Permanently erase internet activity, application usage history, and system traces to protect privacy, prevent data leakage, and free up disk space across network computers.
Digital traces are records of your computer activity automatically stored by applications and the operating system. These include browsing history, downloaded files lists, recent documents accessed, application usage logs, temporary cache files, cookies, form data, search queries, and system event logs.
Connect to your domain and navigate to the computer where you want to erase traces. You can select one computer or multiple computers for batch trace erasure.
Selection Options:
With computers selected, click the Erase Traces button in the Home ribbon. The Trace Erasure dialog appears.
Interface Elements:
Click Settings to customize which trace categories to scan and erase:
✓ Select All For:
∂ Selective For:
Click Scan to analyze the computer and discover traces matching your configured categories. Scanning duration varies based on system activity and number of applications installed.
Typical Duration: 30 seconds to 3 minutes depending on trace volume and system speed
After scanning completes, results display organized by category showing the number and types of traces found. Review carefully to ensure you want to erase these items.
Click Erase Traces → Confirm in the dialog → Wait for completion. Progress bar shows erasure status.
Important Pre-Erasure Steps
Why? Open applications lock trace files preventing erasure. Items may show as "skipped" if applications are running.
D-Secure can erase internet traces from all major web browsers installed on the target computer. Each browser stores traces independently in different locations, requiring specialized cleanup for each.
Share similar data structure, comprehensive cleanup
Complete record of visited websites with URLs, titles, visit timestamps, and visit frequency counters.
Privacy Risk: Reveals all websites visited, including sensitive browsing patterns
List of all downloaded files with original URLs, download dates, file paths, and file sizes.
Privacy Risk: Shows what files were downloaded and from where
Tracking cookies, session cookies, authentication tokens, website preferences, and local storage data.
Privacy Risk: Can contain login sessions, tracking data, personal preferences
Downloaded website resources stored locally for faster page loading (images, CSS, JavaScript, media files).
Privacy Risk: Cache can reveal visited sites; uses significant disk space
Passwords stored in browser password managers for automatic login.
⚠️ Caution: Only erase if user has alternative password storage; cannot be recovered
Saved form entries including names, addresses, phone numbers, email addresses, and other frequently entered data.
Privacy Risk: Contains personal information that autofills on websites
Search queries entered in address bar and search engines with timestamps.
Privacy Risk: Reveals interests, research topics, and search patterns
Desktop applications create various traces recording user activity, recent file access, search history, and usage patterns. These traces can expose sensitive business information and personal activities.
Email applications store extensive traces of communication activity including recent contacts, search queries, and temporary file caches.
Supported Applications:
Erasable Traces:
Note: Actual emails in mailboxes are NOT deleted—only usage traces
Instant messaging and collaboration tools store conversation logs, file transfer histories, and contact interaction records.
Covered Applications:
Office applications maintain "Recent Documents" lists showing recently opened Word, Excel, PowerPoint, and Access files with full file paths and access timestamps.
Privacy Impact: Clearing these lists prevents others from seeing what sensitive documents you've been working on, though the actual files remain intact.
Peer-to-peer applications record download histories, shared file lists, and search queries that can reveal usage patterns.
Applications Supported:
Windows operating system creates numerous traces during normal operation that accumulate over time and can reveal computer usage patterns, installed software, file operations performed, and system events.
Files moved to Recycle Bin remain on disk until manually emptied. D-Secure permanently erases all Recycle Bin contents across all drives.
Windows and applications create temporary files in multiple locations that often aren't automatically cleaned up.
Cleaned Locations:
C:\Windows\Temp - System temporary files%UserProfile%\AppData\Local\Temp - User temporary files%Temp% - Environment variable temp folderWindows Error Reporting creates memory dump files when applications crash. These can contain sensitive data from RAM at crash time.
Application, Security, and System event logs recording system activities, login attempts, errors, and warnings.
⚠️ Caution When Erasing Event Logs:
Windows maintains various MRU lists throughout the system showing recently accessed items.
MRU Types Cleared:
Cleans downloaded update files, installation logs, and update cache to free disk space (typically several GB).