• Skip to primary navigation
  • Skip to main content

Advanced Network Systems, Inc

  • Home
  • About
    • Certifications
    • Partners
  • Products
    • IP Phone Systems
    • Life Size Video Conferencing
    • Dell Computers
    • Email Encryption
    • Quickbooks Products
    • Altaro
  • Services
    • Network Concepting and Consulting
    • Advanced Monitoring
    • Workstations
    • Servers
    • Email
  • News
  • Testimonials
  • Knowledge Base
  • Contact
    • Ticket

fdobson

What are cookies?

By fdobson on October 27, 2019

What are cookies?

What Are Cookies?

Cookies are small files which are stored on a user’s computer. They are designed to hold a modest amount of data specific to a particular client and website, and can be accessed either by the web server or the client computer. This allows the server to deliver a page tailored to a particular user, or the page itself can contain some script which is aware of the data in the cookie and so is able to carry information from one visit to the website (or related site) to the next.

What’s in a Cookie?

Each cookie is effectively a small lookup table containing pairs of (key, data) values – for example (firstname, John) (lastname, Smith). Once the cookie has been read by the code on the server or client computer, the data can be retrieved and used to customise the web page appropriately.

When are Cookies Created?

Writing data to a cookie is usually done when a new webpage is loaded – for example after a ‘submit’ button is pressed the data handling page would be responsible for storing the values in a cookie. If the user has elected to disable cookies then the write operation will fail, and subsequent sites which rely on the cookie will either have to take a default action, or prompt the user to re-enter the information that would have been stored in the cookie.

Why are Cookies Used?

Cookies are a convenient way to carry information from one session on a website to another, or between sessions on related websites, without having to burden a server machine with massive amounts of data storage. Storing the data on the server without using cookies would also be problematic because it would be difficult to retrieve a particular user’s information without requiring a login on each visit to the website.

If there is a large amount of information to store, then a cookie can simply be used as a means to identify a given user so that further related information can be looked up on a server-side database. For example the first time a user visits a site they may choose a username which is stored in the cookie, and then provide data such as password, name, address, preferred font size, page layout, etc. – this information would all be stored on the database using the username as a key. Subsequently when the site is revisited the server will read the cookie to find the username, and then retrieve all the user’s information from the database without it having to be re-entered.

How Long Does a Cookie Last?

The time of expiry of a cookie can be set when the cookie is created. By default the cookie is destroyed when the current browser window is closed, but it can be made to persist for an arbitrary length of time after that.

Who Can Access Cookies?

When a cookie is created it is possible to control its visibility by setting its ‘root domain’. It will then be accessible to any URL belonging to that root. For example the root could be set to “advancednetworksystems.com” and the cookie would then be available to sites in “www.advancednetworksystems.com” or “xyz.advancednetworksystems.com” or “advancednetworksystems.com”. This might be used to allow related pages to ‘communicate’ with each other. It is not possible to set the root domain to ‘top level’ domains such as ‘.com’ or ‘.co.uk’ since this would allow widespread access to the cookie.

By default cookies are visible to all paths in their domains, but at the time of creation they can be retricted to a given subpath – for example “www.advancednetworksystems.com/images“.

How Secure are Cookies?

There is a lot of concern about privacy and security on the internet. Cookies do not in themselves present a threat to privacy, since they can only be used to store information that the user has volunteered or that the web server already has. Whilst it is possible that this information could be made available to specific third party websites, this is no worse than storing it in a central database. If you are concerned that the information you provide to a webserver will not be treated as confidential then you should question whether you actually need to provide that information at all.

What are Tracking Cookies?

