Overview of the Privacy Protection Pack
If you want to be fully protected both online and offline, erase all your traces, protect yourself against unauthorized data theft with military-strength encryption or work completely invisible to other users and programs, Total Security Pack may be the right solution for you. Everything that you do on your computer or on the Internet leaves traces, but you are the one responsible to protect your confidential and private data in any way possible by permanently deleting it before disposal, selling or reassignment of your hardware, delete all the traces left by hundreds of applications that manipulate your data, encrypt/hide all information you want to be private or encrypt and use advanced steganography methods when you communicate and transfer any other confidential information.
east-tec Eraser protects your personal data and privacy by securely removing all evidence of your computer and Internet activities. It will help you keep your PC clean by deleting impressive amounts of unnecessary data that is stored on your computer with or without your approval, contributing in this way to improving your computer’s performance and security. By using east-tec Eraser in your day to day activity, your data will be safe and your privacy fully protected.
- Cleans all your Internet browsing, search, chats, pictures from visited websites, unwanted cookies.
- Completely destroys information stored without your knowledge or approval
- Cleans history from 300+ programs
- Wipes deleted information or existing files and folders
- Securely erase entire CD/DVD disks, USB Flash Drives, etc.
- Erasing files beyond recovery, exceeds US DOD 5220.22-M standard
east-tec InvisibleSecrets hides your private data into innocent looking files, like pictures, or web pages. It also features: strong encryption algorithms; a locker that allows you to password protect certain applications; a password management solution and a real-random password generator; a shredder that helps you destroy beyond recovery files, folders and internet traces; the ability to create self-decrypting packages; secured password transfer.
- Features Cryptography and Steganography techniques
- Keep viruses and trojans away
- Possibility to create self decrypting packages and an encrypted Internet line
- Combined Password manager, New password generator and Application Locker
- File Shredder