How Cookies Impact on Cyber Security – Part 2