Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Popular search phrases :: P :: protect
Display: short descriptions | full descriptions
  • Having survived the shipwreck and met the cosmic being in an unfamiliar world, your goal is just to survive at any cost even if it means destroying all creatures in this world. Free to move around the map at will, you have the only way to protect these creatures; the construction of towers. The map also contains scattered energy cells which will improve your characteristics. To pass a level you must collect cells or destroy all creatures. Will yo
  • Privacy Eraser is an all-in-one privacy suite that protects your privacy by cleaning up all your Internet history and past computer activities. It supports popular web browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, Safari and Opera, completely implements and exceeds the US Department of Defense and NSA clearing and sanitizing standard, once erased with it, your file data is gone forever and can not be recovered.
  • You must protect the plane with its valuable cargo from enemy fighters. If all four engines cut out the mission fails. Using your powerful machine gun to shoot down as many fighters as posible. The longer you fly, the more points you score!
  • Imagine yourself as a driver of a "skins" huge, humanoid armored vehicle. Save the city from an out-of-control protection system and destroy all the turrets in the neighborhood. To achieve the goal, you are given several types of weapons, but you must use your ammo wisely because the amount is limited.
  • 2030 to the Land was crushed terrible catastrophe. The Ensemble asteroid has begun to fall to The ground. The Mankind was found on galley proof of death and for the reason protection from asteroid was created unique spaceship whole with one revenge for pilot. You there is try the role cosmic Hero and rescue the Land from VWVload on asteroid. The Play is executed in bright and colorful stiletto. But track record of the fighting and increasing to d
  • LastHope is a very fascinating Tower Defense game where you have to protect the crystals of dark creatures. You will be hooked instantly!
  • Legions of seals conspired to take over the world. Only you can protect humanity from the agile oppressor, defending the Earth through four levels of addictive arcade gameplay. Resist the tyranny!
  • RecoveryFix for Outlook can be used to recover your utmost important PST file that contains several items that have some qualified value. Since this tool is highly recommended by IT professionals, therefore, use of this tool by you is quite obvious. Before downloading this tool, you must be well aware of its outstanding features. These outstanding features assists in recovering your PST files. Working of RecoveryFix for Outlook, involves scanning of corrupt PST files. The scanning is initiated with either of two scanning modes: Advanced mode and Standard mode. The mode selection depends upon severity of the corruption issue. As the scanning gets over, the items of the corrupt file are entirely recovered and presented in tree-like fashion. This tool provides user to save the recovered file in various file formats like EML and MSG. This tool can even recover password-protected file. Being an advanced outlook PST repair tool, RecoveryFix for Outlook supports MS Outlook 2000 and higher versions and Window ...
  • Ancient pyramids fraught with secrets and great treasures. But not everyone can access them, because they are protected by riddles and traps. Today you have a chance to get at what was hidden by the ancient Egyptians. Angling mirrors and collecting jewels, open a path to the top of the pyramid and find what has accumulated for centuries! But remember, everything is buried beneath a layer of darkness and mystery!
  • Copy Protect lets you copy protect your audios, videos, documents and pictures so that they cannot be duplicated, copied or distributed by illegal means. Copy Protect converts all supported formats into executable applications that run only in the drives they are prepared for. If these files are copied to another drive, they do not run and become useless. Copy Protect works in all 32-bit and 64-bit version of Windows 7.0/Vista/XP.
  • Protecting Water Seal was broken. You soldier named Keith, will go on a dangerous adventure to find out who broke the defense. You are waiting for nice graphics and excellent music.
  • Pick the locks of the 13 rooms in order to get out of the castle. You, of course, are able to move and even destroy the obstacles in your path. But this must be done quickly, before time runs out. Otherwise an evil spirit awakens that protects the locks and drags you to hell.
  • Yahoo Messenger Spy Monitor secretly records all Yahoo Messenger incoming and outgoing instant messages. It sends logs to your custom email or ftp. You can check all records by simply receiving emails or opening a web page. Use hotkey to unhide it from the Stealth Mode and protect program access by password. Perfect for catching cheaters, monitoring employees, children or spouse, and even investigating crimes.
  • Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your computer. It runs completely invisiblely. You can check logging reports by simply receiving emails or opening a web page. Perfect for catching cheaters, m onitoring employees, children or spouse, acquiring others' passwords and even investigating crimes. Use hotkey to unhide it from Stealth Mode and protect the program access by password.
  • If you've always wanted to play an effortless game that will not cost a penny, and will be just for fun, then Defend Kitty is for you. You must protect the little kitty from a lot of evil monsters. To kill the monsters, click on them with the mouse. The game has 5 types of enemies: Green fish - The weakest opponent, moves in a straight line, dies after a single tap. Blue fish - The same pushover as the green fish, but attacks on a sine wave.
  • The city was attacked by evil invaders, and now the task of protecting civilians lies with you! Help stop the attack, repelling wave after wave of enemy attacks! At your disposal is a gun which can be improved and used as a powerful weapon to build strength. But if that is not enough, you have to put mines under the city wall, and if necessary deploy a super bomb that can destroy all the enemies at the same time! However, the additional might..
  • Alien ships have invaded into the Solar System. Protect your sector of the space. Upgrade your ship and become a terror for the invaders.
  • Your computer is being attacked by viruses! Protect your computer from the threat with a set of tools at your disposal. When you install the tools you increase the temperature inside the computer and then you need to buy and install the cooler (coolers). After each wave of viruses a strong boss appears. Features - Beautiful graphics Four-types of viruses (three games, plus a bonus) - Three different kinds of tools - Heating System computer.
  • Cheerful and dynamic top-view shooter. Drive and protect yourself from slippery, nasty monsters. For killing the creatures you will be paid money, the earnings dependent on the level. As you accumulate money can buy a new weapon for the car as well as killer bumpers. Keep that car running!
  • In this game you have to defend yourself from the evil slugs, which are out to bust up your car. Fight back, earn money for killing them, and use it to buy engine upgrades, repair the car and buy different types of weapons and protective kits for your car. Enjoy the game!
  • Split PDF software builds up for both profession and end user. You can use this application into different way like personally and professionally. Program permitted you to perform several operations like split PDF file into pages, merge pages, create PDF file, delete blank and useless pages, take out required pages, join two file as well as pages, add number of PDF file in queue etc. Tool make possible to resize PDF document by using paper size, custom size, width and height. No need to worry for documents security because it offer you password protect option in this way you can inset User and owner password on resultant file. Features: * Software enables to split, merge, delete, extract, combine, compare PDF document. * Perform operation according to page range, specific pages and odd/even pages. * Split large PDF file into pages. * Merge number of pages and create PDF file. * Delete useless pages from PDF document. * Extract required pages. * Change PDF page size. * Modify PDF Meta Pro ...
  • X-tank is a super-weapon, able to change the course of the war. Hundreds of scientists and ordinary citizens worked on the creation of this instrument of death. And it rolled off the assembly line, with black finish that absorbs hits from energy beam weapons, powerful psychic protection, the ability to self-repair by nanobots and heavy plasma gun capable of melting a few meters of armor in seconds.
  • According to legend, the ancient temple kept by the sacred Shuriken is able to defeat the evil dark entities. A brave Ninja goes in search of a legendary artifact to protect his village from the forces of darkness. Controls: W, A, S, D - movement U - Teleportation I - Throw Shuriken
  • RegRun Suite is a complete computer security software. RegRun Platinum includes 24 system utilities for computer protection against Rootkits/Trojans/Adware/Spyware components. It increases the speed of Windows boot-up process, making the computer management easier. RegRun Suite is compatible with all known antiviral software and may be used to improve computer security.
  • Shooter Ben is a shooter-platformer developed by the Armure company. You control Ben, the sole survivor of the accident at the nuclear power plant. The game has two modes: "Story" and "survival." In the "stories" mode you need to go through 9 challenging levels full of zombies. In "survival" mode, try to say alive as long as possible, protecting yourself from the zombies. Controls: W, A, S, D - direct character. Space - change weapons.

Page 1 of 10
1 2 3 4 5 6 7 8 9 10


Legal disclaimer | Privacy policy

© 2004-2015 IT Shareware