Delete Cookies: New-Age Diet or Common Sense Internet Security?

No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them. Computer cookies actually have quite a bit in common with their baked counterparts - some are good, some are bad, and they have expiration dates.

Cookies are small text files that a server places onto your hard drive whenever you access a given domain. Cookies typically contain information that the website uses to either customize the page you are viewing or otherwise make your web browsing experience more convenient and enjoyable. The information is stored on your hard drive and accessed whenever you go back to the website that originally gave you the cookie. They usually include an expiration date at which point they will be erased from your computer - it could be when you close your browser; or hours, days, months, or years after it is placed. Some don't expire at all. At the time of this writing I had a cookie stored on my computer that wasn't set to expire until Wednesday, February 25th, 2195 at 3:45:13 am - I deleted it.

Before you run out to your browser's options and delete and block all cookies, let me mention a few common uses of cookies:

* Cookies store information for 'shopping carts' at online stores. When you select an item and place it in the shopping cart, a cookie is created to remember the item and the price so that you can keep shopping. When you are done shopping you simply click the button to check out and the site accesses the information stored in the cookies to complete your order.

* Cookies can be used to remember logins and passwords. While this initially sounds a little disheartening, the purpose is really to save you time. Sites will remember the information for you so you don't have to type it in each time you want to access information.

* Cookies help websites customize their content and layout for you. If you are a diehard fan of the local college's basketball team, and you always access the stats and score from the game at a website, that site might use a cookie to send you straight to your team's page.

* Cookies help identify whether you have already visited a site. They can also count how many times you have visited the site in a given period of time.

* Cookies remember the last page or position you were on at the site. Like a virtual bookmark, this is especially helpful if you are reading online or accessing several pages of information.

There are many other ways cookies can be used, and there is obvious potential for abuse. You probably wouldn't eat a cookie given to you by a complete stranger, especially if you didn't know what was in it. The same common-sense principle holds true while you're online, and exercising a little caution can save you from a lot of heartache later on. Blocking any and all cookies will guarantee no personal information is leaked through the cookies, but many sites will either not be able to or will choose not to interact with you.

The trick, then, is to let the good cookies through while screening out the bad ones, not at all dissimilar to what you do when you hover over the cookie tray at a party - you take the ones you want and leave the rest behind. This can be accomplished in a few different ways.

First, you can periodically delete all the cookies on your hard drive. This will systematically wipe out all unwanted cookies that have made their way to your computer. Unfortunately, it will also take care of all the good cookies too. If you only use the internet occasionally (i.e. a few minutes a week), this option might work for you.

Second, you can try to go about it manually. Many browsers that allow you to block cookies also include a feature that allows you to include a list of sites from which you will allow cookies. The advantage of this method is it places virtually complete control over cookies into your hands, allowing only those that you want to be placed on your hard drive. The disadvantage is that it can become very burdensome (at times downright annoying) having to constantly update the list of allowed sites.

Third, you can call in some third-party software to help out. The best programs will scan your computer to find all the cookies and put them into a table or list. This saves you the trouble of having to dig around your hard drive to find the files yourself (try looking for a folder named "Cookies"). Many programs will also indicate with some degree of confidence whether a given cookie is wanted or unwanted, and provide a convenient way to delete the ones that you decide you don't want.

Nick Smith is a client account specialist with 10x Marketing - More Visitors. More Buyers. More Revenue. For great software to help delete cookies, check out ContentWatch, Inc.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Russia says NATO membership of Balkan countries threatens security
Reuters
SARAJEVO (Reuters) - NATO enlargement to take in members from the Balkan countries is undermining security and stability in the region, a senior Russian parliamentarian said on Monday. Valentina Matviyenko, speaking in the upper house of Bosnia's ...

and more »

NPR

Alexa, Tell Me A National Security Secret: Amazon's Reach Goes ...
NPR
It's little known that the CIA uses Amazon Web Services to store its data, and, now, it's the favorite for a big-money Pentagon contract to do the same. Amazon's tentacles go to other agencies, too.
Alexa, tell me a national security secret: Amazon's reach goes beyond the Post Office89.3 KPCC

all 1 news articles »

Council on Foreign Relations (blog)

