Multiplayer Euchre 1.0.0
After the trump is set, the team which called the trump becomes the attackers, while the other team becomes the defenders. During the phase of setting the trump, an attacking player may declare "going alone" in an attempt to win the most points ...
- Audio & Multimedia
- Business
- Communications
- Desktop
- Development
- Education
- Games
- Graphics
- Home & Hobby
- Network & Internet
- Screen Savers
- Security & Privacy
- Servers
- System Utilities
- Web Development
- AnyMP4 Video Converter for Mac
- SSuite NetSurfer Browser
- Datarecovery Mac
- Apeaksoft Blu-ray Player
- Best Data Recovery
- AnyRec Blu-ray Player for Mac
- Aiseesoft Mac FoneTrans
- Clyton
- MindOnMap
- 4Easysoft Blu-ray Player
- EasyBilling Invoicing...
- FoneLab Data Retriever
- Informachine File Manager
- Migrate Access Database to...
- Disk Media Recovery Software
- ADRC Data Recovery Tools
- avast! Antivirus
- Revo Uninstaller
- Java Runtime Environment
- AVG Anti-Virus Free Edition
- GOM Media Player
- RegSeeker
- IrfanView
- CPU-Z
- Malwarebytes Anti-Malware
- Spybot Search & Destroy
- Skype
- µTorrent
- Ai File Extension Editor
- Remove Drm From Pdf Files
- Download Word Templates For...
- Assault Cube Sounds
- Download Song As Zip File
- Rankquest Watchseo
- Free Becker Cpa
- Creative Smiley Faces Text
- Portable Photo Editor Free...
- Screen Capture Master
- Bat Merge
- Daz Iso Compressor
- Destroy Recycle Bin Windows
- Decode Firefox Cache File
- Link Directory Script
Attackers Download
-
1Freeware
-
2Bugs Defense PLUS 1.0.0.9
Bugs Defense is a classic tower defense game. You need to prevent hordes of hostile bugs from taking your treasures away. You will create mazes to complicate the attackers? task. You can build up to eight different types of towers, each of them having ...$1.49 -
3AS3 Personal Firewall 1.1
The log viewer provides data connection notes that can be used for prosecuting the potential attackers. Use the rules editor to specify the destination and service for each rule with the required action. For example, if you don't want someone connecting ...Freeware -
4Crusaders Of Space: Open Range 1.1
Just when you thought the alien invasion was successfully fought off once and for all, new waves of alien scum come in numbers far greater then 5 years ago. The government is alarmed. An abstract from an official intelligence report: Our satellites have ...$19.95 -
5Netbios Share Scanner 1.0
In order to keep sensitive data belonging to your company and customers safe at all times, you should constantly check your systems for security vulnerabilities to ensure that you keep at least one step ahead of any attackers. Netbios Share Scanner ...Freeware -
6Foundstone DIRE (Detect Insecurely
However, attackers can target these same systems by exploiting ‘insecurely registered applications’ on target systems. Foundstone has released a free tool called Foundstone DIRE, which allows users/system administrators to identify ...Freeware -
7SDL Regex Fuzzer 1.1
Regular expression patterns containing certain clauses that execute in exponential time (for example, grouping clauses containing repetition that are themselves repeated) can be exploited by attackers to cause a denial-of-service (DoS) condition. SDL ... -
8Return of Warrior 1.0
- Attackers – They serve as part of the Ak’Kan Combatants. Attackers are extremely aggressive and dangerous. - Templars – Provide protection to the Ak’Kan nation. Their ability to shield and strong defense skills ... -
9Star Assault 1.3
Aircraft upgrades are mandatory when a mission is finished in order to be ahead of the attackers. Adjustable ship parts are shields, reactor and propulsion. Laser guns, rail guns, heat seekers and rockets are the options when it comes to weapons, and ... -
10Defence Alliance 2 1.6
Two teams face off in attack/defend scenarios where the attackers must complete their objectives before time runs out. The mod features six different classes: Medic, Mechanic, Rocketeer, Machine Gunner, Sniper and the Rifleman, each with their own special ... -
11X-Force: Fight For Destiny 1.0
