I’m sorry to be the bearer of bad news, but when you clear your history to keep your browsing activities confidential, it’s like moving a folder full of confidential documents from your desk into the desk’s drawer. Even though the folder is gone from the direct view of unwanted people, but the documents still exist and can easily be found with a bit of extra effort.Read More
Internet privacy is one of the most talked about topics these days. However, without realizing how your computer actually interacts with the web, it is impossible to achieve that desired peace of mind.
To easily understand what’s going on between your computer and the web when you visit various websites, let’s use a simple analogy.
Think of your computer’s hard drive as a blank diary and your computer’s mouse as a ballpoint pen. Anytime you authorize an action on the web with the click of your mouse – whether it is sending a message on Facebook, buying a new tablet on Amazon.com, looking for the best restaurant in town, watching U2’s latest music video, or checking your balance on your Internet banking site – it’s just like writing an entry in the diary.Read More
Even though government surveillance is nothing new – just think of Caesar’s spies in the Roman Empire, or the KGB in the former Soviet Union – the Snowden revelations made us realize how much it was a part of our modern lives, too. The fact that agency staff could witness private moments of our lives whenever they liked, even if were up to nothing wrong, was a sobering realization to say the least. Being a good citizen, it seems, doesn’t qualify one anymore for being excluded from monitoring so in this post we are looking at techniques that can help you protect your Internet privacy in the face of mass surveillance.Read More
You probably delete dozens of various files from your PC every day. But have you ever wondered what happens to a file after its deletion? How does “deletion” work in the first place? Does a file just disappear from the system without a trace after deletion? Does it become an empty space? What happens to the often confidential information contained in the file? And basically, where do deleted files go?
We are sharing a great video below this post that answers all those questions in a fun and easy-to-follow, yet scientific way. Michael from VSauce walks you through the phases of file deletion and concludes that there is no such thing as “deletion”, only overwriting!Read More
We are very happy to announce that east-tec Eraser, the latest version of our flagship security and privacy utility, is now available from the East-Tec Store. east-tec Eraser has now over 17 years of experience in protecting your sensitive data and privacy, and securely erasing all evidence of your Internet and PC activity!
This year we worked very hard on implementing as many customer-feedback based new features in east-tec Eraser as possible, as well as improving the intuitiveness of the program. Let me give you a short tour of what’s new, hoping that you’ll be satisfied with what east-tec Eraser has to offer you.Read More