Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Delete Cookies: New-Age Diet or Common Sense Internet Security? > NetSparsh - Viral Content you Love & Share

Delete Cookies: New-Age Diet or Common Sense Internet Security?

No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them. Computer cookies actually have quite a bit in common with their baked counterparts - some are good, some are bad, and they have expiration dates.

Cookies are small text files that a server places onto your hard drive whenever you access a given domain. Cookies typically contain information that the website uses to either customize the page you are viewing or otherwise make your web browsing experience more convenient and enjoyable. The information is stored on your hard drive and accessed whenever you go back to the website that originally gave you the cookie. They usually include an expiration date at which point they will be erased from your computer - it could be when you close your browser; or hours, days, months, or years after it is placed. Some don't expire at all. At the time of this writing I had a cookie stored on my computer that wasn't set to expire until Wednesday, February 25th, 2195 at 3:45:13 am - I deleted it.

Before you run out to your browser's options and delete and block all cookies, let me mention a few common uses of cookies:

* Cookies store information for 'shopping carts' at online stores. When you select an item and place it in the shopping cart, a cookie is created to remember the item and the price so that you can keep shopping. When you are done shopping you simply click the button to check out and the site accesses the information stored in the cookies to complete your order.

* Cookies can be used to remember logins and passwords. While this initially sounds a little disheartening, the purpose is really to save you time. Sites will remember the information for you so you don't have to type it in each time you want to access information.

* Cookies help websites customize their content and layout for you. If you are a diehard fan of the local college's basketball team, and you always access the stats and score from the game at a website, that site might use a cookie to send you straight to your team's page.

* Cookies help identify whether you have already visited a site. They can also count how many times you have visited the site in a given period of time.

* Cookies remember the last page or position you were on at the site. Like a virtual bookmark, this is especially helpful if you are reading online or accessing several pages of information.

There are many other ways cookies can be used, and there is obvious potential for abuse. You probably wouldn't eat a cookie given to you by a complete stranger, especially if you didn't know what was in it. The same common-sense principle holds true while you're online, and exercising a little caution can save you from a lot of heartache later on. Blocking any and all cookies will guarantee no personal information is leaked through the cookies, but many sites will either not be able to or will choose not to interact with you.

The trick, then, is to let the good cookies through while screening out the bad ones, not at all dissimilar to what you do when you hover over the cookie tray at a party - you take the ones you want and leave the rest behind. This can be accomplished in a few different ways.

First, you can periodically delete all the cookies on your hard drive. This will systematically wipe out all unwanted cookies that have made their way to your computer. Unfortunately, it will also take care of all the good cookies too. If you only use the internet occasionally (i.e. a few minutes a week), this option might work for you.

Second, you can try to go about it manually. Many browsers that allow you to block cookies also include a feature that allows you to include a list of sites from which you will allow cookies. The advantage of this method is it places virtually complete control over cookies into your hands, allowing only those that you want to be placed on your hard drive. The disadvantage is that it can become very burdensome (at times downright annoying) having to constantly update the list of allowed sites.

Third, you can call in some third-party software to help out. The best programs will scan your computer to find all the cookies and put them into a table or list. This saves you the trouble of having to dig around your hard drive to find the files yourself (try looking for a folder named "Cookies"). Many programs will also indicate with some degree of confidence whether a given cookie is wanted or unwanted, and provide a convenient way to delete the ones that you decide you don't want.

Nick Smith is a client account specialist with 10x Marketing - More Visitors. More Buyers. More Revenue. For great software to help delete cookies, check out ContentWatch, Inc.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

CSO Online

6 essential elements of edge computing security
CSO Online
“If you're responsible for asset management, you need to account for your IT assets across the company, whether these assets come in through IT or end user areas,” says Mike Raggo, CSO at 802Secure, which specializes in IoT security. “If you don't do ...

and more »

TechCrunch

Russian indictments show that the US needs federal oversight of election security
TechCrunch
President Trump's Helsinki summit with Vladimir Putin, on the heels of 12 Russian intelligence officials indicted for hacking the 2016 election, made it clear that this administration has zero commitment to protect our elections from future Russian ...

and more »

PBS NewsHour

US launches national security probe into uranium imports
PBS NewsHour
WASHINGTON — The Commerce Department has started an investigation into the impact of uranium imports on U.S. national security, a move that could limit future imports and add another front to the Trump administration's trade fight. Commerce Secretary ...
Commerce Dept. reviewing impact of uranium imports on US national securityThe Hill
Trump Administration Investigating Uranium Imports Under National Security ConcernsWall Street Journal
Trump launches national security probe of uranium importsPolitico

all 65 news articles »

