Every day we offer FREE licensed software you’d have to buy otherwise.

Ultima Steganography 1.5 Giveaway

Giveaway of the day — Ultima Steganography 1.5

Ultima Steganography is an extremely easy-to-use steganography software for Windows.
User rating: 251 (33%) 515 (67%) 48 comments

Ultima Steganography 1.5 was available as a giveaway on February 21, 2011!

Today Giveaway of the Day
free today
Clone HDD, SSD, USB flash drive, memory card or other storage device.

Ultima Steganography is an extremely easy-to-use steganography software for Windows. With the help of the program you can easily encrypt some file and hide it in a picture. Once a file is hidden in an image the saved picture is still a picture, it will load just like any other image and appear as it did before, the only difference will be that it contains hidden file.

File security and integrity are currently the most important issues in the world of information technology. Keep your private data safe with the help of Ultima Steganography.

Today the Developer is going to reward 3 best improvement suggestion with personal licenses for MultiStage Recovery. So share your valuable ideas and win the prize!

Use Idea Informer widget to submit your feedback and do not forget to fill in your name and e-mail – otherwise the Developer will not be able to contact you in case you are the one to win!

System Requirements:

Windows XP/ Vista/ 7


Enplase Research



File Size:

3.11 MB



GIVEAWAY download basket

Developed by Hewlett-Packard
Developed by Kaspersky Lab
The standard anti-malware solution for Windows.
Recover lost or forgotten passwords for RAR files.

Comments on Ultima Steganography 1.5

Thank you for voting!
Please add a comment explaining the reason behind your vote.

Did anyone notice the second post? 10,000 images? Are u a pro photographer or do u have a HUGE family. Most people, not accusing, who have that many images are getting them from the darkside anyway.
Also, the comment "I have over 10.000 pictures on my pc, so I would not use even 1 picture for that kind of “hiding”…" You don't have one image you would send to anyone? Out of 10,000? Not even a picture of a bowl of fruit. Dont take this too seriously I travel to the darkside sometimes I'm not going to deny it. It's just that those kinds of statements make u jump out as "suspect" anyway and you should'nt worry about the morality of hiding info in an image.
If you think about it. There are many legit uses for this type of software. You only seemed to think hiding something was wrong. That's why we have firewalls and anti-spy/malware programs installed. Essentially to hide our info this could be considered another layer.

Just my 2cents. No offense meant.

Reply   |   Comment by robjov  –  9 years ago  –  Did you find this comment useful? yes | no (+1)

We're going to use it to hide a backup of our keywallet codes. I think it may be an invaluable tool if it works well.

Reply   |   Comment by Geno  –  9 years ago  –  Did you find this comment useful? yes | no (0)

First of all I want to thank GAOTD and the software programs producers for their free offers. I always check what is available, read the comments and download if I think I might use it. Sometimes I find a real use/need for the s/w, a lot of times I end up deleting/uninstalling it. But I am thankful for the opportunity to at least try the softward.
Now, for today's program. I downloaded this when it was offered last year and have had it on my computer since then but was not able to use the full version because of my neglect to "register" it then. I downloaded it this time.
??I have a question for anyone who has tried it.
?? Why does the image have to have the red box which states that it contains a secret file???? That seems to me to be a magnet for someone to try to decrypt it. Is there any way to remove that big red box? Or am I the only one to have that trouble???

Reply   |   Comment by SamF  –  9 years ago  –  Did you find this comment useful? yes | no (+1)

While I have my hobbies that have nothing to do with this type of stuff, in the real world this is in the area where I make my living and have since the mid-80s. Take my word for it, it will only take a few minutes of scanning with one of several security softwares to find the 'picture' and while some may be unreadable, they all can be removed.
I'll pass on this.

Reply   |   Comment by WaveThemes  –  9 years ago  –  Did you find this comment useful? yes | no (0)

I have used this type of steganography to hide messages or small programs in a picture, then email it, they can remove the file at the other end using the same software.

