December 19, 2025
Scroll Wars: Nostalgia vs. Naughty Code
Reconstructed Commander Keen 1-3 Source Code
35 years on, fans cheer while old office drama resurfaces
TLDR: A reconstructed Commander Keen 1–3 source lets fans rebuild the original games exactly, sparking celebration and a fresh ethics debate over alleged reuse of workplace code. Some cheer the preservation and ask if it boosts modern ports; others argue whether hero worship trumps office rules.
Commander Keen’s original magic jar just got opened: a full reconstruction of the Keen 1–3 source code, tuned to build the exact same game files from 1990. The community went nuclear with nostalgia and hot takes. One fan declared, “Keeping Keen alive should be a priority for humanity!”, while others immediately asked if this helps modern ports like Commander Genius. Meanwhile, old-school PC folks flexed their IBM XT memories and crowned Carmack all-time legend.
Then came the brainy twist: to match the original game perfectly, the dev had to use the exact old tools and even pick specific variable names so memory lined up the same way. In simple terms: he tricked the compiler by naming things just right. The crowd loved the puzzle vibes—“Nice!”—and joked about appeasing the BSS (the part of a program for uninitialized data) with sacrificial names and files like BSSCHEAT.
But the real drama? The code shows pieces that look like they came from id Software’s day job work at Softdisk—sparking a “was it borrowing or was it bad?” ethics debate. One side clutches popcorn over alleged office-code reuse; the other rolls their eyes and says genius builds on what works. The result: pure retro chaos, heavy nostalgia, and a sprinkle of scandal
Key Points
- •Full reconstructed source code for Commander Keen 1–3 has been released, covering versions from a Nov 1990 beta to PSA 1.34.
- •Exact binary reproduction requires Turbo C++ 1.00 and Turbo Assembler 2.0+ for versions up to 1.31; Gravis 1.32 and PSA 1.34 require Borland C++ 2.0.
- •Compression with LZEXE or PKLITE is needed to generate executables identical to original releases.
- •The author solved BSS segment variable ordering by generating random names, analyzing .OBJ output, and applying internal renaming via BSSCHEAT files.
- •IDLIB.C/ASM code is described as based on The Catacomb and Hovertank, with claims of substantial reuse from Softdisk’s Dangerous Dave.