www.archive-org-2014.com » ORG » A » ALLABOUTCOOKIES

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".

    Archived pages: 177 . Archive date: 2014-02.

  • Title: All About Computer Cookies - Session Cookies, Persistent Cookies,How to Enable/Disable/Manage Cookies
    Descriptive info: .. All About Cookies is a free resource to help marketers and consumers understand the issues surrounding the use of cookies.. What is an IP address?.. What is a Cookie File/Folder?.. What is Protocol?.. What are Pop Up ads?.. What is a cookie?.. What is a browser?.. Managing Cookies.. What are Web Beacons, otherwise known as Web Bugs, and how do the work?.. What is a Clear GIF?.. Surf Safely.. I have heard that cookies are bad for privacy - is that true?.. Privacy Concerns.. New European laws.. What is a 3rd party adserver.. What else can I do to protect myself when online?.. How do I protect my computer from Viruses?.. Privacy Alliance.. Welcome To All About Cookies.. org.. What are cookies in computers?.. Also known as browser cookies or tracking cookies, cookies are small, often encrypted text files, located in browser directories.. They are used by web developers to help users navigate their websites efficiently and perform certain functions.. Due to their core role of enhancing/enabling usability or site processes,.. disabling cookies.. may prevent users from using certain websites.. Cookies are created when a user's.. browser.. loads a particular website.. The website sends information to the browser which then creates a text file.. Every time the user goes back to the same website, the browser retrieves and sends this file to the website's server.. Computer Cookies are created not just by the website the user is browsing but also by other websites that run ads, widgets, or other elements on the page being loaded.. These cookies regulate how the ads appear or how the widgets and other elements function on the page.. For Managing cookies for different browsers.. see here.. Standard uses for browser cookies.. Website servers set cookies to help authenticate the user if the user logs in to a secure area of the website.. Login information is stored in a cookie so the user can enter and leave the website without having to re-enter the same authentication information over and over.. More information.. Session Cookies.. are also used by the server to store information about user page activities so users can easily pick up where they left off on the server's pages.. By default, web pages really don't have any 'memory'.. Cookies tell the server what pages to show the user so the user doesn't have to remember or start navigating the site all over again.. Cookies act as a sort of bookmark within the site.. Similarly, cookies can store ordering information needed to make shopping carts work instead of forcing the user to remember all the items the user put in the shopping cart.. Persistent or tracking Cookies.. are also employed to store user preferences.. Many websites allow the user to customize how information is presented through site layouts or themes.. These changes make the site easier to navigate and/or lets user leave a part of the user's personality at the site.. For Information on session and persistent and tracking cookies,.. Cookie security and privacy issues.. Cookies are NOT viruses.. Cookies use a plain text format.. They are not compiled pieces of code so they cannot be executed nor are they self-executing.. Accordingly, they cannot make copies of themselves and spread to other networks to execute and replicate again.. Since they cannot perform these functions, they fall outside the standard virus definition.. Cookies CAN be used for malicious purposes though.. Since they store information about a user's browsing preferences and history, both on a specific site and browsing among several sites, cookies can be used to act as a form of spyware.. Many.. anti-spyware.. products are well aware of this problem and routinely flag cookies as candidates for deletion after standard virus and/or spyware scans.. See here for some.. privacy issues and concerns.. The way  ...   out option for website visitors, websites will need to specifically gain the consent of their visitor and they must Opt In to be able to store cookies on their computer or other devices.. This is expected to be difficult to manage and enforcement will more than likely be done subtlely and with encouragement rather than with the threat of fines and penaltys.. What does the new law say?.. The new requirement is essentially that cookies can only be placed.. on machines where the user or subscriber has given their consent.. 6 (1) Subject to paragraph (4), a person shall not store or gain.. access to information stored, in the terminal equipment of a subscriber.. or user unless the requirements of paragraph (2) are met.. (2) The requirements are that the subscriber or user of that terminal.. equipment--.. (a) is provided with clear and comprehensive information about the.. purposes of the storage of, or access to, that information; and.. (b) has given his or her consent.. (3) Where an electronic communications network is used by the.. same person to store or access information in the terminal equipment.. of a subscriber or user on more than one occasion, it is sufficient for the purposes of this regulation that the requirements of paragraph (2).. are met in respect of the initial use.. “(3A) For the purposes of paragraph (2), consent may be signified by a.. subscriber who amends or sets controls on the internet browser which.. the subscriber uses or by using another application or programme to.. signify consent.. (4) Paragraph (1) shall not apply to the technical storage of, or.. access to, information--.. (a) for the sole purpose of carrying out the transmission of a.. communication over an electronic communications network; or.. (b) where such storage or access is strictly necessary for the.. provision of an information society service requested by the subscriber.. or user.. More information on the new changes can be found.. here.. Key tips for safe and responsible cookie-based Web browsing.. Due to their flexibility and the fact that many of the largest and most-visited websites use cookies by default, cookies are almost unavoidable.. Disabling cookies will lock a user out of many of the most widely-used sites on the Internet like Youtube, Gmail, Yahoo mail, and others.. Even search settings require cookies for language settings.. Here are some tips you can use to ensure worry-free cookie-based browsing:.. Customize your.. browser's cookie settings.. to reflect your comfort level with cookie security or use the cookie cleaner included in.. Abine's free Privacy Suite.. If you are very comfortable with cookies and you are the only person using your computer, you may want to set long expiration time frames for storing your personal access information and browsing history.. If you share access on your computer, you may want to set your browser to clear private browsing data every time you close your browser.. While not as secure as rejecting cookies outright, this option lets you access cookie-based websites while deleting any sensitive information after your browsing session.. Install and keep antispyware applications updated.. Many spyware detection, cleanup applications, and spyware removers include attack site detection.. They block your browser from accessing websites designed to exploit browser vulnerabilities or download malicious software.. Make sure your browser is updated.. If you haven't already, set your browser to update automatically.. This eliminates security vulnerabilities caused by outdated browsers.. Many cookie-based exploits are based on exploiting.. older browsers' security shortcomings.. Cookies are everywhere and can't really be avoided if you wish to enjoy the biggest and best websites out there.. With a clear understanding of how they operate and how they help your browsing experience, you can take the necessary security measures to ensure that you browse the Net confidently.. Privacy *.. |.. Cookie Settings..

