As we all know, deleting files/folders by pressing SHIFT+DELETE or emptying Trash doesn’t mean that we permanently deleted them. The files/folders will reside somewhere in our computer. Data thieves or low enforcement may use data recovery programs to retrieve all our personal and sensitive data’s if they want them. There are so many methods and […]
I2P is an anonymity network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. All traffic is encrypted end to end. Many applications are available that interface with I2P, including mail, […]
BleachBit quickly frees disk space, removes hidden junk, and easily guards your privacy. Erase cache, delete cookies, clear Internet history, remove unused localizations, shred logs, and delete temporary files. Designed for Linux and Windows systems, it wipes clean 70 applications including Firefox, Internet Explorer, Flash, Google Chrome, Opera, Safari, Adobe Reader, APT, and more.
611Posted February 21, 2010 by M. Zinoune
Donate to Unixmen
We need your assistance to stay live and contribute more articles on Unix.