-
Treasure of Big Totem 3
The third entry, where you have to continue helping the old man reach hsi destination.
FreeRocky Bytes ScoreTotal Downloads130 -
Inspector Kloo 8
A bracelet has mysteriously disappeared, and the house owner is certain that a thief is responsible.
FreeRocky Bytes ScoreTotal Downloads89 -
Clickcharts Flowchart Maker
Create flowcharts quickly and easily, with a wide variety of shapes and connections!
FreeRocky Bytes ScoreTotal Downloads575 -
Escape to the Spa
Escape from the spa's locker room to get to the actual spa in another Tesshi-E escape game.
FreeRocky Bytes ScoreTotal Downloads106 -
Alkirian - The Ice Stone
Dan goes to a snow mountain to hunt down the ice stone mentioned in the nine pages.
FreeRocky Bytes ScoreTotal Downloads94 -
Shotcut
Shotcut is a free video editor that's open source and automatically updates! It comes with many user features that other video editors don't have.
FreeRocky Bytes ScoreTotal Downloads777 -
Hadoop
Contribute to research and development through distributed computing when you install Hadoop on your PC.
FreeRocky Bytes ScoreTotal Downloads2,960 -
Treasure of Big Totem 4
Play as the third member of the group of adventurers who are all after the titular treasure.
FreeRocky Bytes ScoreTotal Downloads109 -
The Escape Hotel
The first large expansion to the scope and scale of the puzzle and environment design.
FreeRocky Bytes ScoreTotal Downloads148 -
Treasure of Big Totem 10
Cut back to Victoria as she crosses the reef and obtains the next scroll containing an important clue to her goal.
FreeRocky Bytes ScoreTotal Downloads93 -
Treasure of Big Totem 11
The last member of the group, Amara, has finally arrived on the island. You have to help her solve some puzzles and catch up with the others.
FreeRocky Bytes ScoreTotal Downloads93 -
Treasure of Big Totem 16
The penultimate entry in the series where Victoria meets up with Otto and they work together to find a scroll.
FreeRocky Bytes ScoreTotal Downloads136 -
Esklavos Chapter 4
The duo's been separated because one of them fell into a cave that nobody's ever escaped from.
FreeRocky Bytes ScoreTotal Downloads125 -
Escape from the Box Room
Tesshi-E starts to experiment in this entry which has one of the most unique game design in escape games.
FreeRocky Bytes ScoreTotal Downloads124 -
Rocky Bytes ScoreTotal Downloads94
Complete Step by Step Guide: How to Clean and Speed Up my computer with free programs (Windows)
Computers, no matter how fast and powerful they are will slow down at some point. You can think of it as the wear and tear from constant use. But unlike other products, a worn out and sluggish isn’t at the end of its lifetime. There are many ways we can bring it back to its full potential. Learn ...
The uses of Wifi Auditor
Wifi Auditor is a tool that analyzes nearby wireless connections, identifies the make and model of the router and provides you with the factory default WPA-PSK password for them. Of course, by now you’re thinking this is rather dodgy and suspicious, but don’t be alarmed. Wifi Auditor is a ...
Bytes that Rock Winners announced: Discover the best games, programs and blogs of 2015!
As you may be aware we recently held the Bytes that Rock Software Awards recognizing the best software, games and blogs from the last twelve months for their hard work and the fantastic programs and blogs they have given to us during the last year. We are pleased to say it was hugely successful, thanks to ...
Security Essentials guide: Protect your Internet privacy and discover other tools to keep yourself safe
If you’ve read Rocky Bytes in the past, you know we take internet privacy and security very seriously. We’ve discussed the topics of anti-censorship and tracking tools at length and have taken great strides into having the best software available for you to keep yourself safe from the dangers ...
Best remote access software: Teamviewer, LogMeIn or TightVNC?
Remote Access tools are applications used to, as the name suggests, obtain remote access to a computer, to view or modify its contents or even execute applications. While they have personal uses, such as quick access to home PCs from any location, using another desktop or mobile, their main uses are ...