If you want to really hide and secure something use Trucrypt.

Reply   |   Comment by GeoHot  –  9 years ago  –  Did you find this comment useful? yes | no (+3)

You can do this without software. This program just makes it a little easier is all....

Everybody hollering about ethics...silly. Well, I live in a third-world country where there is NO freedom of speech and I use steganography all the time, to get the truth to friends of mine. There have been numerous people jailed in Thailand, Malaysia and Singapore just in the last couple of years for speaking their peace...the truth.

So quit your bellyaching in your comfortable little ethical Western worlds.


Reply   |   Comment by Jeeem  –  9 years ago  –  Did you find this comment useful? yes | no (+12)

I like comment #15, John, referencing OutGuess.org. That's why I don't code for the encryption field--people far smarter than I am figure out the weaknesses of every encryption method. Note that the site also has OutGuess, which is a high-quality steganographic tool for JPEGs, but all of the sources are for UNIX/Linux.

Reply   |   Comment by Fubar  –  9 years ago  –  Did you find this comment useful? yes | no (+5)

To Activate the program, do the following:

1. After Installing tje program, run the program.
2. Click on "X" to close out the 1st blue window that appears.
3. Click on "About" in the 2nd blue window.
4. Click on "Enter activation key..." in the 3rd blue window.
5. Individually copy the "Name" & "License key" data from the "readme" file & paste it into the appropriate text boxes in the 4th blue window.
6. Click on "Activate" and you should now have the Full Program.

Reply   |   Comment by 777  –  9 years ago  –  Did you find this comment useful? yes | no (+7)

I would like to thank GAOTD and the developers of this encrypting s/w. I would also like to thank those of you who have given some good ideas as to how this s/w could be used. I thought the password idea was genious. We have to face the fact that there are people who try to take away our privacy and we have to be vigilant by doing what we can to protect it. There are predators, prey, and ones who fight back. It's good to know that we have plenty of fighters who help the prey fight back as well.

Reply   |   Comment by Ms. Lady Woman  –  9 years ago  –  Did you find this comment useful? yes | no (+5)

Works well, I like it. Its a keeper for sure. Will go with the other Stego programs I have. Hide in plain site is my motto for password files. I do like the fact that when I put in a password to un-encrypt my text file it doesn't hide the password. Why do I need it hidden when I am decoding.

Reply   |   Comment by Clive  –  9 years ago  –  Did you find this comment useful? yes | no (-4)

This is obviously more of a privacy solution than security, and for this it is quite sufficient.

Reply   |   Comment by soylent_dave  –  9 years ago  –  Did you find this comment useful? yes | no (0)

For those of you who are putting your digital photos on a website and need to protect them there is a relatively simple way to do it.
1) Put your images in a directory and protect it with an htaccess file.
2) Always use tables for each photo. Use your image as the table background and use a transparent gif as the actual image in the table.
3) Use a script to get rid of scroll bars, buttons, and cancel the right click function. There are lots of free scripts available to do this.
4) Use mouse hover to show the background image in full size. As soon as someone moves the mouse to try to capture the image it disappears and since the image directory is protected by htaccess they cannot type in the image name to get to your photos.

This is a method I have used for many clients and have yet to have problems. I hope this helps. 3's

Reply   |   Comment by Lloyd Olson  –  9 years ago  –  Did you find this comment useful? yes | no (+8)

Are we doing this again? There are several freeware apps that do this, and the fundamental feature of steganography is "security through obscurity". You bury some important bit of data inside one picture, then hide it among many, obscuring the data in a file where people will not generally be looking, and among other non-ASCII bytes where one has to know where to look, and how to decode the "data".

The tip-off for anyone snooping is the existence of a stegagraphy program ON YOUR COMPUTER! Then they know that you did it, and what you used! The only stegography app that is really effective is one that looks like something else until you type in a secret keystroke sequence, or one that is "portable" and resides only on a thumbdrive.

