Mac
Mac
Windows
Log in / Sign up
Mac
›
Tags
›
attack methods
Most popular
Attack Methods
software
Relevance
Popularity
Rating
Tubbler
free
224
Celmaro Ltd.
Tubbler is a Mac program that enables you to watch YouTube clips directly from your desktop...
you choose between two
methods
to import
SkyEater OO Free
free
219
Kreuz 45
SkyEater is an interesting piece of software that was designed to help you practice your piano skills...
customize the oscillator types,
attack
time, release time, glide
Talaqa Chinese-English Dictionary
212
Thimar International
Talaqa Chinese-English dictionary is a sophisticated and easy...
OS sophisticated Chinese input
methods
. You can
PdfCompress
209
metaobject ltd.
PdfCompress is, as its name says, an application that helps you reduce the size of your PDF...
access to various compression
methods
that significantly reduce
Durak
free
209
Lost Token Software LLC
Durak is an exciting game for Mac where your goal is to get...
defend against an
attack
will take...proceed on various card
attack
situations
Batch Open Page
free
205
LDYSoft
Batch Open Page is a program that provides you with a quick and simple way to open multiple...
choose between two import
methods
: load a TXT
BinaryConverter
free
203
Visentin Abramo
This program was designed for Mac users who need to convert text...
access to two input
methods
: write the text
PureFTPd Manager
free
202
Jean-Matthieu Schaffhauser
PureFTPd Manager is a simple Cocoa frontend to PureFTPd, "a free (BSD)...
access, configure your authentification
methods
, regulate bandwith usage
Protect Files
199
Apimac
Protect Files is a system security and privacy tool. It allows you to create protected spaces...
are two different
methods
...window. The second
method
creates an encrypted disk
iRead PDF
199
liudongbao
iRead PDF is a useful PDF reading software program that supports PDF...
circles, and other marking
methods
. In addition
Teddy Floppy Ear: The Race
193
Forever Entertainment S.A.
Teddy Floppy Ear - The Race is a very cute arcade racing game...
ups that let you
attack
your enemies directly
SecureSend Decrypter
free
193
com.vanislandsites
SecureSend: a secure method of sending confidential information over the Internet. This is the decrypter version...
a secure
method
of sending confidential...own proprietary algorithms and
methods
. There is a bunch
Assassin's Creed Brotherhood
191
Ubisoft Entertainment.
Assassin's Creed...
they all wait and
attack
...for you to counter-
attack
them. Also, the game
Tovi
free
189
Ideawu
Tovi is intended to preview multiple types of images. In this respect, the application supports...
find keyboard and mouse
methods
difficult to remember
Helicon Focus
188
Helicon Soft Ltd.
Helicon Focus is an image editor designed for Mac...
you choose between 3 rendering
methods
, and provides
ShutterCount
188
DIRE Studio Kft.
ShutterCount displays the number of shutter actuations (the shutter count) of your Canon EOS digital...
with simple EXIF-based
methods
PixCompare
free
187
Oliver’s Homepage
PixCompare is a really good tool to find duplicates and compare them both visually and using...
using a hole array of
methods
. The pair
Save Our Souls : Entity
184
Django Cass
Entity is an action/adventure game following an Unknown military officer. Because of his previous...
bringing down a massive alien
attack
. Using
ESET Cybersecurity
183
ESET, spol. s.r.o
ESET Cybersecurity is a dependable anti-virus solution for your Mac. No personal computer exists...
malware and other threats
attack
the Mac OS X platform
Septem
180
TritheCat Studio
Septem is a chess variant where you have to move your chess to attack...
move your chess to
attack
or combine other chess
1
2
3
4
5
6
7
8
…
20
Tags
Actuations Number
EXIF-based Method
Focus Bracketing
Focused Images
Image
System
USB-Connected Camera
Watch Online Video
Watch YouTube Clips
YouTube Trailers
Featured stories
See all
WikiLeaks' 'Dark Matter' shows how the CIA attacked Macs
Wikileaks has just made public another bundle of stolen documents detailing CIA's techniques for breaking into Macs and iPhones.
iOS 18 and its reliance on AI: what’s known thus far
iOS 18 is heavily marketed as a groundbreaking iteration of the OS. Let's take a look at the AI side of the buzz.
Apple allows game emulators with outside sources of ROMs
Unlike the earlier moves of this sort, this time it's not a forced decision.
Apple puts a spotlight on work-related Vision Pro use cases
Vision Pro is here to stay. Apple showcases how companies are using the set for purposes other than entertainment.
Life-saving: Apple seeks to patent an anti-drowning feature
Apple Watch was never designed to be just a device telling time. Its maker continues to extend the list of what the watch is capable of.