    Original link path: /
    Open archive

  • Title: Todo sobre cookies ordenador - Cookies de sesión, cookies persistentes, Cómo Activar / Desactivar / administrar las cookies
    Descriptive info: Todo sobre las Cookies es un recurso gratuito para ayudar a los comerciantes y los consumidores comprender los problemas relacionados con el uso de cookies.. ¿Qué es una dirección IP?.. ¿Qué es un archivo de cookie / carpeta?.. ¿Qué es un protocolo?.. ¿Qué son los anuncios pop up?.. ¿Qué es una cookie?.. ¿Qué es un navegador?.. Galletas de Gestión.. ¿Qué son las balizas web, también conocidos por web bugs, y cómo hacer el trabajo?.. ¿Qué es un GIF claro?.. He oído que las cookies son malas para la intimidad - ¿es eso cierto?.. ¿Qué es un servidor de anuncios 3 ª parte.. ¿Qué más puedo hacer para protegerme cuando esté en línea?.. ¿Cómo puedo proteger mi computadora de virus?.. Bienvenido a All About Cookies.. ¿Qué son las cookies en los ordenadores?.. También conocidas como cookies de navegador o cookies de seguimiento, las cookies son pequeños archivos de texto, a menudo encriptados, que se ubican en los directorios del navegador.. Los desarrolladores de páginas web los utilizan para permitir a sus usuarios navegar con más facilidad y desarrollar ciertas funciones.. Debido a su papel central a la hora de aumentar e incluso permitir ciertos procesos de los distintos sitios web, desactivar las cookies puede hacer que los usuarios no utilicen ciertas páginas web.. Las cookies se crean cuando el navegador de un usuario carga una página concreta.. Esta página envía información al navegador, que crea entonces un archivo de texto.. Cada vez que el usuario regresa a la misma página, el navegador recupera este archivo y lo envía al servidor de la página.. La página web que el usuario está visitando no es la única que crea las cookies, sino que también lo hacen otras webs que desarrollan anuncios, herramientas u otros elementos presentes en la página que está siendo cargada.. Esas cookies regulan cómo deben aparecer los anuncios o el funcionamiento de las herramientas y otros elementos de la web.. Para administrar las cookies de los distintos navegadores, ir aquí.. Usos habituales de las cookies de navegador.. Los servidores web configuran las cookies para ayudar a autentificar al usuario si éste ingresa en una zona segura del sitio web.. La información de registro se almacena en una cookie de forma que el usuario pueda entrar y salir de la página sin tener que volver a introducir su información de identificación una y otra vez.. Más información.. El servidor también utiliza las cookies de sesión para almacenar información sobre la actividad del usuario en la página, para que los usuarios puedan volver con facilidad al lugar donde abandonaron las páginas del servidor.. Por defecto, las páginas web no tienen en realidad ningún tipo de "memoria".. Las cookies le dicen al servidor qué páginas mostrar para que el usuario no tenga que recordarlas o volver a empezar a navegar por todo el sitio hasta encontrar donde se quedó.. Las cookies son una especie de marca páginas en el sitio.. De forma parecida, las cookies pueden almacenar la información requerida para hacer que los carritos de la compra online funcionen y que el usuario no tenga que recordar todos los artículos que metió dentro del carrito.. Las cookies permanentes o de seguimiento también se utilizan para almacenar las preferencias del usuario.. Muchas páginas web permiten al usuario personalizar cómo quiere que se le presente la información mediante diseños o temas distintos.. Estos cambios hacen que sea más fácil navegar por el sitio de acuerdo con la "personalidad" del usuario en el sitio en cuestión.. Para obtener información sobre las cookies de sesión o de seguimiento, mira aquí.. La seguridad de las cookies y las cuestiones de privacidad.. Las cookies NO son virus.. Las cookies tienen  ...   la tranquilidad mental absoluta de que tus archivos están seguros.. Otras amenazas relacionadas con el uso de cookies.. Dado que la protección de la privacidad está muy valorada y es un derecho de todo usuario de internet, vale la pena estar protegido frente a las amenazas que las cookies pueden plantear.. Puesto que las cookies se transmiten de ida y vuelta entre el navegador y el sitio web, si un enemigo o una persona no autorizada se interpone en la transmisión de datos, la información recibida por las cookies puede ser interceptada.. Aunque es bastante raro, esto puede suceder si el navegador se conecta al servidor utilizando una red no encriptada como una conexión WiFi abierta.. La seguridad en internet solamente es posible si usas de forma habitual un programa de protección antivirus.. Visita nuestra sección de protección antivirus.. Otros ataques relacionados con las cookies están vinculados con la explotación de configuraciones defectuosas de cookies en los servidores.. Si una página web no obliga a los navegadores a utilizar exclusivamente canales encriptados, los atacantes pueden usar esa vulnerabilidad para hacer trampas a los navegadores y conseguir que envíen información por canales no seguros.. Los atacantes desviarán entonces los datos delicados para fines indeseados.. Es importante elegirla protección antifraude y robo para proteger tu información personal.. Trucos clave para una navegación web con cookies segura y responsable.. Debido a su flexibilidad y al hecho de que muchas de las webs más grandes y visitadas utilizan cookies por defecto, las cookies son prácticamente inevitables.. Desactivar las cookies haría que un usuario no pudiera acceder a la mayoría de los sitios usados de forma masiva en internet, como YouTube, Gmail, correo Yahoo y otros.. Incluso los buscadores necesitan las cookies para los ajustes de idioma.. Aquí hay algunos consejos que pueden servirte para conseguir una navegación web segura utilizando cookies:.. Personaliza los ajustes de cookies de tu navegador para conseguir un nivel en el que te sientas cómodo con la seguridad de las cookies o utiliza el limpiador de cookies incluido en la Suite de Privacidad gratuita de Abine.. Si te resultan muy cómodas las cookies y eres la única persona que utiliza tu ordenador, puede interesarte elegir largos plazos de duración para que las cookies almacenen tu información personal de acceso y tu historial de navegación.. Si compartes el acceso a tu ordenador, puede interesarte ajustar tu navegador para eliminar los datos privados de navegación cada vez que cierres el navegador.. Aunque no es tan seguro como rechazar el uso de cookies, esta opción te permite acceder a páginas web que necesitan cookies para funcionar al mismo tiempo que destruyes toda té información delicada después de cerrar sesión con tu navegador.. Instala y mantén actualizadas las aplicaciones antispyware.. Muchos programas de detección de spyware, aplicaciones de limpieza y limpiadores de spyware incluyen la detección de sitios potencialmente peligrosos.. Así, bloquean el acceso de tu navegador a los sitios web que han sido diseñados para aprovechar la vulnerabilidad del navegador para descargar software malicioso.. Asegúrate de que tu navegador está actualizado.. Si no lo has hecho ya, configura tu navegador para que se actualice automáticamente.. Esto eliminará la vulnerabilidad de la seguridad propia de los navegadores no actualizados.. Muchos exploits que utilizan las cookies se aprovechan de los fallos de seguridad de los navegadores anticuados.. Las cookies están en todos los sitios y en realidad no se pueden evitar si deseas disfrutar de los mayores y mejores sitios web existentes.. Con una comprensión clara de cómo funcionan y cómo te ayudan a mejorar tu experiencia en la navegación, puedes tomar las medidas de seguridad necesarias para asegurarte que navegas por la red de forma confidencial..

