SlideShare a Scribd company logo
1 of 19
A
SEMINAR
ON
INTERNET COOKIES
Presented by:
User details here
CONTENTS
 Introduction.
 Why are these files called “ Cookies “ ?
 Cookies Type.?
 Which best describes an internet cookie?
 Whats the point?
 Mmmm!! Cookies.
 The Problem with Cookies.
 Introduction to “Doubleclick Inc.”
 Breakdown of Cookie Parameters ?
 Are cookies Dangerous to my computer?
 Can I delete Cookies?
 Conclusion
WHAT ARE COOKIES ?
A cookie is a piece of text that a Web server can
store on a user's hard disk. Cookies allow a
Web site to store information on a user's
machine and later retrieve it.
WHY ARE THESE FILES CALLED “ COOKIES “
?
A cookie is a well-known computer science term
that is used when describing an opaque piece of
data held by an System.
TYPE OF COOKIES
 Persistent Cookie
 Non-Persistent Cookie
PERSISTENT COOKIE
 Persistent cookies help websites remember your
information and settings when you visit them in the
future.
 These remain on your hard drive until you erase
them or they expire. How long a cookie remains on
your browser depends on how long the visited
website has programmed the cookie to last.
NON-PERSISTENT/SESSION COOKIE
 These are temporary and are erased when you
close your browser at the end of your surfing
session. The next time you visit that particular site it
will not recognise you and will treat you as a
completely new visitor as there is nothing in your
browser to let the site know that you have visited
before.
KNOWING THE BASICS:
 In the Business Week survey in 2000, only 40% of
the randomly selected knew what an Internet
cookie was.
WHAT’S THE POINT?
 Sites use cookies to…
 Track number of visitors
 First timers vs. returning visitors
 How often the user visits the site.
WHERE ARE COOKIES?
 You can find cookie files on your hard drive, your “C”
drive.
MMMM! COOKIES…
 They remember usernames for various sites that
require log-in
 Also have the option to remember your passwords for
you!
 They allow you to shop as you browse via online
shopping carts!
THE PROBLEMS WITH COOKIES
 Multiple users on the same hard drive
 Family computer, internet cafes
 Credit car7d fraud
 Easily erasable
 Throw off site’s total counts
 Can contain spyware!
 Can pass on personal information without user’s
permission (email address, phone number, credit card
number, etc.)
DOUBLECLICK INC.
 Developed cookie program that can follow and save
user internet browsing.
 Such cookie files are saved into text profiles.
 Profiles can be extensive and detailed.
 Serves over 200 billion ads per month.
BENEFITS OF DOUBLECLICK:
 Advertisers!
 Allows internet advertisers to place their ads on sites or
pages which will reach their target audiences
BREAKDOWN OF
COOKIE
PARAMETERS
As we have just seen, a cookie contains more than simply a name and
a value. In fact, a cookie has 6 parameters that can be passed to it:
 The name of the cookie,
 The value of the cookie,
 The expiration date of the cookie,
 The path the cookie is valid for,
 The domain the cookie is valid for,
 The need for a secure connection to exist to use the cookie.
Two of these are mandatory (its name and its value). The other four
can be set manually or automatically.
ARE COOKIES DANGEROUS TO MY
COMPUTER?
Nooooo…..….. A cookie is a
simple piece of text. It is not a program.
It cannot be used as a Virus.Your browser
(not a programmer) can save cookie values to
your hard disk if it needs to, but that is the
limit of the effect on your system.
CAN I DELETE COOKIES?
Yes. Whether you use Internet Explorer or Netscape, your
cookies are saved to a simple text file that you can delete as you
please.
In order to do this properly, remember to close your browser first.
This is because all your cookies are held in memory until you close
your browser. So, if you delete the file with your browser open, it will
make a new file when you close it, and your cookies will be back.
Remember that deleting your cookie file entirely will cause you to
"start from scratch" with every web site you usually visit. So, it may be
preferable to open the cookies.txt file and remove only the entries you
don't like, or go to the cookies folder and delete the files matching
servers you don't want.
Cookies are user friendly.Cookies are not
harmful for your system. They just store your
data/information,you can privately access later.
Cookies remains alive in your system with your
information as long as it’s expiry time or may die
after your browser close.
CONCLUSION
Internet cookies

