If you want to listen to the full audio testimonial, click the play button below:
You can also read the full transcript of the audio testimonial.
Let me introduce Michael Hawes, a writer, podcaster, music creator, editor of Artemisia and a longtime user of east-tec Eraser, who firmly believes that using a computer without our software is one of the most irresponsible things one can do in today's tech orientated world.
But how did it all start?
When Michael purchased his first computer in 2002, as a curious and new computer user, he did some research on PCs and their security. Later, he launched a website, on which he published reviews of games, utilities and various security software. His computer was also shared with his sons, who used the machine to play games, do some emailing and peer-to-peer downloading.
One day Michael noticed some unusual behavior regarding the computer's performance. He suspected that it was a Remote Access Trojan virus. Unfortunately, he was right and to prove to his skeptical sons that viruses are not rare at all, he did an imaginative trick. As he wanted to see if his screen was visible to the attacker in real-time or not, he opened the text-editor and typed in some notes. Those notes contained commands to move the cursor in a particular way. His instructions were fulfilled and the attacker immediately moved his cursor in the required directions. This verified that the hacker could see his screen. Because it took some time for him to abolish that virus, he was convinced that he should pay more attention to cyber-security. After that incident, his website became mainly focused on security and that's when he got to know east-tec Eraser.
Michael's opinion on east-tec Eraser and the East-Tec team
According to him, "east-tec Eraser is a wonderful program and in my book, an essential program for all but the most uninformed of users." For him, the software is an easy-to-use, effective tool, which could greatly decrease the rate of cyber-crime attacks, if more people were using it. In his experience, East-Tec developers have always been one step ahead of their customers. Not once did he have to ask for a new feature. But as the nature of software development requires advancement, the East-Tec team had to constantly improve its software as well. The developers have managed to achieve these improvements in a way that the Eraser remains free of useless adornments, but full of fresh features to this day.
The features Michael uses the most are Privacy Guard and Erase Deleted Data. As far as he knows Privacy Guard is the last thing his sons do after every session at their computers, as a matter of habit since he first got the software in 2003. The Privacy Guard erases sensitive data from your Windows and Internet activities. Windows and Internet sites track your actions and habits and gather revealing traces about everything you do online and offline. The Privacy Guard doesn't erase files and data you have saved or that are needed for normal operation.
Due to his website and his reviews of products over the years, he has had numerous customer care experiences with many different companies. From the beginning, the East-Tec staff has always been remarkable, when compared to others. Quoting his words, the staff is "human, well-informed, professional, patient and possessing integrity, honour and technical ability."
But why do we need to secure our computers properly?
Over time, Michael's computer has become his banker, his archive for manuscripts, poetry, reviews, essays, music, his photo album and his telephone. After connecting a printer and a scanner to his PC, it also became the machine with which he makes and fills out official forms.
To summarize, his most sensitive information is stored on his computer. According to him, not securing and erasing this data properly is a very careless thing to do. Just to mention some of his examples, it is like selling your personal desk without removing your papers first or placing your wallet on a public bar, leaving the building and then coming back later to pick it up.
We at East-Tec feel proud to have such customers as Michael Hawes. For almost two decades, east-tec Eraser has been helping him on a daily basis without any problems, moreover, he is especially happy to experience the personal connection behind the product that East-Tec is offering. For him, that is as valuable and useful as the product itself.
Full transcript of the audio testimonial
Hi folks, this is Michael Haas, host of Bobcat Logic right between your ears and author of Stochastic Scintille talking to you from Lillouette, British Columbia, Canada.
I want to share with you my own experiences as an east-tec eraser user for many years. When I first purchased East-Tec, I was sharing my first-ever computer with two of my sons. They gamed, mailed, skyped, and did a lot of p two p downloading. I researched computers in general and security in particular. Soon, I began a website and started doing my own banking and other business on the computer. In time, I began reviewing software on my website. Early on, I noticed strange behavior on my computer. I found out we'd been invaded by a remote access trojan. I opened a blank text file on my desktop and I wrote a note to the attacker with a request to move my mouse in a certain way if they could see my note in real time. The interloper complied, and I was thus able to prove to my two doubting sons that such things existed and that security was no small matter. I worked hard to eradicate that trojan. As our world moved further into cyberspace, I sought a way to securely delete Windows tracks as a matter of safety, privacy, and maintenance. The small hard drives in those days quickly filled up with those security-compromising leftovers.