    Original link path: /es/
    Open archive

  • Title: Alles ?ber Computer-Cookies - Session-Cookies, persistente Cookies Aktivieren / Deaktivieren / Cookies verwalten
    Descriptive info: Alles über Plätzchen ist eine freie Ressource zu helfen, Vermarkter und Verbraucher die Themen rund um die Installation der Cookies verstehen.. Was ist eine Ip-Adresse?.. Was ist ein Cookie Datei/Ordner?.. Was ist ein Protokoll?.. Was sind Pop Ups?.. Was ist ein Cookie?.. Was ist ein Browser?.. Verwalten von Cookies.. Was sind Web Beacons, auch bekannt als Zählpixel und wie funktionieren Sie?.. Durchsichtiges GIF?.. Ich habe gehört Cookies sind schlecht Für die Privatspähre - ist das wahr?.. Wie funktioniert das mit Adservern von Dritten Parteien.. Welche anderen Schritte kann Ich gehen um meine Privatspähre online zu schützen?.. Wie man seinen Computer vor nicht willkommenen Eindringlingen schützt?.. Willkommen auf All About Cookies.. Was sind Cookies in Computern?.. Auch als Browser-Cookies oder Tracking-Cookies bekannt, Cookies sind kleine verschlüsselte Text Dateien in deinem Browser Verzeichnis.. Sie werden von Web-Entwicklern benutzt u den Besuchern zu helfen einfacher durch eine Webseite zu navigieren und bestimmte Funktionen zu nutzen.. Aufgrund ihrer zentralen Roller bei der Verbesserung der Usability von Webseiten kann das.. Ausschalten von Cookies.. dazu führen das du einige Seiten nicht benuzten kannst.. Cookies werden erstellt wen der.. Browser.. eines Benutzers eine bestimmte Webseite lädt.. Die Webseite sendet Informationen an den Browser der dann die Text-Datei erstellt.. Jedesmal wen der Benutzer zu der Webseite zurückkehrt fragt der Browser den Cookie ab und sendet die Informationen an den Server der Webseite.. Computer Cookies werden nicht nur von der Webseite erstellt die der Besucher browst, sie werden auch von anderen Webseiten erstellt die Werbeanzeigen, Widgets oder andere Elemente auf der Webseite die geladen wird laufen lassen.. Diese Cookies regulieren wie Werbeanzeigen eingeblendet oder wie Widgets oder andere Elemente auf der Seite funktionieren.. Wie man Cookies auf verschiedenen Browsern verwaltet kannst die.. HIER.. sehen.. Standard-Anwendungen für Browser-Cookies.. Webseiten benuzten Cookies um Benutzer zu authentifizieren zu können wen der Benutzer sich in einen sicheren Bereich der Webseite einloggen will.. Login Informationen werden auf dem Cookie gespeichert sodass der Benutzer nicht jedesmal alle seine Daten neu eingeben muss wenn er eine Seite verlässt und wieder zu ihr zurückkehrt.. Mehr Informationen.. Sitzungscookies.. werden auch von den Servern verwendet um Informationen über die Aktivitäten einer Besuchers auf einer Webseite zu speichern sodass die Besucher einfach da weitermachen können wo Sie aufgehört haben.. Standartmässig haben Webseiten kein Gedächtnis.. Cookies sagen dem Server welche Seiten er dem Besucher zeigen soll so dass der Besucher sich nicht wieder an alles erinnern muss oder nochmal durch die komplette Seite navigieren muss.. Cookies agieren als eine Art Lesezeichen innerhalb der Seite.. Genauso können Cookies Bestellinformationen speichern sodass Warenkörbe funktionieren und die Besucher nicht gezwungen werden sich an alle Dinge die sie in ihren Warenkorb gelegt haben erinnern müssen wenn Sie zur Kasse gehen.. Dauer oder Tracking-Cookies.. werden auch benutzt um die Preferenzen von Besuchern zu speichern.. Viele Webseiten erlauben es Benutzern Anpassungen hinsichtlich des Layouts der Seite vorzunehmen mit hilfe von Templates.. Diese Anpassungen machen die Seite einfacher zu navigieren und/oder lassen den Benutzer einen Teil seiner Persönlichkeit auf der Seite lassen.. Für mehr Informationen zu Sitzungscookies und Dauercookies.. sieh  ...   