
	  Ȃ܂܂ɂ邱ƂłB



	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 30



	  9.  IvV

	       lɂ͂ꂼꂢ낢ȍD݂ NetHack ̗Vѕ 
	   قȂĂ̂ŁANetHack ̐U镑ύX邽ߐݒłI
	  vVB

	  9.1.	IvV̐ݒ

	       IvVݒ肷@ɂ͂BQ[ `O'  R
	  } hgƂɂđSẴIvV邱ƂłÂ
	  ƂǂύXłB܂Aϐ``NETHACKOPTIONS''ݒt@ C
	   ŎIɐݒ肷邱ƂłBNetHack ̃o[WɂĂ
	  Q[JnOɃIvVݒ肷邱ƂłvO 
	  邱ƂB

	  9.2.	ϐ NETHACKOPTIONS g

	       ϐ NETHACKOPTIONS ɂ͂낢ȃIvV̏lJ
	  }ŋ؂ė񋓂ݒ肷BIvV̂̂̂ 
	  P ɃIIt̑Ił邾łB̃IvVXg
	  ɓƃIɂȂAIvV̑O `!' ``no''ƃI
	  t ɂȂB̑̃IvVł͐ݒlƂĕ񂪕KvłB
	  ̃IvVݒ肷ɂ̓IvVAR܂̓C R[
	   LAݒl̏œ͂΂悢Bݒl͎̃J}͕
	  ̍Ō܂łƂȂB

	       Ⴆ``autoquiver''I A``autopickup''  I tA  O
	  ``Blue  Meanie'' ɁAt[c``papaya''ɂȂ悤Ɋϐ
	  ݒ肷ɂ csh ł͎̃R}h͂΂悢B (!͓ꕶ 
	  Ȃ̂ŃGXP[vĂKv邱Ƃɒ)

	       % setenv NETHACKOPTIONS "autoquiver,\!autopickup,name:Blue Meanie,fruit:papaya"

	  sh ܂ ksh ł

	       $ NETHACKOPTIONS="autoquiver,!autopickup,name:Blue Meanie,fruit:papaya"
	       $ export NETHACKOPTIONS

	  Ƃ΂悢B

	  9.3.	ݒt@Cg

	        t@C̒`#'Ŏn܂s̓RgƂĈB
	  t@C̒``OPTION=''Ŏn܂s͊ϐ``NETHACKOPTIONS''
	      @  I v V   L q Ă̂ƌȂB
	  ``DUNGEON=''A``EFFECTS=''A``MONSTERS=''A``OBJECTS=''A``TRAPS=''A``BOULDER=''
	  Ŏn܂s͂ꂼ dungeon A effects A monsters A objects A
	  traps A boulder
	   IvVƂĈ邪A̎w@́AݎgĂtH
	   ĝɎgLN^R[h 10 i̗łB
	  ̗ 0 w肷ƁA̍ڂ͕ύXȂB̋@\ I v
	  V̕@ł͗płȂB̗͊es̍Ō`\'邱
	  ɂĕsɓn邱ƂłB



	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 31



	       RpC AUTOPICKUP_EXCEPTIONS IvVݒ肳 
	   ƁA ``AUTOPICKUP_EXCEPTION=''Ŏn܂sɂ pickup_type
	  IvV̗O`łB

	       Wݒ̐ݒt@C OS ɂĈ   A   
	  ``NETHACKOPTIONS''  i擪`@'t邱ƂŁjgpݒ
	  t@Cw肷邱ƂłB

	  9.4.	JX^}CYIvV

	       ȉɂ낢ȃIvV̖B܂ɒ
	   ͖̕Bȉ̃IvV̂ɂĂ͖
	  ƂȂĂIvVB

	  align
	    X^[g̑(align:lawful, align:neutral,  align:chaotic)B
	     ̈ꕶŎw肷邱ƂłBWݒł̓_ɑI
	    B `O' R}hŐݒ肷邱Ƃ͂łȂB

	  autodig
	    @邽߂̓ɂĂāA@邱Ƃłn`Ɉړ 
	    ƂƂAIɌ@iWݒ̓ItjB

	  autopickup
	     ɂ̂IɏEiWݒ̓IjB̐U镑
	    JX^}CY邽߂ɂ pickup_types QƂ邱ƁB

	  autoquiver
	    ̃IvV͖̎`f'(fire:̒ɂ̂𔭎
	     ) R}hsɂǂ邩߂BIȂAR
	    s[^[͓KȕɓB̎A􂢁A j A 
	    @A  A ̐Ȃǂ͍lȂ̂Œӂ邱ƁB
	    `Q'R}hgĎ̍DȕɓB镐킪
	    ȂÃIvVIt̎͑`t'(throw:𓊂)
	    R}hsB (Wݒ̓It)

	  boulder
	    \̂ɗpLN^iWݒ͊\L N
	    ^jB

	  catname
	    X^[g̔L̖O(: catname:Morris)B `O' R}hŐݒ肷
	    邱Ƃ͂łȂB

	  character
	    LN^[̃^ C v     ( :``character:Monk'')B
	    ``role'' IvVƓłBEƂݒ肷邻̑̕@ɂ
	    Ă``name''IvVQƂ̂ƁB ``random''ȊO̕
	    ŏ 1 ŔʂB

	  checkpoint
	    v ONbVɕł悤ɊKړ閈
	    ԂZ[uiWݒ̓IjB



	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 32



	  color
	    FXȉ╨⓴A̒n`J[ŕ\ (} C N  R 
	    s[^ł͕Wݒ̓I)B

	  checkspace
	    t@CޑOɃfBXN̋󂫗eʂ`FbN(Wݒ
	    ̓I)BZ[ut@C⃌xt@Ĉ߂Ɏgp[eBV
	    2GBȏ̋󂫗eʂꍇÃIvVItȂ
	    ΂ȂȂȂB̃IvV̓RpCMFLOPPY
	    `ĂƂ̂ݓKpB

	  cmdassist
	     肪ȃ~XoƂɐVKvC[̂߂ɒǉ̃R}
	    h⏕bZ[W\(Wݒ̓I)B

	  confirm
	    ybgAXȂ̍UĂȂU悤Ƃ 
	    ɊmF(Wݒ̓I)B

	  DECgraphics
	     A  \ɗp镶ȂgłׂĒ`ɁA
	    DEC VT-xxx/DEC Rainbow/ANSI rZbg炠炩ߗp 
	     ݒgp(Wݒ̓It)B̃IvV͂܂^[~
	    iK؂ȃOtBbNLN^[悤ݒ肷B 
	     AȂŃOtBbN㏑ݒ肷Ƃɂ
	    ȂĂ͂ȂB

	  disclose
	    Q[Iɕ\𐧌䂷(Wݒ́ASĂ\  
	    )Bݒł͈̂ȉ̒ʂB

		 i - ̊Ӓ
		 a - ̌J
		 v - ގ̈ꗗ
		 g - E
		 c - 

	     ꂼ̕\ɑ΂āȂOɂǂ̂悤ɐUw镶
	    邱ƂłB̈Ӗ͈ȉ̂ƂB

		 y - mF邪AWݒ̓CGXɂB
		 n - mF邪AWݒ̓m[ɂB
		 + - mFȂɕ\B
		 - - mFȂŔ\ƂB

	    (: ``disclose:yi na +v -g -c'') ̂悤ɐݒ肵ꍇA 
	      m F  (Wݒ̓CGX)B ͊mF(Wݒ
	    m[)B ގ͊mFȂɕ\B E͊mF
	    ɔ\ƂB ͊mFɔ\ƂBގ
	    ꗗ㩂⓯mɂĎ񂾉܂ނƂɒӁB