TechCrunch

Okta nabs ScaleFT to build out 'Zero Trust' security framework ...
TechCrunch
Okta, the cloud identity management company, announced today it has purchased a startup called ScaleFT to bring the Zero Trust concept to the Okta platform.
Okta acquires zero trust security firm ScaleFTZDNet

all 5 news articles »

Make Security Boring Again
Dark Reading
I know this because I routinely hear from and ask questions of security leaders from both commercial and public sector organizations, and the top problems are categorically identical: talent recruitment and retention, skills gaps, budget challenges ...


WIRED

Amazon Tests Out Two Tools to Help Keep Its Cloud Secure
WIRED
Two new tools might help alleviate the problem, though. Known as Zelkova and Tiros, the offerings from the AWS Automated Reasoning Group analyze crucial AWS security configurations, evaluating access control schemes and mapping possible paths to ...


TNW

Survey: 45% of security professionals reuse the same password
TNW
There's a saying — “practice what you preach.” If you give advice, make sure it's something you follow personally. Turns out, some security pros aren't doing that. A survey of 306 infosec professionals at London's Infosecurity Conference 2008 from ...


TechRepublic

BetterCloud bolsters G Suite security with rapid risk identification
TechRepublic
On Wednesday, SaaS operations management platform BetterCloud launched a real-time security monitoring and reporting solution for businesses using G Suite. The solution, called Activity-Based Alerts for Google Cloud, allows enterprises to continuously ...
BetterCloud launches security alerts for G SuiteZDNet

all 3 news articles »

WTOP

Debate over Fairfax school security continues as vote nears
WTOP
WASHINGTON — Just over a week before the Fairfax County School Board will vote whether to implement more than $24 million in security recommendations, debate continues over one strategy that was voted down — hiring more school resource officers.


KCRA Sacramento

Investigation: Gaps remain in election security 4 months before midterms
KCRA Sacramento
With the crucial midterm elections less than four months away, an investigation by the Hearst Television National Investigative Unit has found gaps remain in state and federal preparedness. The potential risks span from voting machines to cyber ...
NY aims to boost election cyber securityNEWS10 ABC

all 5 news articles »
Google News

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

1. Geek Superhero http://www.deprice.com/geeksuperhero.htmGeek Superhero watches your computer for changes,... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

Firewall Protection - Does Your Firewall Do This?

The first thing people think about when defending their computers... Read More

Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing

The Internet offers a global marketplace for consumers and businesses.... Read More

Three-pronged Trojan Attack Threatens Security on the Internet

Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More

Reporting Internet Scams

When it comes to reporting Internet scams most of us... Read More

5 Tips For An Unbreakable Password

Despite the current wave of identity theft and corporate security... Read More

3 Steps to Ending Scams and Virus Problems

Watching how the traditional media covers the latest virus or... Read More

Top Five Online Scams

The top five online scams on the Internet hit nearly... Read More

Phishing

Recently I have received email from my bank/credit Card Company,... Read More

Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the... Read More

An Open Letter From a So-called Stupid

Someone recently told me, "You would have to be a... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More

How to Get Rid of New Sobig.F Virus?

As you know, this time the virus under the name... Read More

Internet Identity Theft - How You Can Shield Yourself

With the advent of the World Wide Web, a whole... Read More

How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances

Spyware/adware is a new major concern for PC users everywhere.... Read More

The 5 Critical Steps to Protecting Your Computer on the Internet

Spyware, viruses and worms... oh my!If you are connected to... Read More

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

Top Five Spyware Fighting Tips

Spyware and adware are becoming major problems for online surfers... Read More

Is That Free Stuff Like An iPod Or Desktop Computer Really Free?

Have you seen the web site, www.freestuff.com? Or have you... Read More

Passwords or Pass Phrase? Protecting your Intellectual Property

Much has been said on the theory of password protection... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More

The Risk Of Electronic Fraud & Identity Theft

Electronic Fraud and Identity Theft ----------------------------------- Human beings are pretty... Read More

The Importance of Protecting Your PC from Viruses and Spam

Today the internet is a mine field of malicious code... Read More

How to Protect Yourself Against Online Criminals

Credit card fraud is a growing problem for online businesses... Read More