Back-up deines Computer kann sicherstellen das deine Dateien sicher sind.. Andere Cookiebasierte Bedrohungen.. Da der Schutz der Identität sehr ernstgenommen wird und das gute Recht eines jeden Interntnutzers ist zahlt es sich us sich bewusst zu machen welche Bedrohung Cookies darstellen können.. Während Cookies zwischen dem Browser und der Webseite hin und her gesendet werden kann ein Angreifer, wenn er sich zwischen die Datenübertragung schalten kann die Informationen auf dem Cookie abfangen und auslesen.. Obwohl es nur sehr selten vorkommt, kann so etwas passieren wenn der Browser auf den Server durch eine unverschlüsselte Verbindung wie zum Beispiel einen WIFI Channel zugreift.. Sicherheit im Internet ist nur zu erreichen wenn du regelmässig Anti-Virus Programme einsetzt.. Sieh dir unsere.. Anti-Virus Sektion an.. Andere Cookiebasierte Angriffe machen sich fehlerhafte Cookie Einstellungen oder Server zu nutze.. Falls eine Webseite nicht nur mit veschlüsselten Browserkanälen arbeitet können Angreifer diese Schwäche ausnutzen um deinen Browser dazu zu bringen sensitive Informationen über unverschlüsselte Kanäle zu senden.. Die Angreifer saugen dann die sensitiven Informationen für nicht genehmigte Zwecke ab.. Schlüsseltips für sicheres und verantwortungsbewusstes cookiebasiertes browsen im Internet.. Aufgrund ihrer Flexibilität und der Tatsache das die meisten grossen Webseite Cookies standartmässig einsetzten sind Cookies fast nicht zu vermeiden.. Cookies ausschalten wird den Benutzer aus vielen der am häufigsten genutzten Webseiten wie zum Beispiel Gmail, yahoo mail und youtube aussperren.. Sogar Sucheinstellungen benögen Cookies für die Spracheinstellungen.. Hier sind einige Tipps die du benutzen kannst um ohn e Bedenken mit Cookies zu browsen:.. Nehme Anpassungen an deinen.. Cookie-Einstellungen.. vor die deinen Komfortlevel mit Cookie-Sicherheit entsprechen oder benutze den Cookie-Cleaner den es in.. Abines free Privacy Suite.. gibt.. Falls du dich mit Cookies sicher fühlst und falls du die einzige Person bist die deinen Computer benutzt solltest du lange Laufzeiten für deine persönlichen Zugangsiformationen und Browser Historie setzen.. Falls du dir deinen Computer mit jemand anderem teilst dann solltest du einstellen das deine privaten Daten gelöscht werden jedesmal wenn du deinen Browser schliesst.. Es ist zwar nicht so sicher wie ganz auf Cookies zu verzichten, mit dieser Option kannst du jedoch Cookiebasierte Webseiten aufsuchen und benutzen währnd alle deine sensitiven Daten nach deiner Sitzung gelöscht werden.. Installiere Anti-Spyware und halte die Software aktuell.. Viele Spyware-Detection, Spyware-Remover und Clean-up Anwendungen beinhalten eine Funktion die angreifende Webseiten aufspührt.. Sie blockieren deinen Browser wenn er auf Webseiten zugreifen will die dafür erstellt wurden um Browser-Schwchstellen auszunutzen oder Schädliche Software herunterzuladen.. Stelle sicher das dein Browser auf dem neuesten Stand ist.. Stellen Sie sicher, dass Ihr Browser wird aktualisiert.. Falls du es noch nicht getan hast stelle in deinem Browser ein das er sich automatisch aktualisiert.. So eliminierst du Sicherheitsrisiken die auf einen veralteten Browser zurückzuführen sind.. Viele Cookiebasierte Schadprogramme basieren auf der Ausbeutung der.. Schwachstellen veralteter Browser.. Cookies sind überall und können nicht vermieden werden wenn man die grössten und besten Webseiten im Internet aufsuchen will.. Mit einem klaren Verständnis wie sie funktionieren und dir helfen im Internet zu surfen kannst du die nötigen Schritte unternehmen um sicherzustellen das du unerkannt durchs Web surfen kannst..

