Google Cookies

Are Google Cookies a threat or privlidge ??

Google is the best search engine today. We all love Google, In fact many of us open Google to check if our Internet connection is working or not !! I know its funny but its a fact.
Google is the best place to search and find things that we do not know about.


But how many of you know about Google Cookies ??
We all know about Browser Cookies, Cookies simply store all the searches. Cookies are used to store the information about the visitors and also they are used to store the Login informations like username, passwords, etc.

Similar to Browser Cookies, Google also have Cookies.
Google builds up a detailed profile of your search terms over many years. So Google probably know when you were in love for the first time,
what diseases your children have had, who was your first crush and other things you have had searched about on google.

Google stores all the information regarding your search query, time etc. They save all this for our privlige, for our benefit.
When you will search something on google then it will show results using your old search queries.

If you want to hide all information from google then i have a solution for you !!

  • G-zapper

It helps you to stay anonymous while searching on google by deleting or blocking the google cookies that track your preferance and search history.G-Zapper helps you protect your identity and search history. G-Zapper will read the Google cookies installed on your PC, display the date it was installed, determine how long your searches have been tracked,  and display your Google searches. G-Zapper allows you to automatically delete or entirely block the Google search cookie from future installation. Easily block Google cookies and clean cookies with G-Zapper

If you don’t want a G-zapper, try a web-proxy.

The beauty with these sites is that you/your pc never makes contact with google or any other site.
All the information is sent through the proxy site’s servers.
It leaves no trace. is good but it doesn’t allow for google images, videos, etc. is better but it also doesn’t work for google images. is great, it access images, videos, etc.

Recently I’ve been testing to get to the places others don’t reach. By the way VPN is also a nice option.


This post  will familiarize you with Firewall , bypass the firewall and tools to bye pass it.


A hardware device and/or software program which sits between the Internet and the intranet, internet, of an organization

It restricts information that comes to your computer from other computers, giving you more control over the data on your computer and providing a line of defense against people or programs that try to connect to your computer without invitation.

In fact, that’s why its called a firewall. Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next.

what is firewall
what is firewall

Firewall objective

Its main objectives are to filter:
what should come in the intranet (inbound traffic) and
what should come out of the intranet (outbound traffic).

what is firewall
what is firewall


Packet Filtering Firewall : They are usually part of a router and each packet is compared to a set of criteria before it is forwarded, dropped, or a message is sent to the originator.

what is firewall
what is firewall

Circuit level Gateway : they monitor TCP handshaking between packets to determine whether a requested session is legitimate. Information passed to remote computer through a circuit level gateway appears to have originated from the gateway. On the other hand, they do not filter individual packets.

what is firewall
what is firewall

Application level gateways : also called proxies, are application specific. An application level gateway that is configured to be a web proxy will not allow any ftp, gopher, telnet or other traffic through. They offer a high level of security, but have a significant impact on network performance.



Stateful Multilayer Firewalls : combine aspects of the other three types of firewalls. They filter packets at the network layer and evaluate contents of  packets at the application layer. They allow direct connection between client and host, and they rely on algorithms to recognize and process application layer data instead of running application specific proxies.



Firewall defense your network using one of two access denial methodologies:

  • may allow all traffic through unless it meets certain criteria, or
  • may deny all traffic unless it meets certain criteria

And Criteria to be configured for  firewall



So these are four criteria on which your network should be defensed by Anti virus. The next post will be on How to bye pass Firewall