SlideShare una empresa de Scribd logo
1 de 29
Internet Cookies
'Internet Cookies'

A cookie, also known as an HTTP cookie, web
cookie, or browser cookie.
What is an 'Internet Cookies' ?

A cookie is a TEXT object send by web server
to a browser or on your hard drive.

The main purpose of a cookie is to identify
users and remember stateful information
(such as items in a shopping cart) or to save site
login information for you
WHO CAN SEE THE COOKIES?

Only the server that put the cookie on
your hard drive.

Larger sites can set a domain attribute for
other servers in the same sub domain
What Do 'Cookies Look Like' ?
eg. google.com/search
Where does the term "Cookie" come
from?

Cookies for the internet were originally
developed in 1995 by the Netscape
Communications Corporation. The word
"cookie" comes from "magic cookie,"

A computer science term for a piece of
information shared between co-operating pieces
of software. So where does "magic cookie"
come from? Some say it comes from the
computer games of the late 80's & early 90's.
Eating Magic Cookies in the game would give
the player special powers
Types Of Cookies
1.Session Cookies: Stored in memory
Valid for one session.
One session means time between opening and
closing of your browser.
As the browser store in memory this cookies also
stored in memory. As the browser goes out of
memory the cookies also deleted.
2. Persistent Cookies: Stored in hard drive

They are Stored for more than one browser
session. Hence they are stored in hard drive.

Persistent cookies stay with your browser even
after you've exited it.

The next time you open your browser and access
the website that placed the cookie on your
browser, it will find the cookie still there.

They are actually very helpful.
3. Secure Https:

They are only useful when you are transferring
data via https (secure) protocol.

Used for secure transmission of information.
Like bank transaction.

Ensuring that the cookie is always encrypted
when transmitting from client to server.

This makes the cookie less likely to be exposed
to cookie theft.
4. Http Only

Can be used only via HTTP protocol.

Restrict acces from other non-HTTPAPIs.

Suppose I have a http only cookies so it can not
be accesed by non http script like java script.

They are much more secure than other cookies.
6. Third Party Cookies

This cookies generate from first party.

They just track you and expose your privacy.

A Web site that is not the site you are visiting.

For example, if the Web site you are on using
third-party advertising those third-party
advertising Web sites may use a cookie to track
your Web habits for marketing purposes.
Third Party Cookies
7. Super or Zombi Cookie

Most Dangerous cookies.

Some cookies are automatically recreated after
a user has deleted them; these are called zombie
cookies
Other Attributes Of Cookies

Name , Value , Expiry of the cookie

Path , Domain the cookie is good for

Need for a secure connection to use the
cookie

Whether or not the cookie can be accessed
through other means than HTTP (i.e.,
JavaScript)
Uses
1. Session management:

Cookies may be used to maintain data related to
the user during navigation, possibly across
multiple visits.

Eg. You are buying online so it keep track of the
things which you buy.
2. Personalize

Keep track of your preferences on any website.

Suppose Theme,Layout etc
3. Tracking

Done by third party website.

Track you moving one site to another.

Or with in the website.
Hence the cookie get lots of data.
But here we have a solution
A web server typically sends a cookie containing a
unique session identifier.
Limitations
Disadvantages
Delete Chrome Cookies

Cilck on the side bar in chrome.

Now click on Settings option.

In 'Privacy' click on Content Settings.

Here you will found Cookies Section. Now
click on 'All Cookies site data'.

You will found all the cookies stored in your
chrome. Now you can delete by your choice
either one or all.
Delete Firefox Cookies

Please not there are some variations depending
on your operating system and if you wish to
delete a single cookie or all cookies from Firefox.
Step one

At the top of the Firefox window, click on the
Firefox button (Tools menu in Windows XP) and
then click Options.

Select the Privacy Panel and set the Firefox will:
option to Use custom settings for history
Delete Firefox Cookies Conti..
Step two

Now click on the button labelled Show
Cookies… and a the Cookies window will
appear.
Step three

In the Search: field, type the name of the site
whose cookies you want to remove. The cookies
that match your search will be displayed. You can
now select the cookie(s) in the list to be removed
and click Remove Cookie button.
Thank You.....

Más contenido relacionado

La actualidad más candente

Https presentation
Https presentationHttps presentation
Https presentationpatel jatin
 
Presentation of web designing
Presentation of web designingPresentation of web designing
Presentation of web designingsreejagiri
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Web Site Design Principles
Web Site Design PrinciplesWeb Site Design Principles
Web Site Design PrinciplesMukesh Tekwani
 
How Hashing Algorithms Work
How Hashing Algorithms WorkHow Hashing Algorithms Work
How Hashing Algorithms WorkCheapSSLsecurity
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Web Fundamentals
Web FundamentalsWeb Fundamentals
Web Fundamentalsarunv
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networksTannistho Ghosh
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell pptsravya raju
 
WWW, Website & Webpage
WWW, Website & WebpageWWW, Website & Webpage
WWW, Website & WebpageZeeshan Alam
 