If this program INSTALLS, leaving a footprint on your computer, it is useless unless you don't intend to use it for anything but misleading someone hunting for your secrets.

Reply   |   Comment by CA_AH  –  9 years ago  –  Did you find this comment useful? yes | no (+2)

lol... wow! I have just read every single "REVIEW". hmmm, so, here is what I have gathered: using this s/w proves that I am as guilty as Willie Nelson not having paid his taxes for years, that I am stealing some top secret corp files. Hahaha! Love this. I am gonna take this and guess what, I'm gonna use this! Not telling what I'm using it for either.... but let's just say that some financial institutions require their members to change their p/w every so often; and some teenagers like to try to hack their parents p/w to gain access to things they shouldn't. So...Thanks GAOTD & Enplase Research for providing this to us today, we "thieves"(or consumers) and "criminals"(or parents) need this kind of thing!

Reply   |   Comment by Susan  –  9 years ago  –  Did you find this comment useful? yes | no (0)

Tried this for the invisible watermarking possibilities.

Embedded a 101 byte txt file into a 2.76MB jpg. Output as a png but 8.1MB in size. Uploaded onto my website and then downloaded the pic using "save image as" as both a png and jpg file.

Only the png pic contained my txt file, though both png & jpg files were of the same size

Reply   |   Comment by Jerome  –  9 years ago  –  Did you find this comment useful? yes | no (+14)

I didn't like the giveaway today but I thank the team for the option. I really love http://keepass.info/ it is Free. This is like a password of info safe... You need a password for the Windows network logon, your e-mail account, your website's FTP password, online passwords (like website member account), etc. etc. etc. This is a great way to keep organized and is portable... Check it out it might help the other checking out today's software needing something like KeePass instead...
Thanks for everyone's input and the GAOTD Team for submitting different software and programs....

Reply   |   Comment by CJdoug  –  9 years ago  –  Did you find this comment useful? yes | no (-5)

cmmr's suggested method does not merge the photo with the text but merely appends the text file to the end of the photo which doesn't produce the same results as true stenography. I've toyed around with stenography programs but personally have little use for them but can appreciate their value to those that do.

Reply   |   Comment by asaens  –  9 years ago  –  Did you find this comment useful? yes | no (+4)

Interesting software.

But... I am still not sure of the practical value of it. I understand the need to keep some things secure... but if that is the need, then why not encrypt it? Full encryption provides superior protection to this.

If you are paranoid that someone will want to pry-open your encrypted file, just rename the encrypted file (to dll, jpg, doc, txt, dta, whatever...) and stick it in a folder with similarly named files).

I will admit that steganography makes you feel a little stealthier and "secret agentish"... but it is an inferior way to secure files.

Reply   |   Comment by friendinme  –  9 years ago  –  Did you find this comment useful? yes | no (0)

I have trouble trusting s/w that locks folders so hiding password files in an image may be a suitable alternative.

Reply   |   Comment by me2  –  9 years ago  –  Did you find this comment useful? yes | no (0)

@#1. No use? Illegal? Unethical?

How about to hide a simple text file that's a list of all my game passwords for quick reference when I have to reinstall. How about text file of all the usernames n passwords for all my web accounts. N that's just off the top of my head, I'll prolly think of more. Like my personal contacts list. This can help protect it from hackers/spam. No Security software is totally safe cause the virus/worm has to be created n released before they can counter it.

People can always hack security/passwords etc. but if they don't know its there, they won't know to try.

And it's pathetic that u can only see the negative, dark n criminal aspects of things n people. You're just sad.

Reply   |   Comment by Adam Murphy  –  9 years ago  –  Did you find this comment useful? yes | no (+13)

@Wire FX...stenography is a nice way of invisibly watermarking photographs. In case someone wants to "borrow" them without permission.