	  dogname
	    X^[ǧ̖O(: dogname:Fang)B `O' R}hŐݒ肷
	    Ƃ͂łȂB


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 33



	  dungeon
	     { \   ߂̃OtBbNV{ݒ肷 (Wݒ
	    `` |--------||.-|++##.##<><>_|\\#{}.}..## #}'') dungeon   I v
	    V  ͕Wݒ̑̕ɒn}`̂Ɏgp 1 
	    41 ̕BWݒ̑̕ɂŐݒ肵
	     gēA̒n}\AWݒ͎̕gȂB
	    Ȃ̃VFʈ镶gȂÃL N
	    ^GXP[vKv邩ȂƂɒӁB

	    ̃IvVŐݒ肳镶́A݂ł͒ʏ C Ŏg
	    ŃGXP[v邱ƂɒӂȂĂ͂   B
	    `\'    ͂̂̂̕̕ƂĎ舵Aʂȃv
	    tBbNXƂĂ͈ȂƂƂłB] āA`\'	 
	    `\\' ƂKvBȃGXP[v`ł `\m' ͌
	    ̃^rbgIɂA

	    V{͈ȉ̏łFA(c)A()A pA
	    E̊pÅpAE̊p, ǂ̌AT ̕ǁAt T 
	    ǁA T̕, E T ̕ǁÂȂoAJ
	     (c)AJ(), (c)A()AS̖_A
	    ؁ȀAÂʘHA邢ʘH, ւ̊KiAւ̊KiA 
	     ̂͂Aւ̂͂AՒdA, ʍAAA܂
	    ܂͖xAXAnA~Ă钵ˋ(c)A~Ă    (
	    )AオĂ钵ˋ(c)AオĂ钵ˋ()ACA_A
	    

	    lp̕\𓾂邽߂ɂ͊p T ̕ǂ '+'  g
	     悢mȂB̃[Xł͐VV{
	    Â݂̂č\\̂ŒӁB

	    `O' R}hŐݒ肷邱Ƃ͂łȂB

	  effects
	    ʕ\̂߂̃OtBbNV{ݒ    ( W   
	    ``|-\\/*!)(0#@*/-\\||\\-//-\\| |\\-/'').	 effects IvV
	    ͕Wݒ̑̕ɒn}`̂Ɏgp 1-29  
	    B̕ dungeon IvVƓlɏB

	    V{͈ȉ̏łF(c)A()A(ォE
	    )A(Eォ獶)A@AJ̃tbVAu[
	    ()Au[(E)A@hɗp 4 ̋LAݍ܂
	     ƂɎg 8 ̋LAɗp 9 ̋LB 3
	    LN^ 3 񂩂ȂA̒S͂ 3 ~ 3 ̔z̒S
	    ȂB

	     ̃[Xł͐VV{Â݂̂č\
	    \̂ŒӁB

	    `O' R}hŐݒ肷邱Ƃ͂łȂB

	  extmenu
	    gR}hC^[tF[XALȃR}ḧꗗj[ 
	    o悤ɕύXBL[͂́AŌ Enter KvȂ
	    ƈȊO͓`IȃC^[tF[Xƌ݊B tty C  ^[


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 34



	    tF[XɂĂB(Wݒ̓It)

	  female
	    ``gender:female'' ̌ÂʖB `O' R}hŐݒ肷邱Ƃ͂ł
	    ȂB

	  fixinv
	    ̖ژ^LƕƂ̑Ή͂̕ɒuĂωȂ(W
	    ݒ̓I)BItɂƂ͕ɒuƂ̖̕ژ^Lȍ~
	    ̋LƕƂ̑Ή 1 B

	  fruit
	    Ȃ̍D̉ʕɂȂł̖Oݒ肷( :fruit:mango)
	    (Wݒ́uslime moldv)B NetHack ŎXgÎ
	    IȖȌtłB slime mold(lolo)ƐH~
	      Hוɂׂł낤B apples(S)Aoranges(I
	    W)A pears(mȂ)A bananas(oii)A melons (   )	 
	    NetHack ɂ݂͂Ă̂ŁAݒ肵Ă͂ȂȂB

	  gender
	    Jn̐(gender:male ܂ gender:female).  ŏ̈ꕶ
	    w肷邱ƂłB ``male''  ``female'' IvVw 
	     ĂĂA ``gender'' IvVD悳BWݒł͓K
	    ؂Ȑʂ_ɑIB `O' R}hŐݒ肷邱Ƃ͂
	    ȂB

	  help
	    `/'   R }hgĒׂĂ镨ɂĉ炩̏񂪂
	    A邩ǂq˂(Wݒ̓I)Bwvo 
	     ɂ ``More info?'' Ƃvvgɔς킳ȂȂ
	    ̂ŁAf𒲂ׂ邱ƂłB͋[dv 
	    Ă܂mȂƂӖB

	  hilite_pet
	    yb g𓯎̓王oIɋʂ(Wݒ̓It)BeLX
	    gEBhE\ł color It̂Ƃɋ\B X̃^C
	    gpƂ́An[g̋LybgɂB

	  horsename
	    J n̔n̖O (:``horsename:Trigger'').  `O' R}
	    hŐݒ肷邱Ƃ͂łȂB

	  IBMgraphics
	    AAʁA㩂̕\ɗp镶ȂgłׂĒ` 
	     ɁA IBM g ASCII Zbg炠炩ߗpӂꂽݒ
	    gp (Wݒ̓It)B̃IvV͂܂^[~iK
	     ȃOtBbNLN^[悤ݒ肷BȂ킿A
	    Ȃ̃OtBbNŏ㏑ݒ肷Ƃɂ 
	    Ă͂ȂB

	  ignintr
	    u[N܂ފ荞ݐM𖳎(Wݒ̓It)B




	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 35



	  legacy
	    Q[JnɐbZ[W\(Wݒ̓I)B

	  lit_corridor
	     ڂ₠Ȃ̃LN^ĂɂČʘH\
	     (Wݒ̓It)B

	  lootabc
	    JƂ`o', `i', `b'ł͂Ȃ`a', `b', `c'̃L[g 
	    (Wݒ̓It)B

	  mail
	    Q[Ƀ[zB悤ɂ(Wݒ̓I)B

	  male
	    ``gender:male'' ̌ÂȂʖB `O' R}hŐݒ肷邱Ƃ
	    łȂB

	  menustyle
	    낢ȃIuWFNgw肷Ƃ(Ƃ DropR}h)ɗp
	    C^tF[X̐Bl tradional, combination, partial,
	    full  4 ̃^Cv̍ŏ̈ꕶw肷B ``tradional'' 
	      o[ WŗBꗘpł̂ŁA̎ނ̓
	    ́AɑI񂾎ނɓĂ͂܂SĂ̕  m F  B
	    ``combination''͑I̎ނ͂邪A
	    Ă͂܂镨mFőÎł͂ȂAj[` 
	    I B ``partial''͕̎ނIԂƂAɑSĂ
	    \ꂽj[\B ``full''͕̎ނ̕
	     ɁAŏɕ̎ނ̃j[\AꂩI
	    ނɓĂ͂܂镨̃j[\B

