Ghostery - Ghostery: Difference between revisions
From GCA ACT
Jump to navigationJump to search
(Created via script) |
(Updated via script) |
||
(3 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
=Description= | =Description= | ||
<br> | <br> | ||
Ghostery is a tool that helps you see and manage the “invisible” web of trackers, web bugs, pixels, and beacons that follow you around the Internet. When you visit a website, your browser share some information with that site’s server. This is called a HTTP request. Each request includes your IP address, browser type, and the page you’re requesting. | Ghostery is a tool that helps you see and manage the “invisible” web of trackers, web bugs, pixels, and beacons that follow you around the Internet. When you visit a website, your browser share some information with that site’s server. This is called a HTTP request. Each request includes your IP address, browser type, and the page you’re requesting. | ||
<br> | <br> | ||
=More Information= | =More Information= | ||
Line 8: | Line 8: | ||
[[Category:Cookies & Trackers]] | [[Category:Cookies & Trackers]] | ||
[[Category:Recognising Untrustworthy or Inappropriate Applications]] | [[Category:Recognising Untrustworthy or Inappropriate Applications]] | ||
Latest revision as of 03:00, 24 April 2024
Description
Ghostery is a tool that helps you see and manage the “invisible” web of trackers, web bugs, pixels, and beacons that follow you around the Internet. When you visit a website, your browser share some information with that site’s server. This is called a HTTP request. Each request includes your IP address, browser type, and the page you’re requesting.