Editor's choice |
3D Reversi Unlimited
Impose your invasion strategy with this well designed Reversi 3D game.
Ack!words
An new kind of word puzzle game, Boggle meets Tetris.
Scynse-Man
Clone of the famous arcade game, featuring several mazes and a high score list.
Elixir for Windows
Try to collect the Elixir by removing all the capsules! Windows version of t...
Quarto
Match your wits against a computer or human opponent in this classic strateg...
JoRace
Build a road network without being swallowed by the black hole.
Joseph Run
His name is Joseph. He is a tireless adventurer. He had a duty to steal an ancie
|
|
Get tool swiftly and without troubles. Our library is happy to demonstrate a big assortment of the splendid free software, shareware, and software systems. On this directory you be able to acquire demo releases of popular paid programs, and recieve the greatest free software for your PC or mobile appliance,gadget. Search an ultimate group of the best new software programs on our library! Test trial editions and setup advanced apps on the computer or cellular appliance. Have a look on the recent versions and new releases of typical applications, last software solutions, and PC utilities! Try today!
A large source of great free games including arcade games, strategy games, sports games, puzzle games and more.
|
|
|
Download
|
Buy now!
|
Company: MetalShard, inc.
OS: Win98, WinME, WinXP, Windows2000, Windows CE
Description: Pocket War is a strategic turn-based war game much like the old Empire or Galacitc Conquest games. By choosing what to manufacture and sending orders to your troops, you give your troops the guidance they need to vanquish the computer.
Screenshots:
|
|
Windows Backup |
Looking for backup software? Try Handy Backup - automatic data backup to DVD, CD, FTP, network, or Online. Client-server enterprise backup software.
|
Top Downloads |
Freeware program to rename files & folders & Multimedia files wi
Hotspot Shield secures your Internet connection from hackers
Protect your computer from viruses and malicious programs.
|
|