free trafic

Moonton : Mobile Legends

Senin, 20 Februari 2017

Moba dari moonton ini cukup menyita perhatian saya, game yang basik permainannya mirip seperti Dota di PC atau Vain glory di android/IOS . para penggemar game tersebut pasti bakalan tidak asing lagi dengan cara bermain MoBa ini pasalnya gameplay nya sama persis, berbasis tower destroy. yang sedikit membedakan hanya pada kontrol serta buying Item. saya sendiri telah memainkan game ini dalam beberapa bulan terakhir, kini sudah mencapai rank Elite.

Tips & trick dalam moba ini cukup bervariasi tergantung dari gaya bermain serta karakter yang digunakan. saya bagi sedikit tipsnya sebagai berikut.

Early game. pada saat permulaan permainan, jika bisa ambilah posisi tengah, kenapa ditengah? karena kalian bisa dengan mudah jungling kehutan atas atau bawah. saya biasanya bakal habisin minion dulu lalu lari kehutan buat jungling bunuh 1 monster lalu kembali keposisi buat kill minions, lalu kembali jungling ke hutan lagi dst. jika kalian sendirian kalian bakalan nyampe level 4 saat minion gelombang ke 3 datang, usahakan jangan mati dalam early game dan tetap leveling dengan cara jungling serta kill minions, perhatikan selalu minimap untuk memantau pergerakan lawan.

strategy. gunakan keuntungan jika kalian sendirian, yaitu leveling lebih cepat. tapi jangan sampai tower paling luar kalian hancur. karena selain untuk pertahanan juga untuk memantau pergerakan lawan. selalu gunakan tower saat kalian kalah jumlah, misal 1vs2 atau bahkan 3 tetap dalam range aman tower. kalian bakal menghambat pergerakan lawan serta menahan leveling mereka lambat saat kalian dikeroyok. pada saat seperti itu usahakan jangan req back up. usahakan teman kalian yang berpasangan buat nge push tower lain yang dijaga 1 player lawan.

Karakter favorit saya dalam beberapa bulan ini adalah Alfa, yun zhao, serta miya. kenapa saya memilih mereka. karena mereka memiliki attack yg tinggi. untuk alfa combo dari skill nya juga efisien. semua skill serta ultinya juga memberikan efek area damage yang sangat efisien jika menghadapi musuh yang berkumpul dalam jarak dekat. gear set yang saya pakai untuk alfa saya usahakan mempunyai efek kritikal serta attack speed up. jangan lupa penetration effect untuk ignore physical armor. saat memakai alfa untuk musuh ber HP rendah seperti marksman atau assasin bakalan jadi sasaran empuk. gunakan skill pertama untuk memperlambat pergerakan lawan, karena efek skill pertama adalah slow. lalu gunakan ultimate untuk membuat stun target serta semua enemy hero yang dilalui alfa. nah terakhir skill nomor 2. nah yang asiknya passive skill dari alfa ( go beta! ) bakal aktif saat musuh terkena skill no.1 dan no.2 dalam waktu yang dekat. tinggal pukul beberapa kali dijamin kalo yang kalian hadapi adalah type assasin atau marksman bakalan keok seketika.