Reply   |   Comment by lisaviolet  –  9 years ago  –  Did you find this comment useful? yes | no (+6)

One final comment: After I get the screen basically telling me that this is only a trial version that inserts a banner into your picture unless you purchase the full version, I tried the CLOSE button and it would not close the program. I tried simply closing it's window, but that didn't work either. Had to resort to the Task Manager in Windows 7 to close the program. After I closed it via Task Manager, I ran it again & same problem.

Reply   |   Comment by DrKenB  –  9 years ago  –  Did you find this comment useful? yes | no (-1)

cmmr's suggestion of "Here’s how to hide files in an image without using any software" is incorrect: the article he cites clearly says "You will be needing WinRAR..."

Declarations that "you are trying to hide something or trying to siphon off some info unnoticed or doing something illegal!" are just inane. Software, like butter knives, can be used for good or bad, entirely dependent upon the intent of the user.

For those who can't see any use for this software, that's fine. So what? I don't see any "need" for tax preparation software but that doesn't make it illegitimate in my mind. Just because you don't have a need for some specific software doesn't preclude others from having a legitimate need for it. (Or gee, maybe you're using that tax prep software to do something illegal... maybe we should ban all tax prep software???)

Reply   |   Comment by DrKenB  –  9 years ago  –  Did you find this comment useful? yes | no (+8)

Loaded with a little hiccup (Had to re-register manually after the installer had stated that the program was activated but remained an unregistered version) on a HP Pavillion Dv7 Laptop with 500G HDD and 8Gig RAM Windows 7X64 Home Premium. I know Im going to have lots of fun with this little program.
1) There should be some way to have a deceiphering key so any message could be deceiphered WITHOUT having the program.
2) Is there someway to add this program as a PLUGIN to Paintshop Pro and Photoshop?

Reply   |   Comment by Misty  –  9 years ago  –  Did you find this comment useful? yes | no (+3)

@ Comment #19...Very complicated and costly "guide"...Your method involves editing with Adobe DreamWeaver CS3 (2007) which most people would concede is "software"... It also has a 30 day trial and then costs $399.00, at least on CNET...if you know where to get it free, let us know and preferably the new CS5 version... This is a give-away site...as in "free".

Reply   |   Comment by Dave  –  9 years ago  –  Did you find this comment useful? yes | no (0)

Pixelcryptor no hidden snags and 100% free and full program

Reply   |   Comment by Jimmy  –  9 years ago  –  Did you find this comment useful? yes | no (+3)

A free version does exact same as this is Pixelcryptor

Reply   |   Comment by Jimmy  –  9 years ago  –  Did you find this comment useful? yes | no (+3)

This Software I Find Very Useful. It Installed Very Easy And Quick. Gives step by step on how To "Hide" The File.Tried Hiding .txt File, Worked great. Tried Hiding photo in side Photo, Works even better. Un-Hiding Is As Simple As 1-2-3.
Yeah it might not Be The Most Secure but Thats Why After You Are Done Hiding Your File Use Another program to Encrypt It. Then if you Want The File completely Hidden,just right click on file ,go to properties and check "hidden" click apply then OK.
Then When you want to access the file just un hide(To Unhide just go to control panel-folder options- view -and check show hidden files and apply) and decrypt then extract the "hidden" file. Simple.
Thanks GOTD AND Enplase Research, this Is A Keeper.

Reply   |   Comment by Rob  –  9 years ago  –  Did you find this comment useful? yes | no (+2)

As someone who creates and sells digital content in a market rift with WAREZ, free sharing and thieves I'm thinking this might be something quite useful. Since most of the content thieves are so bold as to not even change copyrighted material before using it for their own gain, it's likely they're not sophisticated enough to know to search for something like this either. It costs nothing to give this a try and if it works could save me a lot of money and grief.

Reply   |   Comment by velvetmoxie  –  9 years ago  –  Did you find this comment useful? yes | no (+8)

#14 - Mark was lucky. I tried the RAR method using ZIP, everything worked fine until I tried retrieving the text file, all I got was a message telling me the ZIP file was invalid or corrupt.

