Mac
Mac
Windows
Log in / Sign up
Mac
›
Tags
›
anonymity attack
Most popular
Anonymity Attack
software
Relevance
Popularity
Rating
Hotspot Shield
15,637
com.openvpn
This version includes support for up to 5 Macs/PCs and 5 iOS devices for one year. AnchorFree's Hotspot...
This version includes support for up to 5 Macs/PCs and 5 iOS devices for one year. AnchorFree's
KisMAC
free
5,655
KisMAC
KisMAC allows users to detect and monitor wireless connections. The application uses AirPort...
be able to simulate
attacks
...the three types of
attacks
: wordlist, weak scheduling
League of Legends
free
4,441
Riot Games, Inc.
Get ready for a fast-paced competitive online game that will test both your skill...
Get ready for a fast-paced competitive online game that will test both your skill and mind. Become
EaseUS Data Recovery Wizard
3,153
EaseUS
EaseUS Data Recovery Wizard is a program that proves to be of good...
became inaccessible after a virus
attack
. The utility is capable
Red Crucible 2
free
2,695
Rocketeer Games Studio, LLC
Red Crucible 2 lets you compete with friends or players from around the globe using some of the world's...
Man Standing Team Deathmatch
Attack
Wondershare Data Recovery
2,010
Wondershare
Wondershare Data Recovery is a Mac utility designed to help...
after dealing with a virus
attack
, hard disk crash
Viscosity
1,466
Viscosity VPN
Viscosity is an OpenVPN client. Therefore, it comes in handy for preserving...
handy for preserving your
anonymity
and security while surfing
Hero Academy
1,297
Robot Entertainment, Inc
Hero Academy is an entertaining board game that puts your strategy skills to the test through numerous challenges...
on the board and
attack
the enemy's troops
iSkysoft Data Recovery
1,030
iSkysoft Studio
iSkysoft...
after dealing with a virus
attack
, having an incorrect partitioning
Yasu
free
953
Jim Mitchell
Yasu was originally created with System Administrators who service large groups of workstations in mind...
a simple, first line of
attack
for a workstation
Tenorshare 4DDiG
890
Tenorshare Co., Ltd.
Tenorshare 4DDiG is an application designed to help...
loss, disk damage, virus
attack
, or other causes
SI-String Section
846
Cakewalk, Inc.
Now Bass, Cello, and Violin sounds are right at your fingertips. The ability to control each instrument's attack...
control each instrument's
attack
and release ...sounds with control over
Attack
, Release, Chorus
Planet VPN
free
793
Free VPN Planet
Planet VPN - free VPN software with no registration and limits...
you will get full
anonymity
, hide your browsing
Onslaught Arena
free
570
Lost Decade Games, LLC
Onslaught! Arena is a very simple shooter game in which you need to shoot at the enemies and try to survive as long...
decreases when the enemies
attack
you
PureVPN
free
569
GZ Systems Ltd.
PureVPN's VPN service has a redesigned Mac VPN client that comes with hack...
the-art encryption, complete
anonymity
and dozens
CyberGhost 5
541
CyberGhost S.R.L.
CyberGhost is a fast, simple and efficient way to protect your online privacy, surf anonymously, and access blocked...
online privacy, surf
anonymously
, and access...notch security and
anonymity
without being complicated
Chopper 2
free
536
Majic Jungle Software
Chopper 2 is an excellent helicopter game for the Mac...
of find and
attack
...enemy infantry and
attacking
different objectives, which
Chess Knight Free
free
531
EnsenaSoft
Enjoy playing Chess every night of the week with Chess Knight Free...
king is under immediate
attack
(in "check")...or defend it from
attack
on the next
Wyzo
free
436
Radical Software Ltd.
Wyzo is an advanced browser designed both for Mac and Windows that provides...
Wyzo is an advanced browser designed both for Mac and Windows that provides
ESET Cyber Security Pro
435
ESET
ESET Cyber Security Pro represents a new approach to truly integrated computer...
your computer against
attacks
and malicious...other Internet-borne
attacks
without hindering
1
2
3
4
5
6
7
8
9
…
20
Tags
File Recovery
Lost Files
Recover Archives
Recover Deleted Files
Recover Files
Recover Lost Data
Restore Files
Restore Lost Data
Shooter Game
Vpn
Featured stories
See all
WikiLeaks' 'Dark Matter' shows how the CIA attacked Macs
Wikileaks has just made public another bundle of stolen documents detailing CIA's techniques for breaking into Macs and iPhones.
iOS 18 and its reliance on AI: what’s known thus far
iOS 18 is heavily marketed as a groundbreaking iteration of the OS. Let's take a look at the AI side of the buzz.
Apple allows game emulators with outside sources of ROMs
Unlike the earlier moves of this sort, this time it's not a forced decision.
Apple puts a spotlight on work-related Vision Pro use cases
Vision Pro is here to stay. Apple showcases how companies are using the set for purposes other than entertainment.
Life-saving: Apple seeks to patent an anti-drowning feature
Apple Watch was never designed to be just a device telling time. Its maker continues to extend the list of what the watch is capable of.