Mac
Mac
Windows
Log in / Sign up
Mac
›
Tags
›
middle attacks
Featured
Middle Attacks
Software
Relevance
Popularity
Rating
Bear With Me
5
Exordium Games
Bear With Me is an episodic noir adventure game. Amber is trying to find her missing brother while being...
wakes up in the
middle
of the night
CAFE 0: The Drowned Mermaid Voiced Version
4
roseVeRte
CAFE 0: The Drowned Mermaid Voiced Version is an OELVN with Japanese voice and English text. A girl's spirit...
0, a mysterious Cafe in the
middle
of nowhere
Kahoot Keyboard Shortcuts
free
4
Lucas Kellar
Keyboard Shortcuts for Kahoot lets you add customizable keyboard shortcuts to Kahoot. The application...
time, even in the
middle
of the game
Age of Empires II Update
free
4
Bold by Destineer
Lead one of the most powerful civilizations of the Middle Ages to greatness. Raise your armies...
powerful civilizations of the
Middle
Ages to greatness
Giza
4
B and B Software
Giza is a fully texture-mapped 3D adventure game with first-person perspective...
a research project in the
Middle
East, you've discovered
Enigmatis: The Ghosts Of Maple Creek - Collector's Edition
4
Macgamestore
Enigmatis: The Ghosts of Maple Creek is a fun hidden object puzzle adventure game. After waking up...
a tiny town in the
middle
of nowhere
Campfire Legends - The Last Act Premium Edition
4
Macgamestore
Past and present merge into one final terrifying chapter in Campfire Legends - The Last Act Premium Edition for Mac...
them deep in the
middle
of nowhere. As Reggie
Island Wars 2 Xmas
4
InterAction Studios
Ah, the South Pacific seas... warm sun, clear skies, crystal waters... too bad you won't get...
been caught in the
middle
of it again! Hop
KeyBlaze Free Mac Typing Tutor
free
4
NCH Software
KeyBlaze is a typing tutor software program designed to assist with learning...
Home Keys for index,
middle
and pinky fingers
OttoPhormant Audio Unit
4
Music Unfolding
OttoPhormant is a wah effect based on morphing formant filters. It can be controlled using touch-triggered sweeps...
three vowel sounds - start,
middle
, and end. The effect
Hamming code
free
4
University of Hamburg
This circuit demonstrates the use of a 4...
XOR gates in the
middle
of the circuit
Port Spy
4
Balancing Rock
Port Spy is a port monitoring application that allows you to see exactly what is being...
called “man-in-the-
middle
” observer. The client
Batch Photo Watermark
4
Ruchira Ramesh
Application that could put watermark on hundreds of images at a time.Watermarking an image helps to show the work...
bottom right, top
middle
, bottom
middle
and centre location
Lost Lands Ice Spell CE
3
FIVE-BN UK LTD.
Lost Lands: Ice Spell Collector's Edition is a captivating puzzle adventure game...
Lost Lands in the
middle
of the summer
Shelter2
3
Might and Delight
Shelter 2 lets you guide a powerful Lynx through vast open landscapes. You play as a Lynx raising...
tundra. Surviving in the
middle
of the food chain
TransMIDIfier
free
2
Be Wary Software
TransMIDIfier provides convenient MIDI routing and virtual instrument patch...
works by functioning as a "
middle
man" between the sequencer
ScienceMatrix
1
Digital Frog International
ScienceMatrix: Cell Structure & Function is closely aligned with and supports the middle...
with and supports the
middle
- and secondary-level science
FogBugz Screenshot
free
1
fogbugz
A picture can be worth a thousand words, and sometimes adding...
Screenshots link in the
middle
of the page
PrefCount
free
1
Yevgeny Nyden
PrefCount is an application that assists with counting up the results of a game of Preferance...
in Russia in the
middle
of the XIX century
Ultimate Reference Suite DVD
1
The Britannica Store.
With more than 100,000 articles, the 2011 Ultimate Reference DVD has more content than any other reference software...
the Student Encyclopedia for
middle
and high school
1
…
14
15
16
17
18
19
20
Tags
Brutal Tundra
Error Correction
Error Detection
Food Chain
Guide Lynx
Interactive Article
Play as Lynx
Rich Multimedia
Type to Answer Kahoot
XOR Gates
Featured stories
See all
WikiLeaks' 'Dark Matter' shows how the CIA attacked Macs
Wikileaks has just made public another bundle of stolen documents detailing CIA's techniques for breaking into Macs and iPhones.
iOS 18 and its reliance on AI: what’s known thus far
iOS 18 is heavily marketed as a groundbreaking iteration of the OS. Let's take a look at the AI side of the buzz.
Apple allows game emulators with outside sources of ROMs
Unlike the earlier moves of this sort, this time it's not a forced decision.
Apple puts a spotlight on work-related Vision Pro use cases
Vision Pro is here to stay. Apple showcases how companies are using the set for purposes other than entertainment.
Life-saving: Apple seeks to patent an anti-drowning feature
Apple Watch was never designed to be just a device telling time. Its maker continues to extend the list of what the watch is capable of.