    Original link path: /ge/
    Open archive

  • Title: Tout sur les cookies Informatique - Les cookies de session, les cookies persistants, Comment Activer / Désactiver / Gérer les cookies
    Descriptive info: Tout sur les cookies est une ressource gratuite pour aider les commerçants et les consommateurs à comprendre les questions entourant l'utilisation de cookies.. Qu'est-ce qu'une adresse IP ?.. Qu'est-ce qu'un fichier Cookie / dossier?.. Quel est le protocole?.. Que sont les annonces pop up?.. Qu'est-ce qu'un cookie?.. Qu'est-ce qu'un navigateur?.. Gestion des cookies.. Que sont les balises Web, autrement connu comme les pixels invisibles, et comment faire le travail?.. Qu'est-ce qu'un GIF clair?.. J'ai entendu dire que les cookies sont mauvais pour la vie privée - est-ce vrai?.. Qu'est-ce qu'un 3rd party adserver.. Que puis-je faire pour me protéger lorsqu'ils sont en ligne?.. Comment puis-je protéger mon ordinateur contre les virus?.. Bienvenue sur AllAboutCookies.. Que sont les cookies informatiques ?.. Egalement connus sous le nom de cookies de navigateur ou cookies de suivi, les cookies sont des petits fichiers texte, souvent chiffrés, qui sont situés dans les répertoires des navigateurs.. Ils sont utilisés par les développeurs web pour aider les utilisateurs é naviguer sur leurs sites web de maniére efficace et é effectuer certaines actions.. En raison de leur réle essentiel pour améliorer/activer l'utilisabilité/l'ergonomie ou le traitement des sites, désactiver les cookies peut empécher les utilisateurs d'utiliser certains sites web.. Les cookies sont créés lorsque le navigateur d'un utilisateur charge un site web spécifique.. Le site web envoie des informations au navigateur, puis ce dernier crée alors un fichier texte.. A chaque fois que l'utilisateur revient sur le même site web, le navigateur extrait et envoie ce fichier vers le serveur du site web.. Les cookies informatiques sont créés non seulement par le site web qui est consulté par l'utilisateur, mais également par d'autres sites web qui gèrent des publicités, des widgets ou d'autres éléments sur la page en cours de chargement.. Ces cookies règlementent la manière dont les publicités apparaissent ou la manière dont les widgets et d'autres éléments fonctionnent sur la page.. Pour géré les cookies sur différents navigateurs,.. reportez-vous ici.. Utilisations normales des cookies de navigateur.. Les serveurs des sites web mettent en place des cookies pour aider à identifier l'utilisateur si ce dernier se connecte à une zone sécurisée.. Les informations de connexion sont stockées dans un cookie afin que l'utilisateur puisse entrer sur le site web et le quitter sans avoir à ressaisir les mêmes informations d'identification encore et encore.. Plus d'informations.. Les cookies de session sont également utilisés par le serveur pour stocker des informations sur les activités de l'utilisateur sur les pages afin que ce dernier puisse facilement reprendre là où il s'était arrêté sur les pages du serveur.. Par défaut, les pages web n'ont pas réellement de mémoire.. Les cookies disent au serveur quelle page afficher à l'utilisateur afin que ce dernier n'ait pas à s'en souvenir ou qu'il n'ait pas à reparcourir tout le site.. Les cookies agissent comme un "marque-page" sur le site.. De la même manière, les cookies peuvent stocker des informations de commande nécessaires pour faire fonctionner les paniers d'achat au lieu d'obliger l'utilisateur à se souvenir de tous les articles qu'il a placé dans son panier.. Les cookies, qu'ils soient persistants ou de suivi, sont également utilisés pour stocker les préférences de l'utilisateur.. De nombreux sites web permettent à l'utilisateur de personnaliser la manière dont les informations sont présentées via les mises en page ou les thèmes du site.. Ces changements permettent de naviguer plus facilement sur le site et/ou de laisser l'utilisateur laisser "sa marque" sur le site.. Pour obtenir des informations sur les cookies de session, sur les cookies persistants et sur les cookies de suivi,.. Questions relatives à la sécurité et au respect de la vie privée avec les cookies.. Les cookies ne sont PAS des virus.. Les cookies utilisent un format de texte brut.. Il ne s'agit  ...   que vos fichiers sont à l'abri.. Autres menaces liées aux cookies.. Etant donné que la protection de l'identité est de première importance et qu'elle fait partie des droits de tous les utilisateurs d'internet, être conscient des menaces que peuvent représenter les cookies est payant.. Etant donné que les cookies font un va-et-vient entre un navigateur et un site web, si un attaquant ou une personne non autorisée se trouve au milieu du flux de données, des informations sensibles du cookie peuvent être interceptées.. Bien que cela soit relativement rare, cela peut se produire si le navigateur se connecte au serveur en utilisant un réseau non chiffré comme un canal wifi non sécurisé.. La sécurité sur internet n'est atteignable que si vous utilisez régulièrement un programme de protection antivirus.. Consultez notre section sur la protection antivirus.. D'autres attaques liées aux cookies impliquent d'exploiter des systémes de configuration erronés pour les cookies sur des serveurs.. Si un site web n'avise pas les navigateurs de n'utiliser que des canaux cryptés, les attaquants profitent de cette vulnérabilité pour tromper ces navigateurs afin qu'ils envoient des informations sensibles sur des canaux non sécurisés.. Ces attaquants détournent ainsi les informations sensibles pour obtenir l'accés non autorisé.. Il est important de choisir les bons services de protection contre la fraude et le vol pour protéger vos informations personnelles.. Conseils clés pour une navigation sére et responsable sur le web avec des cookies.. En raison de leur flexibilité et du fait que nombre des sites web les plus importants et les plus visités utilisent des cookies par défaut, les cookies sont quasiment inévitables.. Le fait de désactiver les cookies empêche l'utilisateur de consulter la plupart des sites les plus largement utilisés sur internet, comme YouTube, Gmail, Yahoo Mail, et d'autres.. Même les paramètres en vue d'effectuer des recherches ont besoin de cookies pour les paramètres linguistiques.. Voici quelques conseils que vous pouvez utiliser pour vous assurer une navigation sans souci avec des cookies.. Personnalisez les paramètres relatifs aux cookies de votre navigateur pour refléter le niveau de confort lié à la sécurité avec les cookies, ou utilisez le nettoyeur de cookies inclus dans la Suite Confidentiality gratuite d'Abine.. Si vous êtes très à l'aise avec les cookies et que vous êtes la seule personne à utiliser votre ordinateur, vous pouvez définir de longs intervalles d'expiration pour le stockage des informations relatives à votre accès personnel et à votre historique de navigation.. Si vous partagez l'accés é votre ordinateur, vous devez configurer votre navigateur afin qu'il efface les données de navigation privées chaque fois que vous fermez votre navigateur.. Cette option n'est pas aussi sécuritaire que celle de rejeter catégoriquement les cookies mais elle permet d'accéder é des sites web avec des cookies puis supprimer les informations sensibles aprés la navigation terminée.. Installer et maintenir à jour les applications anti-logiciels espions.. De nombreuses applications de détection et de nettoyage des logiciels espions, ainsi que des applications visant à supprimer les logiciels espions, incluent une détection des attaques.. Ils empêchent votre navigateur d'accéder à des sites web destinés à exploiter les vulnérabilités des navigateurs ou de télécharger des logiciels malveillants.. Assurez-vous que votre navigateur est à jour.. Si vous ne l'avez pas déjà fait, configurez votre navigateur afin qu'il se mette à jour automatiquement.. Cela élimine les vulnérabilités relatives à la sécurité causées par des navigateurs obsolètes.. De nombreuses attaques relatives aux cookies sont basées sur l'exploitation des défaillances de sécurité des anciens navigateurs.. Les cookies sont partout, difficile de les éviter si on souhaite profiter des meilleurs grands sites web.. Avec une compréhension claire sur leur fonctionnement et leur utilité pour votre navigation, il est alors possible de prendre les mesures nécessaires de sécurité pour s'assurer de naviguer en toute confiance sur le net..

