Content:
Evidence Eliminator 6 is reliable old-school software for guaranteed removal of your private information. Corporate website is currently unavailable.
Privacy sounds like a mantra to those who are savvy enough to know what it’s worth in the environment of advanced computer technologies and the Internet. It’s not as simple to duly maintain it as it might appear to the average user. The files you store on your computer, your browsing history and quite a few other things you deem totally routine can reveal a whole lot more facts about your identity and your habits than perhaps even some of the real-world objects closely associated with you.
As privacy has gone virtual to a large extent, it’s high time people started taking care of it ‘the cyber way’. This substantial shift in sensitive data perception that took place concurrently with the onset of overwhelming digital reign is a huge incentive to go ahead and implement new preemptive protection approaches. How about the stuff kept on your hard drive? It’s key to your identity. Talk about your web activity – it’s something almost intimate that you definitely don’t want to be accessed by anyone out there. In this context, it’s a pretty upsetting fact that deleting the above information through methods provided by Windows (e.g. hitting Delete, rendering your Recycle Bin empty or disk formatting) turns out inefficient as it might still be restored through the use of special software such as forensic analysis tools. Now, imagine you get compromised via a backdoor stealthily installed on your PC, or you sell your machine to someone else – either way, you could be owned even though you might be certain you cleared all of the personally identifiable data beforehand.
Evidence Eliminator (EE) tool by the England-based Robin Hood Software company is meant to lend you a helping hand in facing most of these challenges. It completely smashes private files making them irrecoverable if you assign this task, and irreversibly eliminates all traces of online activity, including browsing history, search requests log etc. Even though this all sounds pretty destructive and even reminiscent of something criminal and counter law enforcement, in this case destruction is a probably positive concept playing on your side. While introducing this product here, we can’t help mentioning that the disk sanitation technology integrated in Evidence Eliminator meets the military-level standard applied by the U.S. Department of Defense – a prominent advantage to consider when picking the best privacy software.
Evidence Eliminator is remarkably easy to get and set up. The distributive is available through its official website at www.evidence-eliminator.com – just click on the appropriate link there to initiate the process. Note that the vendor provides a choice between a 30-day trial offer and the commercial copy, the former downloadable through a direct link and the latter being distributed on an SSL-protected page requiring you to indicate that you trust it and accept the corresponding certificate before proceeding.
Now, the product price might appear pretty high to some – it’s $99.95. That’s quite expensive indeed, but first of all, it’s for lifetime cleaning services per PC, and secondly what you pay for is the market leader and the ‘ancestor’ of all privacy tools whose reliability is beyond all doubt.
The time needed for the download to complete depends solely on your Internet connection and usually takes a few minutes. Once the installer is received, it needs to be extracted. Then you simply go through accepting the Licence Agreement, indicating the appropriate location in the system (if the default one isn’t suitable) and defining the configuration of quick launch icons.
Once the software is installed, it’s about time you explored its GUI and the functions. The very first thing that might come to mind is that the user interface seems pretty dated, resembling the old-fashioned applications clearly from in past decade. Indeed, it underwent no significant upgrades for years. That’s apparently not the point though – the program works immaculately. Moreover, it’s still pretty simple and comprehensive in terms of usability. You get the 5 main sets of tools in the upper right-hand part of the interface (‘Safe Shutdown’, ‘Safe Restart’, ‘Quick Mode’, ‘Test Mode and Options’), each one opening up in the central section with multiple subordinate tabs and check fields. Another impression that might occur is that the GUI is excessively stuffed up with miscellaneous functions – well, that’s not quite a drawback perhaps, because they are all mandatory for the product to perform the full scope of declared services.
We spotted no particular performance issues while testing EE. It doesn’t consume system resources out of the ordinary, so PC slowdown or freezes are not something to worry about here. As far as the scanning time is concerned, the ‘Safe Shutdown’ and ‘Safe Restart’ will actually take a while as there’s some in-depth checking going on when you pick those. ‘Quick Mode’ scanning shouldn’t exceed an interval of several minutes to complete. Data processing and analysis with ‘Test Mode’ is a matter of a few minutes as well.
The huge number of features embedded into Evidence Eliminator is undoubtedly an advantage. While we find it complicated to describe every single one of them in this review, and considering the mutual affiliation of many of them, we are going to outline and group together the key ones that are potentially most prominent and frequently used for securing one’s data.
The optional DoD standard data destruction algorithm accommodated by Evidence Eliminator speaks for itself, so the one thing to eliminate from the shortlist of doubts is the product’s dependability in doing what it’s meant to. It’s proven that even the forensic analysis equipment such as EnCase and F.R.E.D. fails in recovering information processed and shredded by Evidence Eliminator. Therefore neither the files that were once saved to your HDD, nor the very ‘eloquent’ browsing history will be accessible, no matter what the third-party’s intensions might be and how serious they take it. While performing its tasks, not only does Evidence Eliminator consume very reasonable computer resources, even more – it can speed up your computer by deleting redundant files that cram up the system. Some of the things that we wish were provided by EE are more browsers supported (apart from IE, Opera and Netscape) and history cleaning capacity for a broader list of chat clients. Nonetheless, despite the above drawbacks and the aggressive scareware-like promotional tactics used in the past, it’s undeniable that the program being reviewed is among the most effective and top-rated ones in this niche, so confidence is definitely in place with Evidence Eliminator running on your machine.
A problem that might occur while you’re using Evidence Eliminator can be resolved in a number of ways inspired by the vendor’s solid support policy. One option is resorting to the online knowledge base and FAQ section on www.evidence-eliminator.com which should address most of the potential complications (please note Evidence Eliminator website is currently unavailable). Contacting the Support Team is doable via a form you can fill out on the same page as the above options. In case you forget the product registration code, you might find the ‘Priority Registration Backup Service’ useful for recovering these data – note that this feature needs to be activated for a fee of $17.95 when you are purchasing the program’s license. Additionally, EE’s user interface has a built-in ‘Help’ button to give you quick access to main support resources.
Whereas Evidence Eliminator has both some drawbacks and virtues, the latter definitely outweigh. A user who cherishes privacy should appreciate all the advantages this product has to offer and get the invaluable sensation of confidence in being the sole manager of their own data. Based on what we have learned about EE’s functionality, it obviously appears to be worth the cost.
Exposure management is changing the way we assess risk, but not everyone is out in… Read More
Introduction: Navigating the SOCaaS Revolution In today's hyperconnected digital landscape, where cyber threats evolve faster… Read More
The Middle East and Asia are fast-growing hubs for both digital innovation and cyber threats,… Read More
In Europe, digital forensics and incident response firms operate within a complex landscape shaped by… Read More
The United States is home to many of the world’s leading digital forensics and incident… Read More
Third-party vendors have transformed operations for many entities. Tasks like payroll, shipping logistics, and IT… Read More