Reply   |   Comment by Geoffrey Alexander  –  9 years ago  –  Did you find this comment useful? yes | no (+2)

You can do that without the software follow this guide.


Reply   |   Comment by ilikefree  –  9 years ago  –  Did you find this comment useful? yes | no (-10)

@One Nut - cmmr's 'Sizlopedia' RAR method is not as detectable as you suggest, the RAR file extension is applied only in order to view the hidden file, until then, the image-file extension is a standard JPG, TIF or whatever. Reversal restores the protection (I assume).

As for the usefulness of 'Ultima Steganography', I am currently using a previous GiveAwayOfTheDay, AxCrypt (if I didn't get if from GOTD then it was as on recommendation from this forum which, frankly, amounts to the same thing) to protect my passwords but there is always the concern of what happens if something causes me to lose my installation of AxCrypt. 'Ultima Steganography' may prove to be a better solution.

AJW rightly points out that letters are sent in envelopes, most people fail to realise that emails are like postcards, not sealed letters. It has been known for email correspondences to be interfered with and companies exchanging contracts have ended up with conflicting terms & conditions. I know for a near-certain fact that one of my (wholly innocuous) emails was intercepted and read by human investigators before being forwarded on - twelve days later. I noticed afterwards that it contained several potential 'trigger' terms.

It may be possible to open an image in a text-editor and, topping & tailing with the right code, equivalent to a comment marker, embed any text you like. Programmers should know about that one.

Privacy issues may be contentious but how many people publish their real names, let alone reveal their email addresses, on forums such as these?

Reply   |   Comment by Geoffrey Alexander  –  9 years ago  –  Did you find this comment useful? yes | no (+12)

I'll continue using http://www.spychecker.com/program/stools.html as it is free, and so if I have to do a rebuild I can get the program back to decrypt my files.

Reply   |   Comment by Clive  –  9 years ago  –  Did you find this comment useful? yes | no (0)

I would suggest the author gets to know the JPEG encoding system and applies the same technology directly to the JPEG encoded data so it does not decode JPEG the re-encode JPEG + encoded data but edits the already encoded JPEG data and embeds the encoded data onto the JPEG data. The encoded data + image should end up looking like JPEG encoding errors as if a bit too much compression was used. Only allowing lossless compression on the output file kind of defeats the purpose as it draws attention to those massive PNG and TIFF files. It is possible to perform Steganography on any image container format where the output is predicatble even if the compression is ultimately lossy as the encoding should be done after the image data-loss has occoured

Reply   |   Comment by TK  –  9 years ago  –  Did you find this comment useful? yes | no (+15)

I tried "cmmr's" way of doing it yourself. Pretty quick and easy. It worked with a "zip" file made by 7Zip too. Not just RAR files.

Reply   |   Comment by Mark  –  9 years ago  –  Did you find this comment useful? yes | no (0)

Would I be right in assuming that if you were to send or install the resultant file to another computer that the virus protection, if any good, would probably disallow the file as it would read the hidden file as a virus.

Reply   |   Comment by Christine  –  9 years ago  –  Did you find this comment useful? yes | no (-3)

#3 that is not hiding the included data but appending it to an image file as a RAR archive, so you need a comapatible archive program, they say winrar which was not free last time I looked!

Just observing the image size in the jpeg header and comparing it to the file size would lead anyone performing an investigation that there is more than just an image there!

Steganography (when done properly) is intended to encode data in such a way as it is not imediatly apparent that any extra data is encoded within the image.

#6 security through obscurity gives a false sense of security, if you want to store your master password list within an image using this type of tool you should encrypt it first using a strong but memorable passphrase, also not have Steganography or any recognisable derivative in the program name and have the executable password protected so it cannot be executed by unauthorised individuals to scan over your images to see what if anything is stored within.

