SlideShare a Scribd company logo
1 of 19
A
SEMINAR
ON
INTERNET COOKIES
Presented by:
User details here
CONTENTS
 Introduction.
 Why are these files called “ Cookies “ ?
 Cookies Type.?
 Which best describes an internet cookie?
 Whats the point?
 Mmmm!! Cookies.
 The Problem with Cookies.
 Introduction to “Doubleclick Inc.”
 Breakdown of Cookie Parameters ?
 Are cookies Dangerous to my computer?
 Can I delete Cookies?
 Conclusion
WHAT ARE COOKIES ?
A cookie is a piece of text that a Web server can
store on a user's hard disk. Cookies allow a
Web site to store information on a user's
machine and later retrieve it.
WHY ARE THESE FILES CALLED “ COOKIES “
?
A cookie is a well-known computer science term
that is used when describing an opaque piece of
data held by an System.
TYPE OF COOKIES
 Persistent Cookie
 Non-Persistent Cookie
PERSISTENT COOKIE
 Persistent cookies help websites remember your
information and settings when you visit them in the
future.
 These remain on your hard drive until you erase
them or they expire. How long a cookie remains on
your browser depends on how long the visited
website has programmed the cookie to last.
NON-PERSISTENT/SESSION COOKIE
 These are temporary and are erased when you
close your browser at the end of your surfing
session. The next time you visit that particular site it
will not recognise you and will treat you as a
completely new visitor as there is nothing in your
browser to let the site know that you have visited
before.
KNOWING THE BASICS:
 In the Business Week survey in 2000, only 40% of
the randomly selected knew what an Internet
cookie was.
WHAT’S THE POINT?
 Sites use cookies to…
 Track number of visitors
 First timers vs. returning visitors
 How often the user visits the site.
WHERE ARE COOKIES?
 You can find cookie files on your hard drive, your “C”
drive.
MMMM! COOKIES…
 They remember usernames for various sites that
require log-in
 Also have the option to remember your passwords for
you!
 They allow you to shop as you browse via online
shopping carts!
THE PROBLEMS WITH COOKIES
 Multiple users on the same hard drive
 Family computer, internet cafes
 Credit car7d fraud
 Easily erasable
 Throw off site’s total counts
 Can contain spyware!
 Can pass on personal information without user’s
permission (email address, phone number, credit card
number, etc.)
DOUBLECLICK INC.
 Developed cookie program that can follow and save
user internet browsing.
 Such cookie files are saved into text profiles.
 Profiles can be extensive and detailed.
 Serves over 200 billion ads per month.
BENEFITS OF DOUBLECLICK:
 Advertisers!
 Allows internet advertisers to place their ads on sites or
pages which will reach their target audiences
BREAKDOWN OF
COOKIE
PARAMETERS
As we have just seen, a cookie contains more than simply a name and
a value. In fact, a cookie has 6 parameters that can be passed to it:
 The name of the cookie,
 The value of the cookie,
 The expiration date of the cookie,
 The path the cookie is valid for,
 The domain the cookie is valid for,
 The need for a secure connection to exist to use the cookie.
Two of these are mandatory (its name and its value). The other four
can be set manually or automatically.
ARE COOKIES DANGEROUS TO MY
COMPUTER?
Nooooo…..….. A cookie is a
simple piece of text. It is not a program.
It cannot be used as a Virus.Your browser
(not a programmer) can save cookie values to
your hard disk if it needs to, but that is the
limit of the effect on your system.
CAN I DELETE COOKIES?
Yes. Whether you use Internet Explorer or Netscape, your
cookies are saved to a simple text file that you can delete as you
please.
In order to do this properly, remember to close your browser first.
This is because all your cookies are held in memory until you close
your browser. So, if you delete the file with your browser open, it will
make a new file when you close it, and your cookies will be back.
Remember that deleting your cookie file entirely will cause you to
"start from scratch" with every web site you usually visit. So, it may be
preferable to open the cookies.txt file and remove only the entries you
don't like, or go to the cookies folder and delete the files matching
servers you don't want.
Cookies are user friendly.Cookies are not
harmful for your system. They just store your
data/information,you can privately access later.
Cookies remains alive in your system with your
information as long as it’s expiry time or may die
after your browser close.
CONCLUSION
Internet cookies

