How To Cover Your Tracks On The Internet

By: David D. Deprice

Every single time you access a website, you leave tracks. Tracksthat others can access. If you don't like the idea, find outwhat software can help you cover them.

Anti Tracks

Anti Tracks is a complete solution to protect your privacy andenhance your PC performance. With a simple click Anti Trackssecurely erase your internet tracks, computer activities andprograms history information stored in many hidden files on yourcomputer. Anti Tracks support Internet Explorer, AOL,Netscape/Mozilla and Opera browsers. It also include more than85 free plug-ins to extend erasing features to support popularprograms such as ACDSee, Acrobat Reader, KaZaA, PowerDVD,WinZip, iMesh, Winamp and much more. Also you can easilyschedule erasing tasks at specific time intervals or at Windowsstat-up/ shutdown. To ensure maximum privacy protection AntiTracks implements the US Department of Defense DOD 5220.22-M,Gutmann and NSA secure erasing methods, making any erased filesunrecoverable even when using advanced recovery tools.

Free Download: http://www.deprice.com/antitracks.htm

East-Tec Eraser

East-Tec Eraser goes beyond U.S. Department of Defense standardsfor the permanent erasure of digital information and easilyremoves every trace of sensitive data from your computer.

Completely destroy information stored without your knowledge orapproval: Internet history, Web pages and pictures from sitesvisited on the Internet, unwanted cookies, chatroomconversations, deleted e-mail messages, temporary files, theWindows swap file, the Recycle Bin, previously deleted files,valuable corporate trade secrets, business plans, personalfiles, photos or confidential letters, etc. East-Tec Eraser 2005offers full support for popular browsers (Internet Explorer,Netscape Navigator, America Online, MSN Explorer, Opera), forPeer2Peer applications (Kazaa, Kazaa Lite, iMesh, Napster,Morpheus, Direct Connect, Limewire, Shareaza, etc.), and forother popular programs such as Windows Media Player, RealPlayer,Yahoo Messenger, ICQ, etc. Eraser has an intuitive interface andwizards that guide you through all the necessary steps needed toprotect your privacy and sensitive information. Other featuresinclude support for custom privacy needs, user-defined erasuremethods, command-line parameters, integration with WindowsExplorer, and password protection.

Free Download: http://www.deprice.com/eastteceraserstandard.htm

Ghostsurf Platinum

GhostSurf Platinum ensures your safety online by providing ananonymous, encrypted Internet connection, and GhostSurf stopsspyware, eliminates ads and erases your tracks. GhostSurf letsyou customize your privacy level in real-time to suit yoursurfing needs. A variety of options enable you to block personalinformation, mask your IP address, route your data throughanonymous hubs and even encrypt your Internet connection.GhostSurf's Privacy Control Center allows you to see and blockevery piece of data that your computer emits over the Internet,preventing even your Internet Service Provider (ISP) fromcreating a profile on you.

Free Download: http://www.deprice.com/ghostsurfplatinum.htm

CyberScrub Pro

Sensitive data can easily fall into the wrong hands. And becauseWindows is not capable of deleting information beyond recovery,you are at risk!

Passwords, financial documents, even those "about last night"e-mails are fair game for the IT professional, computertechnician or hacker.

CyberScrub allows you to purge, wipe and erase data with methodsthat far exceed US Department of Defense standards for filedeletion (DOD 5220.22).

CyberScrub Erases:

* Selected Files/Folders beyond recovery * Cookies * Cache(Temporary Internet Files) * All traces of Peer2Peer activity(16 popular apps) * Website History * Chat Room Conversations,Instant Messages * Pictures viewed * Email & "previously deletedfiles" * Recycle Bin, Recent Documents * Swap and other "locked"files that contain sensitive data * Peer2Peer Applicationsactivity

Free Download: http://www.deprice.com/cyberscrubprofessional.htm

Computers and The Internet
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 

» More on Computers and The Internet
 



Share this article :
Click to see more related articles