|
Free arcade game catalog. Our games collection include next: free arcade games, 3D arcade, classic arcades, remake of classic arcade etc. New arcade game with beautiful graphics. All games are free to download.
|
- Version: 1.1
- Date (dd/mm/yyyy): 8/12/2015
- Program System Requirements: Windows 95/98/ME/2000/NT/XP/2003/Vista/W7, 16 MB RAM, Pentium-133 MHz, 2 MB hard disk space
- OS: WinXP, WinVista, WinVista x64, Win7 x32, Win7 x64, Win2000, Windows2000, Windows2003, Windows Vista Ultimate, Windows Vista Ultimate x64, Win98, WinME, WinNT 3.x, WinNT 4.x, Win95, Win 3.1x, Windows Vista Starter, Windows Vista Home Basic, Windows Vista Home Premium, Window
- Primary Download: download link
- Company: FreeGamia
- Description:
Snowman Attack - Cheerful New Year's themed game with pleasant graphics. Help the brave snowman sustain an attack from various villains - saber-toothed Wolves, mummies, the big snow giants and others. Use buttons 1-4 to change your weapon.
Daisy Reversi
Try to beat the computer at the board game Reversi (Othello). Some of the features: wide range of complexity levels, realistic graphics, undo/redo moves, save/load/construct positions, statistics, flexible logic and interface settings, color schemes.
TetBlocks for PALM
Based on old classic game.
Throughout the game pieces fall from the top to the bottom of the playing area.
When the pieces form a solid row of blocks across the playing area,
that row vanishes.
The Legend Of Rufa
"Legend of Ruth" ( "The Legend of Rufa") is a colorful game in the 2D Side-Scroller genre. Spirit of Winter, Witch Chill, stole from the tribe the artifact of Fire, without which it is impossible to call upon Spring. The girl and
|
Windows Backup |
Looking for backup software? Try Handy Backup - automatic data backup to DVD, CD, FTP, network, or Online. Client-server enterprise backup software.
|
Top Downloads |
Freeware program to rename files & folders & Multimedia files wi
Hotspot Shield secures your Internet connection from hackers
Protect your computer from viruses and malicious programs.
|
|