id
name
processing priority
4
site type
3 (personal blog or private political site, e.g. Blogspot, Substack, also small blogs on own domains)
review version
11
html import
20 (imported)
first seen date
2024-02-05 00:43:28
expired found date
-
created at
2024-06-07 22:20:57
updated at
2025-12-31 10:32:55
length
15
crc
34285
tld
2211
nm parts
0
nm random digits
0
nm rare letters
0
is subdomain of id
-
previous id
0
replaced with id
0
related id
-
dns primary id
dns alternative id
0
lifecycle status
0 (unclassified, or currently active)
deleted subdomains
0
page imported products
0
page imported random
0
page imported parking
0
count skipped due to recent timeouts on the same server IP
0
count content received but rejected due to 11-799
0
count dns errors
0
count cert errors
0
count timeouts
0
count http 429
0
count http 404
0
count http 403
0
count http 5xx
0
next operation date
2025-02-12 07:31:43
server bits
—
server ip
-
mp import status
20
mp rejected date
-
mp saved date
-
mp size orig
85956
mp size raw text
10673
mp inner links count
20
mp inner links status
20 (imported)
title
Imran On Tech
description
Musings on technology, development, and the world in general
image
site name
Imran On Tech
author
updated
2025-12-19 16:22:58
raw text
Imran On Tech | Musings on technology, development, and the world in general Imran On Tech Musings on technology, development, and the world in general Home About jump to navigation The Origin of “Hacker” April 1, 2008 Posted by Imran Ghory in Computer Security , etymology . 45 comments Everytime the media carries a sensationalist story about “hackers” committing cybercrimes there’s always an uproar among geeks about the misappropriation of the word “hacker”. Sadly it’s the geeks who are mistaken and not for once the media. A few years ago Fred Shapiro tracked down the earliest known reference to computer hackers: 1963 The Tech (MIT student newspaper) 20 Nov. 1 Many telephone services have been curtailed because of so-called hackers, according to Prof. Carlton Tucker, administrator of the Institute phone system. … The hackers have accomplished such things as tying up all the tie-lines between Harvard and MIT, or making long-distance calls by charging ...
redirect type
30 (window.location)
block type
0 (no issues)
detected language
1 (English)
category id
index version
2025110801
spam phrases
0
text nonlatin
0
text cyrillic
0
text characters
8301
text words
1717
text unique words
674
text lines
144
text sentences
72
text paragraphs
27
text words per sentence
23
text matched phrases
7
text matched dictionaries
4
links self subdomains
0
links other subdomains
links other domains
links spam adult
0
links spam random
0
links spam expired
0
links ext activities
1
links ext ecommerce
2 - amazon.com
links ext finance
0
links ext crypto
0
links ext booking
0
links ext news
0
links ext leaks
0
links ext ugc
29 - s0.wp.com, tickletux.wordpress.com, wp.me, s1.wp.com, wordpress.com, en.wikipedia.org, en.wordpress.com
links ext klim
0
links ext generic
0
dol status
0
dol updated
2025-12-19 16:22:58
rss path
rss status
32 (unknown)
rss found date
2024-02-10 04:33:08
rss size orig
14819
rss items
10
rss spam phrases
0
rss detected language
1 (English)
inbefore feed id
-
inbefore status
0 (new)
sitemap path
sitemap status
13 (instead of sitemap files, detected Cloudflare, domain parking, default pages etc. - NOTE: without classical blocks (those get status 11))
sitemap review version
1
sitemap urls count
21
sitemap urls adult
0
sitemap filtered products
0
sitemap filtered videos
0
sitemap found date
2024-02-09 09:45:55
sitemap process date
-
sitemap first import date
-
sitemap last import date
-