How can I destroy my Internet Traces?

To destroy your Internet Traces using east-tec InvisbleSecrets, all you have to do is:

  • Open east-tec InvisibleSecrets
  • Select Destroy Internet Traces from the main page.
  • Select one or more traces you want to destroy. Choose from the following:

    • Internet Explorer Cache
    • Internet Explorer Cookies
    • Recently Typed URLs
    • Internet Explorer History
    • Most Recently Used Documents / Applications

  • Click Next to destroy traces.

Note: For more advanced wiping options, we recommend you to try our data wiping solution, east-tec Eraser.

Destroying data beyond recovery

Deleting files and folders from Windows Explorer is not secure. This will delete only the file’s name so that you will no longer see it in Windows Explorer. To destroy files and folders beyond recovery you must overwrite the file/folder several times with specific patterns before actually deleting it. east-tec InvisibleSecrets provides an integrated Shredder (DoD 5220.22-M compliant) for this operation.

Browsing the Internet is fun and useful, but it leaves traces on your computer and others can see what you used the Internet for. The Internet Traces are the information left on your computer after you browse the Internet: cache, cookies, recently typed URLs, Internet Explorer History, etc.

  • Internet Cache – represents a collection of files stored on your hard-disk so that you browse faster.
  • Internet Cookies – a cookie is a message given to a Web browser by a Web server. The browser stores the message in a text file. The message is then sent back to the server each time the browser requests a page from the server. The main purpose of cookies is to identify users and prepare customized Web pages for them. Unfortunately, this destroys your anonymity. Cookies can tell a hacker what sites you visit regularly.
  • Recently Typed URLs – the web browser keeps a list of recently typed URLs, so when you start writing an URL already in this list, the browser recognises it and you can choose to auto complete it.
  • Internet Explorer History – Internet Explorer keeps a history of the visited web sites.
  • Most Recently Used Documents / Applications
  • and many others…

All of these traces can tell an unexperienced intruder that you visited certain “sensitive” websites. Deleting them is a solution, but an experienced hacker is able to recover them. So they need to be deleted in a secure way. InvisibleSecrets can help you accomplish this by using the Destroy Internet Traces feature.

Note: For more advanced wiping options, we recommend you to try our data wiping solution, east-tec Eraser.

What does it exactly mean that east-tec Eraser cleans activity traces from 300+ programs?

Any program or application you are using can leave sensitive traces on your computer and anyone can see logs with your chat conversations, pictures you have viewed, music you have listed and more. You may remove these traces by selecting the application/program you are using in the Privacy Guard feature and this will help you protect your privacy. If your program does not appear in Privacy Guard, contact us.

Please follow these steps:

  1. Open east-tec Eraser
  2. In the left side panel, click Privacy Guard
  3. Click Advanced
  4. Click Next
  5. You can choose from 300+ applications/sensitive areas that are grouped in categories like Windows, Browsers, Applications, Peer2Peer, News and Email Readers, and Custom
  6. Make your selections and click Next
  7. Click Start
  8. At the end of the wiping process, you may be asked to restart the computer. This is required to complete the process.