Reply   |   Comment by TK  –  9 years ago  –  Did you find this comment useful? yes | no (+16)

I would enthusiastically endorse this were it not for the fact that Enplase code quality is low and that they missed the point of steganography, which is that it should be undetectable. The name of the file which you're hiding and its description are not encrypted, at least not by your key, therefor they are detectable. When you decrypt, your key is visible.

The install is clean. Bugs that were noted last time appear to be fixed, but you should always check that the encrypted file unencrypts correctly. Interestingly, this exposed a bug in the Windows 7 Windows Photo Viewer, it's not displaying large JPEG files correctly, as verified by other photo viewers (the color saturation or luminosity is off).

I recommend reading my comments #19 and #43 from the August 22, 2010 giveaway, noting that some of the bugs mentioned last time appear to be fixed.

Lossless operations can be performed on the result images. I recommend running PNG files through a PNG optimizer, you can easily cut the result file sizes in half without affecting the encrypted data. Large files can obviously be split and the pieces encrypted in multiple images.

Reply   |   Comment by Fubar  –  9 years ago  –  Did you find this comment useful? yes | no (+57)

There is a need for such software even if its just to hide passwords for various accounts. I used to have the same password for all my accounts until a virus got in and started accessing my accounts. Most, shut it out, luckily I had no on-line banking or anything important, as most sites made me change my passwords I now have little sticky yellow postit notes with passwords written all over them. The danger here is if you loose access to the program that created the secret password file you are in trouble.I do like the idea of the program but have had the experience with GAOTD before where you cannot get program again if you have to rebuild computer. You would then be forced to buy full licence just to get your own passwords back. Thank you GAOTD, but will pass on using this one.

Reply   |   Comment by Wombat  –  9 years ago  –  Did you find this comment useful? yes | no (+13)

My suggestion.
The compression process requires that I supply an image as a container file. Depending on the size of the file to be hidden, this container image needs to be greater than a defined size.

Have "Ultima Steganography" list only the images suitable for use as a container file, rather than listing every image of any size.

Reply   |   Comment by Glenn  –  9 years ago  –  Did you find this comment useful? yes | no (+43)

Wirefx: We wear clothes in public because some things are best kept private. That is also why letters are sent in envelopes. It is wise to secure data traversing the Intranet, where security is so poor that it can be regarded as "public". Steganography is one way of doing that.

cmmr: While that technique would fall within the definition of "steganography", the more usual technique is to hash the file to be hidden and then change the least significant digits to encode that within the image file acting as a receptacle. That usually has minimal impact on file size, but requires that the file to be hidden is no larger than about 4% of the size of the image, for a 24-bit image.

Trucker: One additional way to secure one's copyright on pictures is to add a copyright notice using steganography. Since most stealers of pictures are too lazy even to edit them, that can be useful proof of theft.

One trouble with adding data to images is that it can readily be stripped out when even minor changes are made to the image.

Reply   |   Comment by AJW  –  9 years ago  –  Did you find this comment useful? yes | no (+73)

@cmmr you know I could easily defeat that within seconds. Even with the use a simple dos command. Using FIND and we all know a beginning of a rar file starts with Rar!, thus using FIND "Rar!" *.* would search all your pictures in that folder and tell me everything you've hidden. That method is a foolish way to hide a file. With the program offered today, it at least doesn't just attach your file to the end of the picture, this way is a much more effective method.

Reply   |   Comment by One Nut  –  9 years ago  –  Did you find this comment useful? yes | no (+52)

Wire FX: It is sad to hear people suggest that only those doing something illegal would have a reason to hide something. I suppose you also feel that people should not have locks on the front door of their homes since as long as they have nothing illegal in their house, why not leave it open for anyone who feels like walking in?

Seriously - I know that I have a lot of things which I would want to keep secret and secured but none of it is illegal or even morally questionable. Now some of it could not be protected with this software but some of it would work well with s/w of this type.

