BNMC Blog

Tech Terminology: Cookies

Tech Terminology: Cookies

Everyone loves cookies, but browser cookies take on a whole other definition in the computing environment. Do you know what browser cookies do, as well as what their purpose is? Today’s tech term is dedicated to cookies--they might not be delicious, but they do serve an important role within your organization.

What Are Cookies?
Cookies are bits of information from websites that are stored on your computer in a text format. What this accomplishes is that it makes it much easier to access information repeatedly. The information is stored in name-value pairs that check if you’ve accessed the website before. If you have, it customizes your experience to reflect any information that has been collected in regard to that website. The cookies are then removed when the browser window closes, or they linger for as long as they are set to.

In their most basic sense, cookies give websites the ability to remember that you logged in, while also retaining specific settings that are customized based on your input. This keeps them from reverting to the default settings upon leaving the browser. A perfect example of how these work is looking at Amazon and other e-commerce sites. You might wonder how they know what products to recommend to you. The answer is cookies--they keep track of what items you’ve browsed, giving you the ability to potentially purchase them at a later date.

Is This Dangerous?
Cookies might seem like a threat to your privacy at first glance, but this isn’t necessarily true. The data stored by cookies can only be viewed by websites that deliver them. This means that information from one website can’t be seen by another, eliminating the possibility that malicious websites could use cookies to access information stored by other websites.

On the other hand, cookies aren’t always there to help. In the above example, Amazon might be suggesting searches for you, but other websites can store cookies in the form of ads. Advertisement cookies contain information about what you might be interested in, meaning that any website that uses that particular type of ad will be able to see information about what you’re interested in. A good example of this is Google AdWords, which is used all over the Internet.

Clearing Cookies
To clear cookies collected by the browser, you can use the Clear Private Data tool. This also deletes any saved login credentials that you have stored. To make this less irritating for you, you can whitelist specific websites to preserve their cookies.

For more great tech terms and tricks, subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, December 10 2018

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Privacy Malware Network Security Business Computing Hackers Business Software User Tips Internet Microsoft Google Computer Tech Term IT Services Ransomware Efficiency Mobile Devices Hosted Solutions Communication Smartphone Small Business Backup IT Support Managed IT Services Productivity Android Data Data Recovery Saving Money Business Continuity Browser Hardware Innovation Windows 10 Windows Data Management Internet of Things Cloud Computing App Business Management Managed IT Services Microsoft Office Productivity Data Backup Cybersecurity Workplace Tips Artificial Intelligence Gmail Office 365 Windows 10 Disaster Recovery Encryption Passwords Word Upgrade Facebook Server Remote Monitoring Network Website Money Infrastructure IT Support Tip of the week BYOD Outsourced IT Smartphones Chrome Vulnerability Managed Service Provider Employer-Employee Relationship Analytics Phishing communications Applications Mobile Device YouTube IT Management Risk Management Data storage Social Media Company Culture Office Tips Managed Service Government Maintenance Big Data VoIP Google Drive Content Filtering Bandwidth Antivirus Settings Miscellaneous Save Money Robot Users Data Security Business Intelligence Paperless Office Business Technology Server Management Automation Virtual Private Network Touchscreen End of Support Quick Tips Virtual Reality Employee-Employer Relationship Data loss Unified Threat Management Computing Telephone Systems Outlook Spam Operating System Managing Stress SaaS desktop WiFi Laptop LiFi The Internet of Things Information Hosted Solution Holiday Firewall Two-factor Authentication Development Avoiding Downtime Administration Alert Mouse Scam HIPAA Display Wireless Mobile Security Apple Education Vendor Management Storage Monitors VPN Access Control Hotspot Internet Exlporer Social Engineering Troubleshooting Legal Compliance Dell Password Cyber Monday Spying WannaCry Unified Communications Drones IT Technicians Optimization Websites Cabling Windows 8 Legislation Connectivity Microsoft Excel Staff Leominster Google Maps Human Error Hacker SharePoint Modem FinTech Analysis Scary Stories Smart Technology Language Value Safety Deep Learning Techology Regulations Running Cable Mobile Device Management Managed IT Buisness How To Lenovo Mirgation Recycling Statistics Tablet IoT Remote Computing Mail Merge Blockchain Augmented Reality K-12 Schools Device Alt Codes Virtual Desktop Downloads Cookies MSP Network Congestion Sports Shortcut Distributed Denial of Service Computing Infrastructure Professional Services Digital Payment LED Bring Your Own Device VoIP Unified Threat Management Social Networking Writing PowerPoint Digital Budget Firefox Superfish Chatbots eWaste Wi-Fi Disaster Social Bluetooth Comparison Star Wars Information Technology Address Permissions Wearable Technology Network upgrade Collaboration Mobility Typing Humor Nanotechnology Computers Patch Management Managed IT Service Alerts USB Co-Managed IT Best Practice User Error Motherboard Cables Dark Data Update Current Events Cost Management Retail Document Management Onboarding Spyware Downtime Customer Relationship Management Identity Continuity Uninterrupted Power Supply Cybercrime Specifications Fraud Computer Care Marketing Slack IBM Apps Smart Office Politics File Sharing Cryptocurrency Heating/Cooling Multi-Factor Security Screen Reader Charging Break Fix Licensing Dongle Content Google Docs Time Management Printer Wires Customer Service Gadgets Solid State Drive IT solutions Going Green Assessment Office Samsung Identity Theft Digital Signage Networking Solar Hacks Search Black Friday Training Monitoring Corporate Profile Google Wallet Emergency Work Tech Support Bitcoin Servers Google Calendar Smart Tech Dark Web Cooperation Service Level Agreement Automobile Streaming Business Growth Network Management Router Voice over Internet Protocol Chromebook Hard Disk Drive Halloween Printing Notifications Supercomputer CrashOverride Electronic Medical Records Staffing Physical Security Motion Sickness Twitter Upgrades Gadget Administrator Emoji Taxes Crowdsourcing IT Budget Printers Web Server what was your? GPS Personal Information Botnet 3D Printing Cortana IT Consultant Cameras Mobile Computing Processors Tracking Machine Learning Meetings Unsupported Software Virtualization Cleaning CCTV Computer Repair Relocation Webcam Mobile Data Print Toner How To Work/Life Balance Error BDR Recovery Health Private Cloud Point of Sale Ben McDonald shares Travel Regulation Black Market Law Enforcement G Suite

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3