Study CCNA

  • What is CCNA?
  • Geek University
  • Recommended reading
  • Home
  • About
  • Contact

Most websites you visit will use cookies in order to improve your user experience by enabling that website to ‘remember’ you, either for the duration of your visit (using a ‘session cookie’) or for repeat visits (using a ‘persistent cookie’).

Cookies do lots of different jobs, like letting you navigate between pages efficiently, storing your preferences, and generally improving your experience of a website. Cookies make the interaction between you and the website faster and easier. If a website doesn’t use cookies, it will think you are a new visitor every time you move to a new page on the site – for example, when you enter your login details and move to another page it won’t recognise you and it won’t be able to keep you logged in.

Some websites will also use cookies to enable them to target their advertising or marketing messages based for example, on your location and/or browsing habits.

Cookies may be set by the website you are visiting (‘first party cookies’) or they may be set by other websites who run content on the page you are viewing (‘third party cookies’).

What is in a cookie?

A cookie is a simple text file that is stored on your computer or mobile device by a website’s server and only that server will be able to retrieve or read the contents of that cookie. Each cookie is unique to your web browser. It will contain some anonymous information such as a unique identifier and the site name and some digits and numbers. It allows a website to remember things like your preferences or what’s in your shopping basket.

What to do if you don’t want cookies to be set

Some people find the idea of a website storing information on their computer or mobile device a bit intrusive, particularly when this information is stored and used by a third party without them knowing. Although this is generally quite harmless you may not, for example, want to see advertising that has been targeted to your interests. If you prefer, it is possible to block some or all cookies, or even to delete cookies that have already been set; but you need to be aware that you might lose some functions of that website.

First party cookies

First party cookies are set by the website, you are visiting and they can only be read by that site.

Third party cookies

Third party cookies are set by a different organisation to the owner of the website you are visiting. For example, the website might use a third party analytics company who will set their own cookie to perform this service. The website you are visiting may also contain content embedded from, for example YouTube or Flickr, and these sites may set their own cookies.

More significantly, a website might use a third party advertising network to deliver targeted advertising on their website. These may also have the capability to track your browsing across different sites.

Session cookies

Session Cookies are stored only temporarily during a browsing session and are deleted from the user’s device when the browser is closed.

Persistent cookies

This type of cookie is saved on your computer for a fixed period (usually a year or longer) and is not deleted when the browser is closed. Persistent cookies are used where we need to know who you are for more than one browsing session. For example, we use this type of cookie to store your preferences, so that they are remembered for the next visit.

Flash cookies

Many websites use Adobe Flash Player to deliver video and game content to their users. Adobe utilise their own cookies, which are not manageable through your browser settings but are used by the Flash Player for similar purposes, such as storing preferences or tracking users.

Flash Cookies work in a different way to web browser cookies (the cookie types listed above are all set via your browser); rather than having individual cookies for particular jobs, a website is restricted to storing all data in one cookie. You can control how much data can be stored in that cookie but you cannot choose what type of information is allowed to be stored.

Jan 26, 2016upravnik
Privacy PolicyRecommended reading
Share
0
GooglePlus
0
Facebook
0
Twitter
0
Linkedin
Available on Amazon – only $11.99!
BGP performance
CONTENT #1
  • Networking basics
    • What is a network?
    • OSI & TCP/IP models
    • Encapsulation
    • Ethernet
    • Ethernet frame
    • MAC & IP addresses
    • Unicast, multicast, and broadcast addresses
    • Network devices
    • Half duplex and full duplex
    • IEEE Ethernet standards
    • Cisco three-layer hierarchical model
  • Cabling
    • Types of Ethernet cabling
    • Types of Ethernet cables
  • Types of networks
    • Wide area network
    • Local area network & Metropolitan area network
  • IP addressing
    • Types of IP addresses
    • Classes of IP addresses
    • Subnetting explained
    • Subnet mask
    • Create subnets
  • Network tools
    • Ping
    • Traceroute
  • Network protocols
    • TCP/IP suite of protocols
    • TCP explained
    • UDP explained
    • Ports explained
    • ARP
    • DHCP & DNS
    • Telnet & SSH
    • FTP & TFTP
    • SNMP (Simple Network Management Protocol)
    • HTTP & HTTPS
    • NTP (Network Time Protocol)
    • APIPA (Automatic Private IP Addressing)
    • ICMP (Internet Control Message Protocol)
    • IP header
  • Cisco IOS
    • Cisco IOS overview
    • Power on a Cisco device
    • IOS command modes
    • Get help in IOS
    • Running & startup configuration
    • IOS basic commands
    • Configure descriptions
    • Run privileged commands within global config mode
    • Ports on an IOS device
    • Pipe character in IOS
    • IOS boot sequence
    • Backing up IOS configuration
  • IP routing
    • What is IP routing?
    • Connected, static & dynamic routes
    • Administrative distance & metric
    • Routing protocols
  • RIP
    • RIP overview
    • Configuring RIPv2
    • RIP loop prevention
  • EIGRP
    • EIGRP overview
    • EIGRP configuration
    • EIGRP automatic & manual summarization
    • EIGRP authentication & load balancing
    • EIGRP summary
  • OSPF
    • OSPF overview
    • OSPF configuration
    • Designated & Backup Designated Router
    • OSPF authentication
    • OSPF summarization
    • OSPF summary
    • Differences between OSPF and EIGRP
  • LAN switching
    • Layer 2 switching
    • Collision & broadcast domain
    • CSMA/CD
  • VLAN
    • What is a VLAN?
    • Configuring VLANs
    • Configuring access & trunk ports
    • Frame tagging
    • IEEE 802.1Q
    • Inter-Switch Link (ISL)
CONTENT #2
  • ACLs
    • What are ACLs?
    • Types of ACLs
    • Configuring standard ACLs
    • Configuring extended ACLs
  • NAT
    • What is NAT?
    • Static NAT
    • Dynamic NAT
  • IPv6
    • What is IPv6?
    • IPv6 address format
    • Types of IPv6 addresses
    • IPv6 unicast addresses
    • IPv6 global unicast addresses
    • IPv6 unique local addresses
    • IPv6 link-local addresses
    • IPv6 multicast addresses
    • IPv6 address prefixes
    • IPv6 interface identifier
    • IPv6 transition options
    • IPv6 routing protocols
    • How to configure IPv6
    • RIPng
    • Differences between IPv4 and IPv6
  • Miscellaneous
    • Wildcard masks
    • Setting up Telnet
    • Setting up SSH
    • Port security
Random articles
What is NAT?

NAT (Network Address Translation) is a process of changing the source and destination IP addresses and ports. Address translation reduces the need for IPv4 public addresses and hides private network address ranges. The process is usually done by routers or firewalls.   There are three types of address translation:   1. Static NAT – translates […]

Types of Ethernet cabling

There are three cable types commonly used for Ethernet cabling: coaxial, twisted pair, and fiber-optic cabling. In today’s LANs, the twisted pair cabling is the most popular type of cabling, but the fiber-optic cabling usage is increasing, especially in high performance networks. Coaxial cabling is generally used for cable Internet access. We will explain all […]

Pipe character in IOS

IOS supports the use of the pipe character (represented by the | character) to filter the output of the show commands. The pipe function takes the output of the command and sends it to another function, such as begin or include. This way, you can filter the output to find the section of the output that […]

Recommended reading
          
2018 study-ccna.com. This is not an official Cisco site. Cisco Systems is not affiliated in any way with this site. All the texts on this site are written exclusively for study-ccna.com.