Some commercial websites include embedded advertising material which is served from a third-party site, and it is possible for such adverts to store a cookie for that third-party site, containing information fed to it from the containing site – such information might include the name of the site, particular products being viewed, pages visited, etc. When the user later visits another site containing a similar embedded advert from the same third-party site, the advertiser will be able to read the cookie and use it to determine some information about the user’s browsing history. This enables publishers to serve adverts targetted at a user’s interests, so in theory having a greater chance of being relevant to the user. However, many people see such ‘tracking cookies’ as an invasion of privacy since they allow an advertiser to build up profiles of users without their consent or knowledge.

What are viruses, worms, and Trojan horses?

By fdobson on October 27, 2019

Defining viruses, worms, and Trojan horses

According to Webster’s Collegiate Dictionary, a computer virus is “a computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files, and that usually performs a malicious action (such as destroying data)”. Computer viruses are never naturally occurring; they are always man-made. Once created and released, however, their spread is not directly under human control.

  • Macro viruses: A macro is a piece of code that can be embedded in a data file. A macro virus is thus a virus that exists as a macro attached to a data file. In most respects, macro viruses are like all other viruses. The main difference is that they are attached to data files (i.e., documents) rather than executable programs.
  • Worms: Worms are very similar to viruses in that they are computer programs that replicate functional copies of themselves (usually to other computer systems via network connections) and often, but not always, contain some functionality that will interfere with the normal use of a computer or a program. Unlike viruses, however, worms exist as separate entities; they do not attach themselves to other files or programs. Because of their similarity to viruses, worms also are often referred to as viruses.
  • Trojan horses: A Trojan horse is a program that does something undocumented which the programmer intended, but that users would not accept if they knew about it. By some definitions, a virus is a particular case of a Trojan horse, namely, one which is able to spread to other programs (i.e., it turns them into Trojans too). According to others, a virus that does not do any deliberate damage (other than merely replicating) is not a Trojan. Finally, despite the definitions, many people use the term “Trojan” to refer only to a non-replicating malicious program.

Setting a passcode lock on iPhone, iPod touch, and iPad

By fdobson on October 27, 2019

Before You Begin

If you use iPhone, iPod touch, or iPad to access sensitive data, such as your email or calendar, you should consider setting a passcode lock. Doing so protects your data in case an untrustworthy person gets a hold of your device (for example, if it is lost or stolen).
Set a Passcode Lock on iPhone, iPod touch, and iPad

To set a passcode lock for iPhone, iPod touch, and iPad do the following:

Press Settings > Passcode Lock.
Enter a 4-digit code that will serve as your passcode.
Enter your passcode again.

Your device now requires your passcode to unlock it. You must enter your passcode when you turn on the device or press the Wake button.

On iPhone, you do not have to enter your passcode to answer calls or make emergency calls. You must enter your passcode to make normal calls.

Advanced Options

By default, if you have a passcode set for iPhone, iPod touch, and iPad, you must enter it immediately after turning on the device or pressing the Wake button.

You can change the length of time your device is idle before your passcode is required. For example, you can set the device to only require a passcode after it has been idle for more than five minutes.

To change the length of time before your passcode is required, do the following:

Press Settings > Passcode Lock > Require Passcode.
Select a length of time. Shorter times are more secure.

How to add a shared mailbox in Outlook 2010

By fdobson on October 27, 2019

Before You Begin

Despite its name, a shared mailbox provides access to more than just email. Like any Exchange account, a shared mailbox grants access to email, calendar, and contacts.

To add a shared mailbox in Outlook 2010, you must first be granted permission to access that shared mailbox. Your department might request a shared mailbox and designate a few employees to have access to it.

A shared mailbox allows you to work together with other staff members in shared environment. Changes made by one person are seen by others who have access to the shared mailbox. For example, if one person adds an event to the calendar for the shared mailbox, that event is accessible to the others. Likewise, if an email message was deleted from the Inbox by one person, it is deleted for the others as well.

