Game "Ping Pong" represents a three-dimensional simulator of one-nominal sports game. Besides usual and pair game, there are 12 bonus games based on game in table tennis. Bonus games open for victories over section "Passage" and are accessible in the menu of "Expert" and in network game.
Silicone-2 is a first-person shooter. The player will have to quell the robot uprising. Features: Missions are both indoors and in open spaces (sandbox) Help Allied soldiers and vehicles. Each scene is accompanied by a splash in the game engine, auto-save game progress and weapons before each scene for 2 Silicone-written musical compositions, 20 in all. System Requirements: Core 2 Duo 2,93 GHz, NVIDIA GeForce GTS 250 512MB, RAM 2 GB, HDD 200 MB,
Set in the distant future. Mankind took over the Galaxy with stunning speed. But cosmic expansion occurs using autonomous robots that are sent to all parts of the Milky Way. You, the smart droid - researcher, sent people to explore the depths of space. You returned home after a successful execution of the mission, when the sector was opened in an unexplored star factory by robots like you.
Our team GameTruDev have developed a Web Browser for everyday use. In the early version of the browser it was necessary to enter the entire URL string in order to go to the site, or to open another browser window. But in future versions of the product this will be updated. Using our browser will allow you to safely surf the internet. It is built all the necessary plugins for comfortable navigation and other functions. Thank you for checking it ou
Advanced Contact Manager is a simple contact management solution for your sales and technical support teams to keep track of your customers, open issues and call and contact history. Advanced Contact Manager can help your team handle all incoming and outgoing calls, track the history of client contacts and monitor performance of everyone in the team.
This is a simple game in which you will need to drive a car and drive between the walls through openings appearing randomly. The game is divided into three parts, in terms of complexity. Need to operate the machine by pressing the "Left Arrow" of keyboard. It seems very easy. But ... But you yourself try and set records. Enjoy the game.
An ancient evil has swallowed the land of his ancestors. You're the only one who can break the curse and confront him. But be prepared, your path will be difficult and fraught with danger. Hold your gun tight and try to survive among zombies morphed by ancient evil. Features: * Large Mirbach, open for research * Outstanding graphics and audio * Various weapons and enemies * Mysterious Curse * Secrets and caches
SpyKing PC Spy secretly logs all Facebook use, keystrokes, chats & IMs, emails, web sites, user names, passwords, web cam images, apps, microphone, clipboard and more. It supports Skype, Yahoo Messenger and others. It also takes screenshots like a surveillance camera. You can receive reports remotely via email or ftp as often as you wish. Open these reports on another PC or on your cell phone browser.
Description: In a secret complex at each level to collect all the super-stones and find a way out. In some cases, you need to find an electronic key to open the door-blockers. In the last level you need to get to host a secret complex and download all the information from it a secret project on the study of crystals.
Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
Use Outlook Express Security to control access to Outlook Express and its databases. When it is active, Outlook Express becomes locked and no third-party programs can access its message base files and the address book. As a result, when you try to start Outlook Express, open the address book or access the files, a password will be asked to allow access. If an invalid password is entered, Outlook Express or Address Book will not be opened.
Do you want permanent access to your favorite folders? With Chameleon Folder you can open frequently used and favorite folders in Windows Explorer, Open/Save dialog boxes, archive extract windows, and on the desktop, etc. You can create your own Favorites menu containing submenus.
This 3D graphics editing tool can be easily used for molecule creation. Falco Molecule is a 3D graphics editor for molecule creating. You can use this OpenGL editor in order to generate chemical molecules
You woke up in a family's house filled with starving demons. The only way out is to find four key that open the doors to the outside world. But in order to do this, you must avoid the hellish creatures which is very difficult. The only thing that can save you now are quick feet and a bottle of holy water which temporarily stops the demons. Be careful, listening to any sounds that are present, and just maybe you will survive...
Test Your Sight is a game focused on the development of memory and reaction time. Your aim is to open all the pictures on the playing field. The picture opens in the event that the following image you will uncover is a duplicate. If this does not happen, then the picture is closed again. Thus, in order to quickly uncover all pairs of images in the field, you need to remember where what they were before. A new take on "Old Maid" that many will re
SterJo Password Unmask could reveal/unmask most of password text boxes containing hidden characters known as asterisk ('*****') immediately.
Many applications like CuteFTP, Microsoft Outlook, other e-mail clients or login forms would save and hide their passwords with hidden chars to prevent others from seeing them. Sometimes using different passwords for each account could be forgotten and there is no way to reveal them.
Run and application and open the window where the password is hidden with asterisk ('*****') characters. Click "unmask" button and you will see how the asterisks are converted into letters instantly. Copy your previously masked password and don't ever worry if you forgot outlook password, CuteFTP or any other password again.
Ancient pyramids fraught with secrets and great treasures. But not everyone can access them, because they are protected by riddles and traps. Today you have a chance to get at what was hidden by the ancient Egyptians. Angling mirrors and collecting jewels, open a path to the top of the pyramid and find what has accumulated for centuries! But remember, everything is buried beneath a layer of darkness and mystery!
The Bond Yield Calculator for Excel or OpenOffice Calc enables the automatic generation of scheduled bond payments and the calculation of resulting yield to maturity. The model is equipped to handle 'odd' first time periods and is ideal to speed up bond payment and yield calculations.
Pixel Arkanoid is an Arkanoid-style game, with some unique elements. Control the platform and deflect the ball, which in turn destroys the bricks above. Some bricks have a "bonus," which opens up more opportunities to play. To move to the next level, you must knock down the white brick which is located deep in the level. During the game you'll be treated to nice music and sound effects.
Fascinating arcade requiring accuracy to avoid trajectory miscalculation. For level passage: Break open a box with treasures using a gun. The game consists of 18 levels. The purpose is to pass each level, having used the minimum quantity of kernels. In game laws of physics and many objects are broken, so use it to your advantage. Earn points to buy additional kernels: increased strength, explosive, operation.
The game "Lecherous pair" is an arcade puzzle that requires quite a bit of logic to solve. You need to free 30 virgins who are held captive by a villain named Necropuzzle. The goal is to find identical images, which are hidden in the playing field. If you open 2 slots with the same icons they will be destroyed and a section of blocks holding the girl in prison will vanish.