World wide web architecture presentation
World wide web architecture presentationWorld wide web architecture presentation
World wide web architecture presentationImMe Khan
 

La actualidad más candente (20)

Https presentation
Https presentationHttps presentation
Https presentation
 
Presentation of web designing
Presentation of web designingPresentation of web designing
Presentation of web designing
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Web Site Design Principles
Web Site Design PrinciplesWeb Site Design Principles
Web Site Design Principles
 
Web security
Web securityWeb security
Web security
 
How Hashing Algorithms Work
How Hashing Algorithms WorkHow Hashing Algorithms Work
How Hashing Algorithms Work
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Kerberos
KerberosKerberos
Kerberos
 
Web Fundamentals
Web FundamentalsWeb Fundamentals
Web Fundamentals
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 
Http Vs Https .
Http Vs Https . Http Vs Https .
Http Vs Https .
 
WWW, Website & Webpage
WWW, Website & WebpageWWW, Website & Webpage
WWW, Website & Webpage
 
Html Ppt
Html PptHtml Ppt
Html Ppt
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Network security
Network securityNetwork security
Network security
 
World wide web architecture presentation
World wide web architecture presentationWorld wide web architecture presentation
World wide web architecture presentation
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
 

Destacado (8)

Cookie & Session In ASP.NET
Cookie & Session In ASP.NETCookie & Session In ASP.NET
Cookie & Session In ASP.NET
 
Cookies and sessions
Cookies and sessionsCookies and sessions
Cookies and sessions
 
Hypertext
HypertextHypertext
Hypertext
 
Sessions and cookies
Sessions and cookiesSessions and cookies
Sessions and cookies
 
Hypertext, hypermedia and multimedia
Hypertext, hypermedia and multimediaHypertext, hypermedia and multimedia
Hypertext, hypermedia and multimedia
 
Javascript
JavascriptJavascript
Javascript
 
Cookies PowerPoint
Cookies PowerPointCookies PowerPoint
Cookies PowerPoint
 
Cookies!
Cookies!Cookies!
Cookies!
 

Similar a Presentation on Internet Cookies

Cookie replay attack unit wise presentation
Cookie replay attack  unit wise presentationCookie replay attack  unit wise presentation
Cookie replay attack unit wise presentationNilu Desai
 
Cookies and sessions
Cookies and sessionsCookies and sessions
Cookies and sessionsSukrit Gupta
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xiArchana Dwivedi
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief IntroductionHTS Hosting
 
online spying tools
online spying toolsonline spying tools
online spying toolsDeepa Jacob
 
Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 EricZhuZhengyi
 
What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s SakeWhat Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s SakePiwik PRO
 
Cookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxCookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxMIsmail73
 
Web Browser-add ons.pptx
Web Browser-add ons.pptxWeb Browser-add ons.pptx
Web Browser-add ons.pptxkkmodi12
 
Electronic computer cookies
Electronic computer cookiesElectronic computer cookies
Electronic computer cookiesSimilarweb
 
Google Analytics Cookies Tracking
Google Analytics Cookies TrackingGoogle Analytics Cookies Tracking
Google Analytics Cookies TrackingAK DigiHub
 
Cookie testing
Cookie testingCookie testing
Cookie testingBugRaptors
 
The ultimate guide to mining bitcoin with cryptotab
The ultimate guide to mining bitcoin with cryptotabThe ultimate guide to mining bitcoin with cryptotab
The ultimate guide to mining bitcoin with cryptotabSaid Dhaouadi
 
Online Privacy Lilyana Ruiz
Online Privacy Lilyana RuizOnline Privacy Lilyana Ruiz
Online Privacy Lilyana Ruizlilyanariz
 
Cookies: HTTP state management mechanism
Cookies: HTTP state management mechanismCookies: HTTP state management mechanism
Cookies: HTTP state management mechanismJivan Nepali
 

Similar a Presentation on Internet Cookies (20)

Cookie replay attack unit wise presentation
Cookie replay attack  unit wise presentationCookie replay attack  unit wise presentation
Cookie replay attack unit wise presentation
 
Cookies and sessions
Cookies and sessionsCookies and sessions
Cookies and sessions
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief Introduction
 
online spying tools
online spying toolsonline spying tools
online spying tools
 
Cookies
CookiesCookies
Cookies
 
Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5
 
What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s SakeWhat Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
 
Cookies may be set by the website you are visiting
Cookies may be set by the website you are visitingCookies may be set by the website you are visiting
Cookies may be set by the website you are visiting
 
Cookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxCookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptx
 
GDPR Cookies Policy
GDPR Cookies PolicyGDPR Cookies Policy
GDPR Cookies Policy
 
Web Browser-add ons.pptx
Web Browser-add ons.pptxWeb Browser-add ons.pptx
Web Browser-add ons.pptx
 
Electronic computer cookies
Electronic computer cookiesElectronic computer cookies
Electronic computer cookies
 
Google Analytics Cookies Tracking
Google Analytics Cookies TrackingGoogle Analytics Cookies Tracking
Google Analytics Cookies Tracking
 
