This new function available in east-tec Invisible Secrets allows the secure transfer of passwords between two computers. The transfer is made using an encrypted Internet line. The computers are identified over the internet by IPs. At least one of the computers must have a global IP.
In this transfer process one computer will transmit the password – it will be the transmitter – and one computer will receive the password – it will be the receiver. The transmitter must know the IP of the computer that receives the password.
This function might not work properly if you are behind a firewall. Port 10000 must be opened.
When you delete a file, the operating system does not destroy the file contents from the disk – it only deletes some “references” on the file from some system tables. The file contents remains on disk until another file happens to overwrite it. Any software recovery tool can restore the data if it hasn’t been overwritten or thoroughly erased. Hardware recovery tools may even restore overwritten files by analyzing latent magnetic traces.
As a result, your confidential information may be lying unprotected on your disk (not wiped, overwritten or erased) and it is almost impossible to prevent it from falling into the wrong hands.
east-tec Eraser offers secure wipe methods that meet and exceed not only the U.S. Department of Defense standards, but also several other international secure erasing standards, such as Peter Gutmann, Bruce Schneier, AFSSI, NAVSO, Russian GOST, German VSITR. By using these methods, you make sure your data is erased for good.