/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */Now that CWI has allowed free redistribution of this game, I have made an attempt to reconstruct the original sources.
There is a tape but nobody seems to have functioning tape readers anymore.
There has been an incredible amount of traffic generated by users (and abusers) of the "hack" game recently posted to the net. I have just created the newsgroup "net.games.hack" for that traffic. Please stop posting articles about "hack" to "net.games" and "net.games.rogue" and use this new group instead. We now resume the disaster, already in progress.
In fact, missing parts were not uncommon, witness several stories and poems. Here a fragment of the Case of the missing Part 10
THE CASE OF THE MISSING HACK SOURCE PART 10 The time was 483625902. The place was BCU (University California - Backwards). Ed and I has just finished sorting through our $HOME directory when suddenly she entered the room -- a tall dark blond carrying a portable UNIX system. "I've lost it." she blurted out. I suppressed a laugh as I noticed that Ed's tty's were suddenly becoming enabled. "Baby", I said, "We've all lost it, otherwise we wouldn't be here." She cast a cryptic glance at Ed, then turned her attention to me as she said, "Oh no. I mean I've lost IT. My only source to HACK1.0.2, part 10." What a cruel and vicious thing to have happened to a lady. Of all the parts for a lady to lose -- part 10 was the worst. "You've got to be nice and help me find it before it's too late." ...
I put a copy of this in the directory uni87a, files part1., part2., part3., part4., part5., part6., part7., part8., part9., part10., hack.doc. This agrees with the parts 1, 3-10 given above, except that part8. here was repackaged, part1. has a different #define for WIZARD, and some whitespace damage was fixed.Subject: Lost Part 2 of Hack 1.0.2 found Date: Fri, 9 Sep 2005 21:52:34 +0000 An almost complete distribution of Hack 1.0.2, including Part 2 (which is missing from Google), has turned up at: http://vmsone.com/~decuslib/unixsig/uni87a/hack/
Richard Andrews found himself in deep trouble, thanks to the E911 document. Andrews lived in Illinois, the native stomping grounds of the Chicago Task Force. On February 3 and 6, both his home and his place of work were raided by USSS. His machines went out the door too, and he was grilled at length (though not arrested). Andrews proved to be in purportedly guilty possession of: UNIX SVR 3.2; UNIX SVR 3.1;UUCP; PMON; WWB; IWB; DWB; NROFF; KORN SHELL '88; C++ and QUEST.Hack and Quest had large parts of their source in common - the main difference was that Quest used its own level generator quest.mklev.c. I no longer have my copy - sent it optimistically by email from Amsterdam to Denmark and then deleted the Amsterdam copy, but the email never arrived: being larger than 100 kB, the message was discarded by some gateway.
Hack 1.0.3 is more than three times as large, with important additions like the dog, the shops, long worms, the endgame, and contains very little if anything from the original sources.
This source is now freely distributable under a BSD-type license: First of all, Jay Fenlason allows distribution of all code he wrote:
I wish to place all of the hack source code I wrote under the following license. > /* > * Copyright (c) 1982 Jay Fenlason> * All rights reserved. > * > * Redistribution and use in source and binary forms, with or without > * modification, are permitted provided that the following conditions > * are met: > * 1. Redistributions of source code must retain the above copyright > * notice, this list of conditions and the following disclaimer. > * 2. Redistributions in binary form must reproduce the above copyright > * notice, this list of conditions and the following disclaimer in the > * documentation and/or other materials provided with the distribution. > * 3. The name of the author may not be used to endorse or promote products > * derived from this software without specific prior written permission. > * > * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, > * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY > * AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL > * THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, > * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, > * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; > * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, > * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR > * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF > * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. > */ > Jay Fenlason
Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica, Amsterdam All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: - Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. - Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. - Neither the name of the Stichting Centrum voor Wiskunde en Informatica, nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Dick Broekhuis, controller CWI