Front Mission 3 ISO English Version

Selasa, 01 Mei 2012

 The mechanics of Front Mission 3 are a radical departure from Front Mission and Front Mission 2.[3] While it is a tactical role-playing game, there is a stronger emphasis on role-playing elements as opposed to strategic elements in Front Mission 3. The game progresses in a linear manner: watch cut-scene events, complete missions, set up wanzers during intermissions, and sortie for the next mission. The player travels to locations on a world map. As the player progresses through the plot, new locations are revealed on the world map. Towns and cities act as intermission points where the player can organize and set up their units for the upcoming mission. New to Front Mission 3 is the Double Feature Scenario - this allows the player to experience two different scenarios that exist independently of one another within the game's storyline.[4] In other words, the player can play through two stories; while they may share common events and environments, the stories are largely unique and in essence are fully-fledged games.
Front Mission 3 missions are traditional tactical RPG fare, ranging from destroying all enemy targets to protecting a certain allied target. Where the game differs significantly from its predecessors lies mainly through a new combat feature - the ability to attack the pilots themselves. During any attack, the pilot can be damaged or forcefully ejected from their machines. The player can also have a pilot eject from their unit to fight on foot, or hijack another machine on the battlefield. The game also changes how skills are learned; instead of gaining experience to improve a pilot's proficiencies, they are now learned by equipping wanzer parts and using them in battle. When certain conditions are met, there is a random chance that a pilot may learn a new skill from one of their wanzer parts, which can be programmed into the wanzer's battle computer. Many gameplay features from Front Mission 2 have also been removed, greatly simplifying the overall structure of mission play. Missions are now much smaller in scale, limiting the amount of strategic options the player can use.
There are some returning features from Front Mission 2 that are used for mission play though, namely Action Points (AP) and Links. Action Points (AP) is a feature that dictates how much actions can be done with each unit. Actions such as moving and attacking require a certain amount of AP to use. At the end of a full turn, which is one Player Phase and Enemy Phase, a set amount of AP is replenished. A unit's AP amount value depends on how many combat ranks its pilot has earned; these are earned by destroying enemy units. Links is a unique ability that allows multiple units to provide offensive support to each other during Player Phase battles. Links operates differently in Front Mission 3; a unit's pilot must have a Link-class skill and the appropriate weapons (which also acts as their linked actions) equipped. Once this condition is met, a linked battle will commence if the skill activates. Up to three units can be linked together to form one "link".
Other returning features that appear in mission play include mission rankings and mission branching. As in FM3, players are graded on how well or poorly they clear missions. While there are incentives to perform well, the game does not reward the player with new parts or weapons as it did in Alternative. Mission branching returns and now allow players to choose what type of mission to play next. Aside from these, the Network feature from Front Mission 2 returns and is greatly expanded upon. Players can now browse through the pseudo-Internet, send and receive e-mail messages, tinker with online files and wallpapers, or use the new Battle Simulator feature. The Battle Simulator is a game mode where the player can participate in VR training exercises. These drills can be used to increase the fighting proficiencies of the player's pilots and can be taken as many times as needed. Lastly, players can strengthen their parts with the return of the remodeling feature. Through this, the player can augment a wanzer's armor coating (known as "Def-C"), the accuracy of its weapons, increase its jumping power to scale buildings, or equip it with rollers to dash on flat surfaces quickly.


brigandine grand edition iso download

Sabtu, 23 April 2011

Brigandine Grand Edition is the sequel of the most addictive PSX strategy game, Brigandine the Legend of Forsena. Of course as a sequel, Brigandine Grand Edition has better gameplay, graphics, and storyline. Basically, the plot is still same with its prequel. You should select one of the kingdom in Forsena to conquer entire continent. In Brigandine Grand Edition, there is "Multiplayer modes" where you can play as two or three kingdom in a gameplay. Interesting? Let's find more about Brigandine Grand Edition .



Jumat, 11 Juni 2010

psxeven beserta plugin dapat didownload disini

free download psxeven


xenogears psx iso

Kamis, 06 Mei 2010

Xenogears (ゼノギアス Zenogiasu?) is a console role-playing game developed and published by Square (now Square Enix) for Sony's PlayStation. It was released on February 11, 1998 in Japan and on October 21, 1998 in North America. The game was never released in PAL territories. The game was re-released by Square Enix for the Japanese PlayStation Network on June 25, 2008.

Xenogears follows protagonist Fei Fong Wong and several others as they struggle to survive in a world torn apart by war between the nations of Aveh and Kislev. The principles and philosophies of Friedrich Nietzsche, Sigmund Freud, Carl Jung and Jacques Lacan, as well as various religious themes influence the overall plot and world of Xenogears. A major theme of the game is the nature of human memory: from the start of the game, Fei has memory loss, which colors his interactions with other characters. In addition, the struggle between man and machine is also central to the game's plot. Each of the playable characters can ride in giant mechs known as gears and can use them in battle.

Overall, Xenogears was well-received by critics, with a 91% rating on Game Rankings and a score of 83 out of 100 at Metacritic. It was voted the 16th best video game of all time by readers of Famitsu in 2006. A commercial success, Xenogears has sold 1.19 million copies worldwide as of March 31, 2003. Due to these high sales, the game was re-released as a Greatest Hits title in December 2003.

