Editor's choice |
xBarrier for PALM
Build fences and stalemate your opponent in this simple and addictive game.
FreeGamia They Like Darkness III
A random day, a dark, dark night, without warning you meet them.
Battle Boattle
It's Crimsonland gone marine. Fast-paced action that's going to drive you crazy!
Tetrus 2000: World Championship
Tetrus 2000 is a very nice Tetris game. It also includes Pentix, a popular v...
Picture Perfect
Picture Perfect is a fun, challenging and best of all free puzzle game. Unju...
ONE DAY
ONE DAY - very mystical, beautiful and dramatic first-person shooter. The game i
Snakes
This game is a network remake of the very old computer game 'Snake'. How to ...
|
|
Free computer tool acquisitions from the specialized in download websites! Surf the popular computer tools lists, ascertain the newest releases of the perfect tools, and test for free! Do not miss an opportunity to recieve the popular software applications: employ SoftEmpire website to test tools for free of charge. Check out the directory of free programs and computer software versions. select among system softwares, setup controllers, firewalls, and all other varieties of apps for your notebook or mobile phones!
A large source of great free games including arcade games, strategy games, sports games, puzzle games and more.
|
|
|
Download
|
Buy now!
|
Company: Pharos Games
OS: Win95, Win98, WinME, WinNT 3.x, WinNT 4.x, Windows2000, WinXP
Description: When 7 year old Ally follows her cat Through the Glass she begins a strange fantasy adventure. Loosely based on Lewis Carroll's Through the Looking Glass story, the game has beautiful graphics and lots of fun puzzles for all ages.
Screenshots:
|
|
Windows Backup |
Looking for backup software? Try Handy Backup - automatic data backup to DVD, CD, FTP, network, or Online. Client-server enterprise backup software.
|
Top Downloads |
Freeware program to rename files & folders & Multimedia files wi
Hotspot Shield secures your Internet connection from hackers
Protect your computer from viruses and malicious programs.
|
|