[2394] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Smart Fine Print

daemon@ATHENA.MIT.EDU (Leonard H. Smith)
Fri Jul 12 08:27:30 1996

From: "Leonard H. Smith" <lensmith@mta-usa.org>
To: Vassilis Risopoulos <risopoul@informatik.uni-hamburg.de>
Date: Wed, 10 Jul 1996 22:38:12 -800
Reply-to: lensmith@mta-usa.org
CC: www-security@ns2.rutgers.edu
Errors-To: owner-www-security@ns2.rutgers.edu

> I don't
> understand why there is so much noise about cookies. I think they
> are much more usefull then hidden input fields in forms and they do
> my life a lot moree easier when I want to track somebody running
> through my web pages. As far as I know, a server cannot request a
> cookie. The client sents to the server all cookies corresponding to
> the domain and the path set by a 'set cookie' header. Vassilis.-
> 

The level of parinoia here is interesting. 

I think the real question is: what methods are used to access the client 
computer's cookies and what restrictions are there?  What information 
is stored in cookies and how is that information generated?  Another 
question revolves around creative 
variations on the theme....what method variations are possible?

  
()-()-()-()-()-()-()-()-()-()-()-()-()-()-()

Market Technicians Association
http://www.mta-usa.org/~lensmith/

International Federation of Technical Analysts
http://www.ifta.org/~ifta/

()-()-()-()-()-()-()-()-()-()-()-()-()-()-()

home help back first fref pref prev next nref lref last post