Mac
Mac
Windows
Log in / Sign up
Mac
›
Tags
›
attack methods
Top
Attack Methods
downloads
Relevance
Popularity
Rating
Insights
free
292
KnowledgeMiner Software
Insights is original 64-bit parallel software for building predictive models from data...
and identify
methods
of controlling processes...employs advanced validation
methods
based on higher
AutoDMG
free
173
Per Olofsson
AutoDMG takes an OS X installer and builds a system image, suitable for deployment with DeployStudio or Absolute Manage...
AutoDMG takes an OS X installer and builds a system image, suitable for deployment with DeployStudio
4Peaks
free
102
MekenTosj
4Peaks is a program that help molecular biologists to visualize...
AppleScripts or other painstaking
methods
. Analyzing your sequence
Tail Gunner (PowerPC)
free
Timeotech
Tail Gunner is an arcade action game based on the classic video game...
a cruising space ship under
attack
from hostile fighters. Sitting
Mac Data Recovery Software
Recover Data
Recover Data for Mac is an apt file recovery software for Mac operating system. This software is capable...
file's node corruption virus
attack
, extents or extents
SourceGear DiffMerge
free
SourceGear
Diff. Graphically shows the changes between two files...
has 3 different
methods
for compairing pairs...new Simple Equivlance
method
that can ignore
MaxSecureAntivirus
free
21
Max Secure Software
Max Secure Antivirus is designed to protect Mac against viruses, spyware and all other types...
all types of malware
attacks
. Main features: - Quick Scan
Absolute Acey Deucey Backgammon
4
Gammonsoft
Absolute Acey Deucey Backgammon is an Acey Deucey for Mac, made especially...
many features including 4 different
methods
to move the pieces
ScreenshotMenu
free
499
Malcolm Hall
ScreenshotMenu is screen capture utility designed for Mac that sits on your Menu Bar and enables you to take snapshots...
between four screen capturing
methods
: Window To File
ToneCalculator
free
32
naiv.de
ToneCalculator lets you tune your tempo, metronome, and fretboard for many instruments...
times of your reverb,
attack
SWF Protector
5
DCOMSOFT
SWF Protector by DCOMSoft easily helps you protect all your SWF files from all kinds...
and "Mix script"
methods
. ActionScript 3.0 code...encrypted with innovation
method
by DCOMSoft
BlackFog Privacy
5
BlackFog, Inc.
BlackFog Privacy protects you from both data and identity theft by blocking malware and spyware...
hackers by eliminating the
attack
surface
PixelJunk Monsters
4
Double Eleven Ltd.
Tikiman the Forest Defender needs your help in this award-winning Tower Defence game.
from clever monsters that
attack
FinFlow
7
ParanzaSoft
FinFlow is a general purpose financial application that can solve both simple and complex...
interest
method
- the actuarial
method
calculates...compound interest
method
calculates compound
JSTalk Editor
free
89
jstalk.org
JSTalk is a scripting language for Mac OS X built on top of JavaScript, with a bridge to Apple's...
in JavaScript for calling
methods
Brothers in Arms: Earned in Blood
84
Feral Interactive
Real soldiers. Authentic battlefields. True combat.Please check the system requirements...
multiplayer – Go online and
attack
WaveWindow AU
4
Laidman & Katsura
WaveWindow AU is an Audio Units plug-in software oscilloscope...
comes with several synchronization
methods
and displays
BA Financial Calculator Pro for Mac
6
Vicinno Soft LLC.
BA Financial Calculator Pro best emulates FULL VERSION of Texas Instruments BA II Plus...
and Algebraic Operating System
methods
. • Scientific capabilities, including log
RestoreMeNot
96
TofuBytes
RestoreMeNot provides a simple...
that use their own
methods
of restoring previous
ZenTermLite
free
95
YINTAO
Zen Term Lite is a powerful terminal emulator that supports SSH, ZModem...
and provides various authentication
methods
. You can
1
2
3
4
5
6
7
8
…
20
Tags
Absolute Manage Tool
Bring Songs in Tune
Build a Image
DeployStudio Tool
Install Updates
OS X Installer
System Image
Tune Fretboard
Tune Metronome
Tune Tempo
Featured stories
See all
WikiLeaks' 'Dark Matter' shows how the CIA attacked Macs
Wikileaks has just made public another bundle of stolen documents detailing CIA's techniques for breaking into Macs and iPhones.
iOS 18 and its reliance on AI: what’s known thus far
iOS 18 is heavily marketed as a groundbreaking iteration of the OS. Let's take a look at the AI side of the buzz.
Apple allows game emulators with outside sources of ROMs
Unlike the earlier moves of this sort, this time it's not a forced decision.
Apple puts a spotlight on work-related Vision Pro use cases
Vision Pro is here to stay. Apple showcases how companies are using the set for purposes other than entertainment.
Life-saving: Apple seeks to patent an anti-drowning feature
Apple Watch was never designed to be just a device telling time. Its maker continues to extend the list of what the watch is capable of.