SlideShare a Scribd company logo
1 of 21
What is a Cookie?


A cookie is a small text file that is stored on a

user’s computer.
Each cookie on the user’s computer is
connected to a particular domain.
 Each cookie can be used to store up to 4kB
of data.
 A maximum of 20 cookies can be stored on a
user’s PC per domain.



"a cookie is a unique identifier that a web server
places on your computer-- a serial number for you
personally that can be used to retrieve your records
from their databases”



It's usually a string of random-looking letters long
enough to be unique."



Once a cookie is attached or 'set' in your computer, it
tracks your movement around the website that sets it
and provides this information back to the site's
owners.


The amazing thing about the more intrusive cookies is
that nobody would tolerate this sort of behaviour in real

life. Imagine, for example, being stopped at the
entrance to your local grocery store or gas station and
asked to show identification in order to get in. While

you're there, imagine being observed by a security
guard who takes notes on what you're doing or being
recorded by a hidden camera as you walk around.

Information gathering cookies are not nearly so
obvious, but this is essentially what they do once they
get inside your computer.


The main benefit of cookies is that they help you to

navigate

websites,

particularly

those

where

you

purchase goods or services and have to fill out forms
with your name, address, and payment information.
Cookies remember this personal information so that you
don't have to fill out the same form over and over again

every

time

you

make

a

new

purchase.

Unfortunately, other cookies help the websites that set
them far more than they help you.


They provide personal information that you may not want
other people to know. Depending on the nature of a cookie, it

can identify the type of computer you're working on, the
software you're using, and in some cases, may even be able
to get your email address.


Depending on a site's privacy policy (which you should always
read), this data may or may not be made available for sale to
outside advertisers, marketing firms, junk e-mailers, and more.

Many cookies remain in your computer for years or even
decades.


In the worst cases, cookies are set by sites you've never
heard of while you're navigating your favorite sites.



These

often

DoubleClick,

come

HitBox,

from

or

marketing

firms

like

AdForce

that

sell

advertising, analyze website effectiveness, help increase
clients' online revenues, and place or monitor banner ads.


This kind of cookie is capable of tracking your movement
from one website to another, accumulating personal
data, and sometimes making it available for sale to third
parties.


Fortunately, you can fight back against these invasions of privacy. Websites like
Aboutcookies.org contain virtually everything you need to know about who's watching
you, what they're doing, how you can find out who they are, and how to control the cookie-

setters in order to keep your personal information personal. They post a page about how
to delete cookies here, and one about how to control cookies here.


For example, I have my computer set to notify me whenever any website tries to set a
cookie in my machine. I have the option of either accepting or declining it. I make this
decision in much the same way as I do in real life. If I'm asking for help, making a
purchase, or requesting information or services, I usually accept the cookie. If I'd rather
look around first, make my decisions later, or find that the site has nothing to offer, I
usually decline the cookie. This turns the tables on the cookie-setters. You find out who
they are before they find out who you are. You watch them as they follow you around and
tell them to leave you alone whenever they get too nosy.


Two other situations where you should think twice before
giving out personal information:

* Junk emails that ask you to reply in order not to receive any
future mailings. NEVER reply to junk emails; NEVER reply to
"unsubscribe" options. Replying is the only way the senders get
your email address. They also learn that you read their garbage

and reply to it than delete it without ever looking.
* Companies that ask you to either call or email in order to get
additional information not provided on their websites. You can

bet you'll be placed on mailing lists with marketing firms if you
do, so think twice about how badly you need what they won't
give you unless you give away personal information first.
HOW IT COMES IN COMPUTER ?


Advertising

companies

uses

spyware to “mine data” to further

help them advertise better.


Uses your Internet connection
and reports statistical data about
you and your surfing habits to a
3rd

party thus

Violating

your

privacy.
And is a completely a LEGAL program!
FREE, FREE, FREE =
DANGER!!!
Spyware is created by real businesses (and sometimes..
organized crime)

-They

have

business

plans,

and

development groups
-They generate revenue

Competition! They all want your desktop.

sophisticated
What exactly is a Web Bug?
A Web Bug is a graphics on a Web page or in an Email
message that is designed to monitor who is reading the
Web page or Email message. Web Bugs are often invisible

because they are typically only 1-by-1 pixel in size. They
are represented as HTML IMG tags.
Why are Web Bugs invisible on a page?
To hide the fact that monitoring is taking place.

Are Web Bugs always invisible on a page?
Not necessarily. Any graphics on a Web page that is used for monitoring
purposes can be considered a Web Bug.