More Related Content

What's hot

Introduction to Web Terminology
Introduction to Web TerminologyIntroduction to Web Terminology
Introduction to Web TerminologyNicole C. Engard
 
Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS)Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS)Daniel Tumser
 
PHP COOKIES AND SESSIONS
PHP COOKIES AND SESSIONSPHP COOKIES AND SESSIONS
PHP COOKIES AND SESSIONSDegu8
 
Web Scraping using Python | Web Screen Scraping
Web Scraping using Python | Web Screen ScrapingWeb Scraping using Python | Web Screen Scraping
Web Scraping using Python | Web Screen ScrapingCynthiaCruz55
 
Introduction to HTML and CSS
Introduction to HTML and CSSIntroduction to HTML and CSS
Introduction to HTML and CSSMario Hernandez
 
Complete Lecture on Css presentation
Complete Lecture on Css presentation Complete Lecture on Css presentation
Complete Lecture on Css presentation Salman Memon
 
WEB DEVELOPMENT.pptx
WEB DEVELOPMENT.pptxWEB DEVELOPMENT.pptx
WEB DEVELOPMENT.pptxRajnirani18
 
1-01: Introduction To Web Development
1-01: Introduction To  Web  Development1-01: Introduction To  Web  Development
1-01: Introduction To Web Developmentapnwebdev
 
Cross site scripting (xss)
Cross site scripting (xss)Cross site scripting (xss)
Cross site scripting (xss)Manish Kumar
 
Ppt of web development
Ppt of web developmentPpt of web development
Ppt of web developmentbethanygfair
 
6. Web Publishing
6. Web Publishing6. Web Publishing
6. Web PublishingJyoti Yadav
 
Cross Site Scripting (XSS)
Cross Site Scripting (XSS)Cross Site Scripting (XSS)
Cross Site Scripting (XSS)Barrel Software
 
Fundamentals of Web for Non-Developers
Fundamentals of Web for Non-DevelopersFundamentals of Web for Non-Developers
Fundamentals of Web for Non-DevelopersLemi Orhan Ergin
 
Web browser architecture
Web browser architectureWeb browser architecture
Web browser architectureNguyen Quang
 
HTML and CSS crash course!
HTML and CSS crash course!HTML and CSS crash course!
HTML and CSS crash course!Ana Cidre
 

What's hot (20)

Owasp Top 10 A1: Injection
Owasp Top 10 A1: InjectionOwasp Top 10 A1: Injection
Owasp Top 10 A1: Injection
 
Sessions and cookies
Sessions and cookiesSessions and cookies
Sessions and cookies
 
Cookies and sessions
Cookies and sessionsCookies and sessions
Cookies and sessions
 
Cross site scripting
Cross site scriptingCross site scripting
Cross site scripting
 
Introduction to Web Terminology
Introduction to Web TerminologyIntroduction to Web Terminology
Introduction to Web Terminology
 
Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS)Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS)
 
PHP COOKIES AND SESSIONS
PHP COOKIES AND SESSIONSPHP COOKIES AND SESSIONS
PHP COOKIES AND SESSIONS
 
Web Scraping using Python | Web Screen Scraping
Web Scraping using Python | Web Screen ScrapingWeb Scraping using Python | Web Screen Scraping
Web Scraping using Python | Web Screen Scraping
 
Introduction to HTML and CSS
Introduction to HTML and CSSIntroduction to HTML and CSS
Introduction to HTML and CSS
 
Complete Lecture on Css presentation
Complete Lecture on Css presentation Complete Lecture on Css presentation
Complete Lecture on Css presentation
 
WEB DEVELOPMENT.pptx
WEB DEVELOPMENT.pptxWEB DEVELOPMENT.pptx
WEB DEVELOPMENT.pptx
 
1-01: Introduction To Web Development
1-01: Introduction To  Web  Development1-01: Introduction To  Web  Development
1-01: Introduction To Web Development
 
Css animation
Css animationCss animation
Css animation
 
Cross site scripting (xss)
Cross site scripting (xss)Cross site scripting (xss)
Cross site scripting (xss)
 
