Can I define my own shred method?

Yes, you can define your own shred method. Just click on “Advanced Settings” button -> “Security Level” -> select “Custom Security Level” -> click “Add”. You must set the number of overwrite steps, the writing patterns and any other options you want to be applied to the wiping method you create.

Note: For more advanced wiping options, we recommend you to try our data wiping solution, east-tec Eraser.

How can I destroy my Internet Traces?

To destroy your Internet Traces using east-tec InvisbleSecrets, all you have to do is:

  • Open east-tec InvisibleSecrets
  • Select Destroy Internet Traces from the main page.
  • Select one or more traces you want to destroy. Choose from the following:

    • Internet Explorer Cache
    • Internet Explorer Cookies
    • Recently Typed URLs
    • Internet Explorer History
    • Most Recently Used Documents / Applications

  • Click Next to destroy traces.

Note: For more advanced wiping options, we recommend you to try our data wiping solution, east-tec Eraser.

Destroying data beyond recovery

Deleting files and folders from Windows Explorer is not secure. This will delete only the file’s name so that you will no longer see it in Windows Explorer. To destroy files and folders beyond recovery you must overwrite the file/folder several times with specific patterns before actually deleting it. east-tec InvisibleSecrets provides an integrated Shredder (DoD 5220.22-M compliant) for this operation.

Browsing the Internet is fun and useful, but it leaves traces on your computer and others can see what you used the Internet for. The Internet Traces are the information left on your computer after you browse the Internet: cache, cookies, recently typed URLs, Internet Explorer History, etc.

  • Internet Cache – represents a collection of files stored on your hard-disk so that you browse faster.
  • Internet Cookies – a cookie is a message given to a Web browser by a Web server. The browser stores the message in a text file. The message is then sent back to the server each time the browser requests a page from the server. The main purpose of cookies is to identify users and prepare customized Web pages for them. Unfortunately, this destroys your anonymity. Cookies can tell a hacker what sites you visit regularly.
  • Recently Typed URLs – the web browser keeps a list of recently typed URLs, so when you start writing an URL already in this list, the browser recognises it and you can choose to auto complete it.
  • Internet Explorer History – Internet Explorer keeps a history of the visited web sites.
  • Most Recently Used Documents / Applications
  • and many others…

All of these traces can tell an unexperienced intruder that you visited certain “sensitive” websites. Deleting them is a solution, but an experienced hacker is able to recover them. So they need to be deleted in a secure way. InvisibleSecrets can help you accomplish this by using the Destroy Internet Traces feature.

Note: For more advanced wiping options, we recommend you to try our data wiping solution, east-tec Eraser.

How to shred files

To permanently remove files from your computer using east-tec InvisibleSecrets, you have 2 methods:

Method 1

  • Open east-tec InvisibleSecrets.
  • Select Shred Files from the main page.
  • Select the files and folders you want to shred – to do this use the Add Files / Add Folders buttons or/and use Cryptboard button to add files from Cryptboard.
  • Click the Shred button to start the shredding process.

Method 2

  • In Windows Explorer right click the files and folders you want to shred, and from the east-tec InvisibleSecrets menu, select Shred.
  • A window will open, where you can review the files/folder you want to destroy. Click the Shred button to start the shredding process.

Note: For more advanced wiping options, we recommend you to try our data wiping solution, east-tec Eraser.