Horizontal scroller. Sound City is in danger! While feared citizens are hiding in their houses, alien military spaceships are trying to turn the town into ruins. Has mankind lost all hope?
The Use of Videography in Tracking Earth Satellites.Scattered around the world is a network of about sixteen amateur observers who spend most of their spare time looking at earth satellites.They concentrate on tracking classified military satellites.
Once again Mario must strap in harderous fight against evil minions of Bowser. The evil one is going to throw everything He've got to obliterate Mushroom City. Be aware! Bowser uses heavy tanks and military stufff!
File Encryption is free Windows application to encrypt and password protect user's confidential data. File Encryption supports multiple algorithms, it is secure, fast application that uses strong military grade algorithms for file encryption.
Helyx Commando is a challenging skill game that your objective is to help pilot the eggbeater through the cabined canyon. You are asked to finish a military mission. All you have to do is keeping clicking the left mouse button to gain power.
Last Pilot vs Machine Aliens is a terrific shooter you won't forget! The world has been invaded by an alien race of machine warriors. You are a pilot surviving the invasion and controlling an advanced military hovercraft.
Inventory control, inbound and outbound Control inbound and outbound providers monthly Inventory Control by product, keeps track of units and value each month Statistics by product family, month by month Types of suppliers, vendors, families
After unsuccessful experiment of the military AI control has been lost. To obviate the results there has been determined to annihilate AI with viruses.
Take a role of a commando in the game Air Invasion. Your task is to defend a military base situated on the island of MyPlayCity. The base is attacked by the air forces of the enemy. The enemy troops are landed periodically.
imlSoft Folder Guard Professional solves your security issues by preventing unauthorised access to your private data using military strength encryption and password protection.