Cookies & Log Files
A Presentation By : Daryll Castelino
CONTENTS :
COOKIES :
 A Brief Overview
 Privacy
 Limitations
 Types
 Uses
Cookies & log files
Cookies & log files
Cookies & log files
Cookies & log files
A Brief Overview
 A small piece of data stored in a text file.
 Stores a single piece of data under a unique
id name.
 Stored in browser directory on your Hard Disk.
 Customizes webpages according to the user.
 Saves precious time.
 Browser dependent.
 Enhances browsing experience.
Privacy
Cookies can only be read by the site that
created them, or a site 'underneath'
the site that created them. This
prevents other websites from stealing
cookies.
Cookies
Sessions
Persistent First-Party
Third-Party
Session Cookie :
 Temporary.
 Deleted as soon as browser is closed.
 More secure and more reliable.
 Store items for short period of time.
 Mainly used to store items in shopping cart
on your e-commerce websites
Persistent Cookie :
 Permanent till some extent.
 Longer life compared to session cookies.
 Has an expiration date.
 Life can range from a few days to several
years
First – Party Cookie :
 Cookies of the site you’re currently visiting.
 Allowed by default on all browsers.
Third – Party Cookie :
 Cookies other than first-party cookies.
 Generates custom ads on your current webpage.
 Tracks your surfing habits.
On Internet Explorer :
Program files Internet Explorer Cookies.txt
On Netscape Navigator :
Program files Netscape Navigator Cookies.txt
On Opera Mini :
Program files Opera Mini Cookies.dat
Limitations
The cookie specification introduced by Netscape
also places limits on cookies. These limits are:
– 310 total cookies.
– 4 kilobytes per cookie
– 20 cookies per server or domain.
Uses
 On e-commerce websites.
 Login details on user demand.
 Preferred language selection.
 Recently viewed stock quotes.
Security Issues
 Network Eavesdropping.
 Poor encryption.
 DNS cache poisoning.
Log Files
 Records events or software runs.
 Creates audit trials which helps to diagnose
certain problems
 Essentially used on server applications.
 Records requests by client to server.
 Helps in recovering from transaction failures.
 Generally stored on disks and are frequently
backed-up.
 Much briefer than cookies.
< Syntax >
 [start_transaction,T]
 [write_item,T,X,old_value,new_value]
 [read_item,T,X]
 [commit,T]
 [abort,T]
Questions ???

More Related Content

PPTX
Html5 web storage
PDF
Html5-Web-Storage
PDF
Html5 web storage
PPTX
HTML (presentation)
PPTX
PPT
Customer Relationship Management (CRM)
PPT
Presentation on Internet Cookies
PPTX
Cookies: A brief Introduction
Html5 web storage
Html5-Web-Storage
Html5 web storage
HTML (presentation)
Customer Relationship Management (CRM)
Presentation on Internet Cookies
Cookies: A brief Introduction

Similar to Cookies & log files (20)

PPT
Internet cookies
PPTX
Cookies and sessions
PPT
Internet cookies
PPTX
Web Browser-add ons.pptx
PPTX
Enterprise java unit-2_chapter-2
PPTX
Caching and Its Main Types
PDF
Difference in session and cookie.pdf
PDF
E Commerce Analytics Demandware
PPTX
Cookies and Session
PDF
Gemini Recommendations for Ad Blocking.pdf
PDF
Caloosa Tech Times - November 2009
PPTX
Cookie testing
PPTX
Privacy in private browsing mode
PPSX
Sessions and cookies
PPTX
Internet Cookies
PDF
What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
PDF
Cloud Computing for Lawyers: Practical and Ethical Uses of the Cloud
PDF
Cookie replay attack unit wise presentation
PDF
Mozilla firefox support phone number
PPTX
Internet cookies
Cookies and sessions
Internet cookies
Web Browser-add ons.pptx
Enterprise java unit-2_chapter-2
Caching and Its Main Types
Difference in session and cookie.pdf
E Commerce Analytics Demandware
Cookies and Session
Gemini Recommendations for Ad Blocking.pdf
Caloosa Tech Times - November 2009
Cookie testing
Privacy in private browsing mode
Sessions and cookies
Internet Cookies
What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
Cloud Computing for Lawyers: Practical and Ethical Uses of the Cloud
Cookie replay attack unit wise presentation
Mozilla firefox support phone number
Ad