More Related Content

What's hot

Introduction to WordPress
Introduction to WordPressIntroduction to WordPress
Introduction to WordPressLumosTech
 
GDI - Intro to WordPress
GDI - Intro to WordPressGDI - Intro to WordPress
GDI - Intro to WordPressSuzette Franck
 
Basic WordPress for Beginner ppt
Basic WordPress for Beginner pptBasic WordPress for Beginner ppt
Basic WordPress for Beginner pptDipika Wadhvani
 
Content Management System
Content Management SystemContent Management System
Content Management SystemOmnePresent
 
Content Management System
Content Management SystemContent Management System
Content Management SystemRavi Bhadauria
 
Introduction to Web Hosting.
Introduction to Web Hosting.Introduction to Web Hosting.
Introduction to Web Hosting.Cloudbells.com
 
Content Management System - CMS
 Content Management System - CMS Content Management System - CMS
Content Management System - CMSJaime Delgado
 
Content management system
Content management systemContent management system
Content management systemAdhoura Academy
 
WordPress Webinar Training Presentation
WordPress Webinar Training PresentationWordPress Webinar Training Presentation
WordPress Webinar Training PresentationMayeCreate Design
 
Web Publishing: An Overview of Tools and Service
Web Publishing: An Overview of Tools and ServiceWeb Publishing: An Overview of Tools and Service
Web Publishing: An Overview of Tools and Servicekilmeny21
 
Basic WordPress Workshop Presentation
Basic WordPress Workshop PresentationBasic WordPress Workshop Presentation
Basic WordPress Workshop PresentationFelix Albutra
 
What is a Content Management System or CMS
What is a Content Management System or CMSWhat is a Content Management System or CMS
What is a Content Management System or CMSSteve Williams
 
Introduction to WordPress
Introduction to WordPressIntroduction to WordPress
Introduction to WordPressHarshad Mane
 

What's hot (20)

Sessions and cookies
Sessions and cookiesSessions and cookies
Sessions and cookies
 
Cookies and sessions
Cookies and sessionsCookies and sessions
Cookies and sessions
 
Introduction to WordPress
Introduction to WordPressIntroduction to WordPress
Introduction to WordPress
 
GDI - Intro to WordPress
GDI - Intro to WordPressGDI - Intro to WordPress
GDI - Intro to WordPress
 
Basic WordPress for Beginner ppt
Basic WordPress for Beginner pptBasic WordPress for Beginner ppt
Basic WordPress for Beginner ppt
 
Session and Cookies
Session and CookiesSession and Cookies
Session and Cookies
 
Web design - How the Web works?
Web design - How the Web works?Web design - How the Web works?
Web design - How the Web works?
 
Content Management System
Content Management SystemContent Management System
Content Management System
 
Content Management System
Content Management SystemContent Management System
Content Management System
 
Introduction to Web Hosting.
Introduction to Web Hosting.Introduction to Web Hosting.
Introduction to Web Hosting.
 
Content Management System - CMS
 Content Management System - CMS Content Management System - CMS
Content Management System - CMS
 
WEB HOSTING
WEB HOSTINGWEB HOSTING
WEB HOSTING
 
Content management system
Content management systemContent management system
Content management system
 
WordPress Webinar Training Presentation
WordPress Webinar Training PresentationWordPress Webinar Training Presentation
WordPress Webinar Training Presentation
 
Web Browser
Web BrowserWeb Browser
Web Browser
 
Web Publishing: An Overview of Tools and Service
Web Publishing: An Overview of Tools and ServiceWeb Publishing: An Overview of Tools and Service
Web Publishing: An Overview of Tools and Service
 
