Sponsored Content
Contact Us Post Here to Contact Site Administrators and Moderators How to hack computer games that is paid??? Post 302954471 by vbe on Tuesday 8th of September 2015 08:43:00 AM
Old 09-08-2015
In no way you will find assistance here for you desire, this is not a hacker's forum, posters here are or expected to be professionals that have little trouble in producing their code correctly...
Thread closed
 

8 More Discussions You Might Find Interesting

1. AIX

Seeking Paid AIX Support ? anyone know where ?

Hello, I was wondering if anyone knows about getting support for AIX ; This forum is a great place but if it has a section for $$$ AIX support where the experts can analyze and answer the questions/queries of the posters ? Is it possible to get any paid support on this forum ? (8 Replies)
Discussion started by: filosophizer
8 Replies

2. Shell Programming and Scripting

Paid job for bash shell scripts

Job ad removed (1 Reply)
Discussion started by: starmation
1 Replies

3. Cybersecurity

Anonymous published Sentinel counter-hack anti-cyberterrorism training ISO – Computer

Anonymous published Sentinel counter-hack anti-cyberterrorism training ISO image - Computerworld Blogs The link in their twitter doesn't work any more. https://twitter.com/#!/AnonymousIRC/status/85134355659374593 Anyone know for any link to this iso? maybe server outside the US? ... (1 Reply)
Discussion started by: programAngel
1 Replies

4. What is on Your Mind?

Of Computer wizards and games

You guys are really are a genius, you make computer processing more easy for us end users. You just don't make wonders but you also make good computer games too. Really there is a fast evolution on the era of the computer world. Thanks to you guys! __________________ The Cute Angry Birds... (0 Replies)
Discussion started by: methusela123
0 Replies

5. Ubuntu

use VM to play games in Windows (Intense Games)

I have Ubunut installed on my desktop AMD 6 Core 3.2 (will be getting the bulldozer AMD 8 Core when it releases) 16 GB of DDR3 1333 RAM SSD some HDD's Nvidia 560 ti 1GB My question is, how can I or can I even get a Win 7 VM to play games as well in a main install. Give it 10 GBs of RAM... (0 Replies)
Discussion started by: ochieman2000
0 Replies

6. Red Hat

check system resources (VPS) to see if match what I paid?

-bash-3.2$ cat /etc/redhat-release CentOS release 5.8 (Final) Hello, Our company recently paid a hosting company (who shall remain nameless) with certain service guarantees. Is there a simple way to list the CPU speed, RAM, Disk Space etc. It is supposed to be; 25GB Disk Space, 500GB... (2 Replies)
Discussion started by: Astrocloud
2 Replies

7. What is on Your Mind?

Your favourite computer games....

Hi all, there have been a tremendous evolution in the computer games from games like Tetris or DAVE or Prince of Persia or wolf3d... to Call of Duty or BattleField or tomb raider etc etc so let us know the games which you liked the most.... you can also mention about the gaming rig you... (32 Replies)
Discussion started by: vivek d r
32 Replies

8. What is on Your Mind?

The NSA paid $10 million to the security firm RSA to install a cryptographic backdoor.

(5 Replies)
Discussion started by: Neo
5 Replies
HACK(6) 							 BSD Games Manual							   HACK(6)

NAME
hack -- exploring The Dungeons of Doom SYNOPSIS
hack [-d directory] [-n] [-u playername] hack [-d directory] [-s] [-X] [playername ...] DESCRIPTION
hack is a display oriented dungeons & dragons-like game. Both display and command structure resemble rogue. (For a game with the same structure but entirely different display - a real cave instead of dull rectangles - try Quest.) To get started you really only need to know two commands. The command ? will give you a list of the available commands and the command / will identify the things you see on the screen. To win the game (as opposed to merely playing to beat other people's high scores) you must locate the Amulet of Yendor which is somewhere below the 20th level of the dungeon and get it out. Nobody has achieved this yet and if somebody does, he will probably go down in history as a hero among heroes. When the game ends, either by your death, when you quit, or if you escape from the caves, hack will give you (a fragment of) the list of top scorers. The scoring is based on many aspects of your behavior but a rough estimate is obtained by taking the amount of gold you've found in the cave plus four times your (real) experience. Precious stones may be worth a lot of gold when brought to the exit. There is a 10% penalty for getting yourself killed. The administration of the game is kept in the directory specified with the -d option, or, if no such option is given, in the directory speci- fied by the environment variable HACKDIR, or, if no such variable exists, in the current directory. This same directory contains several auxiliary files such as lockfiles and the list of topscorers and a subdirectory save where games are saved. The game administrator may how- ever choose to install hack with a fixed playing ground, usually /var/games/hack. The -n option suppresses printing of the news. The -u playername option supplies the answer to the question "Who are you?". When playername has as suffix one of -T, -S, -K, -F, -C, or -W, then this supplies the answer to the question "What kind of character ... ?". The -s option will print out the list of your scores. It may be followed by arguments -X where X is one of the letters C, F, K, S, T, W to print the scores of Cavemen, Fighters, Knights, Speleologists, Tourists or Wizards. It may also be followed by one or more player names to print the scores of the players mentioned. AUTHORS
Jay Fenlason (+ Kenny Woodland, Mike Thome and Jon Payne) wrote the original hack, very much like rogue (but full of bugs). Andries Brouwer continuously deformed their sources into the current version - in fact an entirely different game. FILES
hack The hack program. data, rumors Data files used by hack. help, hh Help data files. record The list of topscorers. save A subdirectory containing the saved games. bones_dd Descriptions of the ghost and belongings of a deceased adventurer. xlock.dd Description of a dungeon level. safelock Lock file for xlock. record_lock Lock file for record. ENVIRONMENT
USER or LOGNAME Your login name. HOME Your home directory. SHELL Your shell. TERM The type of your terminal. HACKPAGER, PAGER Pager used instead of default pager. MAIL Mailbox file. MAILREADER Reader used instead of default (probably /usr/bin/mail). HACKDIR Playground. HACKOPTIONS String predefining several hack options (see help file). Several other environment variables are used in debugging (wizard) mode, like GENOCIDED, INVENT, MAGIC and SHOPTYPE. BUGS
Probably infinite. Mail complaints to mcvax!aeb . BSD
March 31, 1985 BSD
All times are GMT -4. The time now is 03:56 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy