Mac
Mac
Windows
Log in / Sign up
Mac
›
Tags
›
middle attacks
Top
Middle Attacks
downloads
Relevance
Popularity
Rating
TorChat
free
26
SourceMac
TorChat allows chatting and exchanging files anonymously. This chat client is powered by Tor hidden services...
secure when the
attacker
does not know...implemented allows a potential
attacker
to perform
BirthdayScanner X
free
4
Thomas Stuefe
Address Book-to-iCal-Importer. Birthday Scanner X is a freeware tool which synchronizes birthdays...
Fixed issue which caused
middle
names not showing properly
Stellar Repair for Video
Stellar Information Technology Pvt Ltd
Repair your corrupt videos shot from any camera, with Stellar Repair for Video software on Mac. It supports repair of AVI...
and write errors, virus
attacks
, improper download, or compression
Randhouse
free
20
j7code
Randhouse is a random string generator for creating safe and secure passwords of all types. Set different parameters...
prevent cracking and piracy
attacks
. Randhouse is smart
BitMedic AntiVirus
4
Pocket Bits LLC
BitMedic AntiVirus was designed specifically for the Mac, and offers a full suite of protection. It gives you simple...
your Mac safe from
attacks
. 3-Step Anti-Virus Protection
GV Connect
free
4
Andreas Amann
Are you looking for an easy way to call or send SMS messages to your contacts using your Google...
up people in the
middle
of the night. Quick
jalada AstroChase
5
jalada GmbH
AstroChase is the new arcade experience from jalada. You control a space fighter moving on the screen...
oncoming bombs and kamikaze
attacks
from alien invaders--and
Dioretsa
6
UM App Share
You can get more information for Dioretsa in my site. Dioretsa is a pdf...
Dioretsa is a PDF viewer that manages PDF files with tabs. The name of PDF
Ninepin Bowling
4
Frank Meyer
The ultimate fun with Nine-pins Watch out Ninepin fans! The virtual Nine...
the one in the
middle
(the Kingpin), the player
Clan Lord (Classic)
Delta Tao Software
Clan Lord is Delta Tao's venture into online role-playing games. The goal is to develop...
blue building in the
middle
Tastiera
4
Coq
This widget lets you use your computer keyboard as a piano keyboard. It gives a range of 3 octaves (1 1/2...
(1 1/2 on either side of
middle
C). It was originally
Nine Men's Morris
4
Simone Tellini
Nine Men's Morris is an ancient strategic board game for two players...
form an inner square,
middle
square and outer square
RLPassWeb
free
Theta Pi Software
RLPassWeb is a program that generates Natural Language passwords...
secure against dictionary
attacks
, the most common...brute-force password
attacks
. This program
Revenge of the Titans
55
Puppy Games
Revenge of the Titans is a tower defense game...
all the alien
attackers
while preserving...title references Titan
Attacks
!, a Space
Human Japanese Intermediate
31
Brak Software
Learn Japanese with the long-awaited sequel to Human Japanese! More than two years in the making...
your flow in the
middle
of an interesting discussion
Defense Zone 2
294
Artem Kotov
Defense Zone 2 is a strategy game developed for Mac where your objective...
fort from incoming enemy
attacks
. You can
Safari
free
520,488
Apple Inc.
Safari 5 is a web browser made by Apple for the Mac. It is a lightweight...
avoid the most common
attacks
VPNProxyMaster
31
VPN Proxy Master
VPN Proxy Master is designed to protect your online activities. It works as a shield against...
your data from online
attacks
Tesuji - How to Make a Professional Go Player
free
19
Go Software Studio
Tesuji is developed to help beginners learn all kinds of tesuji. The software includes 5333...
Yoda Norimoto's Tesuji exercises.
Middle
Level Tesuji exercises. Fujisawa
Security Growler
free
47
Nick Sweeting
Security Growler is intended to keep your computer...
actions and avoid hacking
attacks
. The application is quite
1
2
3
4
5
6
7
8
9
…
20
Tags
Anonymous Navigation
Defense
Fast Connection
Improve Tesuji Skill
Learn Tesuji
Online Protection
Protect Network Traffic
Secure Online Browsing
Tesuji Exercises
Tom's Tesuji
Featured stories
See all
WikiLeaks' 'Dark Matter' shows how the CIA attacked Macs
Wikileaks has just made public another bundle of stolen documents detailing CIA's techniques for breaking into Macs and iPhones.
iOS 18 and its reliance on AI: what’s known thus far
iOS 18 is heavily marketed as a groundbreaking iteration of the OS. Let's take a look at the AI side of the buzz.
Apple allows game emulators with outside sources of ROMs
Unlike the earlier moves of this sort, this time it's not a forced decision.
Apple puts a spotlight on work-related Vision Pro use cases
Vision Pro is here to stay. Apple showcases how companies are using the set for purposes other than entertainment.
Life-saving: Apple seeks to patent an anti-drowning feature
Apple Watch was never designed to be just a device telling time. Its maker continues to extend the list of what the watch is capable of.