My search led me to east-tec Eraser. That was back in 2003 when I purchased the program. The features I use the most are privacy guard and erase deleted data. My two sons grew up with east-tec eraser, and as far as I know, privacy Guard is the last thing they do after every session at their computers as a matter of habit since then. My computer is my banker, manuscript archive, music archive, podcast archive, photo album, and telecommunicator. In tandem with my scanner and printer, it fills out forms for everything from licenses, dental, vision, medical, real estate transactions, retirement papers, wills, and taxes. Information is power, and to treat personal information in a careless way is irresponsible. To recycle a computer without securely deleting the hard drives would be like selling your personal desk without removing your papers first, or walking into a Starbucks, plonking down your wallet on the bar, telling all those assembled that you'll be back sometime later to get it, and then walking out an ignorant invitation to criminals to invent brand new crimes.
The core issue is, was, and will be privacy. It's that simple. I would attach the same risk value to all information or data on my computer. East-Tec Eraser is a wonderful and an essential program. More people using this program would put a measurable dent in certain types of cybercrime. The software evolves in a logical, useful manner than a home user can easily keep abreast of. I find that each new version always addresses new needs without my having to lobby for those features. That is key in today's fast world. The staff at East-Tec I have always found to be human, well-informed, professional, patient, possessing integrity and a technical ability beyond what I normally encounter. Rare, old-fashioned business principles that I applaud. If you make something, craft it well and improve it if needs be. Once it is as good as it can get at what it was designed to do, leave it alone, and don't fest-tune it with useless glitter. Any person will be proud to own what another person was proud to build.
I felt good about buying east-tec Eraser in 2003, and I feel good about it today. From 2003 to 2014, I only had two other pieces of software besides east-tec Eraser that met my criteria. By 2019, east-tec Eraser was standing alone. I think of east-tec Eraser as a security utility, so I would classify it as a sectility, if I may coin the term. I would not add more to a tool than is necessary to perform the original function it was designed for. Of course, a tool must stay abreast of changes, but adaptations to make a hammer drive differently shaped nails should not morph the hammer into a paintbrush. Eraser aligns with this principle in my experience.
I would heartily recommend east-tec Eraser to anyone. Here then listener is my official review, and it is my third such review since 2003 of this fine product. It is not often that I write reviews of software anymore these days. I got my first computer in 2002. I created a website and tested a wide variety of games, utilities, and security products. Security became my main focus after having a remote access trojan invade the desktop I shared with my sons. Many dollars and hours were consumed by using, testing, and beta testing. I began a list of which programs worked properly with the XP platform I had. They also had to be well-coded, fully supported, and built by folks who had pride in their work and brand. The list evolved and I noticed disturbing trends. One such trend was the devolution of good software into frankencoated cluster works of digital misery. A further insult was sloppy install uninstall coding that left users with no choice but to jettison the dros and move on.
After my list dwindled down to a mere handful across all categories, I decided to re-review the stalwarts. Those who stayed the course held their mud and adhered to worthy principles. Only one program shined through all those 17 years to present. That program is east-tec Eraser. The people of this company have never disappointed me. They followed a wise course by separating their various utilities. The result is software that evolves by adding any needed functionality while strictly avoiding superfluity. The Romanian coders earned my great respect over the years by being among the technical best in the world today. Their self-imposed standards of craftsmanship count as much as their intelligence to this lifetime user. The information on their website can adequately explain the importance of cybersecurity. I personally would not use a computer without east-tec eraser on board. As I said when I last reviewed this fine product, east-tec Eraser will still be around after you break your next five computers.