Grouper is a cool puzzle-card game played by finding groups in a set of cards. It is based on the original card game Set, which is a modern kind of a match-the-tiles (Memory) game.
But instead of matching 2 cards, Grouper ...
Grouper is a cool puzzle-card game played by finding groups in a set of cards. It is based on the original card game Set, which is a modern kind of a match-the-tiles (Memory) game.
But instead of matching 2 cards, Grouper ...
Kaleidoscope toy written by "ChipEra" in PocketC. Make doodles with rotational symmetry.
This updates the latest security features to the T3, such as Quick unlock and encryption
No description available. Want to contribute? Register or login to edit this post with your description, screenshot, files, and more!
A CD released by Cosmi under 'SwiftWare' branding containing 4 beamable IR games. The case advertises that the games work "with both Palm and Pocket PC Handhelds", and the back of the box states that the software will also work with "PC computers with ...
https://web.archive.org/web/20170319065534/http://www.sergem.net/fonthack123/index.html
FontHack 123 is a FREE font substitution hack. It needs one or several .pdb font files to be present in PalmPilot. Requires HackMaster (EvPlugBase, ...
Yahdice is a clone of the dice game, Yahtzee™. It supports both playing alone or in a group.
Yahdice is open source as of version 2.00
Tower of the Sorceror is a topdown RPG/ Puzzle hybrid, ported from the Dos version by Jeremy Gibson. Its incomplete as the Dos version had 50 levels and this one only 10. Its free to play with no registration required.
His website is gone but ...
These files are only intended for the Sony CLIE NX series. On the Sony CLIE NX series, place these files on the memory stick in the following location: /PALM/PROGRAMS/MMFlash
If there is not a directory create ...
You've heard it. Antivirus for PalmOS. The epitome of uselessness.
In 2000, Symantec Corp. discovered some unique viruses. They were written to attack Palm OS handhelds. It was only a matter of time before a hacker figured out how to exploit ...