	  menu_deselect_all
	    j[̑SĂ̍ڂIɂL[B Amiga, Gem, X11, tty
	    ĂB(Wݒ `-')

	  menu_deselect_page
	     j[   A ݕ\ĂSĂ̍ڂIɂ
	    L[B Amiga, Gem, tty ŎĂB(Wݒ `\')

	  menu_first_page
	    j[̍ŏ̃y[WֈړL[B Amiga, Gem, tty Ŏ
	    ĂB(Wݒ `^')

	  menu_headings
	     j[  ڂĂ镔ǂ̂悤ɕ\邩w肷
	    Bl 'bold'(), 'inverse'(]), 'underline'()̂
	    ꂩłB.  SẴ|[gŎۂɎOSẴ^Cv\ł
	    킯ł͂ȂB

	  menu_invert_all
	    j[̑SĂ̍ڂ̑IԂ𔽓]L[B Amiga, Gem, X11,
	    tty ŎĂB(Wݒ `@')




	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 36



	  menu_invert_page
	     j[  ݂̃y[W̑SĂ̍ڂ̑IԂ𔽓]L[B
	    Amiga, Gem, tty ŎĂB(Wݒ `~')

	  menu_last_page
	    j[̍Ō̃y[WֈړL[B Amiga, Gem, tty Ŏ
	    ĂB(Wݒ '|')

	  menu_next_page
	    j[̎̃y[WֈړL[B Amiga, Gem, tty Ŏ
	    ĂB(Wݒ `>')

	  menu_previous_page
	    j[̑Õy[WֈړL[B Amiga, Gem, tty Ŏ
	    ĂB(Wݒ `<')

	  menu_search
	     j[ŌsL[B Amiga, Gem, X11 ŎĂB(
	    Wݒ `:')

	  menu_select_all
	    j[̑SĂ̍ڂIɂL[B Amiga, Gem, X11, tty  
	    ĂB(Wݒ `.')

	  menu_select_page
	     j[̂Aݕ\ĂSĂ̍ڂIɂL[B
	    Amiga, Gem, tty ŎĂB(Wݒ `,')

	  monsters
	    ̎ނ\̂ɎgpLN^w肷B (W 
	    	  	 ``abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTU-
	    VWXYZ@ '&;:~]'').  ̕ dungeon IvVƓlɏ 
	    BV{̏́A ant or other insect(a邢͂̑
	    ̍), blob(ubu), cockatrice(RJgX), dog  or  other
	    canine( ܂͂̑̃CkȂ̓), eye or sphere(ڂ܂͋
	    ), feline(L), gremlin(O), humanoid(l ),  imp  or
	    minor demon(Cv܂͒ዉ), jelly([[), kobold(R{
	    h), leprechaun(vR[), mimic(~~bN), nymph(j t),
	    orc( I[ N),  piercer(  h), quadruped(l),
	    rodent(l), arachnid or centipede(܂̓Jf), trapper or
	    lurker above(gbp[܂͓Vɐނ), horse or unicorn(
	    n܂̓jR[), vortex(Q), worm([), xan or other
	    mythical/fantastic	insect( U   ͂̑̕svcȍ),
	    light(Cg), zruty(YeB), angelic being(Vĝ   
	    ),  bat  or  bird( R E܂͒), centaur(P^EX),
	    dragon(), elemental(G^), fungus or mold(J r  R
	    P),  gnome( m[ ),  giant  humanoid(  ^ l), invisible
	    monster(Ȃ), jabberwock(Wo[EHb N),  Keystone
	    Kop(L[Xg[Rbv), lich(b`), mummy(~C), naga(i[
	    K), ogre(I[K), pudding or ooze(XC), quantum mechanic(
	     q͊w), rust monster(K̉), snake(), troll(g[),
	    umber hulk(Ao[nN), vampire(opCA),  wraith(  C
	    X),  xorn(][), apelike creature(̂悤Ȑ), zombie(
	    ]r), human(l), ghost(H), golem(S[ ),  demon( 


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 37



	    ), sea monster(C̉), lizard(gJQ), long worm tail(
	    O[̐K), mimic(~~bN) `O' R}hŐݒ肷邱Ƃ͂
	    ȂB

	  msghistory
	     ^P ŌĂяo߂ɕۑĂŏs̃bZ[W̐(W
	    ݒ 20)B `O' R}hŐݒ肷邱Ƃ͂łȂB

	  msg_window
	    ߋ̃bZ[W̕\@ύX(_ł tty ɂ̂ݎ 
	    Ă)Bwłl͈ȉ̂ƂB

		 s - `single': 1 bZ[W (WݒB 3.4.0 ȑOł̐U镑ł)
		 c - `conbination': ŏ 2 bZ[W `single'Ǎ `full'B
		 f - `full': SʁBÂbZ[WB
		 r - SʁBVbZ[WB

	     Ƃ̌݊̂߂ɁAlȂɂł(`full'Ƃ݂Ȃ)A
	    ł(`single'Ƃ݂Ȃ)B

	  name
	    Ȃ̃LN^̖Oݒ肷(Wݒ͂Ȃ [ U[
	    )B  -LƃLN^̐EƂ̓t(܂ -A -B
	    -C -H -K -M -P -Ra -Ro -S -T -V -W ̂ǂꂩɕt) 
	     ĐEƂݒ肷邱ƂłBEƂƂ -@ gpƁA
	    _ȂЂƂIɑIB `O' R}hŐݒ肷邱
	    Ƃ͂łȂB

	  news
	    NetHack  ̃j[Xt@C΂ǂ(Wݒ̓I)B
	    j[X̓Q[̍ŏɕ\̂ŁA `O' R}hł
	    肷͖̂ӖłB

	  null
	    [ɃpfBÔ߂̃iLN^𑗂(Wݒ̓It)B

	  number_pad
	    ړ̂߂[yuhjklbn]̂ɐL[gp(Wݒ 0
	    ܂̓It)B (number_pad:2 ͐̂ DOS ł̐U镑ɂB `5'
	    `g'Ameta-`5'`G'Ameta-`0'`I'ƂȂB)

	  objects
	         \      gݒ肷 (Wݒ
	    ``])[="(%!?+/$*`0_.'')  ̕ dungeon IvVƓl
	     BV{̏Ԃ́iƂȂ悤ȁjȕ
	    ́AAhAwցAAHAHAAA@ A
	    A݁A΂܂͐΁A΂܂͒ASAAŉtB `O' R
	    }hŐݒ肷邱Ƃ͂łȂB

	  packorder
	    ̎ނ\      w   ( W    
	    ``")[%?+!=/(*`0_'').   ̃IvVɂ͂낢ȕ̎ނ\
	    ̗ݒ肷Bݒ肳Ȃނ͈ȑȌōŌ 
	    \B