    Original link path: /fr/
    Open archive

  • Title: How to Protect your computer from Viruses and Trojans -
    Descriptive info: What can I do to manage cookies stored on my computer?.. How to protect your PC.. Anti-virus Programs.. Anatomy of a Virus.. Infected By A Virus.. Security Basics.. Avoiding Viruses.. Safe Downloads.. Keeping PCs Virus-Free.. Paid Anti-virus Programs.. Kaspersky Anti-Virus.. Eset NOD32 3.. 0.. Panda Internet Security.. McAfee VirusScan.. Norton AntiVirus 2009.. Avast Pro AntiVirus.. Avira AntiVirus Premium.. Bitdefender AntiVirus Plus.. Bullguard AntiVirus.. F-Secure AntiVirus.. G Data AntiVirus.. ZoneAlarm AntiVirus + Firewall.. Free Anti-virus Programs.. Avira AntiVir.. AVG Anti-Virus.. ClamWin Antivirus.. Avast 4! Home Edition.. BitDefender Free Edition.. HouseCall Virus Scan 7.. 1.. Immunet Protect 3.. Computer Viruses:.. Protecting Your Computer from Unwelcome Intruders.. When you’re online, you expose your vulnerability to malicious virus that have been growing in virulence and ferocity over the last few years.. These program codes have gone beyond mere annoyances with the worst kinds disabling your PC, but they have become portals for remotely perpetuating more sinister activity that can clandestinely hack into sites, mount denial of services or steal confidential and personal data for fraudulent financial gain at your expense.. Are these virus serious enough to cause losses? Among home PC users, you may think having to reinstall your OS after a virus or malware has brought it down is not really expensive as you lose just a day or two to reinstall your programs and rebuilding files, consider that in a business, you could actually lose millions.. Just ask ChoicePoint when it took a $6 million charge in 2005 after cyber criminals hacked into their systems and stole sensitive data from thousands of customers.. Or the credit card processor CardSystems Solutions which may yet go out of business from major security breach at the company's Tucson, Arizona, operations center.. In a recent consumer survey among security breach victims, people don't take lightly the loss of their data.. More than 60% of respondents indicated their plans to terminate business relationships with a company that lost the data they entrusted to them.. In 2004, rootkits were a relatively obscure form of Trojans meant to infect Unix computers.. But by 2005, rootkits have become a mainstream security threat after Sony BMG Music Entertainment shipped a few million CDs that contained a rootkit among its copy protection scheme.. Within a few months, Sony recalled the CDs, but it was too late, According to security experts, rootkits attacking Windows PC were here to stay.. The.. 2011 Norton Cybercrime Report.. reveals that there were 431 million global cybercrime victims who lost $388 billion in real money losses and computer time.. This is a lot more compared to the estimated $288 billion in revenues from the black markets for cocaine, heroin and illegal drug trades combined.. For sure, not all of these losses were incurred due to Trojans, worms, viruses, rootkits and malware.. But when you consider that roughly 4.. 3% of cybercrimes involve damages to PC resulting from online downloads of infected content over the internet, you are looking at a computed $17 billion in annual losses due to malware and virus infection.. What can I do to protect myself from computer viruses and Trojans?.. These days, practically everyone's online, downloading and exchanging files, and developers are in such a hurry to get their Web sites up or their files out that checking for a nasty bug is more of a courtesy than a requirement.. If you're not careful, your computer can end up with a nasty virus that makes your files act oddly, crashes your computer, pops up bizarre messages, or worst of all, destroys your operating system.. A computer virus is the most subtle of computer problems.. It usually loads itself into your computer system when you run a program to which it has attached itself.. From the computer system, it'll then reproduce itself, much like a biological virus would, by attaching copies of itself to other programs on your hard drive.. What it does then depends on the malevolence of its creator.. Some viruses are nothing more than a practical joke.. They may bring up a message like "Merry Xmas" or melt your display.. Most of them though, either start destroying your system or your files immediately or on a date specified by their creators like the much-publicized Michelangelo virus, which erases important pieces of your system on March 6.. "Trojan horse" programs are similar to viruses in their effect on your system, but they can't reproduce themselves.. They're usually a program disguised as something you might want to download onto your computer for instance, a rogue, modified version of PKWare's PKZIP utility.. But when you run the new program you just found,  ...   you don't keep it updated, you might was well be completely unprotected.. Prevention.. Like sexually transmitted diseases (STDs), computer viruses existed prior to the popularity of the Internet, but as with the sexual revolution of the '70s, viruses have flourished with the widespread sharing of information.. And, much like the efforts to control STDs, controlling computer viruses is to be done through education and practicing safe hex (a play on words which means to perform certain measures to protect your computer).. 1.. Be sure do a full back up of your system on a regular basis.. The best way to clean up an infected file is to replace it with an original non-infected file.. Not to mention the grief a current back up will save if a virus takes your system completely down.. It's also a good idea to keep more than one set of backup in case the current one is infected before the virus is detected.. 2.. Always use an anti-virus software program, one with both an on-demand and an on-access scanner.. You'll want to look for one that has a fairly complete database of viruses and that is updateable.. New viruses are produced daily, so it's important to have software that can detect the latest threat.. Be sure to read the manual and follow the directions of the software program to ensure it's protecting you properly.. Also, consider buying and using two different brands to be doubly protected.. See our review of anti-virus programs.. 