Authored by a Symantec employee
Mention “cookies,” and most people expect a treat to appear. When talking about computers, however, cookies aren’t what’s on the dessert menu. In fact, they’re not even physical objects. Yet they do a great deal of the work that makes it possible for you to browse the Internet—and they can cause trouble if you don’t know how to manage them.
Meet the Cookie
A computer “cookie” is more formally known as an HTTP cookie, a web cookie, an Internet cookie, or a browser cookie. The name is a shorter version of “magic cookie,” which is a term for a packet of data that a computer receives, then sends back without changing or altering it. No matter what it’s called, a computer cookie consists of information. When you visit a website, the website sends the cookie to your computer. Your computer stores it in a file located inside your web browser. (To help you find it, this file is often called “Cookies.”)
What Do Cookies Do?
Different types of cookies keep track of different activities. Session cookies are used only when a person is actively navigating a website; once you leave the site, the session cookie disappears. Tracking cookies may be used to create long-term records of multiple visits to the same site. Authentication cookies track whether a user is logged in, and if so, under what name.
How to Manage Your Cookies
Under normal circumstances, cookies cannot transfer viruses or malware to your computer. Because the data in a cookie doesn’t change when it travels back and forth, it has no way to affect how your computer runs.
However, some viruses and malware may be disguised as cookies. For instance, “supercookies” can be a potential security concern, and many browsers offer a way to block them. A “zombie cookie” is a cookie that recreates itself after being deleted, making zombie cookies tough to manage. Third-party tracking cookies can also cause security concerns, since they make it easier for parties you can’t identify to watch where you are going and what you are doing online.
Here’s how to manage your cookies in order to protect your online activity from prying eyes:
Find the cookie storage. Each browser stores cookies in a slightly different location. In Internet Explorer 9, for example, you can find them by clicking “Tools,” then “Internet Options,” then “Privacy.” In Chrome, choose the Chrome menu on the toolbar, then click “Privacy.” Most browsers store cookie settings under the privacy options. Choose your setting. Every browser gives you a range of options for handling cookies. Internet Explorer, for instance, has a slider that you can adjust for greater or lesser amounts of protection. Chrome both lets you delete existing cookies in a single click and choose how future cookies are collected or stored.
Banning all cookies makes some websites difficult or impossible to navigate. However, a setting that controls or limits third-party and tracking cookies can help protect your privacy while still making it possible to shop online and carry out similar activities.
Disclaimers and references:
Symantec Corporation, the world’s leading cyber security company, allows organizations, governments, and people to secure their most important data wherever it lives. More than 50 million people and families rely on Symantec’s Norton and LifeLock comprehensive digital safety platform to help protect their personal information, devices, home networks, and identities.
© 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Norton, Norton by Symantec, LifeLock, and the Lockman Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Google Chrome is a trademark of Google, Inc. Mac, iPhone and iPad are trademarks of Apple Inc. Microsoft and the Windows logo are trademarks of Microsoft Corporation in the United States and/or other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.