I’m sorry to be the bearer of bad news, but when you clear your history to keep your browsing activities confidential, it’s like moving a folder full of confidential documents from your desk into the desk’s drawer. Even though the folder is gone from the direct view of unwanted people, but the documents still exist and can easily be found with a bit of extra effort.Read More
Internet privacy is one of the most talked about topics these days. However, without realizing how your computer actually interacts with the web, it is impossible to achieve that desired peace of mind.
To easily understand what’s going on between your computer and the web when you visit various websites, let’s use a simple analogy.
Think of your computer’s hard drive as a blank diary and your computer’s mouse as a ballpoint pen. Anytime you authorize an action on the web with the click of your mouse – whether it is sending a message on Facebook, buying a new tablet on Amazon.com, looking for the best restaurant in town, watching U2’s latest music video, or checking your balance on your Internet banking site – it’s just like writing an entry in the diary.Read More
Even though government surveillance is nothing new – just think of Caesar’s spies in the Roman Empire, or the KGB in the former Soviet Union – the Snowden revelations made us realize how much it was a part of our modern lives, too. The fact that agency staff could witness private moments of our lives whenever they liked, even if were up to nothing wrong, was a sobering realization to say the least. Being a good citizen, it seems, doesn’t qualify one anymore for being excluded from monitoring so in this post we are looking at techniques that can help you protect your Internet privacy in the face of mass surveillance.Read More
When you think of threats that may compromise your encrypted personal, or business files, the last thing that comes to mind is the popular document editors you regularly handle your docs with. However, the working mechanisms of these applications may pose just as much privacy threats to your files as evil-minded cyber-crooks operating from Russia, or China do.
Case in point, the auto-recovery feature in MS Office and OpenOffice. By default, the apps save copies of docs you are working on to your computer’s hard drive in every 10-15 minutes so that your unsaved edits can be rescued if there is a system crash, power failure, or an application crash.Read More
We are very happy to announce that east-tec Eraser, the latest version of our flagship security and privacy utility, is now available from the East-Tec Store. east-tec Eraser has now over 17 years of experience in protecting your sensitive data and privacy, and securely erasing all evidence of your Internet and PC activity!
This year we worked very hard on implementing as many customer-feedback based new features in east-tec Eraser as possible, as well as improving the intuitiveness of the program. Let me give you a short tour of what’s new, hoping that you’ll be satisfied with what east-tec Eraser has to offer you.Read More