Mac
Mac
Windows
Log in / Sign up
Mac
›
Tags
›
attack methods
Top
Attack Methods
downloads
Relevance
Popularity
Rating
Shredo
56
mymixapps
Shredo is a nice looking file shredder that allows you to securely erase files...
Shredo is a nice looking file shredder that allows you to securely erase files
Barrier
103
128bit Technologies LLC
Barrier lets you activate a security barrier on your Mac. With this application, you can lockdown...
in case of an
attack
aTypeTrainer4Mac
364
Valentin Vassilevski
aTypeTrainer4Mac is a multilingual typing tutor for Mac OS X...
layouts (but not input
methods
!)
TorChat
free
26
SourceMac
TorChat allows chatting and exchanging files anonymously. This chat client is powered by Tor hidden services...
secure when the
attacker
does not know...implemented allows a potential
attacker
to perform
iColor
16
Dirk Einecke
iColor is a fast and simple application which makes life as an iOS or Mac OS X developer...
Mac OS X and CSS
methods
and properties is generated
Solver for Excel 2011
free
4
Frontline Systems
Solver for Excel 2011 for Mac has the same new features and user interface as Solver for Excel 2010 for Windows...
Evolutionary Solving
Method
Based on genetic...algorithms, this
method
complements Solver's
PhotoShrinkr
9
Plum Amazing, LLC
PhotoShrinkr is an application designed to reduce the size of photos while maintaining...
user interface to other
methods
and other apps
Blitzkrieg Bop
Philipz
From the developer: "Blitzkrieg Bop's goal is to destroy the enemy's headquarters (with a variety of weapons)...
strategically and start your
attack
!"
Raging Thunder 2
86
Polarbit
Raging Thunder 2 will take you through abandoned temples, tropical beaches...
round of Survival, Time
Attack
Krypton
5
com.bigcatos
Protecting your personal and confidential information since 2009, Krypton is the first...
to withstand a brute force
attack
, no one is going
formZ
33
Autodessys
formZ pro is a powerful 3D design application featuring a variety of modeling personalities...
solid and surface modeling
methods
that maintain accurate representations
Mint Project
4
Mint Software
Mint Project is a rapid application development environment that builds true Mac OS X Cocoa applications...
organize your project (classes,
methods
, properties) visually using
JPG Compress 2
10
SEASOFT LTD.
JPG Compress 2 is a tool designed yo help you compress JPEG and PNG files. It recompresses...
it uses two optimization
methods
, lossy and lossless
Graphing Calculator
26
Pacific Tech
Graph equations in two, three, and four dimensions. Graph explicit functions...
Graph equations in two, three, and four dimensions. Graph explicit functions, implicit
The Attack of Mutant Fruits from Outer Space
free
4
Time Invaders
Trying to avoid a disaster, The Earth Alliance has been sent to other planets where the main fruits and vegetables...
Trying to avoid a disaster, The Earth Alliance has been sent to other planets
MjoGraph
free
5,242
Makoto Tanahashi
Mjograph is a simple but highly functional 2D plotting program...
using Latex. Various plotting
methods
(line, pulses, step, region
EAPTest
9
ermitacode
EAPTest is a tool for networking professionals working in 802.1x secure network access environments...
Extended Authentication Protocol (EAP)
methods
. The tool greatly facilitates
Beast Boxing Turbo
4
com.goodhustle.beastboxingturbo
First-person Monster Boxing with Customizable Boxing Gear! You play a secret human boxer in a beastly world...
First-person Monster Boxing with Customizable Boxing Gear! You play a secret human boxer
Dfine
1
Nik Software
Virtually, all digital cameras inherently create unwanted imperfections known...
Point and Color Range
methods
, along with the Selective
Abscissa
free
11
Ruediger Bruehl
Abscissa is a program to make high-quality 2D-plots from data given...
y error bars - 4 interpolation
methods
- user entered functions f(x)...Least-Squares
Method
1
2
3
4
5
6
7
8
9
…
20
Tags
5 Single Player
Activate Firewall
Disable Camera
Editor
Erase Data
Erase Files
File Shredder
Lockdown Access
Security Barrier
Shredding Methods
Featured stories
See all
WikiLeaks' 'Dark Matter' shows how the CIA attacked Macs
Wikileaks has just made public another bundle of stolen documents detailing CIA's techniques for breaking into Macs and iPhones.
Apple allows game emulators with outside sources of ROMs
Unlike the earlier moves of this sort, this time it's not a forced decision.
Apple puts a spotlight on work-related Vision Pro use cases
Vision Pro is here to stay. Apple showcases how companies are using the set for purposes other than entertainment.
Life-saving: Apple seeks to patent an anti-drowning feature
Apple Watch was never designed to be just a device telling time. Its maker continues to extend the list of what the watch is capable of.
Apple’s got a patent for ultra-accurate tracking system
Apple knows how to innovate and disrupt, with iPhone being probably the best manifestation of this ability. Now it aims at gesture-based control.