Hittade 445 resultat för cookies för Alla produkter


There's no option in privacy settings to turn off/on cookies for a specific website every time i try to open my website it ask me to click on accept risk and continue please help.

Office 365 cookie issue

I have configured FF to block all cookies under "Browser Privacy" the custom setting allows "Choose which trackers and scripts to block. and I selected "all cookies". Knowing that all cookies will be blocked I logged into office 365 and allowed manually cookies through "view page info" I then selected "set cookies" to allow expecting full access to office 365 mail, but this did not occur. What happened is I logged into office 365 and could see the icons and my login name but could not read the mail. Office 365 gave the message "we couldn't sign you in please try again" yet I could see my log in name and the office 365 icons for mail, calendar etc.. just not the actual data. If I allow cookies in Browser privacy (which i take it allows cookies always) it woks. I bring this up because it seems like something is missing in cookies that is not represented in FF.What is the difference between browser privacy cookies and allowing it through view page permissions? Can anyone offer an explanation?

Cookies not being kept

http://www.websudoku.com/ is losing cookies (options selected and level of Sudoku). This has worked in past. Additional info. If I leave page and select Sudoku page again - cookies are gone. It is not a matter of closing my browser or even my tab.

Cookies exception list

Hi everyone, I created a "positive list" of websites, I want cookies to stay, any other should be deleted after browser shutdown. I have a problem with the website de.pons.com It is in the exception list but everytime, I go to that website the cookie accept procedure starts again. Could you add the exception list to the things to sync? How can I make a backup of this list? Thanks for all comments. Benno

Are undeleted cookies a danger to security?

I am reading an article published by InfoSecInstitute. It explains why cookies can be a security and privacy risk (copy of part the article below). With this in mind, ''''''''I am wondering how wise it is to keep any cookies that do not expire quickly on their own, but particularly those kept to “help” (for convenience) to avoid MF authentication. If hijacked, the hijackers could get access to what they should not have.'''''''' '''Do I understand correctly that not deleting cookies on the computer can open it up to hijackers? If so, is cookie hijacking a frequent occurrence? It seems that there are many methods to hijack cookies. There are websites that do not use HTTPS. Does using VPN help?''' ---------------------------------- "It’s not like you can get a virus from a cookie; after all, they are just simple text files and do not contain any sort of executable. Yet, depending on how cookies are used and exposed, they can represent a serious security risk. For instance, cookies can be hijacked. As most websites utilize cookies as the only identifiers for user sessions, if a cookie is hijacked, an attacker could be able to impersonate a user and gain unauthorized access. This may happen in several different ways: '''Capturing cookies over insecure channels''': Any cookie related to authentication should always be transmitted securely, but that is not always the case. One example is cookies without a security flag. When a cookie is set with the Secure flag, it instructs the browser that the cookie can only be accessed over secure SSL/TLS channels. If the secure flag is not set, a cookie can be transmitted in cleartext — for instance, if the user visits any HTTP URLs within the cookie’s scope. This would allow an attacker eavesdropping network traffic to easily capture the cookie and use it to gain illegitimate access. '''Session fixation''': This is another attack that allows an attacker to hijack a valid user session. This time, it exploits a limitation in the way the web application manages the session ID. For example, if an application allows a session token in the query parameters, an attacker may send a user an URL with a specific session ID included in its arguments. Now, when the user authenticates by using this URL, the attacker can hijack the session. '''Cross-site scripting (XSS'''): Another way to steal cookies is using cross-site scripting to exploit websites that allows users to post unfiltered HTML and JavaScript content. For example, if a user clicks on a malicious link posted by an attacker, it may execute the JavaScript code and cause the victim’s web browser to send the victim’s cookies to a website the attacker controls. '''Cross-site request forgery (CSRF)''': This is a type of attack that exploits a website by making it execute unauthorized commands that are transmitted from a user that the web application trusts. In a CSRF attack, the attacker’s objective is to use an innocent victim to unknowingly submit a maliciously crafted web request to a website that the victim has privileged access to. Since the victim is already logged, any request coming from his browser will be deemed as trustworthy and be executed. For an CSRF attack to work, an attacker must first identify a reproducible web request that executes a specific action — for example, changing a password on the target page. Once such a request is identified, a link can be created that generates this malicious request and that link can be embedded on a page within the attacker’s control. Even worse, it may not even be necessary for the victim to click the link. For instance, it may be embedded within an html image tag on an email sent to the victim, which will automatically be loaded when the victim opens their email. '''Cookie tossing''': A cookie tossing attack is based on providing a user with a malicious cookie that has been designed to look like it came from the targeted site’s subdomain. Of course, this becomes especially problematic when a website allows untrusted people to host subdomains under its domain. When the user visits the target site, all cookies are sent, both valid and the ones appearing to be from subdomains. In this attack, the ability to take over a session is quite limited, because the attacker can only write information, not read anything. However, cookie tossing can be used to set arbitrary cookie values that, in some cases, can be used for a CSRF attack or an XSS injection, depending on what the main domain does with the content of the cookie. Cookies may also represent a severe risk to privacy. "

Exceptions for cookies not stored

Hello I have set firefox to clear cookies when closing. Nevertheless I want to maintain some exceptions. So I enter the website for that I want to keep the cookies and save. After closing firefox and open it again, this setting for the website is gone, and alos the cookies. How can I permanetly storing these execption? Regards Oliver

Firefox Cookies Being Deleted

Since the most recent Firefox for Windows update, all of my Firefox browsers on my PCs have suddenly stopped saving my already logged in cookies for my major use websites, such as Facebook, Outlook, Amazon, and Netflix. For the past few years, these websites all stay logged in, even when I have Firefox set to delete cookies when the browser is closed, in part because I have these websites all carefully noted in the cookies and site data exceptions. As I said, I've never had problems for the past few years. But since the most recent update a few weeks ago, all of my websites log me out after 24 hrs. I even changed the main cookies settings to not delete any cookies when the browser is closed, but that makes no difference. Something has changed in the most recent Firefox that has disabled the managed exceptions to cookie deletion. I'd love some help on how to fix this, as changing settings does not seem to do it.

Firefox 81.0.1 not remembering cookies

Version 81.0.1 (64-bit) does not remember cookies. I logged in to my email, Facebook, LinkedIn and other sites and chose to remember the browser. When I restart the browser, I have to login again. This happens on all sites with passwords. I tried the sites and restarting Firefox several times with the same results. I have disabled all tracker blocking, allowing everything through. Enhanced tracking protection is off for the sites. Cookies, etc. are NOT set to delete upon exit. This is new behavior. Earlier versions did not have this problem. Any idea of how to fix this?

How to clear some cookies in Firefox?

It is possible to clear all the cookies from a website in Firefox: https://support.mozilla.org/en-US/kb/clear-cookies-and-site-data-firefox In my case, I would like to clear only authentication cookies (to be automatically disconnected when I close Firefox) but I want to keep the other cookies about my preferences. However, I can select on which websites I want to clear my cookies but I can't select which ones. Is there a way to select the list of cookies I want to keep/clear for each websites? Thanks.

Managing Cookie Exceptions

Need help configuring Firefox exceptions for Cookies and Other site Data so sites like the NY Times can remember me so I don't have to log-in to them multiple times per day. I've even deleted Firefox and started over, but that did not resolve the issue. I need an expert in this to help me as I'm just not getting it...though I have tried many different configurations of FireFox's settings. Thanks Tim

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 45