Mac
Mac
Windows
Log in / Sign up
Mac
›
Tags
›
attack methods
Featured
Attack Methods
Software
Relevance
Popularity
Rating
Dict Thai
free
225
Thana Tassanasteinkit
Dict Thai is an English-Thai and Thai-English dictionary iPhone application. This utility provides good designed...
Dict Thai is an English-Thai and Thai-English dictionary iPhone application. This utility provides
Protect Files
199
Apimac
Protect Files is a system security and privacy tool. It allows you to create protected spaces...
are two different
methods
...window. The second
method
creates an encrypted disk
ThinkSpace
free
65
Naoya Enokida
ThinkSpace is a comprehensive thinking tool designed to match the workflow of your creative thoughts...
variety of thinking
methods
...with different thinking
methods
and frameworks
DupHunter
47
TeoreX
DupHunter is a duplicate finder created for Mac that helps you easily and quickly...
choose between two import
methods
...tested both scanning
methods
VPN Server Manager
free
40
SoftEther Project
Using VPN Server Manager enables you to connect and administer SoftEther VPN Server or SoftEther VPN Bridge...
complicated commands or operation
methods
. Using VPN Server Manager
Virtual Piano
30
Michael Dearworth
The best virtual piano experience on the Mac...
Perfectly tuned - Multiple play
methods
(keyboard/touch) - Beautiful interface
AutoSwitchInput Pro
25
Ningbo Shangguan Technology Co., Ltd
AutoSwitchInput Pro lets you automatically switch the input method. If you correctly switch between Chinese and English...
switch the input
method
. If you correctly...Chinese and English (input
method
) is about 6
Rohos Logon Key
21
Tesline-service
Rohos Logon Key lets you use different methods to unlock your computer...
lets you use different
methods
to unlock...it allows using a combined
method
of hardware and PIN
DestroyFlickr
free
12
destroytoday
DestroyFlickr explores alternative methods for viewing Flickr content...
DestroyFlickr explores alternative
methods
for viewing Flickr content
MeVisLab
12
MeVis Medical Solutions AG
MeVisLab represents a powerful, modular framework for the development of image...
visualization and interaction
methods
, with a special...MEVIS develop scientific
methods
Tenorshare iBackupUnlocker for Mac
4
Tenorshare Co., Ltd.
Remove lost or forgotten iTunes backup password...
types of
attacks
, namely Brute-force
Attack
...with Mask
Attack
and Dictionary
Attack
. Select
The Bluecoats North vs South
1
Microids
The Bluecoats North vs South is a game inspired by The Blue Coats comic book...
and capture enemy forts,
attack
trains and protect
Password Pair
free
Esoteric Ventures
Password Pair allows you and a distant associate to establish a common long and complex password that you can use to encrypt...
as a "brute force"
attack
on your encrypted...a smart brute force
attack
Tail Gunner (PowerPC)
free
Timeotech
Tail Gunner is an arcade action game based on the classic video game...
a cruising space ship under
attack
from hostile fighters. Sitting
aquadot red
angelFrogGames
There are seven enemy bugs - each a different color and each with a distinct attack...
each with a distinct
attack
style which...different combinations of
attack
styles each
Note Gate 2
Audiowish
Note Gate 2 is a real-time pitch-based Audio Unit volume filter effect. Combining innovative features like scale independent...
tracker and independent
attack
...volume patterns Separate
attack
Battle City
free
Looble
Battle City is an online tank wars game. Players build, defend and attack cities in an endless quest...
Players build, defend and
attack
cities
Smugglers 3 The Syndicate
Niels Bauer Games
Play a greedy trader, an ambitious bounty hunter or a ruthless pirate and attack whole planets...
or a ruthless pirate and
attack
whole planets
Pokemon Tower Defense
free
Gamekens Games
When a pack of wild Rattata attack Professor Oak's lab, it is up to you to stop...
of wild Rattata
attack
Professor Oak's...mystery behind these
attacks
. Featuring the original
SiegecraftCommander
Blowfish Studios
Siegecraft Commander is a strategy game that challenges...
aim when starting your
attack
. In real time
1
…
8
9
10
11
12
…
20
Tags
Attack Trains
Bluetooth Unlock
Hardware Protection
Image
Irregular Verbs
Online Brainstorming
System Unlock
USB Authentication
USB Key Protection
Workflow of Thoughts
Featured stories
See all
WikiLeaks' 'Dark Matter' shows how the CIA attacked Macs
Wikileaks has just made public another bundle of stolen documents detailing CIA's techniques for breaking into Macs and iPhones.
iOS 18 and its reliance on AI: what’s known thus far
iOS 18 is heavily marketed as a groundbreaking iteration of the OS. Let's take a look at the AI side of the buzz.
Apple allows game emulators with outside sources of ROMs
Unlike the earlier moves of this sort, this time it's not a forced decision.
Apple puts a spotlight on work-related Vision Pro use cases
Vision Pro is here to stay. Apple showcases how companies are using the set for purposes other than entertainment.
Life-saving: Apple seeks to patent an anti-drowning feature
Apple Watch was never designed to be just a device telling time. Its maker continues to extend the list of what the watch is capable of.