Main

processing priority

4

site type

3 (personal blog or private political site, e.g. Blogspot, Substack, also small blogs on own domains)

review version

11

html import

20 (imported)

Events

first seen date

2024-05-30 08:57:20

expired found date

-

created at

2024-06-19 05:57:31

updated at

2026-01-10 19:02:55

Domain name statistics

length

23

crc

10522

tld

2211

nm parts

0

nm random digits

0

nm rare letters

0

Connections

is subdomain of id

13642151 (wordpress.com)

previous id

0

replaced with id

0

related id

-

dns primary id

0

dns alternative id

0

lifecycle status

0 (unclassified, or currently active)

Subdomains and pages

deleted subdomains

0

page imported products

0

page imported random

0

page imported parking

0

Error counters

count skipped due to recent timeouts on the same server IP

0

count content received but rejected due to 11-799

0

count dns errors

0

count cert errors

0

count timeouts

0

count http 429

0

count http 404

0

count http 403

0

count http 5xx

0

next operation date

-

Server

server bits

server ip

-

Mainpage statistics

mp import status

20

mp rejected date

-

mp saved date

-

mp size orig

87316

mp size raw text

10911

mp inner links count

1

mp inner links status

20 (imported)

Open Graph

title

Imran On Tech

description

Musings on technology, development, and the world in general

image

site name

Imran On Tech

author

updated

2025-12-29 06:01:14

raw text

Imran On Tech | Musings on technology, development, and the world in general Imran On Tech Musings on technology, development, and the world in general Home About jump to navigation The Origin of “Hacker” April 1, 2008 Posted by Imran Ghory in Computer Security , etymology . 45 comments Everytime the media carries a sensationalist story about “hackers” committing cybercrimes there’s always an uproar among geeks about the misappropriation of the word “hacker”. Sadly it’s the geeks who are mistaken and not for once the media. A few years ago Fred Shapiro tracked down the earliest known reference to computer hackers: 1963 The Tech (MIT student newspaper) 20 Nov. 1 Many telephone services have been curtailed because of so-called hackers, according to Prof. Carlton Tucker, administrator of the Institute phone system. … The hackers have accomplished such things as tying up all the tie-lines between Harvard and MIT, or making long-distance calls by charging ...

Text analysis

redirect type

30 (window.location)

block type

0 (no issues)

detected language

1 (English)

category id

Other [en] (231)

index version

2025123101

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

8478

text words

1751

text unique words

683

text lines

151

text sentences

75

text paragraphs

27

text words per sentence

23

text matched phrases

7

text matched dictionaries

4

RSS

rss path

rss status

1 (priority 1 already searched, no matches found)

rss found date

-

rss size orig

0

rss items

0

rss spam phrases

0

rss detected language

0 (awaiting analysis)

inbefore feed id

-

inbefore status

0 (new)

Sitemap

sitemap path

sitemap status

1 (priority 1 already searched, no matches found)

sitemap review version

2

sitemap urls count

0

sitemap urls adult

0

sitemap filtered products

0

sitemap filtered videos

0

sitemap found date

-

sitemap process date

-

sitemap first import date

-

sitemap last import date

-