Battle system

Battling is a variant of the Active Time Battle system found in various Final Fantasy games and Chrono Trigger.[4] Most enemy encounters in Xenogears are random, and once a battle starts, the screen enters a separate combat screen. Characters fight with martial arts combat and "Ether" attacks along with special "Deathblow" moves that are learned through repeated combinations of strong, moderate, and weak hits. Attacks use Action Points (AP) and either cost three points, two points, or one point.[5] Each character can initially use three AP per turn, but at higher levels, characters eventually can use six AP per turn. At a certain point in the story, an additional AP is acquired, allowing characters to learn "Elemental Deathblows". In addition to being used for attacks, AP may be saved and used as Attack Points for combo attacks during later turns. A total of 28 AP may be accumulated for combo attacks.

Characters can also use magical abilities that either aid the party or damage enemies. These abilities are limited by the number of Ether Points (EP) that are available to a character and are not replenished between attack rounds. For most characters, these abilities are called Ether, but some characters' abilities have different names, implying differences in their origins. For example, Fei's magic is called "Chi" and Citan's is called "Arcane". While fighting in their gears, characters' Ether abilities are amplified, though some change or become unavailable during this type of combat.[4]

Gear battle

In addition to small-scale, hand-to-hand combat, the characters sometimes fight from within their respective combat robots, called gears.[6] For these particular battles, the combination style is reduced to a selection of strong, medium, or weak attacks that build up the attack level of the gear with each attack so that the gear can unleash a special attack. While in gears, the limiting factor of AP is replaced with a fuel gauge, with each attack consuming an amount relative to its power.[6] There are three levels of normal special gear attacks and one additional "infinite" level of special gear attacks that correspond to a character's learned Deathblow skills. Infinite level differs from the other three levels in several ways. "Infinity Mode" lasts for three turns; while in this mode, fuel can be recharged in larger amounts and gears can use "Infinity" attacks. To reach Infinity Mode, a character has to stay at attack level 3 while performing any other action. With each turn, there is a chance that Infinity Mode will be reached.

Gears can regain fuel with a "Charge" command. The gears can also activate "Boosters" which enable them to act faster at a cost of extra fuel per turn.[6] The "Special Option" command allows for gear HP restoration abilities and special attacks. When a gear has no fuel left, it can no longer execute attacks, use special options, or use boosters. They can, however, Charge to regain fuel and use Ether abilities. The main characters can purchase gear fuel, parts, and upgrades in shops or from certain individuals.

nb: taken from

download xenogears cd 1

download xenogears cd 2


Grand Ages Rome

Jumat, 17 April 2009

Grand Ages Rome

Throughout the game the player can develop his game character by gaining favor with various historical figures such as Julius Caesar, Pompey and Octavian. The benefits provided by these relations are carried over not only for the rest of the campaign but also in free-build maps and multiplayer scenarios.

Persistent Player Character - benefits gained from completed quests are persistent and can be used on any mission, including campaign, free-play and multiplayer
Campaign that features 20 maps of historical cities and locations
Patrons - more than 20 historical figures that offer additional objectives to the player
Over 60 buildings & 50 units
Ships and Islands
New and Improved Economics
Multiplayer - cooperative and competitive mode
Enhanced battle system with standard RTS control of the squads
Grand Monuments such as the Coliseum, Circus Maximus and the Pantheon
City States - famine, siege, riots, etc.
Disasters - random disasters such as plagues, fires and earthquakes. All such disasters will be visualized.



Selasa, 14 April 2009


Hinterland you will create a colony where you can recruit people, farmers, breeders, merchants, etc.. Of course, need some resources to build some buildings. But you have to expand your power until you can have resources and fight the guards in each area.

The more interesting of this game you can change your weapon & can get some Items from monster, or you have your own production. this game gives you options which you will focus between character or kingdom?


  • OS: Windows XP or Vista
  • Processor: 1.8 GHz processor or higher
  • RAM: 512 MB RAM Windows XP (1 GB for Windows Vista)
  • Video Card : 64 MB DirectX 8.1 compatible card
  • Hard Disk : 350 MB
  • Input : keyboard and mouse

File : 104 Mb


File : 50.6 MB



vanguard bandits free download iso

Rabu, 01 April 2009


The story revolves around a boy named Bastion and his part-taking in a Holy War.Bastion and his friends are rebels and fight to end the war,they fight for good and justice.Their enemy?General Faulkner,the epitome of evil.He is at the helm of the Junaris Empire.Faulkner oppresses the people and kills without just cause.Bastion and his friends fight to end this mans terror.

Although there are three different story lines(Kingdom Branch,Empire Branch,Ruin Branch)the story line always centers on Bastion and his fight to end the war between the Pharastia Kingdom and the Junaris Empire.
The game has many plot twists and different events may occur depending on your choosing.To really comprehend the deep and involving story you must play through the game three times,on each of the three main branches.

