Content deleted Content added
No edit summary |
Pleasancoder (talk | contribs) compacted lead section and removed sections of flash cookie and Client side persistence - they are not practical as cookie alternatives |
||
Line 1:
{{HTTP}}
A '''cookie''', also known as a '''HTTP cookie''', '''web cookie''', or '''browser cookie''', is
As text, cookies are not [[executable]]. Because they are not executed, they cannot replicate themselves and are not [[Computer virus|viruses]]. However, they can be used by [[spyware]] to track user's browsing activities - a major privacy concern that prompted stricter laws<ref name=eulaw>{{cite news | url = http://www.bbc.co.uk/news/technology-12668552 | work= BBC | title=New net rules set to make cookies crumble | date=2011-03-08}}</ref>. Cookies could also be stolen by [[Hacker_(computer_security)|hackers]] to gain access to a victim's web account<ref>{{cite web|url= http://news.cnet.com/8301-10789_3-9918582-57.html |first=Robert |last=Vamosi | title=Gmail cookie stolen via Google Spreadsheets |date=2008-04-14}}</ref>.
== History ==
Line 50 ⟶ 44:
=== Zombie cookie ===
{{main|Zombie cookie}}
A zombie cookie is any cookie that is automatically recreated after a user has deleted it. This is accomplished by a script storing the content of the cookie in some other
== Uses ==
Line 359 ⟶ 353:
=== HTTP authentication ===
The HTTP protocol includes the [[basic access authentication]] and the [[digest access authentication]] protocols, which allow access to a Web page only when the user has provided the correct username and password. If the server requires such credentials for granting access to a web page, the browser requests them from the user and, once obtained, the browser stores and sends them in every subsequent page request. This information can be used to track the user.
== See also ==
|