Tech Term: Cookies Defined

Tech Term: Cookies Defined

Chances are, if you’ve spent any amount of time around a computer, you’ve heard of browser cookies. What you may not have heard, is what these cookies do. For today’s Tech Term, we’ll explore what cookies are, and what they do.

What are Cookies?
A cookie is a sample of information that a website stores on a user’s computer in text format that only that particular website can access. This information, made up of name-value pairs, informs the website if you have ever visited before and allows it to personalize your experience as a user. These cookies are often removed once the browser window is closed down, but they can be designed to last longer.

Cookies are what enable a website to “remember” that you are logged in and allow you to change particular settings without them reverting back the next time you navigate to a new page. Furthermore, cookies can allow websites to remember your browsing tendencies and suggest things that might interest you, even if you haven’t logged in. This is especially apparent on ecommerce sites that offer you products that might interest you based on the products that you’ve viewed in the past.

Are Cookies Dangerous?
In a word, no. All these pieces of data are viewable only by the website that delivered them. This means that Website A can only see cookies that it has delivered, and its cookies are likewise hidden from Website B. As a result, if Website B was attempting some malicious activities, the information that Website A has stored is safe.

However, some cookies are used for purposes that may be unwelcome to some users. Have you ever been browsing for a particular item on Amazon, and then notice that the other websites you visit are displaying advertisements for related items? This is the result of an advertising cookie taking note of what you have demonstrated interest in, thereby allowing it to customize the advertisement to best fit your interests.

Clearing Cookies
Of course, you can remove the cookies that your browser has accumulated by using the Clear Private Data tool. However, this will also erase any saved login credentials that you do want websites to have saved. The majority of browsers have ways to workaround this by whitelisting some websites as trusted to save cookies.

Are there any other Tech Terms you’d like defined, or do you have more questions about cookies? Reach out to us at (858) 509-1970 and let us know!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, July 23 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business computing Google Malware Software Microsoft Network Security Backup Hackers Internet Windows 10 Data Android Business Email Innovation Smartphones Hosted Solutions Tech Term Small Business Business Continuity VoIP Hardware Managed IT Services Alert Browser Computer Computers Disaster Recovery Cloud Computing Ransomware Smartphone Office Mobile Devices Business Management Law Enforcement Productivity Data Backup Outsourced IT Cybercrime Efficiency User Tips Communications How To Artificial Intelligence Router IT Services Productivity Telephone Systems Money Password Virtualization Windows Collaboration Cybersecurity Chrome Work/Life Balance Network Quick Tips Miscellaneous App Upgrade Data Recovery Office 365 Communication Passwords Health Facebook Managed IT Services Social Media Internet of Things Social Engineering Windows 10 Data Breach HaaS Google Drive Data Protection Office Tips Mobile Device Management Automation Saving Money IT Support Microsoft Office Two-factor Authentication Hacking Phishing Bring Your Own Device Connectivity Word Wi-Fi Data Security Holiday Applications Workplace Tips Private Cloud Vulnerability Spam Apps Worker Website CES Marketing BYOD Scam Data Storage Big Data Public Cloud Computer Care Battery Server OneNote Content Management Paperless Office Redundancy IT Management Electronic Medical Records Remote Computing Avoiding Downtime Samsung End of Support Business Intelligence Spam Blocking History Blockchain Bandwidth Flexibility Entertainment Update IT Plan Identity Theft Save Money Infrastructure USB Value Operating System Legal IT Support Networking Mobility Automobile Unsupported Software PDF Employer-Employee Relationship Remote Monitoring VPN Managed IT Keyboard Charger Data Management Patch Management Managed Service Provider Government BDR Windows 7 Mobile Device Cleaning Comparison Gadgets Skype Risk Management Document Management Search Emails Amazon Authentication Flash Hiring/Firing Gmail Instant Messaging Telecommuting Cryptocurrency Virtual Reality Solid State Drive Google Apps Video Games Audiobook Meetings Travel Music Humor Internet Exlporer Specifications Servers Frequently Asked Questions Network Congestion Amazon Web Services Nanotechnology Start Menu Politics Rootkit Files Voice over Internet Protocol How to Transportation Safety Worker Commute Audit Employer Employee Relationship Data storage Recovery Recycling Wireless Internet Books Assessment Hybrid Cloud Remote Work Practices Safe Mode IT Consultant Workers Addiction Wearable Technology Digital Signature HVAC Education Excel Online Shopping Smart Tech Tools Training Machine Learning Black Market IT solutions Physical Security Benefits Virtual Assistant Computer Fan Sync Computer Accessories eWaste Wire Television Apple Hosted Computing Leadership Cache Scalability Data loss Internet exploMicrosoft Millennials Encryption Enterprise Content Management Computing Infrastructure Tip of the week Evernote Downtime Vendor Management Multi-Factor Security HIPAA YouTube Firewall Telephone System The Internet of Things Bluetooth Criminal Sports Wireless webinar Emergency Public Computer iPhone Credit Cards Inventory Save Time Password Manager Screen Mirroring Troubleshooting Loyalty Advertising Workforce Password Management Windows 10s Windows Server 2008 Wireless Charging Devices Best Practice Root Cause Analysis Relocation User Error Trending Human Resources HBO Smart Technology Current Events FENG Telephony Google Docs Smart Office Conferencing Software Tips Fraud Access Control Monitor Business Mangement Information Technology Cast SaaS Accountants NIST Techology Users Cortana Thought Leadership Content Botnet Experience Staff Settings Outlook Two Factor Authentication Knowledge Twitter Webinar CrashOverride Thank You WiFi Company Culture Congratulations Managing Stress

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Digital Hold The Case for Hosting Your Phone Solution In-House
24 February 2018
Informative Blog. Thanks a lot for the useful info.
Maria Albert Download the Wrong App and Have More Than Pokémon Fever Infect Your Device
26 September 2017
Occasionally I strive to not concentrate such these kinds of articles and neglect reading like these...
nathan dwyer Your Guide To Mobile Device Management as an SMB
07 September 2017
I come here after quite a while since 2016 and entire this term i have miss the chance to get inform...