ืžืขืœื“ื•ื ื’ ืคื•ืŸ ื“ื™ ืฉืคึผื™ืœ NetHack 3.6.3

ื ืึธืš 6 ื—ื“ืฉื™ื ืคื•ืŸ ืึทื ื˜ื•ื•ื™ืงืœื•ื ื’, ื“ื™ NetHack ืึทื ื˜ื•ื•ื™ืงืœื•ื ื’ ืžืึทื ืฉืึทืคึฟื˜ ืฆื•ื’ืขื’ืจื™ื™ื˜ ืžืขืœื“ื•ื ื’ ืคื•ืŸ ื“ื™ ืœืขื“ื–ืฉืึทื ื“ืขืจื™ ืจืึธื’ื•ืขืœื™ืงืข ืฉืคึผื™ืœ NetHack ืงืกื ื•ืžืงืก.

ื“ืขืจ ืžืขืœื“ื•ื ื’ ื›ึผื•ืœืœ ื“ืขืจ ื”ื•ื™ืคึผื˜ ื–ืฉื•ืง ืคื™ืงืกื™ื– (ืื™ื‘ืขืจ 190), ื•ื•ื™ ื’ืขื–ื•ื ื˜ ื•ื•ื™ ืื™ื‘ืขืจ 22 ืฉืคึผื™ืœ ื™ืžืคึผืจื•ื•ื•ืžืึทื ืฅ, ืึทืจื™ื™ึทื ื’ืขืจืขื›ื ื˜ ื“ื™ ืกืึทื’ื“ื–ืฉืขืกื˜ื™ื“ ื“ื•ืจืš ื“ื™ ืงื”ืœ. ืื™ืŸ ื‘ืึทื–ื•ื ื“ืขืจ, ืงืึทืžืคึผืขืจื“ ืžื™ื˜ ื“ื™ ืคืจื™ืขืจื“ื™ืงืข ืžืขืœื“ื•ื ื’, ื“ื™ ืคืึธืจืฉื˜ืขืœื•ื ื’ ืคื•ืŸ ื“ื™ ืงืœืœื•ืช ืฆื•ื‘ื™ื ื“ ืื•ื™ืฃ ืึทืœืข ืคึผืœืึทื˜ืคืึธืจืžืก ืื™ื– ื‘ืื˜ื™ื™ื˜ื™ืง ื™ืžืคึผืจื•ื•ื•ื“. ืึทืจื‘ืขื˜ ืื™ืŸ MS-DOS (ืกืคึผืขืฆื™ืขืœ ืื•ื™ืฃ ื•ื•ื™ืจื˜ื•ืึทืœ ืžืืฉื™ื ืขืŸ) ืื™ื– ืื•ื™ืš ื™ืžืคึผืจื•ื•ื•ื“.

ื“ื™ ืžืขืœื“ื•ื ื’ ืคื•ืŸ ื•ื•ืขืจืกื™ืข 3.6.3 ืื™ื– ื“ื™ ืœืขืฆื˜ ืžืขืœื“ื•ื ื’ ืคื•ืŸ ื“ื™ 3.6 ืฆื•ื•ื™ื™ึทื’ ืื•ืŸ ืื™ื– ื“ืขืจ ืึธื ื”ื™ื™ื‘ ืคื•ืŸ ื“ืขืจ ืึทื ื˜ื•ื•ื™ืงืœื•ื ื’ ืคื•ืŸ ื“ื™ 3.7 ืฆื•ื•ื™ื™ึทื’. ื“ืขืจ ื•ื•ื™ื™ึทื˜ืขืจ ื”ื•ื™ืคึผื˜ ืžืขืœื“ื•ื ื’ ืื™ื– ื’ืขืจื™ื›ื˜ ืฆื• ื–ื™ื™ืŸ 3.7.0, ืื™ืŸ ื•ื•ืึธืก ืขืก ืื™ื– ืคึผืœืึทื ื ืขื“ ืฆื• ื‘ืึทืงืขื ืขืŸ ื ื™ื™ึทืข ืคึฟืขื™ึดืงื™ื™ื˜ืŸ, ื•ื•ื™ ื’ืขื–ื•ื ื˜ ื•ื•ื™ ืฆื• ืจื™ื™ื ื™ืงืŸ ื“ื™ ืงืึธื“ ื‘ืึทื–ืข ืคึฟื•ืŸ ืงืึธื“ ืฆื• ืฉื˜ื™ืฆืŸ ืึท ื ื•ืžืขืจ ืคื•ืŸ ืึทื•ื˜ื“ื™ื™ื˜ื™ื“ ืคึผืœืึทื˜ืคืึธืจืžืก.

ืžืขืœื“ื•ื ื’ ืคื•ืŸ ื“ื™ ืฉืคึผื™ืœ NetHack 3.6.3

ืžืงื•ืจ: opennet.ru

ืœื™ื™ื’ืŸ ืึท ื‘ืึทืžืขืจืงื•ื ื’