Recently uploaded (20)

PDF
Literature_Review_methods_ BRACU_MKT426 course material
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PPTX
Core Concepts of Personalized Learning and Virtual Learning Environments
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
PDF
Journal of Dental Science - UDMY (2021).pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
Journal of Dental Science - UDMY (2020).pdf
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
International_Financial_Reporting_Standa.pdf
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
PDF
CRP102_SAGALASSOS_Final_Projects_2025.pdf
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
Hazard Identification & Risk Assessment .pdf
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PPTX
Education and Perspectives of Education.pptx
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
Literature_Review_methods_ BRACU_MKT426 course material
AI-driven educational solutions for real-life interventions in the Philippine...
Core Concepts of Personalized Learning and Virtual Learning Environments
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
Journal of Dental Science - UDMY (2021).pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
Journal of Dental Science - UDMY (2020).pdf
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
International_Financial_Reporting_Standa.pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
CRP102_SAGALASSOS_Final_Projects_2025.pdf
Introduction to pro and eukaryotes and differences.pptx
Hazard Identification & Risk Assessment .pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Education and Perspectives of Education.pptx
Unit 4 Computer Architecture Multicore Processor.pptx
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
Share_Module_2_Power_conflict_and_negotiation.pptx
Ad

Cookies & log files

  • 1. Cookies & Log Files A Presentation By : Daryll Castelino
  • 2. CONTENTS : COOKIES :  A Brief Overview  Privacy  Limitations  Types  Uses
  • 7. A Brief Overview  A small piece of data stored in a text file.  Stores a single piece of data under a unique id name.  Stored in browser directory on your Hard Disk.  Customizes webpages according to the user.  Saves precious time.  Browser dependent.  Enhances browsing experience.
  • 8. Privacy Cookies can only be read by the site that created them, or a site 'underneath' the site that created them. This prevents other websites from stealing cookies.
  • 10. Session Cookie :  Temporary.  Deleted as soon as browser is closed.  More secure and more reliable.  Store items for short period of time.  Mainly used to store items in shopping cart on your e-commerce websites
  • 11. Persistent Cookie :  Permanent till some extent.  Longer life compared to session cookies.  Has an expiration date.  Life can range from a few days to several years
  • 12. First – Party Cookie :  Cookies of the site you’re currently visiting.  Allowed by default on all browsers. Third – Party Cookie :  Cookies other than first-party cookies.  Generates custom ads on your current webpage.  Tracks your surfing habits.
  • 13. On Internet Explorer : Program files Internet Explorer Cookies.txt On Netscape Navigator : Program files Netscape Navigator Cookies.txt On Opera Mini : Program files Opera Mini Cookies.dat
  • 14. Limitations The cookie specification introduced by Netscape also places limits on cookies. These limits are: – 310 total cookies. – 4 kilobytes per cookie – 20 cookies per server or domain.
  • 15. Uses  On e-commerce websites.  Login details on user demand.  Preferred language selection.  Recently viewed stock quotes.
  • 16. Security Issues  Network Eavesdropping.  Poor encryption.  DNS cache poisoning.
  • 17. Log Files  Records events or software runs.  Creates audit trials which helps to diagnose certain problems  Essentially used on server applications.  Records requests by client to server.  Helps in recovering from transaction failures.  Generally stored on disks and are frequently backed-up.  Much briefer than cookies.
  • 18. < Syntax >  [start_transaction,T]  [write_item,T,X,old_value,new_value]  [read_item,T,X]  [commit,T]  [abort,T]