- CONFIGURATION AND ENVIRONMENT
- BUGS AND LIMITATIONS
- SEE ALSO
- LICENSE AND COPYRIGHT
- DISCLAIMER OF WARRANTY
Acme::MetaSyntactic::nethack - The largest time waster in the world of *nix.
This document describes Acme::MetaSyntactic::nethack version 1.0.1.
This theme lists NetHack artifacts, objects (both unknown and known descriptions), roles, names, sayings, etc.
List of categories
This module was created by copying strings from the NetHack 3.4.3 source. Categories are thus, for the most part, those of the NetHack developers.
This theme currently includes the following high-level categories:
artifacts: special, unique items. No subcategories.
monsters: the various entities with which you interact. (slash!, smash!, kill!)
Monsters are subdivided into
quests(which are further subdivided into
bogus(which includes things like smurfs and mothers-in-law.).
objects: the things you will need in your journey.
This contains two immediate subcategories:
known. These differentiate the descriptions you will get when you have no special information about an item and when you can properly recognize an item. For example, requesting a name from
objects/unknown/ringswill return something like "coral_ring", while
objects/known/ringswill return something like "ring_of_increase_damage".
Both of these have the following sub-sub-categories:
amulets: the fetishes that may or may not influence you. Includes the objective of the game.
armor: the (hopefully) protective bits of raiment. Subdivided into
shirts(worn by tourists), and
suits, which is further subdivided into
food: comestibles broken down by
people_food(mmmm... candy bars).
gems: shiny bits.
potions: mmm... tastes like a caramel latte.
rings: pretty things for your fingers.
rocks: ummm, these are, like, really rocks.
scrolls: bits of paper with weird, indecipherable scrawls on them.
spellbooks: just a bunch of words.
tools: manipulators, subdivided into
weapons(things like pickaxes which can be used for digging or bashing something's skull), and
wands: sticks that you wave in the air.
weapons: instruments used solely for self-defense (or not). Subdivided into
polearms(broken down into
miscellaneous: the other stuff.
roles: information about the occupations you may have. Subdivided into:
classes: the occupations themselves.
levels: the names for the experience levels for each occupation. Subdivided by occupation:
gods: the Higher Entities that each occupation grovels before, bribes, scorns, pleads to, and curses. Subdivided by occupation:
races: the five humanoid types you can be. No subcategories.
genders: the three sex types you can be. No subcategories.
alignment: the view types you can have on the universe. No subcategories.
shops: the kinds of items that an establishment may purvey. No subcategories.
tshirts: the epigrams that may show on a tourist's chest. No subcategories.
sounds: various noises you may hear. No subcategories.
names: the proper names that an entity may take. Subdivided into:
ghosts: the proper names for the incorporeal presences you may encounter.
coyotes: the proper names for certain dog-like creatures. These are all mock-Latin.
shopkeepers: the proper names for the vendors you will be stea^H^H^H^Hpurchasing items from, subdivided by the type of items they sell:
light_in_mine(light stores in mine levels), and
statements: various utterances and responses you may hear along your way. No subcategories.
CONFIGURATION AND ENVIRONMENT
Acme::MetaSyntactic::nethack requires no configuration files or environment variables.
BUGS AND LIMITATIONS
No bugs have been reported.
Please report any bugs or feature requests to
email@example.com, or through the web interface at http://rt.cpan.org.
LICENSE AND COPYRIGHT
Copyright ©2007-2008, Elliot Shank
<firstname.lastname@example.org>. All rights reserved.
This module is free software; you can redistribute it and/or modify it under the same terms as Perl itself. See perlartistic.
DISCLAIMER OF WARRANTY
BECAUSE THIS SOFTWARE IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE SOFTWARE, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE SOFTWARE "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE SOFTWARE IS WITH YOU. SHOULD THE SOFTWARE PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR, OR CORRECTION.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE SOFTWARE AS PERMITTED BY THE ABOVE LICENSE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE SOFTWARE TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.