Developers of xue chipo love to solve puzzles and offer us to do the same, this time trying to get out of the gloomy prison facilities. Some of their games are invited to choose from twenty different rooms, others open a dozen other safe and so on. As for the series of games about the escape from prison incarceration, the three games here! And to be honest, they look like two drops of water, what, in my opinion, their main drawback. In fact, you can download the first, second or third part, yes, the levels will be different, but the graphics and feed absolutely identical, what is more, every single part contains quite a few levels, so that in their place would be worth to combine it all into one the application and not to take anyone's head, but did not. Each part contains advertising, but does not imply Donat, who in these games are not common.
There is no logic, and not necessary. If you want to approach this game (and many similar) from the point of view of common sense, then I will do not recommend, it is not here. Generally difficult to imagine a prison where the door is opened from the inside, and the key that there somewhere and hide, and sometimes it can get a fairly simple puzzle solving ... but it is a problem of the genre, in principle, not a particular project. In any case, if you like the game, then this position and you do not mind, so we'll see that the game is ready to offer.
Features Can You Escape Prison Room 2?
unique puzzle
I have a lot of thinking
The game is easy and enjoyable, addictive game
there is a feature to automatically save
beautiful graphics (no applications for realism, but yeah, it's pretty lick)
in some places you have to think outside the box
All levels have balanced complexity
Result: the project is not much stands out among the hundreds of similar and can not offer anything revolutionary, but if you're not tired of this - try, the game is free.
Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.
Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call.
Allows the app to view information about network connections such as which networks exist and are connected.
Allows the app to write to the USB storage.
Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.
Allows the app to get your approximate location. This location is derived by location services using network location sources such as cell towers and Wi-Fi. These location services must be turned on and available to your device for the app to use them. Apps may use this to determine approximately where you are.
Allows the app to read the contents of your USB storage.
Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.
Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call.
Allows the app to view information about network connections such as which networks exist and are connected.
Allows the app to write to the USB storage.
Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.
Allows the app to get your approximate location. This location is derived by location services using network location sources such as cell towers and Wi-Fi. These location services must be turned on and available to your device for the app to use them. Apps may use this to determine approximately where you are.
Allows the app to read the contents of your USB storage.
Attention! All files represented on this site either were found freely distributed on the internet or by their authors’ permission. If any of materials on this site violates your rights,
report us