The story is a wonderfully done with a great translation(thanks to Working Designs).Although,unlinke the Lunar translation,Vanguard Bandits has more of a serious tone in the text rather then a humours one.Either way,translation is perfect when it's done by Working Designs.

game play:

This is the reason why Vanguard Bandits is a pure joy to play...The gameplay is addictive and requires you to think out your next moves.You must learn to position your characters correctly and attack at the right moment.The core of the gameplay is the battle system.

You always battle in your ATAC(Giant humaniod mechs).ATAC's may learn different techniques depending on which stone or amulet you give them or how you level up character stats.In the battle system there are two gauges:AP and FP.

AP determines how far you can walk or what skills you can do(skills differ from techniques or attacks because they usually temporarily boost a characters stats or even heal them).When your AP gauge is empty,it usually means that it is time to end your turn.

FP,on the other hand plays an important part in the battles.When you are attacked,your FP gauge fills depending on what actions you take(You can either attack,defend,avoid or counterattack.)For instance,avoiding costs less FP then attacking.

When your FP gauge fills to one hundred,your character will become frozen and will be unable to do anything on the next turn.Also,when you are frozen,you become very vulnerable to enemy attacks.However,you can freeze enemies,making them very easy to destroy.

Also,on the battlefield,you must use the landscaping to your advantage...If you learn to position yourself using the landscaping you can either protect yourself from enemies or surround them.Positioning is very important.For example,a damages character may want to turn his/her back against a bush to prevent any back attacks.

Overall,I was very satisfied with Vanguard Bandits.Truly,a wonderful game.I suggest that you should own it.It is worthy to be in any gamers collection.


AVG Internet Security 8.0 + Keygen (Keys Untill 2018 !)

Rabu, 25 Maret 2009

AVG Internet Security - a collection of applications Grisoft to help protect your computer from all kinds of online threats: viruses, worms, trojans, spyware and adware providers, hackers and spam. In the AVG Internet Security includes modules: Anti-Virus, Anti-Spyware, Anti-Spam and Firewall. The program is easy to use, is able to automatically update via the Internet and work on schedule.

All-in-one protection
* Anti-Virus: protection against viruses, worms and trojans
* Anti-Spyware: protection against spyware, adware and identity-theft
* Anti-Rootkit: protection against hidden threats that deliver malicious content
* Anti-Spam: catches e-mail threats including phishing, fraud and spam
* Firewall: stops hackers and viruses spread over the internet
* Safe Downloads: protection against malicious websites
* Safe Instant Messaging: protects your ICQ and MSN communication
* Safe Search: safely click search results
* Safe Surf: real-time protection from poisoned web pages
* System Tools: for easy system management
* Technical Support: free support and service around the clock and across the globe

Easy-to-use, automated protection
Real-time protection, automatic updates, low-impact background scanning for online threats, and instant quarantining or removal of infected files ensures maximum protection. Every interaction between your computer and the Internet is monitored, so nothing can get onto your system without your knowledge. AVG scans in real time:

* All files including documents, pictures and applications
* E-mails (all major email programs like MS Outlook and Thunderbird supported)
* Instant messaging and P2P communications
* File downloads and online transactions such as shopping and banking
* Search results and any other links you click on

Internet security with peace of mind
The new web shield checks every web page at the moment you click on the link to ensure you?re not hit by a stealthy drive-by download or any other exploits. All links on search results pages in Google, Yahoo, and MSN are analyzed and their current threat level is reported in real time before you click on the link and visit the site.

System requirements
* Intel Pentium 1,2 GHz
* 70 MB free hard drive space (for installation)
* 256 MB RAM
* MS Windows 2000, XP, Vista

Info : Password:


Office 2003 Lite 32 Mb

Rabu, 12 November 2008

Contains Word, Excel and Powerpoint 2003. Just 32 MB. Silent Install. After installing, takes only 70mb of disk space.


How to enable the hidden files and folders option in XP?

Senin, 10 November 2008

Today tip will help you to solve the problem with hidden files and folders in windows XP. Normally in windows XP, you can view the hidden files and folders using the path, Tool>Folder Options>View, and then check the "Show hidden files and folders" radio box. But sometime due to some spyware/trojan attacks, this radio box is unchecked automatically and you could not show the system hidden files and folders.
Follow the given steps to visible the hidden files and folders:

To edit the computer registry, first you should log onto your computer with administrative rights.