WORDPRESS
WORDPRESSWORDPRESS
WORDPRESS
 
Basic WordPress Workshop Presentation
Basic WordPress Workshop PresentationBasic WordPress Workshop Presentation
Basic WordPress Workshop Presentation
 
What is a Content Management System or CMS
What is a Content Management System or CMSWhat is a Content Management System or CMS
What is a Content Management System or CMS
 
Introduction to WordPress
Introduction to WordPressIntroduction to WordPress
Introduction to WordPress
 

Similar to Internet cookies

What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s SakeWhat Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s SakePiwik PRO
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief IntroductionHTS Hosting
 
Electronic computer cookies
Electronic computer cookiesElectronic computer cookies
Electronic computer cookiesSimilarweb
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xiArchana Dwivedi
 
Cookie replay attack unit wise presentation
Cookie replay attack  unit wise presentationCookie replay attack  unit wise presentation
Cookie replay attack unit wise presentationNilu Desai
 
Training Computer
Training ComputerTraining Computer
Training Computercmonasmith
 
Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 EricZhuZhengyi
 
Cookies and its threats.pptx
Cookies and its threats.pptxCookies and its threats.pptx
Cookies and its threats.pptxatharvbaghel4444
 
MCDM State Management
MCDM State ManagementMCDM State Management
MCDM State ManagementElise
 
Optimize your computer for peak performance
Optimize your computer for peak performanceOptimize your computer for peak performance
Optimize your computer for peak performancepacampbell
 
Enterprise java unit-2_chapter-2
Enterprise  java unit-2_chapter-2Enterprise  java unit-2_chapter-2
Enterprise java unit-2_chapter-2sandeep54552
 
online spying tools
online spying toolsonline spying tools
online spying toolsDeepa Jacob
 
Presentation portfolio E-business
Presentation portfolio E-business Presentation portfolio E-business
Presentation portfolio E-business J_waut14
 
Web Browser-add ons.pptx
Web Browser-add ons.pptxWeb Browser-add ons.pptx
Web Browser-add ons.pptxkkmodi12
 

Similar to Internet cookies (20)

What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s SakeWhat Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief Introduction
 
Electronic computer cookies
Electronic computer cookiesElectronic computer cookies
Electronic computer cookies
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Cookie replay attack unit wise presentation
Cookie replay attack  unit wise presentationCookie replay attack  unit wise presentation
Cookie replay attack unit wise presentation
 
Cookies may be set by the website you are visiting
Cookies may be set by the website you are visitingCookies may be set by the website you are visiting
Cookies may be set by the website you are visiting
 
Cookies
CookiesCookies
Cookies
 
Training Computer
Training ComputerTraining Computer
Training Computer
 
Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5
 
Cookies and its threats.pptx
Cookies and its threats.pptxCookies and its threats.pptx
Cookies and its threats.pptx
 
MCDM State Management
MCDM State ManagementMCDM State Management
MCDM State Management
 
Optimize your computer for peak performance
Optimize your computer for peak performanceOptimize your computer for peak performance
Optimize your computer for peak performance
 
Cookie presentation
Cookie presentationCookie presentation
Cookie presentation
 
Enterprise java unit-2_chapter-2
Enterprise  java unit-2_chapter-2Enterprise  java unit-2_chapter-2
Enterprise java unit-2_chapter-2
 
Zombie Cookies
Zombie Cookies Zombie Cookies
Zombie Cookies
 
online spying tools
online spying toolsonline spying tools
online spying tools
 
Sessions&cookies
Sessions&cookiesSessions&cookies
Sessions&cookies
 
Presentation portfolio E-business
Presentation portfolio E-business Presentation portfolio E-business
Presentation portfolio E-business
 
Web Browser-add ons.pptx
Web Browser-add ons.pptxWeb Browser-add ons.pptx
Web Browser-add ons.pptx
 
Cookies & log files
Cookies & log filesCookies & log files
Cookies & log files
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Internet cookies

