Mac
Mac
Windows
Log in / Sign up
Mac
›
Tags
›
elemental attacks
Featured
Elemental Attacks
Software
Relevance
Popularity
Rating
KisMAC
free
5,655
KisMAC
KisMAC allows users to detect and monitor wireless connections. The application uses AirPort...
be able to simulate
attacks
...the three types of
attacks
: wordlist, weak scheduling
Seagate File Recovery
1,141
Seagate Technology LLC
Seagate File Recovery software restores files from hard drive or removable storage...
corrupted due to virus
attacks
. Featuring Intelligent Scan Technology
Blood & Glory
free
782
Glu Games Inc.
THE HIT iOS GAME COMES TO THE MAC APP STORE! THERE WILL BE BLOOD…...
dual weapons SPECIAL
ATTACKS
& COMBOS Complete special
attacks
and combos
VeraCrypt
free
771
IDRIX
VeraCrypt is a free disk encryption software brought to you by IDRIX (https://www.idrix.fr) and that is based on TrueCrypt...
developments in brute-force
attacks
...much harder for an
attacker
to gain access
Webroot SecureAnywhere
537
Webroot Inc.
This program brings you an advanced protection against viruses...
malicious websites and fishing
attacks
before they can
Blood & Glory 2: Legend
free
496
Glu Games Inc.
***If you are experiencing an initial loading screen hang and are currently on Mac OS Mountain Lion 10.8...
unleash stunning Special
Attacks
, Super Combos...unblockable and undodgeable
attacks
so choose
Detect Safe Browsing
free
309
com.easysol
Detect Safe Browsing (DSB) from Easy Solutions extends fraud prevention to the end...
in-the browser (MITB)
attacks
. DSB provides
Transcend Elite
free
262
Transcend Information, Inc.
Transcend Elite can help you protect important and sensitive data from accidental losses...
power failures or virus
attacks
. The tool is specifically
Syncovery
229
Super Flexible Software
Syncovery can help you synchronize and back up your data to prevent losses due to virus attacks...
losses due to virus
attacks
, hardware crashes, etc...include or exclude given
elements
. Finally
Pocket Dogfights
free
180
Zerobytes
Pocket Dogfights is an arcade game for Mac that provides you with an 80's gaming feel due to its graphics...
Pocket Dogfights is an arcade game for Mac that provides you with an 80's gaming
McAfee Endpoint Protection for Mac
177
McAfee, Inc.
This application is an essential security solution for protecting the data on your Mac endpoints...
of viruses, spyware, phishing
attacks
, and exploits. The program
Sentinel 3: Homeworld
77
Origin8
Sentinel 3: Homeworld - the third instalment of the highly acclaimed Sentinel sci-fi tower defense series...
armor to execute devastating
attacks
and support
iBomber Defense Pacific
62
Chillingo Ltd
iBomber Defense... The world of iBomber has got bigger and better...
withstand repeated enemy
attacks
and strategically plan...Rewind, Counter
Attacks
, Turret Damage
ArpON
free
4
Andrea Di Pasquale
ArpON (Arp handler inspectiON) is a portable ARP handler. It detects and blocks all ARP...
all ARP poisoning/spoofing
attacks
with the Static Arp
Tesla Wars
free
4
Synaptic Wave
Tesla Wars provides hours of zapping fun on your fingertips. You need to gather up...
beat off the endless
attacks
of merciless
Cloudmark DesktopOne Lite
free
3
Cloudmark Inc.
Cloudmark DesktopOne Lite provides standalone email antispam filtering that continuously protects...
from spam and phishing
attacks
. Upon installation
Living Legends: Wrath of the Beast
2
4 Friends Games
Living Legends: Wrath of the Beast is an exciting puzzle game...
from vicious magical bears
attacks
...of the bear
attacks
. Almost every location
Fierce Tales: The Dog's Heart
1
Blam! Games ltd.
The citizens of Houndspoint have always loved and trusted their canine companions...
cause of the sudden
attacks
and figure
Antivirus Spartan
1
NikOffsec
Antivirus Spartan is a security software application that offers you protection against malware...
adware, and network
attacks
. The malware scan...will identify any MiTM
attack
, which
RisenDragons
Skunk Studios, Inc.
Cruel beings have devastated a floating island, scattering its fragments...
enemies and utilize special
attacks
to get
1
2
3
4
5
6
7
8
…
15
Tags
Backup Data
Find Clues
Hidden Objects
Manage Users
Mobile Users
Network Blocker
Packet Inspector
Sudden Attacks
Synchronize Folders
Transcend Storage
Featured stories
See all
WikiLeaks' 'Dark Matter' shows how the CIA attacked Macs
Wikileaks has just made public another bundle of stolen documents detailing CIA's techniques for breaking into Macs and iPhones.
iOS 18 and its reliance on AI: what’s known thus far
iOS 18 is heavily marketed as a groundbreaking iteration of the OS. Let's take a look at the AI side of the buzz.
Apple allows game emulators with outside sources of ROMs
Unlike the earlier moves of this sort, this time it's not a forced decision.
Apple puts a spotlight on work-related Vision Pro use cases
Vision Pro is here to stay. Apple showcases how companies are using the set for purposes other than entertainment.
Life-saving: Apple seeks to patent an anti-drowning feature
Apple Watch was never designed to be just a device telling time. Its maker continues to extend the list of what the watch is capable of.