Mac
Mac
Windows
Log in / Sign up
Mac
›
Tags
›
flank attacks
Featured
Flank Attacks
Software
Relevance
Popularity
Rating
KisMAC
free
5,655
KisMAC
KisMAC allows users to detect and monitor wireless connections. The application uses AirPort...
be able to simulate
attacks
...the three types of
attacks
: wordlist, weak scheduling
Seagate File Recovery
1,141
Seagate Technology LLC
Seagate File Recovery software restores files from hard drive or removable storage...
corrupted due to virus
attacks
. Featuring Intelligent Scan Technology
Blood & Glory
free
782
Glu Games Inc.
THE HIT iOS GAME COMES TO THE MAC APP STORE! THERE WILL BE BLOOD…...
dual weapons SPECIAL
ATTACKS
& COMBOS Complete special
attacks
and combos
VeraCrypt
free
771
IDRIX
VeraCrypt is a free disk encryption software brought to you by IDRIX (https://www.idrix.fr) and that is based on TrueCrypt...
developments in brute-force
attacks
...much harder for an
attacker
to gain access
Webroot SecureAnywhere
537
Webroot Inc.
This program brings you an advanced protection against viruses...
malicious websites and fishing
attacks
before they can
Blood & Glory 2: Legend
free
496
Glu Games Inc.
***If you are experiencing an initial loading screen hang and are currently on Mac OS Mountain Lion 10.8...
unleash stunning Special
Attacks
, Super Combos...unblockable and undodgeable
attacks
so choose
Call of Duty 2
432
Aspyr Media
Call of Duty 2 redefines the cinematic intensity and chaos of battle as seen through the eyes of ordinary soldiers fighting...
Call of Duty 2 redefines the cinematic intensity and chaos of battle as seen through
Detect Safe Browsing
free
309
com.easysol
Detect Safe Browsing (DSB) from Easy Solutions extends fraud prevention to the end...
in-the browser (MITB)
attacks
. DSB provides
Syncovery
229
Super Flexible Software
Syncovery can help you synchronize and back up your data to prevent losses due to virus attacks...
losses due to virus
attacks
, hardware crashes, etc
Brothers in Arms: Road to Hill 30
103
Feral Interactive
Real soldiers. Authentic battlefields. True combat.Please check the system requirements...
multiplayer – Go online and
attack
...to Find, Fix,
Flank
Brothers in Arms: Earned in Blood
84
Feral Interactive
Real soldiers. Authentic battlefields. True combat.Please check the system requirements...
multiplayer – Go online and
attack
...to Find, Fix,
Flank
ArpON
free
4
Andrea Di Pasquale
ArpON (Arp handler inspectiON) is a portable ARP handler. It detects and blocks all ARP...
all ARP poisoning/spoofing
attacks
with the Static Arp
Tesla Wars
free
4
Synaptic Wave
Tesla Wars provides hours of zapping fun on your fingertips. You need to gather up...
beat off the endless
attacks
of merciless
Cloudmark DesktopOne Lite
free
3
Cloudmark Inc.
Cloudmark DesktopOne Lite provides standalone email antispam filtering that continuously protects...
from spam and phishing
attacks
. Upon installation
Living Legends: Wrath of the Beast
2
4 Friends Games
Living Legends: Wrath of the Beast is an exciting puzzle game...
from vicious magical bears
attacks
...of the bear
attacks
. Almost every location
Infested Planet
2
Rocket Bear Games
Infested Planet is a real-time tactical combat in which you command a team of 5...
Your soldiers are being
flanked
and the perimeter...the aliens are busy,
flank
Fierce Tales: The Dog's Heart
1
Blam! Games ltd.
The citizens of Houndspoint have always loved and trusted their canine companions...
cause of the sudden
attacks
and figure
Antivirus Spartan
1
NikOffsec
Antivirus Spartan is a security software application that offers you protection against malware...
adware, and network
attacks
. The malware scan...will identify any MiTM
attack
, which
Babel Rising
free
1
Mando productions
Babel Rising lets you play God and use your powers to prevent humans from building...
can unleash devastating elemental
attacks
based on fire
RisenDragons
Skunk Studios, Inc.
Cruel beings have devastated a floating island, scattering its fragments...
enemies and utilize special
attacks
to get
1
2
3
4
5
6
7
8
…
14
Tags
Backup Data
File Synchronization
Find Clues
Hidden Objects
Special Attacks
Special Weapons
Strategic Thinking
Synchronize Directories
Synchronize Folders
WAVE of Enemies
Featured stories
See all
WikiLeaks' 'Dark Matter' shows how the CIA attacked Macs
Wikileaks has just made public another bundle of stolen documents detailing CIA's techniques for breaking into Macs and iPhones.
Apple puts a spotlight on work-related Vision Pro use cases
Vision Pro is here to stay. Apple showcases how companies are using the set for purposes other than entertainment.
Life-saving: Apple seeks to patent an anti-drowning feature
Apple Watch was never designed to be just a device telling time. Its maker continues to extend the list of what the watch is capable of.
Apple’s got a patent for ultra-accurate tracking system
Apple knows how to innovate and disrupt, with iPhone being probably the best manifestation of this ability. Now it aims at gesture-based control.
DoJ sues Apple for monopoly practices: what’s in it for us?
The US Department of Justice decided to take on Apple over the way the company does business, essentially. What does that mean for regular users?