Ppt of web development
Ppt of web developmentPpt of web development
Ppt of web development
 
6. Web Publishing
6. Web Publishing6. Web Publishing
6. Web Publishing
 
Cross Site Scripting (XSS)
Cross Site Scripting (XSS)Cross Site Scripting (XSS)
Cross Site Scripting (XSS)
 
Fundamentals of Web for Non-Developers
Fundamentals of Web for Non-DevelopersFundamentals of Web for Non-Developers
Fundamentals of Web for Non-Developers
 
Web browser architecture
Web browser architectureWeb browser architecture
Web browser architecture
 
HTML and CSS crash course!
HTML and CSS crash course!HTML and CSS crash course!
HTML and CSS crash course!
 

Similar to Internet cookies

What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s SakeWhat Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s SakePiwik PRO
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief IntroductionHTS Hosting
 
Electronic computer cookies
Electronic computer cookiesElectronic computer cookies
Electronic computer cookiesSimilarweb
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xiArchana Dwivedi
 
Cookie replay attack unit wise presentation
Cookie replay attack  unit wise presentationCookie replay attack  unit wise presentation
Cookie replay attack unit wise presentationNilu Desai
 
Training Computer
Training ComputerTraining Computer
Training Computercmonasmith
 
Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 EricZhuZhengyi
 
Cookies and its threats.pptx
Cookies and its threats.pptxCookies and its threats.pptx
Cookies and its threats.pptxatharvbaghel4444
 
MCDM State Management
MCDM State ManagementMCDM State Management
MCDM State ManagementElise
 
Optimize your computer for peak performance
Optimize your computer for peak performanceOptimize your computer for peak performance
Optimize your computer for peak performancepacampbell
 
Enterprise java unit-2_chapter-2
Enterprise  java unit-2_chapter-2Enterprise  java unit-2_chapter-2
Enterprise java unit-2_chapter-2sandeep54552
 
online spying tools
online spying toolsonline spying tools
online spying toolsDeepa Jacob
 
Presentation portfolio E-business
Presentation portfolio E-business Presentation portfolio E-business
Presentation portfolio E-business J_waut14
 
Web Browser-add ons.pptx
Web Browser-add ons.pptxWeb Browser-add ons.pptx
Web Browser-add ons.pptxkkmodi12
 

Similar to Internet cookies (20)

What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s SakeWhat Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief Introduction
 
Electronic computer cookies
Electronic computer cookiesElectronic computer cookies
Electronic computer cookies
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Cookie replay attack unit wise presentation
Cookie replay attack  unit wise presentationCookie replay attack  unit wise presentation
Cookie replay attack unit wise presentation
 
Cookies may be set by the website you are visiting
Cookies may be set by the website you are visitingCookies may be set by the website you are visiting
Cookies may be set by the website you are visiting
 
Cookies
CookiesCookies
Cookies
 
Training Computer
Training ComputerTraining Computer
Training Computer
 
Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5
 
Cookies and its threats.pptx
Cookies and its threats.pptxCookies and its threats.pptx
Cookies and its threats.pptx
 
MCDM State Management
MCDM State ManagementMCDM State Management
MCDM State Management
 
Optimize your computer for peak performance
Optimize your computer for peak performanceOptimize your computer for peak performance
Optimize your computer for peak performance
 
Cookie presentation
Cookie presentationCookie presentation
Cookie presentation
 
Enterprise java unit-2_chapter-2
Enterprise  java unit-2_chapter-2Enterprise  java unit-2_chapter-2
Enterprise java unit-2_chapter-2
 
Zombie Cookies
Zombie Cookies Zombie Cookies
Zombie Cookies
 
online spying tools
online spying toolsonline spying tools
online spying tools
 
Sessions&cookies
Sessions&cookiesSessions&cookies
Sessions&cookies
 
Presentation portfolio E-business
Presentation portfolio E-business Presentation portfolio E-business
Presentation portfolio E-business
 
Web Browser-add ons.pptx
Web Browser-add ons.pptxWeb Browser-add ons.pptx
Web Browser-add ons.pptx
 
