East-Tec Eraser 2014 ensures identity protection with immaculate efficiency by irreversibly deleting sensitive material.
The tangible shift in computing which is steadily acquiring the properties of an overwhelming tendency is personal data protection. One’s real-world identity and its cyber counterpart are now merged to the extent where the former can be stolen by retrieving details of the latter. What is it that can allow criminals to learn your personally identifiable data such as habits, commercial preferences, private life details, credit card history, business occupation etc. – and put it all together to form a complete digital derivative of you as a person? This can all be exposed, directly or implicitly, by the contents of your computer’s hard drive.
The current relevance of privacy software is therefore perfectly well understood. Our today’s subject is one of such utilities, called East-Tec Eraser 2014 by the Romania based ‘East Technologies’ company. Without going too far ahead, we must admit it copes commendably with the targeted tasks addressing complete erasure of data. On the one hand, this product relieves the operating system from being encumbered by unnecessary files, thus contributing to substantial computer productivity improvement. On the other, more importantly, the application removes sensitive objects beyond subsequent recovery, no matter how smart and cutting-edge the tools are that identity thieves might apply. This software is smart enough to figure out which files to target – you run a scan, and get the complete list of those. By the way, those of you who are certain that it suffices to use the Windows removal options might get upset to learn that all they do is keep you from accessing those files, whereas they are still physically there.
The recognition of East-Tec Eraser is definitely on the rise: it got awards from the renowned and unbiased software evaluation portals and magazines such as Softpedia (Five Start Excellent Review), CNET (Editor’s Rating: Outstanding), Computer Shopper, PC Advisor and a number of others. Some more facts: this product has been around since 1998; it was used by the U.S. Marines within an experiment on information protection enhancement conducted by DARPA (Defense Advanced Research Projects Agency) in 2001. Well, quite intriguing, isn’t it? Let’s now get down to some specifics and see what East-Tech Eraser 2014 has got in store for the average customer.
File Systems Supported:
The distributive for East-Tech Eraser 2014 goes in two versions: commercial and the 15-day free trial. Installation and setup went smooth, trouble-free and surprisingly fast. There’s no reinventing the wheel here: the procedure implies downloading the 5.7 MB installer file and then clicking through the regular things such as the License Agreement acceptance and selecting the destination location. It took us some 15 seconds to complete the install – actually, the download of the stub installer was even a little more time-consuming than that. That’s pretty amazing in terms of the speed and ease. The welcome dialog box that pops up right after the setup gives a brief preview of the key features.
CPU usage was not significantly affected during the test – in fact, it never exceeded 85% on our lab machine which has pretty average hardware. Even though the application does inform the user of the possible appearance of a ‘Low Disk Space’ warning during the ‘Erase Deleted Data’ task, we didn’t get one. Moreover, East-Tec Eraser provides the option of setting the custom allocation of system resources: Low, Normal (default), High and Realtime – thus giving it at the user’s discretion to determine the system productivity impact. In regards to the program’s speediness, it’s generally great as far as the scanning goes. However, the actual removal takes a while even when the app works in the Normal mode: wiping the 33 GB free (unused) disk space on C drive was a 20-minute-long procedure. Erasing deleted data is a yet more time consuming routine. Of course it all varies depending on the data destruction algorithm being applied. The good thing is that the application does notify you of the possibly long wait time, so it’s all pretty transparent. In any case, the wait is worth it as the thoroughness is splendid.
The graphical user interface makes this software easily understandable and comprehensive. It has 5 main buttons in the left-hand part (Privacy Guard, Erase Deleted Data, Add Files and Folders, Erase Files and Folders, and the current security status of the system); and some quick access buttons on the top for the scheduler, erasing the contents of the Recycle Bin, deleted Email and entire drive formatting. The grading scale for customizable security level is available in the bottom part of the GUI – the default one is ‘Stop Software Recovery Tools’.
The overall impression from usability is close to outstanding. The long wait time for thorough data wiping did seem a bit discouraging, but, like we said, it’s worth the salt when it comes to identity protection.
Sufficiency is probably the most precise term to describe the feature set built into East-Tec Eraser 2014. The product appears to be balanced in that it gives you basically all you need to permanently erase both sensitive material and unnecessary junk cramming up the system. Once again, the features are not many, but they are enough.
Here is the list of capabilities you get if you end up choosing East-Tech Eraser as your privacy software:
It’s clear that the entirety of features privacy software is supposed to supply is qualitatively and fully delivered by this product.
The metrics we used for measuring the degree of East-Tec Eraser’s reliability are pretty unambiguous: data deletion techniques employed; the scope of tasks and activity areas covered; and the privacy protection results you get at the end of the day.
In terms of the data erasing effectiveness, the product accommodates a set of ‘Wipe Methods’, i.e. sanitize algorithms: Quick Wiping, Stop Software Recovery Tools, AFSSI-5020, NAVSO P-5239-26, Russian GOST P50739-95, German VSITR, Stop Hardware Recovery (DoD and Gutman), Bruce Schneier’s algorithm, and 3+7+3 Beyond DoD Standards. From where we sit, this appears to be an exhaustive list of algos for the average user to not feel short of identity protection. Of course the more advanced wipe methods imply longer wait times if picked, but here you have a choice depending on your needs, which is great news. Actually, unless you are a secret agent or a government official, the Stop Software Recovery Tools algorithm should do the trick.
There are over 400 sensitive areas and applications that East-Tec Eraser 2014 is now capable of permanently removing private data from. Just a few of those are latest versions of Mozilla Firefox, Internet Explorer, Google Chrome, America Online, MSN Explorer, Netscape Navigator, Safari, Opera, Yahoo / MSN / AOL Messengers, ICQ, Outlook, Limewire, Windows Media Player, RealPlayer, Winamp, Google Toolbar, MS Office, avast! Free Antivirus, Norton 360, ZoneAlarm, CorelDRAW Graphics Suite X6, TeamViewer, WinRar, WinZip and a lot more.
The output of East-Tec Eraser’s data processing activity is simple – everything personally identifiable vanishes for good, plus the PC starts running faster.
Contacting the East Technologies support staff is not an issue. Here you have, once again, a number of options to choose from: telephone support for United States and internationally; Email support via email@example.com; and a ticket you can submit through www.east-tec.com/support/, with a detailed description of the problem you encountered. In case your inquiry is more trivial, click ‘Help’ on top of the product’s interface, then hit ‘Help topics’ or ‘Support’ to open up the interactive self-help window and look up the problem in there. We didn’t find an online chat option though. Still, considering the responsiveness of their team, you shouldn’t run into complications seeking help.