Total VPN

Total VPN 1.0

Total VPN lets you unlock your favorite website from wherever you are, stay secure with an encrypted connection and avoid tracking by obscuring your IP address. We believe in your right to privacy. Try TotalVPN for free, it's simple to use, quick to setup...

LiquidVPN

LiquidVPN 1.10

When you combine the fastest VPN service on earth with our new multi-platform VPN client you get one heck of a value. With the new LiquidVPN app you can connect to the LiquidVPN network with a single click. Instantly protect yourself from common threats...

Plug Spy

Plug Spy 2.3.1 updated

Plug Spy is a first grade tool to observe your Mac. It activates automatically on screen lock and triggers actions in case of unexpected occurrences. Instant notification on you phone will give you additional security if you leave your Mac alone. Plug-Spy...

MacFort

MacFort 4.9.9.0 updated

MacFort is an innovative utility which gives you the ability to easily encrypt and password protect individual files and folders, applications and their associated files. With just 2 clicks, MacFort lets you password protect several applications data on...

NordVPN

NordVPN 1.0

A VPN Service encrypts all the traffic flow between the internet and your device. Further, it prevents the tracking software and organisations from monitoring your internet activity and helps hide your IP address. Additional benefit of unblocking the net...

Invisible

Invisible 1.6.1 updated

The quickest way to keep personal documents away from unwanted eyes. Drop files onto Invisible to instantly hide them from view, and make them visible again just as easily with the click of a button. All your private files are kept safely out of view, and...

IPinator

IPinator 1.0.1

IPinator allows you to send anonymous email, and encrypt your Internet connection. Protect your online privacy by changing your IP with IPinator - VPN. When you browse the Internet normally, your computer makes a direct connection to the websites you...

Undercover

Undercover 6.0.1 updated

Undercover routinely checks with the Undercover server. In case of theft, the Mac's unique Undercover ID is added to the list on the Undercover server, initiating the recovery process. During the recovery phase, Undercover transmits its current location...