Mac
Mac
Windows
Log in / Sign up
Mac
›
Tags
›
attack methods
Top
Attack Methods
downloads
Relevance
Popularity
Rating
Topaz BW Effects
5
Topaz Labs, LLC
Topaz BW Effects takes you beyond traditional black and white conversion methods by integrating unique features like...
black and white conversion
methods
by integrating unique
Email Obfuscator
4
Tension Software
Email Obfuscator is a tool useful for anyone creating and editing Web pages It creates email links using...
by various available
methods
: ASCII HEX Percentage...selection from various
methods
Internal preview
Cubemen
63
3 Sprockets Pty Ltd
ON SALE! Cubemen is a fast paced, action packed, original singled & Multi-player 3D TD / RTS hybrid...
to a certain location to
attack
or defend. You can
Kairon
57
Kilian Sternad
Kairon is a powerful tool developed by Kilian Sternad and is used for astrology...
rich application uses various
methods
for interpretation
Magic Encyclopedia Illusions
46
Alawar Entertainment, Inc.
When Catherine receives word of an attack on the Magic Academy...
receives word of an
attack
on the Magic Academy
Secure File Deletion
9
Pocket Bits LLC.
Secure File Deletion is a professional app that allows you to delete documents...
DoD 7-pass government standard. 3
methods
of secure deletion including
Aabel
2
Gigawiz
Diverse statistical & exploratory data analysis methods Easy to use data-reduction techniques for complex...
data analysis
methods
...new statistical analysis
methods
, extended exploratory
Maiar
free
27
Elrond Network
Maiar is a smart browser that comes with privacy and ad-blocking features built...
tracking pixels and other
methods
of data collection
Burger
free
77
Magma Mobile
A burger-serving game is coming now for your best enjoyment in a free version...
best in the Time
Attack
Mode to collect a maximum
You'll Never Take Me Alive!
free
5
iSEC Partners
YoNTMA (You'll Never Take Me Alive!) is a tool designed to enhance the protection of data encryption on laptops...
data later via a DMA
attack
while the machine...a similar-style cold-boot
attack
Nice to Recover Photo
4
Nice to Recover
Nice to Recover Photo for Mac incorporates high...
high end media recovery
methods
to systematically scan
FormLoom
4
Yabdab Inc.
Formloom offers several methods to validate and pre-format user input. Formloom utilizes...
Formloom offers several
methods
...the Bootstrap 12 column
method
Symbolist
free
14
Patrick Smith
Symbolist lets you search for symbols in executable files and in the Objective...
protocols, and view their
methods
as readable Objective-C
Archibald
35
Polyrythmic
Archibald is a virtual drummer which improvises on your patterns. As you're building...
the same shade and
attack
?). The power of interpretation
ESET Cybersecurity
182
ESET, spol. s.r.o
ESET Cybersecurity is a dependable anti-virus solution for your Mac. No personal computer exists...
malware and other threats
attack
the Mac OS X platform
Agnitus Kids Learning Program
free
15
Agnitus
Agnitus Kids Learning Program is an application designed for Mac that provides...
choose from various teaching
methods
, and much more
MultiTrendPro
free
12
Igor Vlasov
Multi Trend Pro gives you the real, underlying trends of all the stocks showing...
sell signals using different
methods
, compare with other indicators
Aquamacs Emacs
free
4
David Reitter
Aquamacs is a Mac-like distribution of the powerful Emacs text editor. It looks and behaves like...
(if wanted), international input
methods
, Apple Help
MemoryTamer
56
Eric Henderson
MemoryTamer is an automatic memory-freeing app that runs in your menu bar. It supports notifications with both Growl...
supports several additional payment
methods
that Paddle
1
2
3
4
5
6
7
8
…
20
Tags
Data Encryption
Encryption Keys
Graphic Ephemeris
Internet
Localize All Text
Math Game
Protect Laptop
Protection Tool
Puzzle Game
Yahoo Finance
Featured stories
See all
WikiLeaks' 'Dark Matter' shows how the CIA attacked Macs
Wikileaks has just made public another bundle of stolen documents detailing CIA's techniques for breaking into Macs and iPhones.
iOS 18 and its reliance on AI: what’s known thus far
iOS 18 is heavily marketed as a groundbreaking iteration of the OS. Let's take a look at the AI side of the buzz.
Apple allows game emulators with outside sources of ROMs
Unlike the earlier moves of this sort, this time it's not a forced decision.
Apple puts a spotlight on work-related Vision Pro use cases
Vision Pro is here to stay. Apple showcases how companies are using the set for purposes other than entertainment.
Life-saving: Apple seeks to patent an anti-drowning feature
Apple Watch was never designed to be just a device telling time. Its maker continues to extend the list of what the watch is capable of.