Home | Products | Sitemap | Contact Us
@
EAST Technologies, founded in 1997 by Horatiu Tanescu and Eugen Malita, creates innovative and award-winning privacy and security products and solutions. EAST Technologies is widely known for the East-Tec Eraser security product designed to protect the privacy, identity and confidential information of the computer and Internet user.

EAST Technologies has a customer base that spans individuals, small to medium-sized businesses, the Fortune 500 and governmental agencies. They all trust the quality of EAST Technologies products and enjoy accessing powerful features through intuitive and easy to use interfaces.

@

                

East-Tec Eraser 2012

Keep what you do online or on your computer to yourself and protect your privacy!

Securely erase tracks and secrets. Completely destroy information stored without your knowledge or approval. Clean all your favorite browsers. Clean all your favorite programs.

Overview

Securely erase tracks and secrets.

Completely destroy information stored without your knowledge or approval: Internet history, Web pages and pictures from sites visited on the Internet, unwanted cookies, chatroom conversations, deleted e-mail messages and files, temporary files, the Windows swap file, the Recycle Bin, etc.

Cleans all your favorite browsers.

East-Tec Eraser 2012 cleans Internet Explorer, Mozilla Firefox, Google Chrome, Opera, Safari, etc. and securely deletes all your Internet history, visited web pages and images (Temporary Internet Files or cache), address bar locations, unwanted cookies, and more.

@

Cleans all your favorite programs.

East-Tec Eraser 2012 also cleans records kept by over 200 of the most popular software programs: Adobe Flash Player, Microsoft Word and Office, Skype, Windows Media Player, Yahoo Messenger, Outlook and Outlook Express, µTorrent, Picasa, Adobe Reader, etc.

@

Very secure erasing.

East-Tec Eraser 2012 meets and exceeds government and industry standards for the permanent erasure of digital information, Russian and German security standards, and industry standards like the Bruce Schneier Algorithm or the Peter Gutmann Method.

More Information......

@

@
@
@

East-Tec DisposeSecure

Don't give away sensitive information with the old computers that you or your company resells, donates or removes from operation.

Deleting all files, formatting the hard disk or using FDISK is not enough to stop people to restore information using basic recovery programs.

East-Tec DisposeSecure removes all traces of data from the hard disk by overwriting and destroying every sector and bit of information. East-Tec DisposeSecure meets and exceeds government and industry security standards for the permanent erasure of digital information.

What You Know

  • Your company upgrades to new computers or hard drives
  • Your company trades older computers towards newer systems
  • Your company returns leased computers or laptops
  • Your company reassigns computers to different departments or personnel
  • Your company removes old computers from operation and donates them to charity or to other organizations

What You May Not Know

With each computer or hard drive you may give away:

  • Sensitive or restricted information
  • Business plans, strategies and reports
  • Banking account information, financial statements, credit card numbers
  • Employees information or social security data
  • An entire history of activities that have been performed with the computer

The East-Tec DisposeSecure Solution

East-Tec DisposeSecure removes all traces of information from a hard disk or from selected partitions, without damaging the disk. Every sector and every bit of information is overwritten and destroyed beyond recovery.

In a nutshell, East-Tec DisposeSecure:

  • Securely deletes (wipes) all data on any hard disk or on one or more individual partitions
  • Overwrites IDE & SCSI drives
  • Is Operating System & BIOS independent
  • Offers powerful data wiping verification capabilities
  • Provides full review of the wiping results using the built-in Sector Viewer
  • Generates validation reports that meet US Department of Defense requirements

More Information......

(c)2005-2014 Amazing (HK) Trading Ltd. All Rights Reserved