Internet privacy is one of the most talked about topics these days. However, without realizing how your computer actually interacts with the web, it is impossible to achieve that desired peace of mind. To easily understand what's going on between your computer and the web when you visit various...
4 min read
Even though government surveillance is nothing new - just think of Caesar's spies in the Roman Empire, or the KGB in the former Soviet Union - the Snowden revelations made us realize how much it was a part of our modern lives, too. The fact that agency staff could witness private moments of our...
6 min read
You probably delete dozens of various files from your PC every day. But have you ever wondered what happens to a file after its deletion? How does "deletion" work in the first place? Does a file just disappear from the system without a trace after deletion? Does it become an empty space?...
2 min read
While it's old news that passwords provide the most important layer of protection for your various business related accounts (emailing, accounting, online banking, PayPal, to name but a few), many small business owners still fail to pay proper attention to crucial details when creating passwords for...
8 min read
When you think of threats that may compromise your encrypted personal, or business files, the last thing that comes to mind is the popular document editors you regularly handle your docs with. However, the working mechanisms of these applications may pose just as much privacy threats to your files...
4 min read
We are very happy to announce that east-tec Eraser 2015, the latest version of our flagship security and privacy utility, is now available from the East-Tec Store. east-tec Eraser has now over 17 years of experience in protecting your sensitive data and privacy, and securely erasing all evidence of...
5 min read