< Rodney> DrHats (Rog Orc Mal Cha), 1125 points, T:1835, killed by a pony
< billnye> not DrCowboyHats, that's for sure
<b_jonas> oh, that that function randomly calls useup on the scroll, which is why there is a comment when creating the pseudo-object that it's initialized to a stack of 20 spellbooks so that it's not used up
< Rodney> mathew (Wiz Elf Mal Cha), 377 points, T:1246, killed by a dog called Advice Dog
< Muad> Advice Dog says "don't die!". Advice Dog bites! You die..
<bcode> The djinni speaks. "Can't you read the label, fool? 'Best before T:2042'!" The djinni hits! You die...
<TjrWiz> nomul(0) -- so you waste all your movement points if you have speed?
<ais523> nomul(0) doesn't waste all your movement points, that's nomul(-1) you're thinking of
<rawrmage> question: what the hell is actually nomul
<ais523> nomul(0) just turns off run and command repeat
<ais523> rawrmage: err, you probably don't want to ask that
< askhl_> I still don't understand the deal with the bobble hat. Weren't the challenges supposed to make the game *more* difficult? Its advantage seems to be that it's an extremely good helmet. But what's the disadvantage? That it will maybe crash the game?
< s-vektori> you can drain for gain with drain life!
< s-vektori> like i did recently with some char
< s-vektori> then i did it wrong (:D) and ended up with xlvl 1 char with 2 hp's
< s-vektori> had to seriously grind for a while to survive
< s-vektori> any comments on good beginning strategy
< chao> don't die
< bcode> s-vektori: don't die;
< theRaisse> s-vektori: don't die
<+ais523> and "open-world" means that there are a huge number of areas to visit, most of which are mostly identical and just filler
<+ais523> but we have that already in Gehennom
<+ais523_> I guess whenever you look at any part of NetHack code in details, you just find a mound of special cases taped together by global variables
<+ais523_> apart from the drawbridge code
< coppro> ais523_: which is a mound of special cases taped together by special cases?
<+ais523_> which works by assuming that the rest of NetHack follows a sane storage model and then tries to warp reality around it to fit