Click Start button and type regedit in Run option then press Enter for next.
Navigate to HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\
Advanced\Folde r\Hidden\SHOWALL
Now in right side panel, double click on the DWORD value "CheckedValue", here a small dialog box will appear with the title "Edit Dword Value".

To modify the "Value data" information as DWORD Value to 1 then click on Ok button to finish the process.

Now you can easily view the hidden files and folders using the path, Tool>Folder Options>View and then check "Show hidden files and folders" radio box.

But next time, if you want to disable this functionality then simply change the value of data box to old value.


USB Disk Security 2009 full Unlimited

Jumat, 07 November 2008

USB Disk Security 2009 full Unlimited

You have to admit that today's viruses and malware in general benefit from the most incredible creativity and ingenuity when created. There is always a door to your computer and if not sealed in time or at least monitored properly chances are a nasty finds it and infects your machine.

One of the recent technological contraptions on the market has reached to enjoy so much success that it is barely seen as a novelty and it is regarded more like a standard users cannot do without. To make a long story short, I am talking about USB sticks and how they can become the means for infecting your system.

A well placed nasty and a simple command in a trivial autorun.inf file can unleash a battle you may have lost from the beginning if security is not a priority. Sure, there are variables for this to happen and one of them is for you not to know the USB stick you plug into your computer. Another one is for you not to enforce adequate security on the machine so that the nasty may enter and do its job undetected.

Fortunately there are plenty of applications up to the protecting job, both in the category of firewalls as well as in the category of antivirus software and there are even some really good freebies available. But here comes another one: USB Disk Security. Its purpose is to prevent malware located on inserted USB sticks from infecting the entire computer. The application does not reside on the USB drive but on the computer and every time you stick the memory in the system it'll immediately analyze the storage device and alert you by displaying the threats.

It is is not a freeware, but considering the task it has taken upon its shoulders this would only be natural. Testing it without paying the $55 price is no sweat, especially when there is no other limitation than the fact that the malicious items cannot be deleted.
The interface is nice and comfortable as all the options are aligned in the upper part of the screen and switching between them only requires a click of your mouse. Immediately after sticking the USB flash into the computer USB Disk Security will alert you about the existent potential threats. During our testing it detected the autorun.inf file as being a risky item.

It's true that this little file could be the starter of a mass infection but it would be nice if the user was given an overview of the commands and files to be executed via autorun.inf. Instead USB Disk Security simply marks it as a risky file offering one possibility only: deletion. It is a known fact that most users rely on the commands included in this little file and they generally know what it contains, ergo deleting it altogether is not such a good idea.

A scan option is also provided by the application and I have to admit that the process is pretty fast, in our case the results being displayed in less than a minute. Using proactive protection the software does not need regular updates. However, as it usually happens, proactive protection is not 100% accurate and is prone to generating false positives. In the case of USB Disk Security false positives is all we were served. Not even when we added a number of malware on the USB drive did the number of results alter in any way.
The application would always detect perfectly safe files belonging to portable software as "suspicious".

Again, the only option available was deleting them. No search on the Internet for more information on them, only deletion which actually sends the files directly to Quarantine from where you can later restore them. Also, it seems that the scanner will label as "suspicious" anything with BAT or CMD extension, regardless of its purpose.

Memory Shield option is designed to monitor potentially unsafe actions performed by applications and "close the window of vulnerability left open by other products' reactive, signature-based responses". Unfortunately the feature could not be tested as it did not react in any way to our malware stimuli, no matter what.
USB Tools section contains two options for protecting your computer from the malicious USB drive. The first one allows you to enable/disable immunity by automatically blocking most malicious programs from USB drive. Be advised that turning this feature on results in disabling the AUTORUN on the drive and creating USB Disk Security directories on each drive of your computer, named AUTORUN.INF.

Upon acquiring and then canceling the immunity on our test computer, a very strange message popped up alerting that there may be a virus on the USB drive and advising that I should use an antivirus software to solve the matter. If you ponder a bit, an antivirus software costs between $40-$70 (but let's say $40); add the $55 the USB Disk Security costs and you've got yourself a $95 bargain. From what I can tell immunity's purpose is to prevent executing automatic commands via AUTORUN.

The second option in USB Tools is Safely Remove. This action guarantees safe removal of USB drives once all files stored on it are closed. The principle driving USB Disk Security is simple: an Explorer restart and then launching the long "Safely Remove Hardware" wizard. To tell you the truth I simply click on the USB icon in system tray, pick the one I want out and that is it.

