No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them. Computer cookies actually have quite a bit in common with their baked counterparts - some are good, some are bad, and they have expiration dates.
Cookies are small text files that a server places onto your hard drive whenever you access a given domain. Cookies typically contain information that the website uses to either customize the page you are viewing or otherwise make your web browsing experience more convenient and enjoyable. The information is stored on your hard drive and accessed whenever you go back to the website that originally gave you the cookie. They usually include an expiration date at which point they will be erased from your computer - it could be when you close your browser; or hours, days, months, or years after it is placed. Some don't expire at all. At the time of this writing I had a cookie stored on my computer that wasn't set to expire until Wednesday, February 25th, 2195 at 3:45:13 am - I deleted it.
Before you run out to your browser's options and delete and block all cookies, let me mention a few common uses of cookies:
* Cookies store information for 'shopping carts' at online stores. When you select an item and place it in the shopping cart, a cookie is created to remember the item and the price so that you can keep shopping. When you are done shopping you simply click the button to check out and the site accesses the information stored in the cookies to complete your order.
* Cookies can be used to remember logins and passwords. While this initially sounds a little disheartening, the purpose is really to save you time. Sites will remember the information for you so you don't have to type it in each time you want to access information.
* Cookies help websites customize their content and layout for you. If you are a diehard fan of the local college's basketball team, and you always access the stats and score from the game at a website, that site might use a cookie to send you straight to your team's page.
* Cookies help identify whether you have already visited a site. They can also count how many times you have visited the site in a given period of time.
* Cookies remember the last page or position you were on at the site. Like a virtual bookmark, this is especially helpful if you are reading online or accessing several pages of information.
There are many other ways cookies can be used, and there is obvious potential for abuse. You probably wouldn't eat a cookie given to you by a complete stranger, especially if you didn't know what was in it. The same common-sense principle holds true while you're online, and exercising a little caution can save you from a lot of heartache later on. Blocking any and all cookies will guarantee no personal information is leaked through the cookies, but many sites will either not be able to or will choose not to interact with you.
The trick, then, is to let the good cookies through while screening out the bad ones, not at all dissimilar to what you do when you hover over the cookie tray at a party - you take the ones you want and leave the rest behind. This can be accomplished in a few different ways.
First, you can periodically delete all the cookies on your hard drive. This will systematically wipe out all unwanted cookies that have made their way to your computer. Unfortunately, it will also take care of all the good cookies too. If you only use the internet occasionally (i.e. a few minutes a week), this option might work for you.
Second, you can try to go about it manually. Many browsers that allow you to block cookies also include a feature that allows you to include a list of sites from which you will allow cookies. The advantage of this method is it places virtually complete control over cookies into your hands, allowing only those that you want to be placed on your hard drive. The disadvantage is that it can become very burdensome (at times downright annoying) having to constantly update the list of allowed sites.
Third, you can call in some third-party software to help out. The best programs will scan your computer to find all the cookies and put them into a table or list. This saves you the trouble of having to dig around your hard drive to find the files yourself (try looking for a folder named "Cookies"). Many programs will also indicate with some degree of confidence whether a given cookie is wanted or unwanted, and provide a convenient way to delete the ones that you decide you don't want.
Nick Smith is a client account specialist with 10x Marketing - More Visitors. More Buyers. More Revenue. For great software to help delete cookies, check out ContentWatch, Inc.
![]() |
|
![]() |
|
![]() |
|
![]() |
Someone recently told me, "You would have to be a... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
Millions of people make purchases online, but many people are... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Many of us have run into an annoying and time-consuming... Read More
No longer are viruses the only threat on the internet.... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
During the release of a new software product specialized to... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
Let us take the example of scrambling an egg. First,... Read More
When it comes to a secure website and passwords it... Read More
The money being spent online is steadily growing. With billions... Read More
When it comes to reporting Internet scams most of us... Read More
File sharing on p2p is soaring despite the music and... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
Over £5 billion pounds was spent on online shopping in... Read More
I am the victim of an internet scam. It is... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
First off I should explain what phishing is. Phishing is... Read More
History and BackgroundThe virus was one of the first ever... Read More
If you are a parent, as am I, I think... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
If spyware were a person and he set himself up... Read More
First, let's do a little recap'. As I stated in... Read More
There are folks out there who use their powers for... Read More
Every now and then you can read about a new... Read More
A little bit of time invested into learning about internet... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
As you know, this time the virus under the name... Read More
When surfing the Internet you probably take your anonymity for... Read More
History and BackgroundThe virus was one of the first ever... Read More
As more people are logging onto the Internet everyday, Network... Read More
You've seen it in the news - 40 million credit... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
With the advent of the World Wide Web, a whole... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
Pharming is one of the latest online scams and rapidly... Read More
Spyware is software that runs on a personal computer without... Read More
Today the internet is a mine field of malicious code... Read More
First of all we need to get some terms stated.... Read More
If you run any type of Internet business, Adware and... Read More
Threats we ordinary Web users face online leave us no... Read More
Have you ever had to call Symantec or McAfee to... Read More
When the Internet first came about, it was realized it... Read More
My first experience with a spyware BHO based infection was... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
There has not been a time in the history of... Read More
Be careful of sites that promise to send you "instant... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
They're out there. Individuals trying to make a quick buck... Read More
Do you sometimes notice your computer running slower. Is your... Read More
There are ways to insure security though. You can get... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
First off I should explain what phishing is. Phishing is... Read More
First, let's do a little recap'. As I stated in... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
If you have used a Windows machine for a while,... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
This really chapped my lips...I recently bought a new computer.... Read More
There are folks out there who use their powers for... Read More
As the number of people using the Internet as an... Read More
Internet Security |