Main

processing priority

4

site type

3 (personal blog or private political site, e.g. Blogspot, Substack, also small blogs on own domains)

review version

11

html import

20 (imported)

Events

first seen date

2024-02-05 00:43:28

expired found date

-

created at

2024-06-07 22:20:57

updated at

2025-12-31 10:32:55

Domain name statistics

length

15

crc

34285

tld

2211

nm parts

0

nm random digits

0

nm rare letters

0

Connections

is subdomain of id

-

previous id

0

replaced with id

0

related id

-

dns primary id

13642151

dns alternative id

0

lifecycle status

0 (unclassified, or currently active)

Subdomains and pages

deleted subdomains

0

page imported products

0

page imported random

0

page imported parking

0

Error counters

count skipped due to recent timeouts on the same server IP

0

count content received but rejected due to 11-799

0

count dns errors

0

count cert errors

0

count timeouts

0

count http 429

0

count http 404

0

count http 403

0

count http 5xx

0

next operation date

2025-02-12 07:31:43

Server

server bits

server ip

-

Mainpage statistics

mp import status

20

mp rejected date

-

mp saved date

-

mp size orig

85956

mp size raw text

10673

mp inner links count

20

mp inner links status

20 (imported)

Open Graph

title

Imran On Tech

description

Musings on technology, development, and the world in general

image

site name

Imran On Tech

author

updated

2025-12-19 16:22:58

raw text

Imran On Tech | Musings on technology, development, and the world in general Imran On Tech Musings on technology, development, and the world in general Home About jump to navigation The Origin of “Hacker” April 1, 2008 Posted by Imran Ghory in Computer Security , etymology . 45 comments Everytime the media carries a sensationalist story about “hackers” committing cybercrimes there’s always an uproar among geeks about the misappropriation of the word “hacker”. Sadly it’s the geeks who are mistaken and not for once the media. A few years ago Fred Shapiro tracked down the earliest known reference to computer hackers: 1963 The Tech (MIT student newspaper) 20 Nov. 1 Many telephone services have been curtailed because of so-called hackers, according to Prof. Carlton Tucker, administrator of the Institute phone system. … The hackers have accomplished such things as tying up all the tie-lines between Harvard and MIT, or making long-distance calls by charging ...

Text analysis

redirect type

30 (window.location)

block type

0 (no issues)

detected language

1 (English)

category id

Edukacja (47)

index version

2025110801

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

8301

text words

1717

text unique words

674

text lines

144

text sentences

72

text paragraphs

27

text words per sentence

23

text matched phrases

7

text matched dictionaries

4

RSS

rss status

32 (unknown)

rss found date

2024-02-10 04:33:08

rss size orig

14819

rss items

10

rss spam phrases

0

rss detected language

1 (English)

inbefore feed id

-

inbefore status

0 (new)

Sitemap

sitemap status

13 (instead of sitemap files, detected Cloudflare, domain parking, default pages etc. - NOTE: without classical blocks (those get status 11))

sitemap review version

1

sitemap urls count

21

sitemap urls adult

0

sitemap filtered products

0

sitemap filtered videos

0

sitemap found date

2024-02-09 09:45:55

sitemap process date

-

sitemap first import date

-

sitemap last import date

-