One of the final tools available in USB Disk Security is RepairSystem which brings registry repair and disk cleanup options up front. The first one will restore a bunch of folders and files: Folder Options, My Documents, Windows History, Favorites, Search, Run, etc. so, if you have changed the homepage in IE, kiss it goodbye unless you have another software to alert and prevent the change. The purpose is noble as in case of infection it restores them to the default state, but there is no alert to this. So you'd better use this function in case of infection only.

Clean Up tool deletes all unnecessary files, starting with cookies (it does not matter if you still need them), Windows and IE temporary files, log of recent documents and everything that has been recycled.
Last one in the list, Autostart, simply displays the elements programmed to start with Windows. Besides the fact that the only control over them is deleting them, USB Disk Security failed in our case to display all of them leaving two startup items aside.
Autostart pretty much wraps up the list of functions and options available in the program. You get to decide on the price and utility of the software as well as on testing it on your own machine.

The Good
The interface is extremely easy to handle and tool descriptions help the user to better understand the role and function of the features. The icons are nicely drawn.

The Bad
I will limit to putting functionality and price to the balance and I have to say that there is nothing appealing in neither of them. Oh, and when uninstalling, look for MyAppVerName as that is in fact USB Disk security.

The Truth
I can't think of a tool that cannot be replaced in USB Disk Security by a freeware and with much greater success. USB Shield displays autorun.inf as being risky, the scanner showed false positives only, memory shield could not be tested, USB Tools are not exactly a good way to treat your removable drive, RepairSystem isn't exactly efficient and Autostart failed to display all startup elements.
For all this you have to pay $55 and still need an antivirus software to detect and eliminate malware. Now $40, the cost of a good antivirus and $55, the cost of USB Disk Security, makes $95 when you can perfectly well get yourself a good firewall and system monitor and witness any change made to the system and spend the dough on something more useful.


Alexa rank enhancer (SEO Tool)

RankEnhancer has found a way to help you improve your ranking and placement by using special technology that tricks these systems into thinking 1000s of vistors are already coming to your website. When they crawl your site, and see all this activity, that helps move you up the ladder.

Help file included ! Full Version


Internet Download Manager v5.12 Build 11

Version 5.12 build 11 adds complete Vista support, YouTube grabber that can be used to download FLV videos from YouTube, Google Video, and MySpaceTV, redeveloped scheduler, MMS protocol support and the site grabber feature. This feature not only lets you download required files that are specified with filters, for example all pictures from a web site, or all audio files from a web site, but it also lets you download subsets of web sites, or complete web sites for mirroring or offline browsing. It's possible to schedule multiple grabber projects to run them once at a specified time, stop them at a specified time, or run periodically to synchronize changes. The new version also adds improved browser integration, redesigned and enhanced download engine, the unique integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.


HDClone Professional v3.2.8

HDClone Professional v3.2.8
HDClone Professional v3.2.8 + Serial

Creating identical 1:1 copies of hard disks and other media. For data rescue, backup, system restoration, mass installations and many more...

HDClone copies the entire contents of hard disks and other IDE/ATA, SATA/eSATA, SCSI, USB, and Firewire media on a physical level. This even allows for the smooth creation of backups or copies of complete operating system installations. In combination with the special 'SafeRescue' mode of HDClone, this technique is also perfect for rescuing data in case of defective hard disks. Furthermore, HDClone works independent of a partition layout, file system and operating system (i.e. it works with FAT, FAT32, NTFS, etc.). Thus, it also works with proprietary data formats which could not be accessed otherwise. Besides copying complete drives, it is also possible to apply it to certain partitions only.

Hardware Requirements:
# PC Pentium or higher, 32 MB RAM, VGA
# bootable floppy drive or CD/DVD
# PCI IDE hard disk controller

# optional: Busmaster IDE controller
# optional: USB 1.1 (UHCI, OHCI)
# optional: USB 2.0 (EHCI)
# optional: Adaptec SCSI controller
# optional: AHCI (SATA II) controller
# optional: Firewire / IEEE1394 (OHCI)

The Professional Edition of HDClone is conceived for daily use. For this purpose, it offers technicians, professional and private users the highest possible speed and flexibility through its 'FastCopy' mode and the 'Sector area' option which allows you to define an arbitrary copying area on the medium.

