. . . "They can also be used by software applications to identify a computer, file or other item." . .