Tech Term: Cookies Defined

Tech Term: Cookies Defined

Chances are, if you’ve spent any amount of time around a computer, you’ve heard of browser cookies. What you may not have heard, is what these cookies do. For today’s Tech Term, we’ll explore what cookies are, and what they do.

What are Cookies?
A cookie is a sample of information that a website stores on a user’s computer in text format that only that particular website can access. This information, made up of name-value pairs, informs the website if you have ever visited before and allows it to personalize your experience as a user. These cookies are often removed once the browser window is closed down, but they can be designed to last longer.

Cookies are what enable a website to “remember” that you are logged in and allow you to change particular settings without them reverting back the next time you navigate to a new page. Furthermore, cookies can allow websites to remember your browsing tendencies and suggest things that might interest you, even if you haven’t logged in. This is especially apparent on ecommerce sites that offer you products that might interest you based on the products that you’ve viewed in the past.

Are Cookies Dangerous?
In a word, no. All these pieces of data are viewable only by the website that delivered them. This means that Website A can only see cookies that it has delivered, and its cookies are likewise hidden from Website B. As a result, if Website B was attempting some malicious activities, the information that Website A has stored is safe.

However, some cookies are used for purposes that may be unwelcome to some users. Have you ever been browsing for a particular item on Amazon, and then notice that the other websites you visit are displaying advertisements for related items? This is the result of an advertising cookie taking note of what you have demonstrated interest in, thereby allowing it to customize the advertisement to best fit your interests.

Clearing Cookies
Of course, you can remove the cookies that your browser has accumulated by using the Clear Private Data tool. However, this will also erase any saved login credentials that you do want websites to have saved. The majority of browsers have ways to workaround this by whitelisting some websites as trusted to save cookies.

Are there any other Tech Terms you’d like defined, or do you have more questions about cookies? Reach out to us at (858) 509-1970 and let us know!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 21 April 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Privacy Best Practices Technology Cloud Software Business computing Network Security Microsoft Google Hackers Windows 10 Backup Malware Business Smartphones Android Business Continuity Email Innovation Browser Hardware Alert Internet Small Business Managed IT Services Office Hosted Solutions Computers Disaster Recovery Smartphone Data Ransomware Business Management User Tips Cloud Computing Computer Productivity Efficiency VoIP Outsourced IT Mobile Devices Data Backup Cybercrime Cybersecurity Virtualization Productivity How To Chrome Telephone Systems Law Enforcement Money Social Engineering Communications Collaboration Miscellaneous Managed IT Services Windows App Health Passwords Work/Life Balance Social Media Password IT Services Quick Tips Artificial Intelligence IT Support Vulnerability Spam Mobile Device Management Facebook Tech Term Data Recovery Hacking Holiday Data Security Network Wi-Fi Communication Office Tips Two-factor Authentication Router Upgrade Windows 10 Apps Private Cloud Bring Your Own Device Phishing Data Protection Data Breach Google Drive HaaS Office 365 Patch Management History Samsung Cleaning Scam Mobile Device BYOD Flexibility Computer Care Value PDF VPN Internet of Things Mobility Managed Service Provider Redundancy Avoiding Downtime Remote Computing CES Automation Remote Monitoring Saving Money Automobile End of Support Identity Theft Data Management Workplace Tips Worker Big Data Update Data Storage OneNote Battery IT Management Electronic Medical Records Employer-Employee Relationship Server Government Spam Blocking Comparison Gadgets IT Plan Microsoft Office Public Cloud Operating System Marketing Word Legal Unsupported Software Keyboard Charger Business Intelligence Root Cause Analysis Online Shopping Safety Applications Managed IT Best Practice Software Tips eWaste Conferencing Millennials Experience Apple Windows 7 Encryption Botnet Evernote Bandwidth Users Criminal Hiring/Firing Emails Content Solid State Drive Workforce Music Search iPhone Flash Travel Meetings Wireless Charging Transportation Networking Virtual Reality Audiobook User Error Video Games Relocation Employer Employee Relationship Google Docs Audit BDR Wearable Technology Loyalty How to Accountants Cortana Benefits Current Events Worker Commute Monitor Entertainment Physical Security Computer Accessories IT solutions Website Computer Fan Telecommuting USB SaaS Information Technology Black Market Sync Data loss Google Apps Firewall Knowledge Internet Exlporer Scalability Humor Content Management Bluetooth IT Support Voice over Internet Protocol The Internet of Things Remote Work Troubleshooting Practices Screen Mirroring Workers Smart Technology Network Congestion Data storage HBO Blockchain FENG Assessment Telephony Hosted Computing Recovery Cast Infrastructure Two Factor Authentication IT Consultant Risk Management Internet exploMicrosoft Outlook HIPAA Settings Multi-Factor Security Credit Cards Television Skype Inventory Password Manager Leadership Politics Advertising Instant Messaging Frequently Asked Questions Human Resources Rootkit Trending Fraud Books Public Computer Wireless Start Menu Access Control Business Mangement Excel Staff Training Amazon Education Tools Authentication Gmail Save Money Techology Tip of the week Vendor Management Specifications Downtime Amazon Web Services Emergency Computing Infrastructure Files Recycling Save Time webinar Hybrid Cloud Windows Server 2008 Digital Signature Windows 10s WiFi Webinar Thank You Congratulations CrashOverride Nanotechnology

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Digital Hold The Case for Hosting Your Phone Solution In-House
24 February 2018
Informative Blog. Thanks a lot for the useful info.
Maria Albert Download the Wrong App and Have More Than Pokémon Fever Infect Your Device
26 September 2017
Occasionally I strive to not concentrate such these kinds of articles and neglect reading like these...
nathan dwyer Your Guide To Mobile Device Management as an SMB
07 September 2017
I come here after quite a while since 2016 and entire this term i have miss the chance to get inform...