Mac
Mac
Windows
Log in / Sign up
Mac
›
Tags
›
attack methods
Top
Attack Methods
downloads
Relevance
Popularity
Rating
LastPass Password Manager
free
4
LogMeIn, Inc.
LastPass simplifies your digital life. From your LastPass vault...
authentication: LastPass uses multiple
methods
of authentication
XPS-to-PDF
free
6
RootRise Technologies Pvt. Ltd.
XPS-to-PDF is a simple, efficient, and fast way to batch convert XPS...
and Flate image compression
methods
. Can set compression quality
Wild Horse Simulator
4
Gluten Free Games
Enter into the wild and live the life of a Horse!
to increase their health,
attack
damage, and even unlock
Air Assault
4
TameStorm Games
Air Assault is a basic vertical scrolling shooter. Your objective is to control an assault helicopter...
are dumb. They don't
attack
you directly, they just
Stock Investment Guide
4
Churr Software
Stock Investment Guide (SIG) performs fundamental stock analysis, using the methods used by stock clubs...
stock analysis, using the
methods
used by stock clubs
Medieval Math Battle
5
SpinFall
Learning math facts has never been so dangerous!
the stronger your
attack
. Knowledge is power!...battles and villains X.
Attack
Tenorshare iBackupUnlocker for Mac
4
Tenorshare Co., Ltd.
Remove lost or forgotten iTunes backup password...
types of
attacks
, namely Brute-force
Attack
...with Mask
Attack
and Dictionary
Attack
. Select
otx
free
86
otx
otx stands for "object tool extended". It uses otool (object tool) to disassemble a Mach...
data types of Objective-C
methods
Tubbler
free
224
Celmaro Ltd.
Tubbler is a Mac program that enables you to watch YouTube clips directly from your desktop...
you choose between two
methods
to import
MozyHome
68
Mozy
MozyHome is an online backup service. It keeps a backup copy...
MozyHome is an online backup service. It keeps a backup copy
APG
free
26
13cubed
APG generates passwords with two (2) to eight (8)...
crack during a brute-force
attack
(12 vs. 32 characters
Timestamp Converter
160
Keynetech Inc.
A timestamp represents the time and date at which an event was recorded by a computer...
choose between two input
methods
: copy the current timestamp
watermark PRO
831
cf/x AG
watermark PRO is a program designed for people who wish to take ownership of their personal pictures...
choose between multiple watermarking
methods
, works with various image
Apeaksoft Data Recovery for Mac
59
Apeaksoft Studio
Apeaksoft Data Recovery for Mac is 100%...
crashes, inaccessible drive, virus
attack
IP Notification
15
Rebrand Software
IP Notification is a network...
using up to three
methods
: your email account
Algodoo Physics
free
4
Algoryx Simulation AB
Become an inventor with Algodoo - Start designing and testing your ideas in seconds...
creative minds. The simulation
methods
are based on cutting
Sync Sync Sync
4
SYW Mac Software
Sync!Sync!Sync!... Do you have backup copy of your data? If your hard disk drive breaks...
! provides various backup
methods
like "Add copy"..."Selectional" backup
methods
which
Helicon Focus
188
Helicon Soft Ltd.
Helicon Focus is an image editor designed for Mac...
you choose between 3 rendering
methods
, and provides
ResizeIt
free
2,483
sekn
ResizeIt is a simple Mac application designed to help you change the resolution of your favorite images...
to four image resizing
methods
(by pixel, ratio, maximum
iFonebox
66
Auntec
iFonebox for Mac is a powerful and trustworthy data recovery tool for iPhone...
iFonebox for Mac is a professional and powerful data recovery software specially designed for iPhone
1
…
4
5
6
7
8
…
20
Tags
Adding Comments
Batch Conversion
Focus Bracketing
Machine Code
Output Quality
Plain Text
Play
Raster Images
Resize Images
Url
Featured stories
See all
WikiLeaks' 'Dark Matter' shows how the CIA attacked Macs
Wikileaks has just made public another bundle of stolen documents detailing CIA's techniques for breaking into Macs and iPhones.
iOS 18 and its reliance on AI: what’s known thus far
iOS 18 is heavily marketed as a groundbreaking iteration of the OS. Let's take a look at the AI side of the buzz.
Apple allows game emulators with outside sources of ROMs
Unlike the earlier moves of this sort, this time it's not a forced decision.
Apple puts a spotlight on work-related Vision Pro use cases
Vision Pro is here to stay. Apple showcases how companies are using the set for purposes other than entertainment.
Life-saving: Apple seeks to patent an anti-drowning feature
Apple Watch was never designed to be just a device telling time. Its maker continues to extend the list of what the watch is capable of.