<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
    xmlns:admin="http://webns.net/mvcb/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:content="http://purl.org/rss/1.0/modules/content/">

    <channel>
    
    <title>Total Privacy | Pointstone Software, LLC</title>

    <link>https://www.pointstone.com/support/faq/</link>
    <description></description>
    <dc:language>en-ca</dc:language>
    <dc:creator>steven@pointstone.com</dc:creator>

    <dc:rights>Copyright 2022</dc:rights>
    <admin:generatorAgent rdf:resource="http://www.codeigniter.com/" />

        
        <item>

          <title>Why should I use Total Privacy to protect my privacy?</title>
          <link>https://www.pointstone.com/support/faq/article/why-should-i-use-total-privacy-to-protect-my-privacy</link>
          <guid>https://www.pointstone.com/support/faq/article/why-should-i-use-total-privacy-to-protect-my-privacy</guid>

          <description><![CDATA[
      <h3>You know what you've been doing with your computer, but that doesn't mean that anyone else has to!</h3>Total Privacy is a <span style="font-weight: bold;">safe</span> and <span style="font-weight: bold;">easy-to-use</span> to use <span style="font-weight: bold;">privacy protection tool</span> that stops all those pesky snoopers such as Cookies, history, index.dat, competitors (and even your boss!) from finding the <span style="font-weight: bold;">trail of your computer use</span> that modern internet browsers and many <span style="font-weight: bold;">other programs leave behind</span>. All this can be accomplished with a single click on the mouse, or even automatically!<br><br>With Total Privacy you get total confidence and peace of mind for secure computer use by completely and permanently removing all traces and history of your recent activity. What's more, Total Privacy also helps improve and optimize your computer's performance. By deleting all those unnecessary temporary files, install/uninstall records and by cleaning your internet browser cache, Total Privacy will keep your computer functioning as smoothly and as quickly as it should.<br><br>Total Privacy makes use of the <span style="font-weight: bold;">most advanced washing and shredding methods</span> available today to make sure that your own private business and computer use remains exactly that - private. To get more of the full story on how the power and simplicity of Total Privacy makes it easy for you to foil the intruders who want to check up on your computer activity, please read the rest of the articles.      ]]></description>
      <pubDate>Fri, 26 Aug 2011 15:40:33 +0000</pubDate>
        </item>

        
        
        <item>

          <title>Why should I use a secure shredding method?</title>
          <link>https://www.pointstone.com/support/faq/article/why-use-a-secure-shredding-method-in-total-privacy</link>
          <guid>https://www.pointstone.com/support/faq/article/why-use-a-secure-shredding-method-in-total-privacy</guid>

          <description><![CDATA[
      <h3>Wipe for Maximum Security</h3>Washing and Cleaning your Privacy Items provides a high level of security and should generally be enough to prevent any intruder from breaching your privacy. However, you should note that deleting items alone may not protect your privacy from those who are determined to uncover your personal and sensitive information and are prepared to employ more advanced file recovery methods.<br><br>To prevent this Total Privacy offers the most advanced shredding methods available today to ensure that even if the underlying file system does not physically remove all remnants of your files, their contents are effectively inaccessible.<br><br><span style="font-weight: bold;">No other privacy software offers as many data destruction algorithms as Total Privacy 5.5.</span><br><br>You can choose to shred your files from any of the <span style="font-weight: bold;">most sophisticated data destruction algorithms in existence</span> to be certain that your confidential files, data and information are totally beyond recovery.<br><br><span style="font-weight: bold;">Single Pass</span>: The fastest, but least secured of the data destruction algorithms. Your data is overwritten with zeroes in a single pass.<br><br><span style="font-weight: bold;">Triple Pass</span>: Triple Pass consists of two complimentary overwriting passes followed by a random pass. This is an extra security measure that should prevent any particular recovery program retrieving your data.<br><br><span style="font-weight: bold;">U.S. Standard, DoD 5220.22-M (7 passes)</span>: U.S. Department of Defense specifies a seven pass extended character rotation overwrite algorithm in the DoD 5220.22-M specification. This Total Privacy shredding method conforms to these overwriting standards as well as method 'd' of the Cleaning and Sanitation Matrix.<br><br><span style="font-weight: bold;">U.S. Navy NAVSO P-5239-26 (RLL) (3 passes)</span>: This shredding method conforms to the U.S. Navy standard and uses three passes - one flush, one specifically patterned for RLL and one random.<br><br><span style="font-weight: bold;">U.S. Navy NAVSO P-5239-26 (MFM) (3 passes)</span>: This shredding method conforms to the U.S. Navy standard and uses three passes - one flush, one specifically patterned for MFM and one random.<br><br><span style="font-weight: bold;">U.S. Army AR380-19 (3 passes)</span>: AR380-19 is the data destruction level specified and published by the U.S. Army. This procedure calls for 3 overwriting passes, one random and a character with its compliment.<br><br><span style="font-weight: bold;">German Standard, VSITR (7 passes)</span>: The German standard calls for each sector to be overwritten with three alternating patterns of 00 and FF and in the last pass with AA.<br><br><span style="font-weight: bold;">Russian Standard, GOST P50739-95 (7 passes)</span>: GOST P50739-95 is the purge required by the Russian Federation. This procedure calls for a single pass of zeroes followed by a single pass of random characters.<br><br><span style="font-weight: bold;">Peter Gutman (35 passes)</span>: Peter Gutman suggests methods for ensuring that the recovery of data can be made as difficult as possible for an attacker by offering the 35 overwrite pass algorithm. This algorithm is slow, but extremely reliable.<br><br><span style="font-weight: bold;">Bruce Schneier (7 passes)</span>: The Bruce Schneier method offers a seven pass overwriting algorithm. The first with all ones, the second all with zeroes and then five times with a cryptographically secure pseudo-random sequence.      ]]></description>
      <pubDate>Fri, 26 Aug 2011 15:47:23 +0000</pubDate>
        </item>