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 38



	  perm_invent
	      I Ȃ΁A݂̎ꗗɃEBhEɕ\Ă
	    B̋@\ĂEBhEVXeł̂ݗLB

	  pettype
	    vCLN^NX̃^Cṽybggpł 
	     ̃ybgw肷A܂͏̃ybgSw肵ȂB
	    wô``cat'', ``dog'', ``none'' łB `O' R} h
	    Őݒ肷邱Ƃ͂łȂB

	  pickup_burden
	     EɂŎw肵ו̏dx (Unburdened, Bur-
	    dened, streSsed, straiNed, overTaxed, overLoaded) ȏ   
	    ƁAs邩ǂmFB (Wݒ `S').

	  pickup_types
	    autopickup	 IvVݒ肳Ă鎞ɏE̎ނw肷
	    (Wݒ͑SĂ̎)BIRpCIvV   
	    AUTOPICKUP_EXCEPTIONS w肳ĂƁA autopickup_exception
	    sgƂ autopickup ̐U镑ׂłB

	  prayconfirm
	    _ɋFOɊmF(Wݒ̓I)B

	  preload_tiles
	    MSDOS̃veNg[hŁA^CQ[̎n߂ɂ炩 RAM
	       łǂ𐧌䂷BIɂƁA^CO
	    tBbÑptH[}X܂邪A葽̃gp(
	    Wݒ̓I)B `O' R}hŐݒ肷邱Ƃ͂łȂB

	  pushweapon
	    ɕĂ鎞 `w' (wield: ) R}hg
	    ƂAɎĂ\̕ɐݒ肷(Wݒ  I
	    t)B

	  race
	     I(: ``race:human'')BWݒ̓_łB
	    `O' R}hŐݒ肷邱Ƃ͂łȂB

	  rest_on_space
	    Xy[XL[ `.'(rest: xe) R}hƂĎgp (W
	    ݒ̓It)B

	  role
	    L  N ^[  ^ C v  ݒ肷 (:``role:Samurai'')B
	    ``character''IvVƓłBEƂݒ肷邻̑̕@
	    ɂĂ``name''IvVQƂ̂ƁBʂ͐擪 1 
	    	  	  	  	A   `r'         O   	 
	    B``Rogue''A``Ranger''A``random''邩łB

	  runmode
	    u܂Ƃ߂Ĉړv(shift+control+ňړ邩As
	    R}h}EX̃NbNgꍇ) Ƃɂǂꂭ炢̕p x
	    Œn}XV邩𐧌䂷Bݒ\Ȓl͈ȉ̒ʂB


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 39



		 teleport - ړĂn}XVB
		 run - 7 炢ɒn}XVB
		 walk - 1 ɒn}XVB
		 crawl - ``walk'' ƓlAɂ΂炭~B

	     ̃IvV͉ʕ\ɂ̂݉eAۂ̈ړʂɂ͉e
	    ȂBWݒ `run' łBo[W 3.4.1 ȑO   `tele-
	    port'  ݂̂łBʂmFł邩ǂ͎gĂł[
	    ̎ނɈˑB

	  safe_pet
	    ybg(ybgƒm)UĂ܂̂h(Wݒ  I
	    )B

	  scores
	     ɃXRAXĝǂ̕邩𐧌䂷 (F``scores:5
	    top scores/4 around my score/own scores'')Bꂼ̕ 
	    ̕ (`t', `a', `o')݂̂KvłB

	  showexp
	    ŉsɌ݂̌o_\(Wݒ̓It)B

	  showrace
	     Ȃ\ƂɁAEƂɑΉ}[Nł͂ȂA푰ɑ
	    }[Nŕ\(Wݒ̓It)B̐ݒ͕\ɂ p
	    AQ[ƂĂ͉ςȂƂɒӁB

	  showscore
	    ŉsɌ݂̃XRA\(Wݒ̓It)B

	  silent
	    [̃r[v炳Ȃ(Wݒ̓I)B

	  sortpack
	     ̖ژ^\Ƃޖɉו̓eבւ (W
	    ̓I)B

	  sound
	    Ȃ̃LN^[̂Ɋւ郁bZ[W\(W
	    ݒ̓I)B̓Rs[^[̉o͋@\Ƃ͉̊֌W
	    ȂƂɒӂ邱ƁB̃IvV͕IɂvC [
	     䉺ɂBႦ΁AĂԂ͂̃IvV͎I
	    ItɂAڊo߂ƃIɂȂB

	  sparkle
	    (₠Ȃ)U󂯁AɒRꍇɉʌʂ\ 
	     (Wݒ̓I)B

	  standout
	    ``--More--''𑾎ŕ\(Wݒ̓It)B

	  suppress_alert
	    O ̃o[WύXꂽ@\ɑ΂Ēӂ𑣂bZ[W
	    \Ȃ悤ɂ NetHack ̃o[W   B  ( :


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 40



	    ``suppress_alert:3.3.1'') ̂悤Ɏw肷 3.3.1 ȑOɕύX
	    ꂽ@\ɑ΂钍ӃbZ[W͕\ȂB

	  time
	    ŉsɃQ[Ōo߂Ԃ^[ŕ\(Wݒ  I
	    t)B

	  timed_delay
	     ╨̂̈ړȂǁAʂ\邽߂ɂƎԑ҂
	    ƂAȃLN^ʂɑ邩Ƀ^C}[gp B
	    (tty  C^tF[Xɂ̂ݓKpB X11 C^tF[X͏
	    ^C}[gpBWݒ̓^C}[ɂ鎞ԑ҂gݍ 
	    ĂȂ΃I)

	  tombstone
	    񂾂Ƃ΂\(Wݒ̓I)B

	  toptenwin
	    Q[I̕\Wo͂̂NetHack̃EBhEɕ\
	     (Wݒ̓It)B̃IvVݒ肷ƃEBhEg
	    o[W NetHack ł͋NeEBhEƂ͕ʂ̃EBh
	    EɃXRAXg\BAXRAXg̓Q[ I
	    ƃ^[~iEBhEɂ͎cȂB

	  traps
	    㩂̎ނ\̂ɎgpLN^w肷B(Wݒ
	    ``^^^^^^^^^^^^^^^^^"^^^^'').  traps IvV͕Wݒ̕ 
	    ̑㩂`̂Ɏgp 1  22 ̕B
	    ̕ dungeon IvVƓB    
	    dungeon IvVƓlɏB

	    V  {̏́A arrow trap(), dart trap(),
	    falling rock trap(◎), squeaky board(  ),  bear
	    trap( F), land mine(n), rolling boulder trap(),
	    sleeping gas trap(KX), rust trap(  H  ),  fire
	    trap(   ),  pit( ), spiked pit(gQ炯̗),
	    hole(), trap door(), teleportation trap(uԈړ ),
	    level teleporter(ʂ̊Kւ̏uԈړ), magic portal(@̓
	    ), web(̑), statue trap(), magic trap(  @ 
	    ),  anti-magic  field( @Ԃ), polymorph trap(ω
	    )B