Besides IDE/ATA and SATA/eSATA hard disks and USB Mass Storage devices (hard disk, stick, card reader) via USB 1.1 and 2.0., HDClone Professional Edition also supports SCSI hard disks* and Firewire (IEEE1394) mass storage (SBP2) devices, e.g. an external hard disk or a card reader. The Professional Edition copies up to 5,4 GB/min and more.

You can build a bootable program floppy disk or CD/DVD
with this software package by doing the following:

WINDOWS 9x/Me/NT/2000/XP
Extract the files of the package into a directory
of your choice and use INSTALL.EXE to create a
bootable floppy disk or CD/DVD.

This package contains a floppy image (HDCLONE.IMG)
and an ISOimage (HDCLONE.ISO). From these you can
create a bootable medium under most Linux systems
by doing the following:
At first, extract the software package to a folder
of your choice. From there, open a terminal window
and use one of the following commands:
- Bootable floppy: "dd if=hdclone.img of=/dev/fd0" or
"dd if=hdclone.img of=/dev/floppy"
- Bootable CD/DVD: "cdrecord hdclone.iso"

This package contains a floppy image (HDCLONE.IMG)
and an ISOimage (HDCLONE.ISO). Use an appropriate
program to write them on floppy disk or CD/DVD.

You find further information for building a bootable
floppy disk or CD/DVD in the detailed manual (see below).

Insert floppy disk or CD/DVD into a bootable drive and
restart the computer. Ensure in the BIOS that it will boot
from this drive. HDClone will then be loaded automatically
when starting the PC.


Age of Conan: Hyborian Adventures

Rabu, 05 November 2008


In a world filled with cruel gods, mythical creatures, lost civilizations and a struggling human race, the mighty barbarian has finally seized the throne as king of Aquilonia. But Conan’s rule is on the brink of chaos, spiraling towards the doom of ancient evils. In this twisted fantasy world, dark magic and brutal combat lurks around every corner, and each man and woman must carve their own unique destiny under Conan’s reign. In the true vision of Robert E. Howard’s dark universe it’s now time for you to become a messenger of death.


the elder of the scroll : oblivion


Oblivion is the quintessential role-playing game for the next generation and another leap forward in gaming. Step inside the most richly detailed and vibrant game-world ever created. Oblivion is the latest chapter in the epic and highly successful Elder Scrolls saga and utilizes the latest PC and next-generation video game hardware to fully immerse you into the experience. With a powerful combination of freeform gameplay and unprecedented graphics, you can unravel the main quest at your own pace or explore the vast world and find your own challenges.

After the mysterious and untimely death of the Emperor, the throne of Tamriel lies empty. With the Empire ready to crumble, the gates of Oblivion open and demons march upon the land-laying waste to everything in their path. To turn the tide of darkness, you must find the lost heir to the throne and unravel the sinister plot that threatens to destroy all of Tamriel.

download links
enjoy it


resident evil director cut walkthrough


This guide is for both Jill & Chris.

Your first objective is to find some clues. After speaking to Barry go
to the far door and go through it. You should now meet your first zombie
so arm your gun(or knife if you`re feeling a bit handy) and shoot it down.
After a few shots it will fall down, but it isn`t dead so aim down and blast
it to make it stand up again and then shoot it some more. The body is Kenneths
, this is the first clue. Collect the clips and go back to talk to Barry.
Barry will still be where you spoke to him(still `examining` the blood).
A zombie will now burst in and Barry will take care of it automatically. Now
go to the Main Hall. Barry will now give you a lock pick and tell you where
to go next, so go through the blue doors. In this room are 2 moveable objects
(a desk and some steps), move the steps next to the statue and collect the
map, now move the desk away from the door and enter. Inside there is a zombie
on the floor, you can either shoot him on the floor or have some fun and boot
his head off(Chris crushes his head), collect the ribbon on the shelf and......


game for your mobile free


final fantasy tactic walkthrough

Selasa, 04 November 2008

Final Fantasy Tactics was released on the heels of the highly-successful Final Fantasy VII. Tactics introduced a whole new revolutionary concept to the FF series: strategy based battles. Battles were fought on an isometric 3D field, and this entire new dimension to the game added a new amount of strategy to Final Fantasy Tactics. However, this game was largely ignored, as it is only 1 disc. But it's still an awesome game to play, definitely the Final Fantasy game with the most replay value and difficulty.

