Mac
Mac
Windows
Log in / Sign up
Mac
›
Tags
›
attack methods
Top
Attack Methods
downloads
Relevance
Popularity
Rating
PDFGenius 4
4
RootRise Technologies Pvt. Ltd.
PDFGenius for iOS ( iPad, iPhone and iPod ) is available on the iTunes App...
Quartz and Image compression
methods
. Compress large image
Bitmessage
free
45
Jonathan Warren, The Bitmessage Developers
Bitmessage is a client application that uses the communications protocol with the same name to guarantee...
have always been other
methods
to send messages privately
Stellar Phoenix iPod Recovery for Mac
Stellar Information Systems Ltd
Stellar Phoenix iPod recovery software recovers and repairs damaged...
unknown volume format, virus
attack
, human error and mishandling
JSONExport
free
18
Ahmed Ali
JSONExport is a desktop app for Mac OS X that enables you to export JSON objects...
their associated constructors, utility
methods
, setters and getters
Vademecum
free
4
Vademecum Team
Vademecum is a Data Mining suite that provides you with a novel help...
most elaborated Data Mining
methods
Actual ODBC SQL Server driver
4
Actual Technologies
The Actual SQL Server ODBC Driver lets you access your company's Microsoft SQL...
driver supports both
methods
of SQL...using whatever authentication
method
your organization
City of Secrets
16
Aidem Media
"… on the level of a Pixar film … High praise for a game on iOS, but it is that good." - GamingBits "Out...
plot. There are several
methods
in the game
Math Library by WAGmob
247
WAG Mobile Inc.
Math Library is a teaching application for Mac that provides...
limits, geometry shapes, statistical
methods
, and many others
Instalyrics
1,172
Tal Shrestha
Instalyrics is a music lyrics finder that lives in the menu bar. It supports instant search for currently playing...
one of the aforementioned
methods
, Instalyrics opens
Fone Rescue
97
Fireebok Studio
Fone Rescue helps you recover data lost or accidentally deleted from your iPhone, iPad...
Backup Files Provides two
methods
of recovery: recover
Cloudphish Anti-Phishing
free
6
Cloudphish, Inc.
Cloudphish Anti-Phishing is a tool used to securely track and authenticate messages...
Cloudphish Anti-Phishing is a tool used to securely track and authenticate messages
Riffle
21
bergdesign inc.
Riffle is a lightweight image-browsing tool designed to help you find photos...
menu offers two alternative
methods
to select the computer
Irukandji
17
Charlie's Games
Irukandji is a fun score attack shooter...
Irukandji is a fun score
attack
shooter
SynthMaster
4
KV331 Audio LLC
SynthMaster is an 'all-around' semi-modular software synthesizer and effect plug...
features many different synthesis
methods
including VA, Additive
iMol
free
60
Piotr Rotkiewicz
iMol displays the structure of chemical substances at their molecular level. The application is designed for both learning...
structures, iMol provides four
methods
for selecting atoms
Contexts
112
Usman Khalid
Contexts is intended to increase your productivity when you need to switch between open...
the command+tab
method
, the app puts...great alternative for macOS’s
methods
to switch
Land Air Sea Warfare
34
Isotope 244
Control giant mega units and dominate in battle! Join the 100...
trees for an ambush
attack
. You can expand...new AI featuring several
attack
modes and strategies. *
Hydrothermal
4
Nuclear Nova Software
Hydrothermal is a city building game where you create a space...
an army though, aliens
attack
MAFFT
free
4
Kazutaka Katoh
MAFFT is a multiple sequence alignment program for unix-like operating systems. It offers a range of multiple...
a range of multiple alignment
methods
, L-INS-i (accurate; for alignment
Fortress Under Siege
157
EASY Inc.
A conspiracy throws our kingdom into the most dangerous moment...
already launches the
attack
, which...rich and skillful playing
methods
, for example
1
2
3
4
5
6
7
8
…
20
Tags
Accurate Alignment
Arcade Game
Battle
Effect Plug-in
Fight
Kids Game
Math Equations
Math Quiz
Sequences Alignment
Synthesis Methods
Featured stories
See all
WikiLeaks' 'Dark Matter' shows how the CIA attacked Macs
Wikileaks has just made public another bundle of stolen documents detailing CIA's techniques for breaking into Macs and iPhones.
iOS 18 and its reliance on AI: what’s known thus far
iOS 18 is heavily marketed as a groundbreaking iteration of the OS. Let's take a look at the AI side of the buzz.
Apple allows game emulators with outside sources of ROMs
Unlike the earlier moves of this sort, this time it's not a forced decision.
Apple puts a spotlight on work-related Vision Pro use cases
Vision Pro is here to stay. Apple showcases how companies are using the set for purposes other than entertainment.
Life-saving: Apple seeks to patent an anti-drowning feature
Apple Watch was never designed to be just a device telling time. Its maker continues to extend the list of what the watch is capable of.