	    `O' R}hŐݒ肷邱Ƃ͂łȂB

	  travel
	    gxR}hLɂ(Wݒ̓I)B̃IvV 
	    I tɂ邱ƂɂāAn}EBhENbN邱
	    ƂɂāA]܂Ȃړ悤Ƃ邱ƂhƂłB

	  verbose
	    Q[̃Rgڍׂɕ\(Wݒ̓I)B

	  windowtype
	    EChEVXegp邩ǂuttyv܂́uX11v I


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 41



	    iWݒ̓o[WɂjB `O' R}hŐݒ肷邱
	    Ƃ͂łȂB

	  9.5.	EChEVXeŐpJX^}CYIvV

	       ȉ͂ȂIEBhD^Cv̓JX^}CY
	   ύX邽߂ɗplXȃIvV̐łB镶
	  ͓Kɐ؂l߂BSẴEBhD^Cvɑ΂Ă S
	   ̃IvVLƂ킯ł͂ȂB̃IvVݒ
	  ꂽƂAEBhD^Cv̐ݒ󂯕tȂA 
	    B 󂯕tȂȂAPɖB݂̃EB
	  hD^CvőΉĂIvV́AIvVꗗ\ (`O') 
	  \Bꕔ̃IvV`O'R}hœIɕύXłB

	  align_message
	    bZ[WEBhEǂɒu(top, bottom, left, right)

	  align_status
	    Xe[^XEBhEǂɒu(top, bottom, left, right)

	  ascii_map
	    \ȂASCIILN^}bv\

	  color
	    ÁAA̍\vfJ[ŕ\

	  eight_bit_tty
	    8 rbgLN^(Ⴆ traps IvVŎw肵)
	    ܂܃^[~iɕ\(Wݒ̓It)B

	  font_map
	    }bvEBhE\tHg

	  font_menu
	    j[\tHg

	  font_message
	    bZ[W\tHg

	  font_status
	    Xe[^X\tHg

	  font_text
	    eLXg\tHg

	  font_size_map
	    }bvEBhE\tHgTCY

	  font_size_menu
	    j[EBhE\tHgTCY

	  font_size_message
	    bZ[WEBhE\tHgTCY



	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 42



	  font_size_status
	    Xe[^XEBhE\tHgTCY

	  font_size_text
	    eLXgEBhE\tHgTCY

	  fullscreen
	    EBhEłȂʑŜŕ\悤Ǝ݂

	  hilite_pet
	    ybgڗ悤ɕ\(Wݒ̓It)B̃IvV 
	    U 镑͎gĂEBhEVXeɈˑBeLXgEB
	    hȄꍇAPx]ɗpB^C̏ꍇA 
	    Iɂ̓ybg̋߂Ƀn[g}[N\B

	  large_font
	    傫tHggB

	  map_mode
	    w肳ꂽ@Ń}bv\B

	  mouse_support
	    ͂ƈړɃ}EXg悤ɂB

	  player_selection
	    LN^[IɃ_CAO{bNXmFʂp

	  popup_dialog
	    ͎Ƀ|bvAbv_CAO{bNXp

	  preload_tiles
	    ^ C    ɗ\ߓǂݍłBႦ΁AveNg[
	    hMSDOSł̏ꍇAQ[JnɃ^C RAM ɗ\ߓǂݍނ 
	     𐧌䂷B\ߓǂݍނƃ^COtBbN̐\͌シ
	    邪A葽̃ (Wݒ̓I)B `O' R} 
	    hŐݒ肷邱Ƃ͂łȂB

	  scroll_amount
	    scroll_margin  IvVŎw肳ꂽʒuɗƂɁAǂꂾ
	    ̐XN[邩w肷B

	  scroll_margin
	    EBhE̒[炱Ŏw肳ꂽ}XɂȂ܂̓J[\ 
	    ړƂɁAʂXN[B

	  softkeyboard

	  splash_screen
	    NɃXvbVXN[\(Wݒ̓I)

	  tiled_map
	    \Ȃ^C}bv\




	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 43



	  tile_file
	    Wݒ㏑ʂ̃^Ct@C̖O

	  tile_height
	    ^C\łł̃^C̍

	  tile_width
	    ^C\łł̃^C̕

	  use_inverse
	    Q[w肵Ƃɉʂ𔽓]

	  vary_msgcount
	    bZ[WEBhEɈxɕ\郁bZ[W̐

	  windowcolors
	    \ȂEBhEw肵OiF/wiFŕ\

	  wraptext

	  9.6.	vbgtH[ŗL̐ݒIvV

	       ȉ͓̃vbgtH[ŃJX^}CYU镑̕ύX
	  邽߂ɗpIvV̐łB

	  altkeyhandler
	    L[͂ DLL I(Win32 tty NetHack ̂)B DLL  
	     ÓA.dll ̊gqpXŎw肷B `O' R}hŐݒ
	    邱Ƃ͂łȂB

	  altmeta
	    (Wݒ̓IB AMIGA NetHack ̂)B

	  BIOS
	    ɉʂAړɃJ[\L[g悤ɃL[ {[
	    h ǂނ߂ɁA IBM-PC ݊ BIOS ROM gpĂ}V
	    BIOS R[gpB (Wݒ̓ItBOS/2 , PC,    ST
	    NetHack ̂)

	  flush
	    (Wݒ̓ItB AMIGA NetHack ̂)B

	  MACgraphics
	    (Wݒ̓IB Mac NetHack ̂)B

	  page_wait
	    (Wݒ̓IB Mac NetHack ̂)B

	  rawio
	    raw(cbreak łȂ) [hgpāA荂ȏo͂Ɩ̋N
	    Ȃ͂ (MS-DOS ł̓v^Ȃɂ    
	    `^P'  v^o͂̃gOƂ݂ȂĂ܂Ƃ) (W
	    ̓It)B: DEC Rainbow ł͂ꂪÎƂ̓nOAbv
	    Ă܂B `O' R}hŐݒ肷邱Ƃ͂łȂB


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 44



	  soundcard
	    (Wݒ̓IB PC NetHack ̂)B `O' R}hŐݒ肷邱
	    ͂łȂB

	  subkeyvalue
	    (Win32 tty NetHack ̂)BۃL[{[h̖␳̂ 
	    邽߂ɁA OS  NetHack ɕԂL[͂̒lύX邽߂Ɏg
	    pB OPTIONS=subkeyvalue:171/92 ƂƁAƂ 171 
	    悤ƂĂꍇA NetHack  92 ԂBKvȂA
	    subkeyvalue sݒt@CɏĂ悢B `O' R}hŐݒ
	    邱Ƃ͂łȂB

	  video
	    g prfI[hݒ肷(PC NetHack ̂)Bl `autode-
	    tect', `default', `vga' ̂ꂩłB `vga' (  	VGA
	    n[hEFAƂ`autodetect')ɐݒ肷ƁA\Ƀ^C
	    pB `O' R}hŐݒ肷邱Ƃ͂łȂB

	  videocolors
	    NO_TERMgpĂPCVXẽJ[pbgZbg (W
	    ݒ́u4-2-6-1-5-3-15-12-10-14-9-13-11v)(PC NetHack ̂)B
	    V{̏Ԃ́AԁE΁EFEE}[^EVAEP E
	    PԁEP΁EFEPEP}[^EPVAB `O' R
	    }hŐݒ肷邱Ƃ͂łȂB

	  videoshades
	    3 iK̗p\ȃOCXP[ݒ肷 (Wݒ   ``dark
	    normal  light''  PC  Nethack̂)BQ[ʂɂꍇ
	    ́AR̃XP[𒲐Ă݂邱ƁBł܂   
	    A!colorĂ݂邱ƁB `O' R}hŐݒ肷邱Ƃ
	    łȂB

