How To Cover Your Tracks On The Internet

Every single time you access a website, you leave tracks. Tracks that others can access. If you don't like the idea, find out what software can help you cover them.

Anti Tracks

Anti Tracks is a complete solution to protect your privacy and enhance your PC performance. With a simple click Anti Tracks securely erase your internet tracks, computer activities and programs history information stored in many hidden files on your computer. Anti Tracks support Internet Explorer, AOL, Netscape/Mozilla and Opera browsers. It also include more than 85 free plug-ins to extend erasing features to support popular programs such as ACDSee, Acrobat Reader, KaZaA, PowerDVD, WinZip, iMesh, Winamp and much more. Also you can easily schedule erasing tasks at specific time intervals or at Windows stat-up/ shutdown. To ensure maximum privacy protection Anti Tracks implements the US Department of Defense DOD 5220.22-M, Gutmann and NSA secure erasing methods, making any erased files unrecoverable even when using advanced recovery tools.

Free Download: http://www.deprice.com/antitracks.htm

East-Tec Eraser

East-Tec Eraser goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer.

Completely destroy information stored without your knowledge or approval: Internet history, Web pages and pictures from sites visited on the Internet, unwanted cookies, chatroom conversations, deleted e-mail messages, temporary files, the Windows swap file, the Recycle Bin, previously deleted files, valuable corporate trade secrets, business plans, personal files, photos or confidential letters, etc. East-Tec Eraser 2005 offers full support for popular browsers (Internet Explorer, Netscape Navigator, America Online, MSN Explorer, Opera), for Peer2Peer applications (Kazaa, Kazaa Lite, iMesh, Napster, Morpheus, Direct Connect, Limewire, Shareaza, etc.), and for other popular programs such as Windows Media Player, RealPlayer, Yahoo Messenger, ICQ, etc. Eraser has an intuitive interface and wizards that guide you through all the necessary steps needed to protect your privacy and sensitive information. Other features include support for custom privacy needs, user-defined erasure methods, command-line parameters, integration with Windows Explorer, and password protection.

Free Download: http://www.deprice.com/eastteceraserstandard.htm

Ghostsurf Platinum

GhostSurf Platinum ensures your safety online by providing an anonymous, encrypted Internet connection, and GhostSurf stops spyware, eliminates ads and erases your tracks. GhostSurf lets you customize your privacy level in real-time to suit your surfing needs. A variety of options enable you to block personal information, mask your IP address, route your data through anonymous hubs and even encrypt your Internet connection. GhostSurf's Privacy Control Center allows you to see and block every piece of data that your computer emits over the Internet, preventing even your Internet Service Provider (ISP) from creating a profile on you.

Free Download: http://www.deprice.com/ghostsurfplatinum.htm

CyberScrub Pro

Sensitive data can easily fall into the wrong hands. And because Windows is not capable of deleting information beyond recovery, you are at risk!

Passwords, financial documents, even those "about last night" e-mails are fair game for the IT professional, computer technician or hacker.

CyberScrub allows you to purge, wipe and erase data with methods that far exceed US Department of Defense standards for file deletion (DOD 5220.22).

CyberScrub Erases:

* Selected Files/Folders beyond recovery

* Cookies

* Cache (Temporary Internet Files)

* All traces of Peer2Peer activity (16 popular apps)

* Website History

* Chat Room Conversations, Instant Messages

* Pictures viewed

* Email & "previously deleted files"

* Recycle Bin, Recent Documents

* Swap and other "locked" files that contain sensitive data

* Peer2Peer Applications activity

Free Download: http://www.deprice.com/cyberscrubprofessional.htm

John Deprice owns and operates http://www.deprice.com

In The News:


pen paper and inkwell


cat break through


Arming Yourself Against Spyware

While clicking from site to site on the internet you... Read More

Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable... Read More

Internet Shopping - How Safe Is It?

Millions of people make purchases online, but many people are... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs... Read More

Spyware Removal

Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More

Another Fine Mess!

I'm in the Anti-Spyware business, and I'm doing a lot... Read More

Avoid Internet Theft, Fraud and Phishing

Since its birth, the Internet has grown and expanded to... Read More

Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

Is your enterprise following the rules?The bulk of financial information... Read More

Spyware Programs Are Out To Get You!

The average computer is packed with hidden software that can... Read More

Top Five Spyware Fighting Tips

Spyware and adware are becoming major problems for online surfers... Read More

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

Phishing ? Its Signs and Your Options

Phishing is the act of some individual sending an email... Read More

Internet Scams: Dont be a Victim

As the number of people using the Internet as an... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike... Read More

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at... Read More

Corporate Security for Your Home Business

The words Corporate Security may conjure up images of a... Read More

Is Your Music Player Spying On You?

In today's times spyware is a very serious issue and... Read More

The Never Ending Spyware Story

It's been with us since 1993, it's gotten more intrusive,... Read More

8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft

Ebay is a great site and is used by many... Read More

Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type... Read More

A New Low

A new variation of the Nigerian Scam theme ... Read More

The Attack of the Advertiser - Spy Mother Spy

The menacing campaigns that drive the corporate spyware and adware... Read More

Be Alert! Others Can Catch Your Money Easily!

So called phishers try to catch the information about the... Read More

Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very... Read More

Secure Your PC From Hackers, Viruses, and Trojans

Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More

Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

Never before with Instant Messaging (IM) has a more vital... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Preventing Online Identity Theft

Identity theft is one of the most common criminal acts... Read More

Viruses and Worms: The Problems and Their Solutions

History and BackgroundThe virus was one of the first ever... Read More

Free Ways to Tackle Threats to Your Computer

Protect Your PCHaving problems with your pc? Do your kids,... Read More