  • 2. CONTENTS  Introduction.  Why are these files called “ Cookies “ ?  Cookies Type.?  Which best describes an internet cookie?  Whats the point?  Mmmm!! Cookies.  The Problem with Cookies.  Introduction to “Doubleclick Inc.”  Breakdown of Cookie Parameters ?  Are cookies Dangerous to my computer?  Can I delete Cookies?  Conclusion
  • 3. WHAT ARE COOKIES ? A cookie is a piece of text that a Web server can store on a user's hard disk. Cookies allow a Web site to store information on a user's machine and later retrieve it.
  • 4. WHY ARE THESE FILES CALLED “ COOKIES “ ? A cookie is a well-known computer science term that is used when describing an opaque piece of data held by an System.
  • 5. TYPE OF COOKIES  Persistent Cookie  Non-Persistent Cookie
  • 6. PERSISTENT COOKIE  Persistent cookies help websites remember your information and settings when you visit them in the future.  These remain on your hard drive until you erase them or they expire. How long a cookie remains on your browser depends on how long the visited website has programmed the cookie to last.
  • 7. NON-PERSISTENT/SESSION COOKIE  These are temporary and are erased when you close your browser at the end of your surfing session. The next time you visit that particular site it will not recognise you and will treat you as a completely new visitor as there is nothing in your browser to let the site know that you have visited before.
  • 8. KNOWING THE BASICS:  In the Business Week survey in 2000, only 40% of the randomly selected knew what an Internet cookie was.
  • 9. WHAT’S THE POINT?  Sites use cookies to…  Track number of visitors  First timers vs. returning visitors  How often the user visits the site.
  • 10. WHERE ARE COOKIES?  You can find cookie files on your hard drive, your “C” drive.
  • 11. MMMM! COOKIES…  They remember usernames for various sites that require log-in  Also have the option to remember your passwords for you!  They allow you to shop as you browse via online shopping carts!
  • 12. THE PROBLEMS WITH COOKIES  Multiple users on the same hard drive  Family computer, internet cafes  Credit car7d fraud  Easily erasable  Throw off site’s total counts  Can contain spyware!  Can pass on personal information without user’s permission (email address, phone number, credit card number, etc.)
  • 13. DOUBLECLICK INC.  Developed cookie program that can follow and save user internet browsing.  Such cookie files are saved into text profiles.  Profiles can be extensive and detailed.  Serves over 200 billion ads per month.
  • 14. BENEFITS OF DOUBLECLICK:  Advertisers!  Allows internet advertisers to place their ads on sites or pages which will reach their target audiences
  • 15. BREAKDOWN OF COOKIE PARAMETERS As we have just seen, a cookie contains more than simply a name and a value. In fact, a cookie has 6 parameters that can be passed to it:  The name of the cookie,  The value of the cookie,  The expiration date of the cookie,  The path the cookie is valid for,  The domain the cookie is valid for,  The need for a secure connection to exist to use the cookie. Two of these are mandatory (its name and its value). The other four can be set manually or automatically.
  • 16. ARE COOKIES DANGEROUS TO MY COMPUTER? Nooooo…..….. A cookie is a simple piece of text. It is not a program. It cannot be used as a Virus.Your browser (not a programmer) can save cookie values to your hard disk if it needs to, but that is the limit of the effect on your system.
  • 17. CAN I DELETE COOKIES? Yes. Whether you use Internet Explorer or Netscape, your cookies are saved to a simple text file that you can delete as you please. In order to do this properly, remember to close your browser first. This is because all your cookies are held in memory until you close your browser. So, if you delete the file with your browser open, it will make a new file when you close it, and your cookies will be back. Remember that deleting your cookie file entirely will cause you to "start from scratch" with every web site you usually visit. So, it may be preferable to open the cookies.txt file and remove only the entries you don't like, or go to the cookies folder and delete the files matching servers you don't want.
  • 18. Cookies are user friendly.Cookies are not harmful for your system. They just store your data/information,you can privately access later. Cookies remains alive in your system with your information as long as it’s expiry time or may die after your browser close. CONCLUSION