Cyber-D's Tetris is a free tetris game with some nice visual effects, sounds and highscore list. Sound effects can be disabled. Keyboard controls are simple and can be customized. Highscore position can be seen live while playing.

Publisher Description

Window 10 CompatibleCyber-D's Tetris is a tetris clone with nice visuals, sounds and a local high score list. Make points by turning and moving the falling blocks into full rows. The more blocks you clear at once, the more bonus points you get. Clearing 4 rows at once gives you a 'Tetris' bonus. You can optionally disable the sound effects. The keyboard controls are simple and can also be customized. You can see your current high score position while you are playing, the more points you make the higher you rank in the high scores. Cyber-D's Tetris is free and contains no ads or malware. However, please feel free to donate to the developer if you really like this software.

Download and use it now: Cyber-D's Tetris

Related Programs

Free Tetris Game

Tetris is a free tile-matching puzzle video game. The Tetris game is a popular use of tetrominoes, the four-element special case of polyominoes. Polyominoes have been used in popular puzzles since at least 1907, and the name was given by...


Tetris

Tetris is an exciting action game. Throughout the game, Tetris pieces fall from the top to the bottom of the playing area. When the Tetris pieces form a solid row of blocks across the playing area, that row vanishes. Because...


Free Game Booster

All those users who use their laptops and PCs for gaming as well, the Free Game Booster will make the experience better. As the name indicates, it adds new features to the device which help accentuate the speed and other...


Cyber-D's SQL Wizard

Cyber-D's SQL wizard makes it easy to generate SQL queries from CSV data. This tool is ideal for people who need to insert large amounts of data into an SQL database. If you always receive Excel documents and need to...


Cyber Prot

Cyber Prot is rather simple to configure, as you only need to enable or disable various functions in order to determine what the application should do when a threat is detected and which scanning tools should be employed. Each of...


Screenshot


Details

Keywords