Search results
Results from the WOW.Com Content Network
Bug Attack is a fixed shooter video game written by Jim Nitchals for the Apple II and published by Cavalier Computer in 1981. [1] A version for Atari 8-bit computers was released in 1982. [ 2 ] Bug Attack is based on Atari, Inc. 's Centipede arcade game.
This is a list of game titles released for Atari 8-bit computers, sorted alphabetically. 0–9. 3 in 1 College & Pro Football; 3-D Tic-Tac-Toe ... Bug Attack; Bug Off ...
A zip file was found within the retail games dummy data, which included the full PlayStation source code to the game. [93] Beatmania 5th Mix: 1999 2000 PlayStation Music video game: Konami: With the 2000 Japanese PSX game Beatmania Best Hits there was mistakenly included the source code for the 1999 game Beatmania 5th Mix. [94] The Bilestoad ...
The games in this table were released under a free and open-source license with free content which allows reuse, modification and commercial redistribution of the whole game. Licenses can be public domain , GPL , BSD , Creative Commons , zlib , MIT , Artistic License or other (see Comparison of free and open-source software licenses ).
Banzai Bug; Barney's Hide & Seek Game; Battle Bugs; Black Widow (video game) Body Harvest; Boku no Natsuyasumi; Boku no Natsuyasumi 2; Boku no Natsuyasumi 3; Boku no Natsuyasumi 4; Buck Bumble; Bug Adventure; Bug Attack; Bug Fables: The Everlasting Sapling; Bug Heroes; Bug Off! Bug Riders; Bug Too! Bug! Bugaboo (The Flea) Bugdom; A Bug's Life ...
Bug! is a 3D platform game which revolves around the player safely progressing through various levels. The game is set on "Bug Island" and consists of six worlds made up of three levels each, with each last level culminating in a mandatory boss fight. [2] Enemies come in the form of insects, mollusks, reptiles, amphibians, and arachnids.
Buck Bumble is a third-person shooter where the player controls a bee.. The game features full-on 3D graphics. Buck can be armed with up to eleven different weapons, including such realistic weapons as a stun gun, a laser, a rocket launcher, and a guided missile launcher.
In computer security, a drive-by download is the unintended download of software, typically malicious software. The term "drive-by download" usually refers to a download which was authorized by a user without understanding what is being downloaded, such as in the case of a Trojan horse. In other cases, the term may simply refer to a download ...