Editor's choice |
Battle of Words
This is our Special Offer, extended use game. Purchase this game for yoursel...
Jungle Checkers v1.5
Play against the computer or live opponent in a game of connect-four. The ob...
Columns Master II
Everyone knows the Match3 game genre. Colorful crystals, berries or fruit...
Three Leaves
Three Leaves lets you play addictive card game against friends and computer ...
Ray Machine
Like all children, Govanni waited for winter and snow. But winter has come, and
Anouk The Fox
Anouk is a fox and she wants to make a cake for her kids. For this reason sh...
Escape 2 The New Order
Escape2: The New Order, is an extension of the famous first-person shooter.
|
|
Excellent utility acquisitions from the most asked for in download sites! Investigate the popular applications types, see the latest versions of the notable computers programmes, and recieve for free! Do not lose an advantage to setup the first class software package: employ SoftEmpire to acquire software program for free of charge. Have a look on the library of free utilities and software tool test versions. take among system softwares, setup planners, softwares for fun, and all other kinds of apps for your PC or cellular stuff!
A large source of great free games including arcade games, strategy games, sports games, puzzle games and more.
|
|
|
Download
|
Buy now!
|
Company: TLK Games
OS: Win98, WinME, Windows2000, WinXP
Description: A fine 3D Chinese checkers to challenge the computer locally at various levels or other players on network like Internet. International or British checker board and rules. Various camera settings and view in 2D. Play hints and capacity of playback.
Screenshots:
|
|
Windows Backup |
Looking for backup software? Try Handy Backup - automatic data backup to DVD, CD, FTP, network, or Online. Client-server enterprise backup software.
|
Top Downloads |
Freeware program to rename files & folders & Multimedia files wi
Hotspot Shield secures your Internet connection from hackers
Protect your computer from viruses and malicious programs.
|
|