	  9.7.	EO̐ݒ

	       IRpCIvVƂ AUTOPICKUP_EXCEPTIONS  
	   B  ̃IvV`ăRpCꂽoCȉꍇA
	  autopickup IvV̐U镑 pickup_types IvVg
	  邱ƂłB

	       autopickup_exception  sݒt@CɏƂŁAE
	  ƂƂɃ`FbNׂp^[`łB

	  autopickup_exception
	    pickup_types IvV̗Oݒ肷B  autopickup_exception
	    I v V ͂Ȃ̈ʒuɂ镨̂̐̒P`Ɉvp
	    ^[w肷B 1-80 ̕łׂłB

	       p^[ł͈ȉ̓ꕶgB

		 *--- 0 ȏ̕Ƀ}b`B
		 ?--- Cӂ 1 Ƀ}b`B

	       ɁAp^[̐擪ɒuꍇɓʈ镶
	  B


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 45



	       < - ȉ̃p^[Ɉv镨̂͏ɏEB
	       > - ȉ̃p^[Ɉv镨̂͌ďEȂB

	       `O' IvVŐݒ肷邱Ƃł邪Aݒ̓Z[uE[h
	  Ƃɂ͕ۑȂB

	       ȉ autopickup_exceptions ̗łB


	  L̗̍ŏ̂̂́ASĂ̖IɏEBԖڂ̗́A 
	   ͎E̗OƂBṒ̗AĂƂ킩Ă
	  ͎̂E̗OƂB `ďEȂ'[` E '
	  [ɗD悷B

	  9.8.	̐ݒ

	       bZ[WEBhEɕ\ꂽbZ[W[U[`̃p
	  ^[ƈvƂɓ̉t@C炷Ƃ   v
	  bgtH[B݂̂ƂAQt, win32tty, win32gui [
	  U[ɑΉĂB

	       [U[ƃbZ[W̊֘AtɊւݒt@Cڂ
	  ȉ̂ƂłB

	  SOUNDDIR
	    t@ĈfBNg

	  SOUND
	     t@Cƃ[U[w肷郁bZ[Wp^[֘At
	    ځBe SOUND ڂ͈ȉ̍ڂɕB

		 MESG	    - bZ[WEBhEw (3.4 ł͂ɑΉĂ)
		 pattern    - }b`p^[
		 sound file - 炷t@C
		 volume     - t@C炷Ƃ̉

	       p^[̐mȏ̓vbgtH[ ``K\'' p
	     NetHack ̓p^[}b`O@\p邩ɂĕς
	  B ``K\'' }b`O NetHack p^[}b`O
	   Ă邪AT[hp[eBCuKvȃvbgtH[
	  B ``K\'' Ɋւ͂ǂ̂ƂQƂ 
	  ƁB ǂ̃p^[}b`OpĂ邩 #version R}
	  hŊmFłB

	       NetHack ̓p^[}b`O[`͈ȉ̓ꕶp
	  B

		 *--- 0 ȏ̕Ƀ}b`B
		 ?--- Cӂ 1 Ƀ}b`B

	       ȉ NetHack p^[}b`O@\płB

		   SOUND=MESG "*chime of a cash register*" "gong.wav" 50



	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 46



	      "chime of a cash register" ܂ރbZ[Wɔ
	  "gong.wav" 炷Bݒt@Cɂ͕ SOUND ݒ 
	  łB

	  9.9.	oQ҂NetHackvC邽߂̐ݒ

	       NetHack	͓A̒n}̂ɕW ASCII LN^[
	  g悤ɐݒ肷邱ƂłB   A  MS-DOS    
	  NetHack  ͉܂͓_ZppΖڂ̕sRȐlłS
	  ɃvC\łBvC[͂̉ʓǂݎVXe 
	   \ȒmKvŁA㉺EɈꕶړ@m
	  ΂ȂȂ낤BʓǂݎVXě\͂m邱 
	   Ȃ艿lBvCOɂ̃KChubN\ɓǂ߂΁A
	  ʂ̃CAEgǂȊ킩邾낤B܂A PC J[\ 
	    u ˂~߂邱ƂłKvB͎̃LN
	  ^[̈ʒuĂB `@'͑̃q[}mCh\킷̂ɂ p
	  ̂ŁÄʒuT̂`@'邾ł͕s\ł
	  BɁAȂĂʒu PC J[\̈ʒu̕I s
	   m点@\Kv낤B̋@\̓XN[Ŝɂǂ̂
	  ȃACe邩𔻕ʂ̂ɕ֗łB

	       ꂽ[U[Ȃ defaults.nhC邱Ƃ͓Ȃ
	  AS҂͏Ђł܂dȂB NetHack ̑S
	  ̌zzɂ NHAccess.nhƂt@ C        B
	  default.nh t@C̃t@CƓւ邱ƂɂAڂ̕s
	  RȐlvCł悤ȐݒɂȂBt@CC   
	  Q[ ̂̂ɊꂽȂAD݂ɍ悤ɐݒύX
	  ƎvƂ낤B̂߂̐ NHAccess.nh ̂̂Ɋ܂܂
	   BQ[̃ANZVreBɍłe^ݒ͈ȉ̂
	  ł:

	  IBMgraphics
	    ̃IvVRgAEg邱Ƃɂ IBM OtBbN
	    𖳌ɂB

	  menustyle:traditional
	    ͉VXe𗘗p鏕ɂȂB

	  number_pad
	     ̔vO number-pad ʂ̊mFɗpB̏
	    A number_pad IvVItɂāA`I Rogue R}
	    hgƁB

	  Character graphics
	    defaults.nh  t@C̉̕ɂSẴLN^[OtBb
	    NݒRgAEgB̂قƂǂ NetHack ̕W
	     A W ASCII LN^[pA̕\gLN
	    ^[ZbĝÂLN^[ŒuB̃L 
	    N^[͉ʓǂݎVXeς킹邾낤B

	  10.  _

	       NetHack ͐ݒɂāAȂ̋@Bɂ鍂_̈ꗗ܂
	  ͍_҂̈ꗗ쐬B҂̐ݒɂȂĂꍇAQ[ 


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 47



	   ܂ŏIꍇ̃}V 1 ̃AJEgɂ 1 
	  ̈ꗗɂ͍ڂȂBȂ̈ꗗɍڂĂ鑼 N
	   荂_ƂA͂Ȃ̑O̓_荂_
	  Ƃɂ̂݁Äꗗׂ̂ʒuɂȂ̖ O  
	  B_܂ōڂ邩RpCɐݒłB

	       _͎ɌolA험iABKƃQ[̏IɊ
	  ĂBQ[ꍇɂ͎ĂSzɂĒE o
	   B|̖{̒ŎEꂽꍇɂ́AS[
	  ƎĂ 90% Mhɓ`(`҂͖S[ 
	  ꍇɂ͎萔邱ƂmĂ)B]ĉɂɈ
	  ĉ^ΐcƂ邩AĂ̎_Ŏ 
	   ŏI邩͂Ȃ߂邱ƂłBꍇׂ͂
	  ̋ɂ邱ƂłBĐc΂ɑ 
	  邱Ƃł邩mȂB

