Monday, July 02, 2007

Erasing 'Shadow Copies' Created in Vista

 
July 2, 2007  
TechNewsletters Alert
   
  Your Update from the Directory for IT Newsletters
131,342 Subscribers  
 

Erasing 'Shadow Copies' Created in Vista

Have you switched to the Microsoft Vista operating system yet? I did and days later went back to XP. Why?

I liked the customization features in Vista but there was a compatibility issue with some of the software programs running on my PC. I also learned that Vista automatically stores copies (called 'shadow copies') of all my computer activity. I was not able to remove these from my PC. I decided to wait for announcements of new software that could successfully run on Vista and also remove the shadow copies. EAST Technologies released their new Vista compatible East-Tec Eraser 2007 in May, 2007.

"Many Vista users are unaware of how the new operating system threatens their privacy. As a default selection, the new shadow copies are automatically turned on when Vista is installed. Without your knowledge or approval, your computer is storing copies of your computer activities, as well as information about your Internet surfing. Erasing this information doesn't ensure your privacy because the shadow copies remain intact. East-Tec Eraser 2007, however, permanently removes both the original and shadow copies, and protects your privacy. Used regularly, East-Tec Eraser 2007 can prevent identity theft, as well as bring you peace of mind by ensuring that your private information remains private." May 2007 EAST Technologies Press Room

East-Tec Eraser 2007, in my opinion, is an excellent privacy tool which is designed to destroy all evidence of online activity and destroy any data or files you want permanently removed from your PC. The thing that caught my attention is that East-Tec Eraser exceeds U.S. Department of Defense standards for the permanent erasure of digital information. Can't get much better than that…

Not convinced? Download a 15-day fully functional evaluation version of East-Tec Eraser 2007 here.

Deb Alloway
Editor

 

"Unplanned Work: The Silent Killer"

You can't see it. You can't smell it. But it can be deadly, and may be in your IT organizations' basement, silently killing your company. It's called unplanned work, and CIOs and CISOs are losing jobs because of it.

This paper reveals dangers and provides helpful scenarios and useful information to help you maximize effectiveness in your IT organization.

Request a copy here >>>

 

"Minimizing Information Risks for Business Messaging"

Are you interested in learning more about the evolving threat environment as well as the legal, financial and compliance issues enterprise companies now face in trying to protect their business messaging systems?

Download this Symantec Webcast with guest speakers, Chris Christiansen and Mark Levitt of IDC.

Request a copy here >>>

 

Major Publishers

Cert Mag CERTguide.com CertTimes.com CIO Magazine
Computerworld ePro Magazine IBM iEntry
Internet World InternetVIZ iSeries Network ISPworld.com
ITtoolbox ITworld SiteProNews SunBelt Software
Support Alert TechTarget ITproPortal VertMarkets IT
Windows ITpro Windows Guide ProgramFiles ZATZ Publishing
 

You subscribed to receive this newsletter as networking.world@gmail.com.
You were sent this offer because you previously registered at TechNewsletters.com. We take your privacy very seriously. If you no longer wish to receive this newsletter click here. Please be advised that this may restrict your ability to use the TechNewsletters.com website. If you have further questions or concerns, contact us.

East-Tec

No comments: