Mac
Mac
Windows
Log in / Sign up
Mac
›
Tags
›
compromised
Featured
Compromised
Software
Relevance
Popularity
Rating
Telegram
free
43,677
Telegram
Telegram is a desktop messenger that uses the services with the same name...
or their security is
compromised
Sketch
3,707
The most important part of any drawing application is arguably the drawing area...
doesn't mean we've
compromised
on the tools though
ProtonVPN
3,644
ch.protonvpn
ProtonVPN is a client application that allows you to browse the web using a VPN...
of the keys gets
compromised
. Moreover, ProtonVPN uses such
Touch VPN
free
303
TouchVPN Inc
Touch VPN is a one-click VPN proxy service. The application...
information can be easily
compromised
. Touch VPN encrypts
CloudPull
179
Golden Hill Software
CloudPull is a simple Mac utility that was designed by the Golden...
your Gmail account gets
compromised
. The application comes
Uplink
135
Introversion software
An enigma in itself, Uplink is akin to a more cerebral incarnation of Ambrosia's popular Escape Velocity series of games...
computer systems you've
compromised
to aid you
MetaClean
72
Adarsus.com
Most files contain metadata as a way to make finding and working with them easier...
your privacy may be
compromised
. MetaClean allows viewing, editing
OPSWAT GEARS
free
32
OPSWAT, Inc.
The free OPSWAT GEARS tool allows home users and IT professionals...
on whether a device is
compromised
. The application, powered
Reincarnations - Uncover the Past 2
24
Big Fish Games
Jane and Dr. Herzle have made a major breakthrough in reincarnation studies, but their hard work is compromised...
their hard work is
compromised
when Jane is kidnapped
sharedSecrets
free
14
ELKOSOFT Software GmbH
This application is good for keeping all your password...
your password is
compromised
, your life is
compromised
Spoofer
free
11
Robert Beverly
Spoofer project measures the Internet's susceptibility to spoofed source address IP packets...
attacks and security circumvention.
Compromised
hosts on networks
PrivacyApp
free
7
Privoro LLC.
Privacy App is designed exclusively for iPhone 6/6s use with the Privoro privacy guards...
case have not been
compromised
. The app implements
Lockngo
5
Keynesis Lockngo
Lockngo is a security application for USB, SATA, FireWire and other external...
your data can't be
compromised
Reincarnations: Uncover the Past Collector's Edition
2
Big Fish Games
Jane and Dr. Herzle have made a major breakthrough in reincarnation studies, but their hard work is compromised when Jane...
their hard work is
compromised
when Jane is kidnapped
Stop Robots
1
Sergey Vitukhin
On Rusty Head planet, the robots became compromised by the virus "Dummy Algorythm"...
planet, the robots became
compromised
by the virus "Dummy
trafficlight
free
1
BitDefender
This extension will add a strong layer of security over your browsing experience...
of legitimate but recently
compromised
iCanary (Classic)
Secret Weapon Labs
FileMaker offers many external methods of opening and accessing stored data. Given the many workarounds...
can your data be
compromised
?
Intego Mac Internet Security X8
Intego
Intego Mac Internet Security X8 contains two of our best-selling products that protect...
corrupted, stolen, or otherwise
compromised
PC-Mac SecureJournal
Lava Software
PC-Mac SecureJournal contains a highly-secure document editor and password...
the user's computer is
compromised
, information stored by PC
1
2
Tags
Audio Frequency
Frequency Protection
Internet Calls
Kidnapped
Privacy Guard
Reincarnation
Run Testes
Send Messages
Share Photos
Studies