Language Selection

English French German Italian Portuguese Spanish

Getting Rid of Nasty Flash Cookies on Linux

Filed under
Software

Flash cookies are the secret nasties of using the Flash player on any platform. These are somewhat like the ordinary HTTP cookies that Web sites infest on our systems. Some HTTP cookies have useful purposes, such as storing the contents of shopping carts and other session information that is actually helpful to us lowly users. But the majority of HTTP cookies are tracking cookies, following us on our travels around the Web, collecting and collating data without our consent and for purposes that do not benefit us. Marketers have no shame when it comes to newer and more inventive ways to spy and track on our movements, and putting together identifying data from diverse sites. Just think if all of that ingenuity were channeled into developing good products that people actually want, and marketing them in ways that were not obnoxious...oh I know, that's crazy talk, so let's move on.

The correct name for Flash cookies is Local Shared Objects, or LSOs, but we'll call them Flash cookies anyway. There are two ways to manage them-- the Adobe way, and the Linux way. Today we'll learn the Adobe way, and then on Friday we'll learn the excellent Linux way.

I think Flash cookies are one of the primary reasons for Adobe's reluctance to open-source the Flash player. I think it is time to give Gnash a serious try.

rest here




I hate nasty cookies.

I hate nasty cookies.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

War Thunder on GNU/Linux and More on SteamVR

Leftovers: OSS

Security Leftovers

  • Wednesday's security advisories
  • Smartphones with fingerprint scanners under screen to hit market this year
    The majority of fingerprint scanners can be found either on the back of a smartphone or on the front, embedded in the home button. But it looks like that status quo is soon about to change. According to a report from The Investor, CrucialTec, a manufacturer of fingerprint modules based in South Korea, will launch its on-screen fingerprint scanning solution that allows you to unlock your device by placing a finger on the screen sometime this year. This means that we can expect to see the first smartphones featuring the new fingerprint technology hit the market in 2017. Unfortunately, CrucialTec did not reveal an exact time frame or the smartphone manufacturers it is currently working with.
  • Kaspersky launches 'secure operating system' -- with no trace of Linux in it [Ed: You must be pretty desperate for headlines and attention when your marketing pitch is, "we're not Linux!"]
  • Windows Botnet Spreading Mirai Variant
    A Chinese-speaking attacker is spreading a Mirai variant from a repurposed Windows-based botnet. Researchers at Kaspersky Lab published a report today, and said the code was written by an experienced developer who also built in the capability to spread the IoT malware to Linux machines under certain conditions.
  • Five New Linux Kernel Vulnerabilities Were Fixed in Ubuntu 16.10, 14.04 & 12.04
    We reported earlier that Canonical published multiple security advisories to inform Ubuntu users about the availability of new kernel updates that patch several flaws discovered recently by various developers. We've already told you about the issues that are affecting Ubuntu 16.04 LTS and Ubuntu 16.04.1 LTS (Xenial Xerus) users, so check that article to see how you can update your systems is you're still using the Linux 4.4 LTS kernel. But if you managed to upgrade to Ubuntu 16.04.2 LTS, which uses Ubuntu 16.10 (Yakkety Yak)'s Linux 4.8 kernel, then you need to read the following.
  • Another Linux Kernel Vulnerability Leading To Local Root From Unprivileged Processes

Red Hat News