Where Do Deleted Files Go?

Where Do Deleted Files Go?

You probably delete dozens of various files from your PC every day. But have you ever wondered what happens to a file after its deletion? How does “deletion” work in the first place? Does a file just disappear from the system without a trace after deletion? Does it become an empty space? What happens to the often confidential information contained in the file? And basically, where do deleted files go?

We are sharing a great video below this post that answers all those questions in a fun and easy-to-follow, yet scientific way. Michael from VSauce walks you through the phases of file deletion and concludes that there is no such thing as “deletion”, only overwriting!

Read More

How Microsoft Office And OpenOffice Can Compromise The Privacy Of Your Files

Why MS Office and OpenOffice can compromise the privacy

When you think of threats that may compromise your encrypted personal, or business files, the last thing that comes to mind is the popular document editors you regularly handle your docs with. However, the working mechanisms of these applications may pose just as much privacy threats to your files as evil-minded cyber-crooks operating from Russia, or China do.

Case in point, the auto-recovery feature in MS Office and OpenOffice. By default, the apps save copies of docs you are working on to your computer’s hard drive in every 10-15 minutes so that your unsaved edits can be rescued if there is a system crash, power failure, or an application crash.

Read More

How I Could Steal Your Credit Card Details From Chrome In Just 5 Minutes

Plain text credit card details in Chrome for anyone to view

Don’t get me wrong, I do love Chrome. It’s my default browser and I use it all the time for browsing, downloading, chatting, to access my Gmail, Google Docs and so on. But the one thing I definitely wouldn’t use it for is storing my credit card numbers so that it can auto-fill various web-forms for me when I’m shopping online.

The thing is, Chrome lets anyone with physical, or remote access to your computer view the credit card details (numbers, expiry dates, cardholder names, physical/billing addresses, email addresses, and phone numbers) it has saved for you, without being asked to enter a master password first!

Read More

Choose From 14 Data Wiping Standards With The Intuitive Slider Selector

Choose From 14 Data Wipe Standards With The Intuitive Slider Selector

There are numerous data wipe standards for the secure removal of sensitive information from PC hard drives and removable data storage devices. east-tec Eraser offers you 14 of them. In this article we would like to recommend you wipe methods for different privacy scenarios and tell you what speed/security balance you can expect when running them. We have also included screenshots to show you how much it is a child`s play to switch between standards with the software’s built-in slider selector.

Read More

Give Your Privacy Protection A Major Update: east-tec Eraser Is Out!

East-Tec announces the release of east-tec Eraser

East-Tec is very happy to announce that the latest version of east-tec Eraser, east-tec Eraser, is now available at the East-Tec Store. This major release comes with plenty of new features. We have redesigned both its interface and architecture to offer our valued customers a more intuitive, efficient and stylish product that also brings you several customization options. The new Dashboard’s advanced privacy risk scanner guarantees real-time risk alerts and the improved Privacy Guard wipes out every bits of compromising online and offline activity traces. This version also boasts the largest database of supported applications ever to keep unauthorized parties away from your personal data at all times.

Read More