What information is carried by a Web bug?
1. The type of browser that fetched the Web bug image. 2. The time the Web bug was fetched. 3. The IP address of the computer that fetched the Web bug. 4. The URL of the main Web site. 5. The URL of the Web bug image located on the hidden Web site. 6. A previously-set cookie value. Information types (1-2) are not necessarily such a big deal. However, (3-6) are more sensitive. The computer’s IP address (3) can be traced by network providers, but this usually takes a fair amount of effort. By receiving (4), the hidden Web site learns where the user intended to browse. And the main Web site can control (5) to communicate any extra information it has through Alice’s computer to the hidden Web site. Item (6) allows the hidden Web site to recognize the user’s computer. For example, suppose Alice creates an account at Spend.com, which contains a Web bug to Bug.com. During this process she enters her e-mail address alice@example.com. The Spend.com Web site could use a Web bug to transmit her a