Are all invisible GIF images, Web Bugs?
No. Invisible GIF files are also used for alignment purposes on Web pages. A
Web Bug will typically be loaded from a different Web server than the rest of
the page, so they are easy to distinguish from alignment GIF files.

What other names are Web Bugs known by?
The Internet advertising community prefers the more sanitized term "clear
GIF". Web Bugs are also known as "1-by-1 GIFs" and "invisible GIFs".
What information is sent to a server when a Web Bug is viewed?

The IP address of the computer that fetched the Web Bug
The URL of the page that the Web Bug is located on
The URL of the Web Bug image

The time the Web Bug was viewed
The type of browser that fetched the Web Bug image
A previously set cookie value
What are some of the uses of a Web
Bug on a Web page?
Ad networks can use Web Bugs to add information to a personal
profile of what sites a person is visiting. The personal profile is
identified by the browser cookie of an ad network. At some later

time, this personal profile which is stored in a data base server
belonging to the ad network, determines what banner ad one is
shown.
Another use of Web Bugs is to provide an independent accounting

of how many people have visited a Web site.

Web Bugs are also used to gather statistics about Web browser
usage at different places on the Internet.
Thank you for watching!

More Related Content

What's hot

User authentication
User authenticationUser authentication
User authenticationCAS
 
Password sniffing
Password sniffingPassword sniffing
Password sniffingSRIMCA
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention systemNikhil Raj
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software rajakhurram
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
Spoofing
SpoofingSpoofing
SpoofingSanjeev
 
Security asp.net application
Security asp.net applicationSecurity asp.net application
Security asp.net applicationZAIYAUL HAQUE
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing pptAnushakp9
 
Different Methodology To Recon Your Targets
Different Methodology To Recon Your TargetsDifferent Methodology To Recon Your Targets
Different Methodology To Recon Your TargetsEslamAkl
 

What's hot (20)

Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Network security
Network securityNetwork security
Network security
 
User authentication
User authenticationUser authentication
User authentication
 
Password sniffing
Password sniffingPassword sniffing
Password sniffing
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Parameter tampering
Parameter tamperingParameter tampering
Parameter tampering
 
Web Security
Web SecurityWeb Security
Web Security
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Email Spoofing.pptx
Email Spoofing.pptxEmail Spoofing.pptx
Email Spoofing.pptx
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Web Security
Web SecurityWeb Security
Web Security
 
Sandbox
SandboxSandbox
Sandbox
 
Spoofing
SpoofingSpoofing
Spoofing
 
Security asp.net application
Security asp.net applicationSecurity asp.net application
Security asp.net application
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
 
Different Methodology To Recon Your Targets
Different Methodology To Recon Your TargetsDifferent Methodology To Recon Your Targets
Different Methodology To Recon Your Targets
 

Viewers also liked

Viewers also liked (11)

Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of Computer
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Factoring
FactoringFactoring
Factoring
 
Spam spyware
Spam spywareSpam spyware
Spam spyware
 
Security testing
Security testingSecurity testing
Security testing
 
Security threats
Security threatsSecurity threats
Security threats
 
Gujrat
GujratGujrat
Gujrat
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
3g vs wifi
3g vs wifi3g vs wifi
3g vs wifi
 

Similar to online spying tools

Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xiArchana Dwivedi
 
Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 EricZhuZhengyi
 
Presentation on Internet Cookies
Presentation on Internet CookiesPresentation on Internet Cookies
Presentation on Internet CookiesRitika Barethia
 
Research Project Ms
Research Project MsResearch Project Ms
Research Project Msmafer23
 
How Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurveyHow Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurveySogolytics
 
Kieon cookie law presentation Jan 2012
Kieon cookie law presentation Jan 2012Kieon cookie law presentation Jan 2012
Kieon cookie law presentation Jan 2012Kieon
 
Google Analytics Cookies Tracking
Google Analytics Cookies TrackingGoogle Analytics Cookies Tracking
Google Analytics Cookies TrackingAK DigiHub
 
Privacy Online
Privacy OnlinePrivacy Online
Privacy OnlineJohn Curry
 
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos Beretas
 
Data Privacy Chicago May2011
Data Privacy Chicago May2011Data Privacy Chicago May2011
Data Privacy Chicago May2011Tim Beadle
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief IntroductionHTS Hosting
 
Presentation portfolio E-business
Presentation portfolio E-business Presentation portfolio E-business
Presentation portfolio E-business J_waut14
 
Is web scraping legal or not?
Is web scraping legal or not?Is web scraping legal or not?
Is web scraping legal or not?Aparna Sharma
 