Cookie testing
Cookie testingCookie testing
Cookie testing
 
The ultimate guide to mining bitcoin with cryptotab
The ultimate guide to mining bitcoin with cryptotabThe ultimate guide to mining bitcoin with cryptotab
The ultimate guide to mining bitcoin with cryptotab
 
Online Privacy Lilyana Ruiz
Online Privacy Lilyana RuizOnline Privacy Lilyana Ruiz
Online Privacy Lilyana Ruiz
 
Cookies: HTTP state management mechanism
Cookies: HTTP state management mechanismCookies: HTTP state management mechanism
Cookies: HTTP state management mechanism
 
Cookies (in Online Advertising)
Cookies (in Online Advertising)Cookies (in Online Advertising)
Cookies (in Online Advertising)
 
Cookie management
Cookie managementCookie management
Cookie management
 

Último

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 

Último (20)

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 

Presentation on Internet Cookies

  • 2. 'Internet Cookies'  A cookie, also known as an HTTP cookie, web cookie, or browser cookie.
  • 3. What is an 'Internet Cookies' ?  A cookie is a TEXT object send by web server to a browser or on your hard drive.  The main purpose of a cookie is to identify users and remember stateful information (such as items in a shopping cart) or to save site login information for you
  • 4.
  • 5. WHO CAN SEE THE COOKIES?  Only the server that put the cookie on your hard drive.  Larger sites can set a domain attribute for other servers in the same sub domain
  • 6. What Do 'Cookies Look Like' ? eg. google.com/search
  • 7. Where does the term "Cookie" come from?  Cookies for the internet were originally developed in 1995 by the Netscape Communications Corporation. The word "cookie" comes from "magic cookie,"  A computer science term for a piece of information shared between co-operating pieces of software. So where does "magic cookie" come from? Some say it comes from the computer games of the late 80's & early 90's. Eating Magic Cookies in the game would give the player special powers
  • 8. Types Of Cookies 1.Session Cookies: Stored in memory Valid for one session. One session means time between opening and closing of your browser. As the browser store in memory this cookies also stored in memory. As the browser goes out of memory the cookies also deleted.
  • 9. 2. Persistent Cookies: Stored in hard drive  They are Stored for more than one browser session. Hence they are stored in hard drive.  Persistent cookies stay with your browser even after you've exited it.  The next time you open your browser and access the website that placed the cookie on your browser, it will find the cookie still there.  They are actually very helpful.
  • 10. 3. Secure Https:  They are only useful when you are transferring data via https (secure) protocol.  Used for secure transmission of information. Like bank transaction.  Ensuring that the cookie is always encrypted when transmitting from client to server.  This makes the cookie less likely to be exposed to cookie theft.
  • 11. 4. Http Only  Can be used only via HTTP protocol.  Restrict acces from other non-HTTPAPIs.  Suppose I have a http only cookies so it can not be accesed by non http script like java script.  They are much more secure than other cookies.
  • 12. 6. Third Party Cookies  This cookies generate from first party.  They just track you and expose your privacy.  A Web site that is not the site you are visiting.  For example, if the Web site you are on using third-party advertising those third-party advertising Web sites may use a cookie to track your Web habits for marketing purposes.
  • 14. 7. Super or Zombi Cookie  Most Dangerous cookies.  Some cookies are automatically recreated after a user has deleted them; these are called zombie cookies
  • 15. Other Attributes Of Cookies  Name , Value , Expiry of the cookie  Path , Domain the cookie is good for  Need for a secure connection to use the cookie  Whether or not the cookie can be accessed through other means than HTTP (i.e., JavaScript)
  • 16.
  • 17.
  • 18.
  • 19. Uses 1. Session management:  Cookies may be used to maintain data related to the user during navigation, possibly across multiple visits.  Eg. You are buying online so it keep track of the things which you buy.
  • 20. 2. Personalize  Keep track of your preferences on any website.  Suppose Theme,Layout etc 3. Tracking  Done by third party website.  Track you moving one site to another.  Or with in the website.
  • 21. Hence the cookie get lots of data.
  • 22. But here we have a solution A web server typically sends a cookie containing a unique session identifier.
  • 25.
  • 26. Delete Chrome Cookies  Cilck on the side bar in chrome.  Now click on Settings option.  In 'Privacy' click on Content Settings.  Here you will found Cookies Section. Now click on 'All Cookies site data'.  You will found all the cookies stored in your chrome. Now you can delete by your choice either one or all.
  • 27. Delete Firefox Cookies  Please not there are some variations depending on your operating system and if you wish to delete a single cookie or all cookies from Firefox. Step one  At the top of the Firefox window, click on the Firefox button (Tools menu in Windows XP) and then click Options.  Select the Privacy Panel and set the Firefox will: option to Use custom settings for history
  • 28. Delete Firefox Cookies Conti.. Step two  Now click on the button labelled Show Cookies… and a the Cookies window will appear. Step three  In the Search: field, type the name of the site whose cookies you want to remove. The cookies that match your search will be displayed. You can now select the cookie(s) in the list to be removed and click Remove Cookie button.