3.. Update the virus database in your anti-virus program regularly (each month or by the direction of the manufacturer).. 4.. On a PC, change the CMOS setting of your boot up process from booting first on the A drive (floppy) and then on the C drive (hard drive) to just booting on the C drive.. This will not only speed up your boot up process but also completely eliminate the risk of infecting your hard drive with an infected floppy disk.. If you should need to boot from a floppy you can easily change the settings back and reboot from the A drive.. Please note: an infected non-bootable floppy disk can just as easily infect your hard drive as would an infected bootable one.. 5.. Don't allow your web browser to automatically run programs, such as MS Word or other programs through its e-mail program.. Configure your browser to launch WordPad or Notepad instead.. One of the biggest and growing threats is the macro virus, which is spread through data processing and spread sheet programs.. 6.. Configure your web browsers to disable ActiveX, Java, and Javascript.. You'll lose some of the fun the Web's been known for, but you'll save your computer from contracting a virus and speed up your connection.. 7.. Know that the only way a virus spreads is either by launching an infected file or by booting an infected disk.. You can not get a virus by simply being online or by reading e-mail.. You have to download and launch an infected file before it will spread.. Therefore, do not launch any unsolicited executable files sent via e-mail.. 8.. Using an updated anti-virus program, scan all new software for viruses before installing them on your hard drive.. Even shrink-wrapped software from major publishers has been known to contain viruses.. 9.. Be aware of hoaxes.. To increase mass hysteria, there have been many stories conjured up and spread by unknowledgeable users.. For a list of known hoaxes check out the following site:.. http://www.. symantec.. com/business/security_response/threatexplorer/risks/hoaxes.. jsp.. Viruses are not the only type of programs that are written solely to cripple computer systems or to use a computer in an unauthorized way.. Other malicious programs are Logic Bombs, Trojan Horses, and Worms.. Help on the Web.. Virus Bulletin.. (www.. virusbtn.. com) offers a list of viruses that are floating through the computer world at present.. The site also offers the opportunity to report viruses, should you be unfortunate enough to encounter a new one firsthand.. If your computer is not on a network, and you never, ever install new programs or download files from the Internet or open email enclosures, you don't have to worry about viruses.. But that's like living in a sealed bubble.. Most of us have to go out into public every day, where we're subject to the germs carried by others (though natural immunities will usually protect us from most of them.. ) Likewise, most people also have to update their software and are interested in communication and information from others.. Luckily, there are some preventions and cures for even the.. nastiest of viruses.. See..

    Original link path: /security/
    Open archive

  • Title: What is an IP Address? - All about Cookies FAQs
    Descriptive info: AllAboutCookies.. org - FAQ Section.. Please browse through the list of questions on the left side of this page to find the answers to any of your questions.. The IP Address is a unique number assigned to your computer connection by your home or office or employer's Internet Service Provider (ISP).. This unique number serves as the ID of your connection when it's accessing the Internet.. It functions like your street address—if someone wants to send you mail or you order a pizza, your address is needed for the postman or delivery person to find your home.. The same process applies to your computer, your IP address is used to route  ...   computer's connection on a provisional basis and usually changes whenever you reboot your router.. An IP Address is a way to measure a user's unique identity.. It is a number that is allocated to your browser by your Internet Service Provider (ISP) or employer, when you log on to the internet.. It is usually allocated on a temporary (or dynamic) basis ie it is only allocated to your browser for the duration of that session online.. It is the 'address' of your computer while you are online.. Without an IP address, servers would not be able to deliver content to you, because they would not be able to locate your computer..

    Original link path: /faqs/
    Open archive

  • Title: What is a Cookie file / Folder? - All about Cookies FAQs
    Descriptive info: All AboutCookies.. Cookies.. are small, usually randomly encoded, text files that help your browser navigate through a particular website.. The cookie file is generated by the site you're browsing and is accepted and processed by your computer's browser software.. The cookie file is stored in your browser's folder or subfolder.. Your browser accesses the cookie file again when you visit the website that created the cookie file.. The browser uses the information stored in the cookie file to help ease your navigation of the website by letting you log in automatically or remembering settings you selected during your earlier visits to the website, among many other functions.. Any particular website  ...   created it.. As explained above, such use is limited to helping your browser process the information located on the website.. Although cookies are merely harmless text files that help your browsing experience, they are not free from controversy.. Cookies can be used to track your browser's website browsing history.. If you feel this impacts your privacy, you can change your browser's settings to limit the use of cookies on your computer to cut down on its ability to keep records of your browsing history.. Essentially this is the memory of your internet browser where you can find all your cookies stored in a format that facilitates easy retrieval by a browser..