Nigeria Security Tracker Weekly Update: April 14 - April 20
Council on Foreign Relations (blog)
April 15: Boko Haram killed three Chadian soldiers in Abadam, Borno. April 15: Herdsmen killed seventy-eight in Awe, Keana, Obi, and Doma LGAs in Nasarawa (casualties not specified by LGA; majority in Obi). April 16: Kidnappers killed one policeman and ...

and more »

Quick Take-Aways From the RSA Security Conference
CSO Online
The transition from “bolted on” to “baked in” security. With security as a top-of-mind issue across business and IT, security functionality is moving toward cloud, application, and IT infrastructure. Intel announced new chip-level security ...

and more »

Stars and Stripes

Chinese smartphones cited by intelligence as security risk sold on US bases
Stars and Stripes
“Regardless of where the device is purchased, on base or off base, servicemembers should practice good (operational security).” In February, the director of national intelligence, along with the heads of the CIA, FBI, National Security Agency, Defense ...

and more »

Chicago Tribune

Oakbrook Center security scans license plates in its parking lots, raising privacy concerns
Chicago Tribune
If you park at Oakbrook Center, your car may be part of a candid camera scenario, as security cars drive up and down aisles in lots and garages, using license plate reading technology to check the plate numbers on vehicles. The license plate ...

and more »

New York Post

National security adviser recently chaired nonprofit with anti-Muslim views
New York Post
National security adviser John Bolton recently chaired a nonprofit that has shared fake anti-Muslim news, according to a new report. Bolton was chairman of the New York-based Gatestone Institute, which peddled misleading and false anti-Muslim accounts ...
National Security Adviser John Bolton is the former chairman of a sensationalist, anti-immigrant nonprofitThe Week Magazine
John Bolton presided over anti-Muslim think tankNBCNews.com
Are Jihadists Taking over Europe?Gatestone Institute

all 17 news articles »

New security at courthouse diffuses several situations
Abilene Recorder Chronicle
The presence of security guards in the Dickinson County Courthouse is making workdays a little less stressful for some employees. Dickinson County Administrator Brad Homman told commissioners Thursday that not only has the screening process and metal ...


Haaretz

Egypt's New Internet Law Blocks Sites Over 'National Security Concern'
Haaretz
What is national security, wondered Yasser Abdel Aziz, a leading member of Egypt's National Council for Human Rights. “If I were to publish something saying that the president is not a native Egyptian, would that harm national security?” At a meeting ...


The Hill

Homeland Security chief issues warning to 'caravan'
The Hill
Homeland Security Secretary Kirstjen Nielsen · Kirstjen Michele NielsenSenators chart path forward on election security bill Navy, Marines chiefs say no morale issues with transgender troops Staff changes upend White House cyber team MORE said Monday ...
Trump Brands Migrant Caravan a 'Disgrace,' Orders Homeland Security Officials to Turn Away Immigrants at BorderNewsweek
DHS boss threatens 'caravan' border-crossers with prosecution, detention, deportationFox News

all 70 news articles »
Google News

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at... Read More

Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom ---------------------------------------- As a network... Read More

How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are... Read More

If You Sell Anything Online Your ePockets Are Being Picked

You and I are a lot alike. We are both... Read More

Web Browsing - Collected Information

You may not realize it, but as you are surfing... Read More

Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

Never before with Instant Messaging (IM) has a more vital... Read More

The Saga of the Annoying Adware

When we think of adware, what comes to mind are... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Be Alert! Others Can Catch Your Money Easily!

So called phishers try to catch the information about the... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

3 Steps to Ending Scams and Virus Problems

Watching how the traditional media covers the latest virus or... Read More

How to Protect Yourself Against Online Criminals

Credit card fraud is a growing problem for online businesses... Read More

Top Five Online Scams

The top five online scams on the Internet hit nearly... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

Are They Watching You Online?

When surfing the Internet you probably take your anonymity for... Read More

Spyware Removal

Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More

Keeping Worms Out of Your Network...

No auntie Sookie, not earth worms, computer virus worms that... Read More

Top 10 tips for Safe Internet Shopping

Over £5 billion pounds was spent on online shopping in... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

Blogs as Safe Haven for Cybercriminals?

To blog or not to blog? Well, why not? Lots... Read More

Wireless Network Security

Working from home has its advantages, including no commute, a... Read More

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More