|
A large source of great free games including arcade games, strategy games, sports games, puzzle games and more.
|
- Version: 2.6
- Date (dd/mm/yyyy): 1/7/2016
- Program System Requirements: Windows 95/98/ME/2000/NT/XP/2003/Vista/W7, 16 MB RAM, Pentium-133 MHz, 2 MB hard disk space
- OS: WinXP, WinVista, WinVista x64, Win7 x32, Win7 x64, Win2000, Windows2000, Windows2003, Windows Vista Ultimate, Windows Vista Ultimate x64, Win98, WinME, WinNT 3.x, WinNT 4.x, Win95, Win 3.1x, Windows Vista Starter, Windows Vista Home Basic, Windows Vista Home Premium, Window
- Primary Download: download link
- Company: Falco Software Company
- Description:
On Earth, the 24 th century, the year of 2341. By mistake, the scientists there was an explosion and release of toxic waste. Many people do not react to the warning sirens, including their training, so most people have died or have undergone mutation
Grossmeister
Grossmeister (c) is a unique high-intellectual card solitaire which requires a chess-grossmeister intellect and patience. The version of Grossmeister 2.5 allows you : - to set a solitaire play order (ascending, descending or both orders) ...
Strayfire
Strayfire is a modern arcade-style shoot'em up, with beautiful 3D accelerated graphics, loads of firepower, hordes of alien enemies to blast, massive bosses, and special effects galore! If you're a fan of pulse-pounding shoot'em up gaming, you de...
FreeGamia The Non Sense 2 Madness On The
The NonSense: Madness On The Island - a story that can not be. The second part! Long and exciting adventure you have to! At another time, in another space - unimaginable events occur. Zombies suddenly appeared on the island and destroyed all living t
|
Windows Backup |
Looking for backup software? Try Handy Backup - automatic data backup to DVD, CD, FTP, network, or Online. Client-server enterprise backup software.
|
Top Downloads |
Freeware program to rename files & folders & Multimedia files wi
Hotspot Shield secures your Internet connection from hackers
Protect your computer from viruses and malicious programs.
|
|