Add Shared Mailbox

To add a shared mailbox in Outlook 2010, do the following:

Open Outlook 2010.
Click File.
Click Info on the left.
Click the Account Settings button and select Account Settings….
Select your Exchange account.
Click the Change button at the top of the window ….
Click More Settings….
Click the Advanced tab.
Click the Add button.
Enter the name of the shared mailbox and click OK.
Click Apply and then click OK.
Click Next.
Click Finish.
Click Close.
Click Mail on the left. The shared mailbox appears on the left side of the screen. Expand the mailbox to view its contents.

You can now added the shared mailbox to Outlook 2010.

How to reserve your Windows 10 Upgrade

By fdobson on October 27, 2019

If you have a Windows 7 or Windows 8 machine you can reserve your free upgrade in the Get Windows 10 App. Once you reserve, Windows 10 will download when available, and you can cancel your reservation at any time.

  1. Click on the small Windows icon found at the right end of the taskbar.
  2. Click “Reserve your free upgrade” in the app window.
  3. Enter your email if you want a confirmation of this reservation.
  4. All set. There’s no obligation and you can cancel your reservation at any time.



When Windows 10 is release you will get another notification to let you know Windows 10 is ready to be installed.

We Are now a RingCentral Partner

By fdobson on June 10, 2015

We recently became a RingCentral partner. RingCentral is a leader in Hosted VOIP services. For more information visit our products page and click IP Phone Systems.

  • Page 1
  • Page 2
  • Go to Next Page »

Advanced Network Systems consists of a dedicated team of system and network professionals with over 60 years of combined practical experience. Based in Lincoln, Rhode Island, ANS has been servicing both large and small businesses in most New England states for the last 13 years. At Advanced Network Systems our main goal is to deliver the highest level of customer service to our clients by providing state-of-the-art technical expertise in a timely and efficient manner.

ANS has grown to be more than your average computer repair shop. Through multiple partnerships with industry leading vendors like Interactive Intelligence, Microsoft, and GFI. ANS has been able to expand its offerings to include cutting edge products and services. Whether you have been thinking about going to the cloud to save costs, looking for a Voice over IP solution for your growing business, or being forced to comply with new regulations for tightened security, ANS has the answers.

Testimonials

Our business relies on Advanced Network Systems to assist with all our computer related needs.

Dr. Day Care Family / Kids Klub

Advanced Network Systems, Inc
2019-10-27T08:14:50+00:00

Dr. Day Care Family / Kids Klub

Our business relies on Advanced Network Systems to assist with all our computer related needs. The top-notch team always attends to our issues promptly and follows through to be sure the job has been successfully completed. Their dedication and attention to detail helps us to keep our business running successfully!
https://advancednetworksystems.com/testimonials/our-business-relies-on-advanced-network-systems-to-assist-with-all-our-computer-related-needs/

Since the start of our firm, Advanced Network Systems has quickly become an integral part in keeping all systems of our technological world afloat.

Fuzion Design

Advanced Network Systems, Inc
2019-10-27T07:41:29+00:00

Fuzion Design

Many of our employees at Fuzion Design are known for their cutting-edge design expertise, working in a small firm, however, forces our employees to wear many different hats—unfortunately ‘tech support’ is not one of them. Thankfully we have had the much needed tech support from our friends at Advanced Network Systems. Since the start of our firm, Advanced Network Systems has quickly become an integral part in keeping all systems of our technological world afloat. We are proud to announce that ANS is top of our speed dial list (We’re sure they aren’t surprised about that one!)
https://advancednetworksystems.com/testimonials/since-the-start-of-our-firm-advanced-network-systems-has-quickly-become-an-integral-part-in-keeping-all-systems-of-our-technological-world-afloat/
0
0
Advanced Network Systems, Inc
  • Home
  • About
  • Contact
  • Knowledge Base
  • News
  • Products
  • Services
  • Testimonials
  • (401) 723-6400

101 Higginson Avenue, Suite 103 B
Lincoln, RI 02865-2799
Voice: 401.723.6400 Fax: 401.725.2453
Copyright © 2025 · Advanced Network Systems, Inc.