A Marketer's Ultimate Guide to Web Cookies
A Marketer's Ultimate Guide to Web CookiesA Marketer's Ultimate Guide to Web Cookies
A Marketer's Ultimate Guide to Web CookiesAdRoll
 
How to remove cookies[4254]
How to remove cookies[4254]How to remove cookies[4254]
How to remove cookies[4254]yvonneschnurr
 
Cookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxCookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxMIsmail73
 

Similar to online spying tools (20)

Cookie management
Cookie managementCookie management
Cookie management
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5
 
Presentation on Internet Cookies
Presentation on Internet CookiesPresentation on Internet Cookies
Presentation on Internet Cookies
 
Research Project Ms
Research Project MsResearch Project Ms
Research Project Ms
 
How Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurveyHow Tracking Your Personal Data Really Adds Up | SoGoSurvey
How Tracking Your Personal Data Really Adds Up | SoGoSurvey
 
Kieon cookie law presentation Jan 2012
Kieon cookie law presentation Jan 2012Kieon cookie law presentation Jan 2012
Kieon cookie law presentation Jan 2012
 
Do not track me
Do not track meDo not track me
Do not track me
 
Google Analytics Cookies Tracking
Google Analytics Cookies TrackingGoogle Analytics Cookies Tracking
Google Analytics Cookies Tracking
 
Privacy & policy
Privacy & policyPrivacy & policy
Privacy & policy
 
Privacy Online
Privacy OnlinePrivacy Online
Privacy Online
 
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TE
 
Data Privacy Chicago May2011
Data Privacy Chicago May2011Data Privacy Chicago May2011
Data Privacy Chicago May2011
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief Introduction
 
Presentation portfolio E-business
Presentation portfolio E-business Presentation portfolio E-business
Presentation portfolio E-business
 
Internet cookies
Internet cookiesInternet cookies
Internet cookies
 
Is web scraping legal or not?
Is web scraping legal or not?Is web scraping legal or not?
Is web scraping legal or not?
 
A Marketer's Ultimate Guide to Web Cookies
A Marketer's Ultimate Guide to Web CookiesA Marketer's Ultimate Guide to Web Cookies
A Marketer's Ultimate Guide to Web Cookies
 
How to remove cookies[4254]
How to remove cookies[4254]How to remove cookies[4254]
How to remove cookies[4254]
 
Cookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxCookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptx
 

More from Deepa Jacob

Impact of aggressive working capital
Impact of aggressive working capitalImpact of aggressive working capital
Impact of aggressive working capitalDeepa Jacob
 
Marketing channels
Marketing channels Marketing channels
Marketing channels Deepa Jacob
 
private equity and angel financing
private equity and angel financingprivate equity and angel financing
private equity and angel financingDeepa Jacob
 
Human organ on trade ppt.
Human organ on trade ppt.Human organ on trade ppt.
Human organ on trade ppt.Deepa Jacob
 

More from Deepa Jacob (6)

P&G
P&GP&G
P&G
 
Impact of aggressive working capital
Impact of aggressive working capitalImpact of aggressive working capital
Impact of aggressive working capital
 
Marketing channels
Marketing channels Marketing channels
Marketing channels
 
private equity and angel financing
private equity and angel financingprivate equity and angel financing
private equity and angel financing
 
Infosys
InfosysInfosys
Infosys
 
Human organ on trade ppt.
Human organ on trade ppt.Human organ on trade ppt.
Human organ on trade ppt.
 

Recently uploaded

GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...lizamodels9
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 

Recently uploaded (20)

GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 

online spying tools

  • 1.
  • 2.
  • 3. What is a Cookie?  A cookie is a small text file that is stored on a user’s computer. Each cookie on the user’s computer is connected to a particular domain.  Each cookie can be used to store up to 4kB of data.  A maximum of 20 cookies can be stored on a user’s PC per domain. 
  • 4.  "a cookie is a unique identifier that a web server places on your computer-- a serial number for you personally that can be used to retrieve your records from their databases”  It's usually a string of random-looking letters long enough to be unique."  Once a cookie is attached or 'set' in your computer, it tracks your movement around the website that sets it and provides this information back to the site's owners.
  • 5.  The amazing thing about the more intrusive cookies is that nobody would tolerate this sort of behaviour in real life. Imagine, for example, being stopped at the entrance to your local grocery store or gas station and asked to show identification in order to get in. While you're there, imagine being observed by a security guard who takes notes on what you're doing or being recorded by a hidden camera as you walk around. Information gathering cookies are not nearly so obvious, but this is essentially what they do once they get inside your computer.
  • 6.
  • 7.  The main benefit of cookies is that they help you to navigate websites, particularly those where you purchase goods or services and have to fill out forms with your name, address, and payment information. Cookies remember this personal information so that you don't have to fill out the same form over and over again every time you make a new purchase. Unfortunately, other cookies help the websites that set them far more than they help you.
  • 8.  They provide personal information that you may not want other people to know. Depending on the nature of a cookie, it can identify the type of computer you're working on, the software you're using, and in some cases, may even be able to get your email address.  Depending on a site's privacy policy (which you should always read), this data may or may not be made available for sale to outside advertisers, marketing firms, junk e-mailers, and more. Many cookies remain in your computer for years or even decades.
  • 9.  In the worst cases, cookies are set by sites you've never heard of while you're navigating your favorite sites.  These often DoubleClick, come HitBox, from or marketing firms like AdForce that sell advertising, analyze website effectiveness, help increase clients' online revenues, and place or monitor banner ads.  This kind of cookie is capable of tracking your movement from one website to another, accumulating personal data, and sometimes making it available for sale to third parties.
  • 10.  Fortunately, you can fight back against these invasions of privacy. Websites like Aboutcookies.org contain virtually everything you need to know about who's watching you, what they're doing, how you can find out who they are, and how to control the cookie- setters in order to keep your personal information personal. They post a page about how to delete cookies here, and one about how to control cookies here.  For example, I have my computer set to notify me whenever any website tries to set a cookie in my machine. I have the option of either accepting or declining it. I make this decision in much the same way as I do in real life. If I'm asking for help, making a purchase, or requesting information or services, I usually accept the cookie. If I'd rather look around first, make my decisions later, or find that the site has nothing to offer, I usually decline the cookie. This turns the tables on the cookie-setters. You find out who they are before they find out who you are. You watch them as they follow you around and tell them to leave you alone whenever they get too nosy.
  • 11.  Two other situations where you should think twice before giving out personal information: * Junk emails that ask you to reply in order not to receive any future mailings. NEVER reply to junk emails; NEVER reply to "unsubscribe" options. Replying is the only way the senders get your email address. They also learn that you read their garbage and reply to it than delete it without ever looking. * Companies that ask you to either call or email in order to get additional information not provided on their websites. You can bet you'll be placed on mailing lists with marketing firms if you do, so think twice about how badly you need what they won't give you unless you give away personal information first.
  • 12.
  • 13. HOW IT COMES IN COMPUTER ?  Advertising companies uses spyware to “mine data” to further help them advertise better.  Uses your Internet connection and reports statistical data about you and your surfing habits to a 3rd party thus Violating your privacy. And is a completely a LEGAL program!
  • 14. FREE, FREE, FREE = DANGER!!!
  • 15. Spyware is created by real businesses (and sometimes.. organized crime) -They have business plans, and development groups -They generate revenue Competition! They all want your desktop. sophisticated
  • 16.
  • 17. What exactly is a Web Bug? A Web Bug is a graphics on a Web page or in an Email message that is designed to monitor who is reading the Web page or Email message. Web Bugs are often invisible because they are typically only 1-by-1 pixel in size. They are represented as HTML IMG tags.
  • 18. Why are Web Bugs invisible on a page? To hide the fact that monitoring is taking place. Are Web Bugs always invisible on a page? Not necessarily. Any graphics on a Web page that is used for monitoring purposes can be considered a Web Bug. Are all invisible GIF images, Web Bugs? No. Invisible GIF files are also used for alignment purposes on Web pages. A Web Bug will typically be loaded from a different Web server than the rest of the page, so they are easy to distinguish from alignment GIF files. What other names are Web Bugs known by? The Internet advertising community prefers the more sanitized term "clear GIF". Web Bugs are also known as "1-by-1 GIFs" and "invisible GIFs".
  • 19. What information is sent to a server when a Web Bug is viewed? The IP address of the computer that fetched the Web Bug The URL of the page that the Web Bug is located on The URL of the Web Bug image The time the Web Bug was viewed The type of browser that fetched the Web Bug image A previously set cookie value
  • 20. What are some of the uses of a Web Bug on a Web page? Ad networks can use Web Bugs to add information to a personal profile of what sites a person is visiting. The personal profile is identified by the browser cookie of an ad network. At some later time, this personal profile which is stored in a data base server belonging to the ad network, determines what banner ad one is shown. Another use of Web Bugs is to provide an independent accounting of how many people have visited a Web site. Web Bugs are also used to gather statistics about Web browser usage at different places on the Internet.
  • 21. Thank you for watching!