|
A large source of great free games including arcade games, strategy games, sports games, puzzle games and more.
|
- Version: 1.1
- Date (dd/mm/yyyy): 29/12/2015
- Program System Requirements: Windows 95/98/ME/2000/NT/XP/2003/Vista/W7, 16 MB RAM, Pentium-133 MHz, 2 MB hard disk space
- OS: WinXP, WinVista, WinVista x64, Win7 x32, Win7 x64, Win2000, Windows2000, Windows2003, Windows Vista Ultimate, Windows Vista Ultimate x64, Win98, WinME, WinNT 3.x, WinNT 4.x, Win95, Win 3.1x, Windows Vista Starter, Windows Vista Home Basic, Windows Vista Home Premium, Window
- Primary Download: download link
- Company: FreeGamia
- Description:
Escape2: The New Order, is an extension of the famous first-person shooter. The second part tells the story of CIA agent named Nick Lobottom, in the year 1970. The main character is sent to a secret hideout, run by Nazis, who continue to run their..
Me Alone Reissue
On the ground, there was an apocalypse. Many people have turned into monsters that eat other people. At that moment of this doomsday, the protagonist was working at the gas station far from the city. He's the only survivor in this place he must defen
FreeGamia Battle For Survival II
Battle For Survival 2 is a fascinating survival shooter with good graphics. Kill monsters, pick new weapons, collect bonuses, and kill even more monsters! With each round there will more and they will grow stronger, but do a good job and you can upgr
FreeGamia Cemetery Warrior II
Cemetery Warrior - Frightful and dynamic 3D shooter. You have 3 weapons at your disposal - an endless machine gun, rocket launcher and plasma gun. Unlike other games where you're given a limited amount of missiles, here you can just keep 'em coming!
|
Windows Backup |
Looking for backup software? Try Handy Backup - automatic data backup to DVD, CD, FTP, network, or Online. Client-server enterprise backup software.
|
Top Downloads |
Freeware program to rename files & folders & Multimedia files wi
Hotspot Shield secures your Internet connection from hackers
Protect your computer from viruses and malicious programs.
|
|