When Icons Attack



Advertisement

Description

Your desktop icons are on a rampage. They have gone wild and are attempting to seize control of the desktop. Only one obstacle stands in there way -- you! This exciting space shooter features over 100 unique levels and rendered graphics. The game plays a bit like space invaders, with some galaga or galaxian mixed in. Many cool powerups augment your ship's icon-blasting abilities -- extra weapons, shields, and more! Requires DirectX 9.0.


  • Rate:
  • License:Shareware
  • Category:Arcade
  • Developer:SB-Software
  • Downloads:96
  • Size:2.72 Mb
  • Price: $12.00

To free download a trial version of When Icons Attack, click here
To visit developer homepage of When Icons Attack, click here


Advertisement


Screen Shot

Click on a thumbnail for the larger image.

When Icons Attack
System Requirements

When Icons Attack requires 95 98 NT 2000 XP:Home XP:Pro.

When Icons Attack Copyright

Shareware Junction periodically updates pricing and software information of When Icons Attack full version from the publisher using pad file and submit from users. Software piracy is theft, Using crack, password, serial numbers, registration codes, key generators, cd key, hacks is illegal and prevent future development of When Icons Attack Edition. Download links are directly from our publisher sites. Links When Icons Attack from Bittorrent, mediafire.com, uploadfiles.com, hotfiles.com rapidshare.com, megaupload.com, netload.in, storage.to, depositfiles.com and other files hosting are not allowed. The download file is obtained directly from the publisher, not from any Peer to Peer file sharing applications such as Shareaza, Limewire, Kazaa, Imesh, eDonkey, eMule, Ares, BearShare, Overnet, Morpheus, BitTorrent Azureus and WinMX.

Review This Software
Your Name:
Rating:
Comment:
Security Code:


More When Icons Attack Software


Advertisement

When Icons Attack

Your desktop icons are on a rampage. They have gone wild and are attempting to seize control of the desktop. Only one obstacle stands in there way -- you! This exciting space shooter features over 100 unique levels and rendered graphics. The game plays a

When Clones Attack!  v.1 4

A fun arcade game in its most classic style.You can relive old memories of 90's with this game. It's you against the clones. Use the mouse and keyboard to navigate, and dispatch of your enemies to reach the next level.

Germ Attack  v.1.0

When germs attack the human body, a super anti-body like you fights the germs to the death. Fight the germs in 60 levels of match game play! Each level requires more and more columns or rows.

Voyage Century Online  v.0.87

The relation between PK and reputation PK: At present, as there is no PVP system designed in battle, once you attack others, the character system will consider it as PK. The color of your character's name will be changed from blue to purple.

NavyAntivirus USB Security System  v.2. 5. 2005

1) Automated scanning of removable drives and cleansing of drives (virus free). 2) Provides immunity to the Flash/Pen Drives from autorun.inf (information file that Windows loads at the time you insert the drives in USB Port, that contains the

Bookworm Adventures  v.32.0

The main character of this game is Lex, the Bookworm. He loves to spell out words. His mission is to rescue Cassandra, the Oracle. To do this he must pass through different levels. Along the way, he will encounter emenies that will try to stop him.

World Domination 2  v.1 1

Be Diplomatic And Become The Winner of World. World Domination 2, the biggest and the best Turn Based Strategy Flash game provided by youdagames.com will entertain you a lot, after World Domination. You were involved in to check the blast in the

MS PST Repair Tool  v.8.4

MS PST Repair Tool can speedily recuperate corrupted or damaged PST files & instantly fix pst and repair ms outlook emails. PDS PST Repair tool is finest PST restore solution to recover outlook pst file with all emails, contacts, calendar etc.

Snort  v.2.9.2.3

Snort is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Combining the benefits of signature, protocol and anomaly-based inspection, Snort is the most widely deployed IDS/IPS technology worldwide.

Stock Toolbar Icons  v.2012.1

What is the first thing one sees when running a program? Surely it is an interface and icons. But creating icons is not an easy job. Stock Toolbar Icons is a real magic wand in this important task. Choose the icons which suit your program best.

Vista Network Icons

Looking to bring a fresh face to your next networking-oriented application? These stock vista icons can give you the glossy look and feel you desire, but with the custom touch that only unique, pixel-perfect designs can provide. When considering an

Flat Database Icons  v.2014.2

What is the first thing one sees when running a program? Surely it is an interface and icons. But creating icons is not an easy job. Flat Database Icons is a real magic wand in this important task. Choose the icons which suit your program best.

Other products of this developer SB-Software

3D Beer Asteroids, Invaders, and  v.1 2

3D Beer Asteroids, Invaders, and Blaster is a sh...Beer Asteroids, Beer Invaders, and Beer Blaster.

Astro Hunter 3D Deluxe

Astro Hunter 3D Deluxe is an asteroid shooter ar...ots of cool powerups and weird aliens to defeat.

Beer Asteroids, Invaders, and Blaster

Beer Asteroids, Beer Invaders, and Beer Blaster ...gned to run under modern 3D hardware. You should

Binary Vortex  v.5.0

Binary Vortex is intended to be easy to use. The..., while still being powerful enough for experts.

DNS Query  v.1 2

This 32-bit program resolves an IP address for a...resolves your machines host name and IP address.

DNS Watcher  v.1 2

DNS Watcher is a shareware DNS server monitor fo...rs monitor if their websites are working or not.

ePassBook  v.1 6

This program is a secure, encrypted password man...ilar to what most people use to access websites.

ePassBook Password Repository  v.1 5

ePassBook Password Repository is a unique tool d...passwords are stored in a secure encrypted file.

ForPilots Logbook  v.2 3

ForPilots Logbook, as its name indicates, is a l... can customize to our own needs and preferences.

ForPilots Pocket CheckList  v.1 1

ForPilots Pocket CheckList is an electronic chec...igurable and you can create your own checklists,

Newest Reviews