ct logo wslogan

2 minutes reading time (405 words)

Tech Term: Cookies Defined

Tech Term: Cookies Defined

Chances are, if you’ve spent any amount of time around a computer, you’ve heard of browser cookies. What you may not have heard, is what these cookies do. For today’s Tech Term, we’ll explore what cookies are, and what they do.

What are Cookies?
A cookie is a sample of information that a website stores on a user’s computer in text format that only that particular website can access. This information, made up of name-value pairs, informs the website if you have ever visited before and allows it to personalize your experience as a user. These cookies are often removed once the browser window is closed down, but they can be designed to last longer.

Cookies are what enable a website to “remember” that you are logged in and allow you to change particular settings without them reverting back the next time you navigate to a new page. Furthermore, cookies can allow websites to remember your browsing tendencies and suggest things that might interest you, even if you haven’t logged in. This is especially apparent on ecommerce sites that offer you products that might interest you based on the products that you’ve viewed in the past.

Are Cookies Dangerous?
In a word, no. All these pieces of data are viewable only by the website that delivered them. This means that Website A can only see cookies that it has delivered, and its cookies are likewise hidden from Website B. As a result, if Website B was attempting some malicious activities, the information that Website A has stored is safe.

However, some cookies are used for purposes that may be unwelcome to some users. Have you ever been browsing for a particular item on Amazon, and then notice that the other websites you visit are displaying advertisements for related items? This is the result of an advertising cookie taking note of what you have demonstrated interest in, thereby allowing it to customize the advertisement to best fit your interests.

Clearing Cookies
Of course, you can remove the cookies that your browser has accumulated by using the Clear Private Data tool. However, this will also erase any saved login credentials that you do want websites to have saved. The majority of browsers have ways to workaround this by whitelisting some websites as trusted to save cookies.

Are there any other Tech Terms you’d like defined, or do you have more questions about cookies? Reach out to us at 630-549-6199 and let us know!



Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Business Computing Cloud Hackers Backup Microsoft Malware Innovation Tech Term Email Internet Network Security Mobile Devices Cybercrime Data Small Business VoIP Android Data Backup Software Ransomware Efficiency Smartphones Cloud Computing Hardware Windows Business Business Management How To User Tips Browser Cybersecurity Smartphone Internet of Things Computers Managed IT Services Business Continuity Law Enforcement Productivity Mobile Device Management Social Engineering Collaboration Communications Hosted Solutions Chrome Upgrade Network Automation Artificial Intelligence Computer Money Data Recovery Router Communication Data Security Two-factor Authentication Operating System Office 365 Outsourced IT Gadgets Social Media Managed IT Services Bandwidth Alert Phishing Saving Money Data Protection App Server BDR Telephone Systems Data Breach Spam Disaster Recovery Connectivity Windows 10 Safety Word Save Money Vulnerability Bring Your Own Device Google Drive Microsoft Office Identity Theft Downtime IT Services Gmail Remote Monitoring YouTube Business Intelligence OneNote Managed IT IT Plan Public Cloud Apps Windows 10 Facebook Recovery Windows 7 Update Virtualization The Internet of Things Infrastructure Unsupported Software Miscellaneous VPN Quick Tips CES Spam Blocking Password Redundancy Content Management Internet Exlporer Avoiding Downtime Comparison BYOD Paperless Office Data Storage Data storage Website Blockchain Physical Security Networking IT Support Cleaning Applications Productivity Passwords Government IT Management Private Cloud Wi-Fi Sports Password Management Windows Server 2008 IBM Devices User Error Big Data eWaste Access Control Health Mobile Device Tech Support Workers Emails Electronic Medical Records Human Resources Value Solid State Drive Accountants Holiday Telephony Evernote Network Congestion Wire Humor Settings NIST Credit Cards Supercomputer Data loss Thought Leadership Robot Criminal HBO Millennials Authentication Shadow IT Botnet Reputation Multi-Factor Security Staff Audit Laptop Apple Flexibility Skype Wireless Charging IT Consultant Smart Office Hybrid Cloud Cryptocurrency Chromecast Flash Fraud Budget Screen Mirroring End of Support Hiring/Firing Frequently Asked Questions Workforce Root Cause Analysis Nanotechnology Files Travel Password Manager Servers Customer Trending Computer Fan Practices Touchpad iPhone Uninterrupted Power Supply Going Green Start Menu Cortana Software Tips Document Management Monitor PDF Charger Safe Mode Office Amazon Cast Addiction Internet exploMicrosoft Patch Management Google Docs Marketing Automobile Data Management NarrowBand Excel Telecommuting Smart Tech Black Market History Workplace Tips USB Business Mangement Netflix HVAC Hacking FENG Hosted Computing Managed Service Provider Legal Office Tips Tools Google Apps webinar Computer Care Windows 10s Digital Signature Virtual Assistant Relocation DDoS Sync Amazon Web Services Current Events Cache Advertising Scam Enterprise Content Management Work/Life Balance Wireless Technology Tip of the week Remote Work Meetings Recycling Specifications Inventory Keyboard Employer-Employee Relationship Conferencing Machine Learning HIPAA Samsung Encryption Telephone System HaaS Entertainment Online Shopping Knowledge Wireless Internet Outlook Voice over Internet Protocol Congratulations Rootkit Television Experience Company Culture Users IT Support Benefits Training Books Virtual Reality Save Time Public Computer CrashOverride Video Games Music Webinar Managing Stress Wireless Loyalty Battery Firewall Vendor Management Twitter Emergency WiFi Worker Commute Scalability Wearable Technology Bluetooth IT solutions SaaS Mobility Risk Management Education Smart Technology Remote Computing Content Search Employer Employee Relationship Politics Information Technology Computing Infrastructure Two Factor Authentication Techology Audiobook How to Computer Accessories Instant Messaging Troubleshooting Thank You Worker Assessment Best Practice Transportation