Mac
Mac
Windows
Log in / Sign up
Mac
›
Tags
›
suspicious sections
Featured
Suspicious Sections
Software
Relevance
Popularity
Rating
OverSight
free
441
objective-see llc
OverSight can monitor your computer’s camera and microphone to detect unauthorized attempts to use them...
OverSight can monitor your computer’s camera and microphone to detect unauthorized attempts
Micro Snitch
340
Objective Development Software GmbH
Micro Snitch is a Mac utility that enables you to monitor the activity of your microphone and built...
Micro Snitch is a Mac utility that enables you to monitor the activity of your microphone
PacketStream
67
Kevin Walzer
PacketStream provides point-and-click activation of the Mac's built-in network monitoring program...
network bottlenecks, or even
suspicious
network activity. All network
Mocha
37
Nurullah Akkaya
Mocha is a tool that monitors your network activity and keeps a record of IP/MAC...
when it notices any
suspicious
activity, like any changes
MD
28
Rixstep
MD provides message digests for files in six common algorithms: MD2, MD5, MDC2, RIPEMD-160, SHA, and SHA-1...
algorithms and are growing
suspicious
even the longer 160
Firewall CyberGuard - Best cyber threat protection
25
Mihaela Popescu
This app is a system protection...
shield actively monitors any
suspicious
activity within your e-mail
Systweak Anti-Malware
21
Systweak Software
Systweak Anti-Malware offers a complete protection against malware. It protects your Mac against...
Furthermore, it looks for
suspicious
or malicious
Traffic Counter
free
19
New Technologies
Traffic Counter is an extremely light and straightforward application you can use to monitor network...
Traffic Counter is an extremely light and straightforward application you can use to monitor network
Nancy Drew - The Deadly Device
16
Her Interactive, Inc.
Fear lingers in a remote laboratory after a physicist's suspicious demise. A police investigation...
a remote laboratory after a physicist's
suspicious
demise. A police investigation
Police Chase - Desert Race
free
9
Academ Media Games
Police Chase - Desert Race is a game application that prepares you for the police officer exam...
If you notice something
suspicious
iCalTextImport
free
8
Mike Hay's
This package attempts to read any.csv, tab...
file and fix any
suspicious
looking entries. Given
Nancy Drew: Tomb of the Lost Queen
8
her interactive
Egyptologists and archaeologists are abuzz about recent discoveries by a university dig team...
a university dig team, but
suspicious
accidents left the group
eScan Anti-Virus Security for Mac
8
MicroWorld Technologies Inc.
eScan Anti-Virus Security for Mac provides real-time protection to Mac machines against viruses...
warns users about the
suspicious
behaviour of applications
Hidden Expedition: Smithsonian Castle Collector's Edition
6
Eipix Entertainment
Hidden Expedition: Smithsonian Castle Collector's Edition is a puzzle game created by Eipix...
the truth regarding the
suspicious
events taking place
Eagle Eye - Facebook Account Guardian
4
Calin Popescu
securityfocus.eu@gmail★★ ★★★ Suggestions & Bug Report at: securityfocus.eu@gmail ★★★ Your Facebook account personal guardian...
by monitoring any
suspicious
login activities...any
suspicious
activities are detected
Black Viper - Sophia's Fate
4
Anuman Interactive / Ticonblu
Black Viper - Sophia's Fate is an adventure game about a young woman who is living a double life...
is sent to investigate a
suspicious
death in a manor belonging
Day Plan
4
Sudip Bag
All-in-one app to plan your day. It empowers you to plan a perfect day and get things...
to come. TODOS This
section
is basically a checklist...Six dedicated
sections
for different types
Escape From Frankenstein's Castle
3
com.IMG.DRMWrapper
Escape from Frankenstein's Castle...Injured in a car crash with her fiancé...
interacts with the castle's
suspicious
inhabitants, discovers clues
AntCorGen
free
2
Laurence Anthony
AntCorGen is a freeware corpus generation tool...
browsing, and decide which
sections
(e.g., title, abstract...downloads the
sections
Bone Profiler
free
Marc Girondot
Bone cross...
to describe bone
sections
...statistically compare bone-
section
compactness profiles. Journal
1
2
3
4
5
6
7
8
…
20
Tags
Adware Protection
Detect Malware
Hidden Object Scenes
Malware Detector
Monitor Data
Monitoring Tool
Mystery
Network Monitoring
Spyware Protection
Suspicious Activity