	       PɌ_ł̍_ҁE_̈ꗗꍇɂ͂قƂ
	  ̃o[Wł nethack -s all Ɠ͂΂悢B


	  11.  T[h

	       NetHack ͕GœQ[łBS҂͐c邷ׂm
	   ȂƂɋCÂA|ɂÂĂ܂ȂB
	  邱Ƃ͂ȂB`铴AɁuTv́uv[h 
	   ꍇɂ́A_̈ꗗɍڂȂƂƂɑȂfb
	  gƈւɑÕZ[ut@CcĂsgƂȂꂽ 
	  ̂łB

	       T [hɓɂ 2 ʂ̕@B1 ̓Q[̊Jn
	   -X XCb`t邱ƂłB 1 ̓Q[̃vC
	  `X'  R}h͂邱ƂłBT[hœ鑼̗_
	  _ȓǎҏNm߂ė~B


	  12.  NWbg

	       ŏ hack ƂQ[́Ao[NC UNIX ̃Q[ rogue
	   fƂĂB̃hLg̑啔 Michael C. Toy 
	  Kenneth C. R. C. Arnold ̎ɂȂ A Guide  to  the  Dungeons  of
	  Doom(^̓Aւ̏) }Xp̂łB܂ꕔ
	   Ken Arromdee ɂ Further Exploration  of  the  Dungeons  of
	  Doom(^̓A̐[ւ̒T) ̂ĂB

	       NetHack ͕ǂ艽\l̐lX̎ɂĊꂽB
	  ̓Q[̊J̉ߒł̎ȏołB


	       Jay Fenlason  Kenny Woodland, Mike Thome, Jon Payne ̏
	  𓾂āAŏ Hack B

	       Andries Brouwer ̓vO啝ɏ Hack Ƃ
	  ȂقȂQ[ɎdďグA UNIX }Vp(Ȃ  )3
	  o[W(1.0.1A1.0.2A1.0.3) Usenet Ŕ\B


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 48



	       Don  G.	Kneller  Hack 1.0.3  Microsoft C gp MS-
	  DOS ֈڐA PC HACK 1.01e 쐬Bo[W 1.03g ł	DEC
	  Rainbow   ̃OtBbNT|[gAďȂƂ 4 
	  o[W(3.0A3.2A 3.51A3.6)쐬B

	       R. Black  PC HACK 3.51  Lattice C   g p    Atari
	  520/1040ST ֈڐA ST Hack 1.03 쐬B

	       Mike  Stephenson ͂̂낢ȃo[WĂ 1 
	  A̒ǉvfƍ킹 NetHack o[W 1.4 쐬 
	  Bɔނ͉l̐lXɍƂ𕪒S NetHack 1.4 ̊g
	  fobOsA NetHack o[W 2.2  2.3 𔭕\B

	       ɂ̌AMike  Ken Arromdee, Jean-Christophe  Collet,
	  Steve  Creps, Eric HendricksonAIzchak MillerAJohn RupleyA Mike
	  ThreepointAJanet Walz ܂ރ`[𗦂ăQ[̑啝ȏ
	  sȂA NetHack 3.0c 쐬B

	       NetHack	3.0  Eric R. Smith ɂ Atari ցA Timo Haku-
	  linen ɂ OS/2 ցA David Gentzel ɂ VMS ֈ A  
	  B  3 l Kevin Darcy ͂̌͊J`[ɉA 3.0
	  ̂̌̂̉ł쐬B

	       Olaf Seibert  NetHack 2.3  3.0  Amiga   A  B
	  Norm MeluchAStephen SpackmanAPierre Martineau  PC NetHack 3.0
	  ̂߂̃I[o[C[`݌vB Johnny Lee	  NetHack
	  3.0  Macintosh ֈڐABނ͑̂܂܂ȓA̎傽Ƃ
	   PCAMacintoshAAmiga ̈ڐAł̊g𑱂A 3.0 ̂̌̂
	  ̉ł쐬B

	       Mike Stephenson[_[ƂAIzchak MillerJanet Walz̏
	  ɂ Ken Arromdee,  David  Cohrs,  Jean-Christophe  Collet,
	  Kevin Darcy, Matt Day, Timo Hakulinen, Steve Linhart, Dean Luick,
	  Pat Rankin, Eric Raymond, Eric Smith ܂ސ`[ 3.0̓O
	  I ȌsȂBނ̓Q[fUCč\zAR[h̑
	  B_WAVfBXvCAꂼ 
	  L N^[̓ʂ̃NGXgAVGhQ[Ƃ̑̑
	  ̐VvfǉA NetHack 3.1𐧍삵B

	       Ken Lorber, Gregg Wonderly, Greg Olson   Richard  Addison,
	  Mike Passaretti, Olaf Seibert ̏؂ Amiga p NetHack 3.1
	  쐬B

	       Norm Meluch  Kevin Smolkowski	  Carl  Schelin,  Stephen
	  Spackman,  Steve  VanDevender, Paul Winner ̏؂ NetHack
	  3.1  PC ɈڐAB

	       Jon Watte  Hao-yang Wang  Ross Brown, Mike Engber, David
	  Hairston,  Michael  Hamel,  Jonathan	Handler,  Johnny  Lee,	Tim
	  Lennan, Rob Menke, Andy Swanson ̏؂ MPW p Macintosh
	  p  NetHack 3.1 쐬B̍쐬ɁABarton House  Think C
	  pB




	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 49



	       Timo Hakulinen  NetHack 3.1  OS/2   A  B  Eric
	  Smith    NetHack 3.1  Atari ɈڐAB Pat Rankin  Joshua
	  Delahunty ̏؂ VMS  NetHack 3.1 쐬B  Michael
	  Allison  NetHack 3.1  Windows NT ɈڐAB

	       Dean  Luick   David Cohrs ̏؂ X11 p NetHack3.1
	  쐬B Warwick Allison  Atari p NetHack ̃^C  o[
	  W   쐬Bނ͌Ƀ^CJ`[Ɋ񑡂A^CT
	  |[g͑̃vbgtH[ɂǉꂽB

	       Michael Allison, Ken Arromdee, David Cohrs,  Jessie  Collet,
	  Steve  Creps,  Kevin	Darcy,	Timo Hakulinen, Steve Linhart, Dean
	  Luick, Pat Rankin, Eric Smith, Mike Stephenson, Janet  Walz,	and
	  Paul	Winner Ȃ 3.2̊J`[ o[W 3.2  1996 N
	  4 Ƀ[XB

	       o[W 3.2 ͊J`[Ă 10 N̂ 
	  Bނ̃Q[ւ̍vɂċLƁA13 l̏̊J`[
	  S͂̃[X̊Jn̍ŏ̎_܂Ń`[ɎcĂ B
	  A 3.1.3  3.2 ̊ԂɁAJ`[̑nn҂̈lł Izchak
	  MillermƐffASȂB̃[X͊J`[ 
	  шڐA`[ނɕꂽB