Final Fantasy Tactics used the Class system, taken directly from Final Fantasy V. Each character in the game could change to a different class at any time, like a Knight, Priest, Wizard, etc... Each class had several useful abilities, and fighting battles and gaining AP allowed the character to permanently learn these abilities. It's definitely one of the most flexible systems used in any RPG.

The battle system was also incredible. Battles were fought on isometric 3D fields, adding a new dimension to the game. Battles were no longer a matter of selecting attacks and watching your character execute it; now, you had to choose where to execute to attack, and position yourself to maximize your chance of hitting. For example, an attack had a much higher chance of hitting if it was aiming at the back of an enemy, instead of straight from the front. This new battle system made Final Fantasy Tactics undoubtedly the most difficult out of all FF's.

The soundtrack in Final Fantasy Tactics is also a departure; not composed by Nobuo Uematsu, but definitely comparable to all of his works. Tactics used a pure orchestral and symphonic style in its soundtrack, from grand majestic pieces to dark, brooding ones.


Game Optimizer Pro v1.0

Optimizer Pro 1.0 By allocating system resources and prioritizing system processes Game Optimizer Pro brings out the gaming side of any computer.Game Optimizer Pro has optimizes your computer in 4 different ways:

Features :

1. Dynamic Optimization
Game Optimizer Pro cleans up Memory space and allocates workspace and memory processes specifically to the game you are playing. At the same time optimizing your hard drive and Game process, thus improving the way your system performs.

2. Static Optimization
Game Optimizer Pro will enhance your gaming experience by allowing your game to run faster and smoother with better frame rates by tweaking the CPU priority, Cache optimization, etc.

3. Magic Speed
One of the most exciting features in Game Optimizer Pro. It allows you to configure your speed index to either speed up or slow down your game. It also includes customizable hotkeys to adjust magic speeds functions.

4. Keyboard remapping
Game Optimizer Pro allows you to customize your keyboard to make the keys that you use the most more accessible during game play and to shut off the keys that can get in the way.


free psx with bios and plugins just play it

Senin, 03 November 2008

Playstation Emulators

The Sony Playstation... There are so many things we can say about it but most of you know about it so let's just go to the specs & emulators.


* Analog Joystick
* Controller
* Memory Card
* Link Cable
* Mouse with Pad
* RFU Adaptor
* Multitap Unit
* R3000A
* 32 bit RISC processor
* Clock- 33.8688MHz
* Operating performance - 30 MIPS
* Instruction Cache - 4 KB
* Data Cache - 1 KB
* BUS - 132 MB/sec.
* Data Transfer Rate (DMA TO RAM) 150 KB/sec. (Normal) 300 KB/sec. (Double speed)
* Maximum Capacity - 660 Megabytes
* Features Audio CD play XA Interactive Audio
* Control Pad Two control pad connectors Expandable with multitap connector
* Backup RAM Two removable cards 128 KB Flash Memory OS support for File Save, Retrieve and Remove
* Serial Port I/O Link Cable Connectivity
* Main RAM: 2 Megabytes Video RAM: 1 Megabyte Sound RAM: 512 Kilobytes CD ROM buffer: 32 Kilobytes OS ROM: 512 Kilobytes
* 24 Channels
* 44.1KHz sample rate
* PCM audio source
* Digital effects include: Envelope Looping Digital Reverb
* Load up to 512K of sampled waveforms Supports MIDI Instruments


emulator ps2 free for download

Rabu, 29 Oktober 2008

The Sony Playstation 2... Successor to the original and is considered by the most as the best & most popular console of it's generation.
The PS2 has the ability to play the games of the older Playstation 1.

  • CPU: Emotion Engine 300MHz, 128-bit INT, 128-bit FP, 24KB L1, 16KB Scratch, 8KB VU0, 32KB VU1, 450 MIPS, 6.2 GFLOPS, 66M Vertices/Sec, 2.4 GB/s Internal, 1.2 GB/s Graphics, 3.2 GB/s Memory
  • Graphics: Sony GS 150MHz, 1.2G Texels/Sec, 32-bit Color, 4MB (48 GB/s), 1.2 GB/sec Bus
  • Sound: SPU2, 48 2D Voices, ADPCM, 2MB
  • Data: 24MB (2.6 GB/s), 16MB (81 MB/s), 4.7GB Discs, Expansion 56K Modem Ethernet


About This Blog

Lorem Ipsum

  © Free Blogger Templates Columnus by 2008

Back to TOP