    Original link path: /faqs/cookie-file.html
    Open archive

  • Title: What is Protocol? - All about Cookies FAQs
    Descriptive info: What is a Protocol?.. A standard set of regulations and requirements that allow two electronic items to connect to and exchange information with one another.. Protocols regulate data transmission among devices as well as within a network of linked devices through both error control and specifying which data compression method to use.. In particular, protocols decide: the method of error checking, how to compact data (if required), how the transmitting device signals that it has concluded sending data, and how the receiving device signals that it has completed receiving data.. Among the most common Internet protocols are FTP (File  ...   that enable two devices to connect and transmit data to one another.. Protocols determine how data are transmitted between computing devices and over networks.. They define issues such as error control and data compression methods.. The protocol determines the following: type of error checking to be used, data compression method (if any), how the sending device will indicate that it has finished a message and how the receiving device will indicate that it has received the message.. Internet protocols include TCP/IP (Transfer Control Protocol/Internet Protocol), HTTP (Hypertext Transfer Protocol), FTP (File Transfer Protocol), and SMTP (Simple Mail Transfer Protocol)..

    Original link path: /faqs/protocol.html
    Open archive

  • Title: What are Pop Up Ads / Windows? - All about Cookies FAQs
    Descriptive info: Pop up ads are advertisments that show up in a new browser window.. There's no one standard size for popup ads.. Popup ads also vary widely in the amount of browser commands that show in the window.. Pop-up ads are just one form of internet advertising used by advertisers to get web users' attention.. Among these other types of ads are ads located within a page you're reading, ads that appear when you're clicking from one page to another (these are called interstitials), ads that appear when you've searched for a keyword or term, ads that are highly animated or appear as interactive games, ads that appear like stand alone websites, ads that appear in  ...   changing online media technology and that's not much of a limit at all.. Popups are just one part of this expanding universe of methods in reaching online consumers.. A pop up is an advertisement displayed in a new browser window.. Pop up windows come in many different shapes and sizes, typically in a scaled-down browser window with only the Close, Minimize and Maximize commands.. Pop-ups are simply one of many formats, alongside fixed spaces within a page, interstitials (between pages), search, rich media, microsites, email, sponsorships, listings and others.. Pop-ups are simply part of this digital media mix.. The reason they are used is that they work - that's why marketers continue asking for them..

    Original link path: /faqs/pop-ups.html
    Open archive

  • Title: What is a cookie? - All about Cookies
    Descriptive info: Are all cookies the same?.. What is a cookie file?.. What are session cookies used for?.. What are persistent cookies used for?.. What can't cookies do?.. So how do cookies get onto my browser?.. Cookie profiling.. What information is in a cookie?.. How do I protect my computer from Viruses?.. All About Cookies.. Cookies are usually small text files, given ID tags that are stored on your computer's browser directory or program data subfolders.. Cookies are created when you use your browser to visit a website that uses cookies to keep track of your movements within the site, help you resume where you left off, remember your registered login, theme selection, preferences, and other customization functions.. The website stores a corresponding file(with same ID tag)to the one they set in your browser and in this file they can track and keep information on your movements within the site and any information you may have voluntarily given while visiting the website, such as email address.. Cookies are often indispensable for websites that have huge databases, need logins, have customizable themes, other advanced features.. Cookies usually don't contain much information except for the url of the website that created the cookie, the duration of the cookie's abilities and effects, and a random number.. Due to the little amount of information a cookie contains, it usually cannot be used to reveal your identity or personally identifying information.. However, marketing is becoming increasingly sophisticated and cookies in some cases can be agressively used to create a profile of your surfing habits.. There are two  ...   services.. Like a key, a cookie itself does not contain information, but when it is read by a.. it can help a website improve the service delivered.. Cookie files are automatically lodged into the.. cookie file.. - the memory of your browser - and each one typically contains:.. The name of the.. server.. the cookie was sent from.. The lifetime of the cookie.. A value - usually a randomly generated unique number.. The website server which sent the cookie uses this number to recognise you when you return to a site or browse from page to page.. Only the server that sent a cookie can read, and therefore use, that cookie.. A cookie is a text-only string of information that a website transfers to the cookie file of the browser on the hard disk of computers so that the website can remember who you are.. A cookie will typically contain the name of the domain from which the cookie has come, the "lifetime" of the cookie, and a value, usually a randomly generated unique number.. Two common types of cookies are used on most websites-session cookies, which are temporary cookies that remain in the cookie file of your browser until you leave the site, and persistent cookies, which remain in the cookie file of your browser for much longer (though how long will depend on the lifetime of the specific cookie).. Cookies can help a website to arrange content to match your preferred interests more quickly.. Most major websites use cookies.. Cookies cannot be used by themselves to identify you..

    Original link path: /cookies/
    Open archive

  • Title: What is a Web Browser? - All about Cookies FAQs
    Descriptive info: This page has been replaced by this page.. ".. What is my Browser?.. ".. A browser is a software application that is your gateway to the internet - a software programme installed on your computer enabling you to visit websites, navigate from web page to web page, print web pages and even  ...   firefox and Opera.. Remember that if you use different computers in different locations e.. g.. a computer at work and a computer at home, you may have a different browser for each.. To Find what browser you are using now click.. For additional information on browsers and how they operate, please.. click here..

    Original link path: /faqs/browser.html
    Open archive





  • Archived pages: 177