	       NetHack	3.1  3.2 ̎ɁAQ[ɔMlQ[
	  Ɏg̕ύXuvɔ\B

	       Tom Proudfoot  Yuval Oren  NetHack++ 쐬A 
	     NetHack--   ɉꂽBƂ͓ƗɁAStephen White 
	  NetHack Plus 쐬B Tom Proudfoot ͌ NetHack  Plus	 
	  NetHack--    A SLASH 쐬B Larry Stewart-Zerba 
	  Warwick Allison ͎rVXeǂ Wizard Patch  
	   B Warwick Allison  NetHack  Qt C^[tF[Xg
	  ɕύXB

	       Warren Cheung  SLASH  Wizard Patch 𓝍   Slash'em
	   쐬A Kevin Hugo ̗͂؂āA̗vfǉB Kevin
	  ͌ɊJ`[ɉÃACfA NetHack 3.3 ɓ
	  B

	       3.2  ̍ŏIo[W̓oOCłł 3.2.3 łB
	  2000 N΍̂߂ 3.3.0 Ɠ 1999 N 12 ɔ \  
	  B

	       Michael	Allison,  Ken Arromdee, David Cohrs, Jessie Collet,
	  Steve Creps, Kevin Darcy, Timo Hakulinen, Kevin Hugo, Steve  Lin-
	  hart,  Ken  Lorber,  Dean  Luick,  Pat  Rankin,  Eric Smith, Mike
	  Stephenson, Janet Walz, Paul Winner Ȃ 3.3 ̊J`[  
	  1999 N 12  3.3.0A 2000 N 8  3.3.1 [XB

	       o[ W 3.3 ͑̐Vvf񋟂B܂A푰ƐEƂ
	  ŏ̃o[WłBEƂƂẴGt͍폜A 
	   ̈ƂȂB܂Ah[tAm[AI[N푰ƂĒǉ
	  ꂽBNƃW[̓EƂƂĒǉꂽB ɁA
	   ɏ邱Ƃoŏ̃o[WłAꂽSĂ


	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 50



	  oOEFuTCgŌ\ŏ̃o[WłBoOX g
	   ɐLтĂɂւ炸A 3.3  1 NƂŏ\
	  肵ĂƂؖB

	       3.4 J`[ Michael Allison, Ken Arromdee, David Cohrs,
	  Jessie  Collet,  Kevin  Hugo, Ken Lorber, Dean Luick, Pat Rankin,
	  Mike Stephenson, Janet Walz, and Paul Winner ŊJnA NetHack
	  3.4.0 [XO 2002 N 3   Warwick Allison B

	       o[W 3.3 ƓlɁAlXȐlX NetHack ̐FXȃvb
	  gtH[ւ̈ڐAsȂĂꂽB

	       Pat Rankin  3.4  VMS ւ̈ڐASB

	       Michael	Allison  MS-DOS ł NetHack 3.4 ǗĂB
	  Paul Winner  Yitzhak Sapir `ĂB

	       Dean Luick, Mark Modrall, Kevin Hugo  3.4  Macintosh  
	  ̈ڐAƊgSB

	       Michael	Allison,  David  Cohrs, Alex Kompel, Dion Nicolaas,
	  Yitzhak Sapir  3.4  Microsoft Windows vbgtH[ւ 
	  A  g   SB Alex Kompel  Windows łւ̐VO
	  tBbNC^[tF[X񋟂B Alex Kompel ͂܂A3.4.1 
	  Windows CE ł񋟂B

	       Ron Van Iwaarden  3.4  OS/2 łǗĂB

	       3.3.1  ŕ Amiga ւ̈ڐAƊg Janne Salmijarvi 
	  Teemu Suikki sĂB

	       3.3.1 ŕ Atari ł Christian ``Marvin'' Bressler 
	  ǗĂB

	       Ken  Lorber  ɂĊǗĂ NetHack ̃EFuTCg
	  http://www.nethack.org/ ɂB

		    - - - - - - - - - -

	       Xlbg[N̐Êǂ悤ȂAAQ[̉
	   菕悤ƂĂƂ킯悤ȏC𑗂Ă悱
	  BA̐_X́AƂɂ͂}̂łł׈ȘA 
	  ̖O𓴌A̎傽̈ꗗƂĂɋL̂B













	  NetHack 3.4					   December 2, 2003





	  NetHack Guidebook						 51



		    Adam Aronow 	   Izchak Miller	 Mike Stephenson
		    Alex Kompel 	   J. Ali Harlow	   Norm Meluch
		   Andreas Dorn 	     Janet Walz 	   Olaf Seibert
		    Andy Church 	  Janne Salmijarvi	  Pasi Kallinen
		   Andy Swanson        Jean-Christophe Collet	    Pat Rankin
		   Ari Huttunen 	   Jochen Erwied	   Paul Winner
		   Barton House 	    John Kallen 	 Pierre Martineau
		Benson I. Margulies	    John Rupley 	    Ralf Brown
		     Bill Dyer		    John S. Bien	    Ray Chason
		 Boudewijn Waijers	     Johnny Lee 	 Richard Addison
		     Bruce Cox		     Jon W{tte		  Richard Beigel
		  Bruce Holloway	  Jonathan Handler	Richard P. Hughey
		  Bruce Mewborne	  Joshua Delahunty	    Rob Menke
		   Carl Schelin 	   Keizo Yamamoto	  Robin Johnson
		    Chris Russo 	     Ken Arnold 	Roderick Schertler
		    David Cohrs 	    Ken Arromdee	  Roland McGrath
		  David Damerell	     Ken Lorber 	 Ron Van Iwaarden
		   David Gentzel	   Ken Washikita	  Ronnen Miller
		  David Hairston	    Kevin Darcy 	    Ross Brown
		    Dean Luick		     Kevin Hugo 	 Sascha Wostmann
		     Del Lamb		    Kevin Sitze 	   Scott Bigham
		   Deron Meranda	  Kevin Smolkowski	 Scott R. Turner
		   Dion Nicolaas	    Kevin Sweet 	 Stephen Spackman
		  Dylan O'Donnell	    Lars Huttar 	  Stephen White
		    Eric Backus 	    Malcolm Ryan	   Steve Creps
		 Eric Hendrickson	   Mark Gooderum	  Steve Linhart
		   Eric R. Smith	    Mark Modrall	Steve VanDevender
		  Eric S. Raymond	  Marvin Bressler	   Teemu Suikki
		   Erik Andersen	    Matthew Day 	    Tim Lennan
		 Frederick Roeber	    Merlyn LeRoy	  Timo Hakulinen
		    Gil Neiger		  Michael Allison	     Tom Almy
		    Greg Laskin 	    Michael Feir	     Tom West
		    Greg Olson		   Michael Hamel	  Warren Cheung
		  Gregg Wonderly	  Michael Sokolov	 Warwick Allison
		   Hao-yang Wang	    Mike Engber 	  Yitzhak Sapir
		   Helge Hafting	    Mike Gallop
	       Irina Rempt-Drijfhout	  Mike Passaretti

	  uhƐi͊eЂ̏W܂͓o^WłB

















	  NetHack 3.4					   December 2, 2003