Even just simple stuff like passwords - we are told to have different passwords for every account, to choose things which are random so they can't be guessed and change them often - I don't know about you, but for me that would be dozens of random passwords changed frequently, the idea of having a nice list hidden in, say, my desktop wallpaper so I can check it as I need to but others would not even know it is there - well, if this s/w is quick enough to be practical, then there is a good example of it's morally acceptable and legal use.

Reply   |   Comment by Fire Monkey  –  9 years ago  –  Did you find this comment useful? yes | no (+145)

This sort of s/w is used than you know, wire-fx ...

I'll post a more considered review later; for now - initial set up was okay but no allowance for jpeg's as well as erroneous error msgs about mis-sized bmp's and ico's I selected for trialing this give me an immediate concern ...

Reply   |   Comment by Stoic Warrior  –  9 years ago  –  Did you find this comment useful? yes | no (-32)

@ Wire FX:
Since you're talking about "ethics" and legality in combination with encryption, I feel sorry for you, you're CLUELESS!

You don't have a clue about the extend of today's spying in every sector, including industrial spying, patents, personal data etc.

The only reason someone might not be advised to use such a software for sensitive data, is that it won't protect you enough. This is also true for software costing thousands (the vast majority of such software).

Reply   |   Comment by Sam  –  9 years ago  –  Did you find this comment useful? yes | no (+105)

Here's how to hide files in an image without using any software:

Reply   |   Comment by cmmr  –  9 years ago  –  Did you find this comment useful? yes | no (+138)

I have seen this kind of program before and I still wonder about how it can be for any use at all...

My point is when you:
- put a file inside a picture file...
- use a speciel program to do so...

then you have to:
- mark those picture files in some way
- or put them in a marked folder

else do you:
- delete them by mistake
- or mix them with other pictures
- forget which picture files contains the hidden file

I have over 10.000 pictures on my pc, so I would not use even 1 picture for that kind of "hiding"...

Reply   |   Comment by Trucker  –  9 years ago  –  Did you find this comment useful? yes | no (-234)

There is not need for such software unless you are trying to hide something or trying to siphon off some info unnoticed or doing something illegal!

Anyways, it's good to know that such software exists, but it's of really no use and of good ethics to use such software either for personal use or else where!

Can't be of any use for hiding large files!

What info would one want to hide inside a picture which is of smaller size???

Thanks for the GAOTD TEAM!

Reply   |   Comment by Wire FX  –  9 years ago  –  Did you find this comment useful? yes | no (-468)
Add a comment

iPhone app giveaways »

StoryToys Sleeping Beauty Giveaway
Experience this magical story in an all new way in this interactive popup book from StoryToys.
$1.99 ➞ free today
Card Collector Giveaway
A fun and easy way to catalog all your baseball, football, basketball, soccer and hockey cards.
$0.99 ➞ free today
My Pills Reminder Giveaway
For many people, remembering to take a daily medication can be the difference between life and death.
$9.99 ➞ free today
Play Video - Music Tube & playlist for youtube Giveaway
Playtube allows you to organize youtube videos in playlists, view history of watched videos and bookmark videos.
$9.99 ➞ free today
Access more than 1,000,000 wallpapers with daily updates!
$0.99 ➞ free today

Android app giveaways »

One By One - Multilingual Word Search Giveaway
A new relaxing word search game for all ages with 3 game modes in 16 different languages!
$1.49 ➞ free today
Hero Shooter : Hunter Of Zombie World Giveaway
This is a 3D hero shooting game.
$1.99 ➞ free today
English Irregular Verbs Test & Practice PRO Giveaway
Practice knowledge of English irregular verbs in an interactive and entertaining way!
$1.99 ➞ free today
Theme Solitaire Tripeaks Tri Tower PV Giveaway
A whole new Solitaire card game like nothing you've ever experienced before.
$3.49 ➞ free today
Equalizer - Bass Booster pro Giveaway
Improve the sound quality of your phone!
$1.99 ➞ free today