Cookies & log files
Cookies & log filesCookies & log files
Cookies & log files
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Internet cookies

  • 2. CONTENTS  Introduction.  Why are these files called “ Cookies “ ?  Cookies Type.?  Which best describes an internet cookie?  Whats the point?  Mmmm!! Cookies.  The Problem with Cookies.  Introduction to “Doubleclick Inc.”  Breakdown of Cookie Parameters ?  Are cookies Dangerous to my computer?  Can I delete Cookies?  Conclusion
  • 3. WHAT ARE COOKIES ? A cookie is a piece of text that a Web server can store on a user's hard disk. Cookies allow a Web site to store information on a user's machine and later retrieve it.
  • 4. WHY ARE THESE FILES CALLED “ COOKIES “ ? A cookie is a well-known computer science term that is used when describing an opaque piece of data held by an System.
  • 5. TYPE OF COOKIES  Persistent Cookie  Non-Persistent Cookie
  • 6. PERSISTENT COOKIE  Persistent cookies help websites remember your information and settings when you visit them in the future.  These remain on your hard drive until you erase them or they expire. How long a cookie remains on your browser depends on how long the visited website has programmed the cookie to last.
  • 7. NON-PERSISTENT/SESSION COOKIE  These are temporary and are erased when you close your browser at the end of your surfing session. The next time you visit that particular site it will not recognise you and will treat you as a completely new visitor as there is nothing in your browser to let the site know that you have visited before.
  • 8. KNOWING THE BASICS:  In the Business Week survey in 2000, only 40% of the randomly selected knew what an Internet cookie was.
  • 9. WHAT’S THE POINT?  Sites use cookies to…  Track number of visitors  First timers vs. returning visitors  How often the user visits the site.
  • 10. WHERE ARE COOKIES?  You can find cookie files on your hard drive, your “C” drive.
  • 11. MMMM! COOKIES…  They remember usernames for various sites that require log-in  Also have the option to remember your passwords for you!  They allow you to shop as you browse via online shopping carts!
  • 12. THE PROBLEMS WITH COOKIES  Multiple users on the same hard drive  Family computer, internet cafes  Credit car7d fraud  Easily erasable  Throw off site’s total counts  Can contain spyware!  Can pass on personal information without user’s permission (email address, phone number, credit card number, etc.)
  • 13. DOUBLECLICK INC.  Developed cookie program that can follow and save user internet browsing.  Such cookie files are saved into text profiles.  Profiles can be extensive and detailed.  Serves over 200 billion ads per month.
  • 14. BENEFITS OF DOUBLECLICK:  Advertisers!  Allows internet advertisers to place their ads on sites or pages which will reach their target audiences
  • 15. BREAKDOWN OF COOKIE PARAMETERS As we have just seen, a cookie contains more than simply a name and a value. In fact, a cookie has 6 parameters that can be passed to it:  The name of the cookie,  The value of the cookie,  The expiration date of the cookie,  The path the cookie is valid for,  The domain the cookie is valid for,  The need for a secure connection to exist to use the cookie. Two of these are mandatory (its name and its value). The other four can be set manually or automatically.
  • 16. ARE COOKIES DANGEROUS TO MY COMPUTER? Nooooo…..….. A cookie is a simple piece of text. It is not a program. It cannot be used as a Virus.Your browser (not a programmer) can save cookie values to your hard disk if it needs to, but that is the limit of the effect on your system.
  • 17. CAN I DELETE COOKIES? Yes. Whether you use Internet Explorer or Netscape, your cookies are saved to a simple text file that you can delete as you please. In order to do this properly, remember to close your browser first. This is because all your cookies are held in memory until you close your browser. So, if you delete the file with your browser open, it will make a new file when you close it, and your cookies will be back. Remember that deleting your cookie file entirely will cause you to "start from scratch" with every web site you usually visit. So, it may be preferable to open the cookies.txt file and remove only the entries you don't like, or go to the cookies folder and delete the files matching servers you don't want.
  • 18. Cookies are user friendly.Cookies are not harmful for your system. They just store your data/information,you can privately access later. Cookies remains alive in your system with your information as long as it’s expiry time or may die after your browser close. CONCLUSION