        
        
        <item>

          <title>What are Profiles and how do I use them?</title>
          <link>https://www.pointstone.com/support/faq/article/what-are-total-privacy-profiles-and-how-do-i-use-them</link>
          <guid>https://www.pointstone.com/support/faq/article/what-are-total-privacy-profiles-and-how-do-i-use-them</guid>

          <description><![CDATA[
      <h3>Total Flexibility with Total Privacy Profiles…</h3>Clean and wash what you want, when you want with Total Privacy's Profiles.<br><br>With Total Privacy's built-in profiles functionality you have <span style="font-weight: bold;">full control and flexibility over your computer's privacy regime</span>. With Total Privacy it's easy to pick and choose the items that you want to clean and wash (and then schedule them automatically if you wish). For example, you can set up a profile to clean and wash just your Internet Explorer items daily and another profile for all items on your whole system say, on a weekly basis.<br><br>It couldn't be easier to set up your Total Privacy Profiles to clean the right items at the right time. Simply follow the steps below…<br><br>If Total Privacy is not already open, start it from your Windows Start &gt; Programs &gt; Total Privacy menu.<br><br>To create or modify your washing and cleaning profiles, you can either a) click on the Profiles tab as shown in the screenshot at right, or b) click on the Modify Profile quick link.<br><br>Click on the Add button and enter a name to create a new profile.<br><br>Total Privacy offers you total flexibility and control over a multitude of options and items that can be washed, cleaned and optimized. Choose from categories including your Windows System, Internet Browsers, Instant Messaging programs and literally hundreds of 3rd party programs with our Custom Plugins.<br><br><span style="font-weight: bold;">Note:</span> For full details on selecting and setting these options in your profiles, please see the relevant topic under Privacy Items.<br><br>To <span style="font-weight: bold;">Rename an existing Profile</span>, simply select the relevant profile and then click on the Rename button. Enter the new name for this profile and click 'OK'.<br><br>To <span style="font-weight: bold;">Delete an existing Profile</span>, select the relevant profile and then click on the Delete button. Click 'Yes' to confirm that this profile is to be permanently deleted.<br><br><h3>Schedule Profiles to Wash and Clean Automatically (Profile Automation)</h3>With Total Privacy, you can schedule various Profiles to run at either a specific time or upon a specific system event by clicking on the relevant option and then choosing the day/time or event in order to automatically schedule this wash as or if desired.<br><br><span style="font-weight: bold;">Note:</span> Each profile can be scheduled to run at a specified time without the need for Total Privacy to be running.      ]]></description>
      <pubDate>Fri, 26 Aug 2011 15:53:15 +0000</pubDate>
        </item>

        
        
    </channel></rss>