East-Tec Logo

Destroy Data

Deleting files and folders from Windows Explorer is not secure. This will delete only the file's name so that you will no longer see it in Windows Explorer. To destroy files and folders beyond recovery you must overwrite the file/folder several times with specific patterns before the actual erase. east-tec InvisibleSecrets provides an integrated Shredder (DoD 5220.22-M compliant) for this operation.

Browsing the Net is fun and useful but it leaves traces on your computer and others can see what you used the Internet for. The Internet Traces are the information left on your computer while you browse the Internet: internet cache, cookies, recently typed URLs, Internet Explorer History.

  • Internet Cache: Represents a collection of files stored on your hard-disk so that you browse faster.

  • Internet Cookies: A cookie is a message given to a Web browser by a Web server. The browser stores the message in a text file. The message is then sent back to the server each time the browser requests a page from the server. The main purpose of cookies is to identify users and possibly prepare customized Web pages for them. Unfortunately this destroys your anonymity. Cookies can tell a hacker what sites you visit regularly.

  • Recently Typed URLs: The web browser keeps a list of recently typed URLs, so when you start writing an URL already existing in this list, the browser recognizes it and you can choose to auto complete it.

  • Internet Explorer History: Internet Explorer keeps a history of the visited web sites.

  • Most Recently Used Documents / Applications

All of these traces can tell any unexperienced intruder that you visited certain "sensitive" websites. Deleting them is a solution, but an experienced hacker is able to recover them. So they need to be deleted in a secure way. east-tec InvisibleSecrets can help you accomplish this - read how you can Destroy Internet Traces.