The player manages restricted resources in the organization part for the defense against the extraterrestrial attackers. He decides what the scientists investigate, what technicians build and what shall be bought for his restricted credits. The equipment ... -
12Intrusion Detection and Defense
Our software uses the Windows event log for security analysis and intrusion detection (among other sources), and it configures the Windows firewall to dynamically deny access to attackers on a very low system level. Configure and adapt your Security ...$199.00
Buy -
13Support Live Chat 1.1
Support Live Chat tool is a highly secure and reliable solution that prevents business-specific data from intruders and online attackers. This highly flexible and customizable utility that is available at much competitive and reasonable prices offers ...$7.00
Buy -
14Avira AntiVir WebGate 3.0.14-2 1.0
Benefits: - Innovative AHeAD (Advanced Heuristic Analysis and Detection) technology for the detection of unknown or rapidly changing attackers for proactive security. - Real-time monitoring of the data traffic through the integrated on-access scanner.$387.45 -
15Hugo Alone in the Tower 1.0
Kill all the attackers, unlock powerful new weapons and have fun.Freeware -
16PetsWar 1.0
28 vividly designed pets and 13 kinds of monster attackers. You decide their destiny. 4. The match of Bull of Brave with Warrior Rooster rocks! How about Warrior Rooster with Chain Smoker Cat? Whoops, monsters are right here under your nose! 5. A huge ... -
17Easter Island TD 1.2
The famous stone heads on Easter Island are being ravaged by mystical creatures from another dimension! ItOCOs up to you to defend your island to the very last head in this fun tower defence game! The Easter Island Moais, they can be used to defeat attackers!Freeware -
18Protectorion Universal Encryption
The software prevents attackers and other unauthorized persons from reading and misusing confidential data on PCs as well as on cloud, network and flash drives. Access your encrypted data and passwords from any PC or share them with other users (multi-user ...$34.90
Buy -
19BitDefender 2013 Antivirus Plus
Bitdefender Safepay Keeps attackers at bay by automatically opening all your e-banking and e-shopping pages in a separate iron-clad, secure browser. Social Network Protection Filters the links you receive from your social networks friends and monitors ...$27.96
Buy -
20Internet Security Software i13.7
We cannot settle with sub-standard protection regime, in the times when fatal malicious programs and attackers are ready to take toll over your vital data and information. Protegent Internet security gives you sufficient PC protection with the added ...$30.00
Buy -
21PDF Maker DLL 3.5.1
The encrypted files use high level 128-bit RC4 encryption so you can be assured they are safe from attackers. Also, with PDF Maker DLL you can easily add form fields, comments, and bookmarks to your documents. Using PDF Maker DLL in your own application ...Freeware -
22Protect My Folders 1.3
* Protect sensitive data from being stolen by viruses and attackers. * Allow you to set accessibility rights for the protected folders or files according to your needs. * No one can run or uninstall Protect My Folders program without your ...$17.95
Buy -
23WASEL Pro Windows 1.17
WASEL Pro protects your identity and data; such as passwords, account information, emails, and Credit Card information from attackers and data sniffers on unsecured wireless hotspots at cafes, airports or hotels. Bypass firewalls content restrictions ... -
24Complete Security Software 3.0.0
You can now easily curb modern evasion techniques used by contemporary attackers. The software is equipped to handle most modern security breach patterns and ensure a safe browsing environment to individual PC users as well as big organizations. Its ...$53.00
Buy -
25Wallix Pro 4.2.0
This program does more than protecting your computer from intruders and attackers, it is very efficient in blocking irritating spyware and adware as well. Wallix Pro Firewal comes with additional security specifications for those of you who also want ...Freeware