id
processing priority
4
site type
3 (personal blog or private political site, e.g. Blogspot, Substack, also small blogs on own domains)
review version
11
html import
20 (imported)
first seen date
2024-05-30 08:57:20
expired found date
-
created at
2024-06-19 05:57:31
updated at
2026-01-10 19:02:55
length
23
crc
10522
tld
2211
nm parts
0
nm random digits
0
nm rare letters
0
is subdomain of id
13642151 (wordpress.com)
previous id
0
replaced with id
0
related id
-
dns primary id
0
dns alternative id
0
lifecycle status
0 (unclassified, or currently active)
deleted subdomains
0
page imported products
0
page imported random
0
page imported parking
0
count skipped due to recent timeouts on the same server IP
0
count content received but rejected due to 11-799
0
count dns errors
0
count cert errors
0
count timeouts
0
count http 429
0
count http 404
0
count http 403
0
count http 5xx
0
next operation date
-
server bits
—
server ip
-
mp import status
20
mp rejected date
-
mp saved date
-
mp size orig
87316
mp size raw text
10911
mp inner links count
1
mp inner links status
20 (imported)
title
Imran On Tech
description
Musings on technology, development, and the world in general
image
site name
Imran On Tech
author
updated
2025-12-29 06:01:14
raw text
Imran On Tech | Musings on technology, development, and the world in general Imran On Tech Musings on technology, development, and the world in general Home About jump to navigation The Origin of “Hacker” April 1, 2008 Posted by Imran Ghory in Computer Security , etymology . 45 comments Everytime the media carries a sensationalist story about “hackers” committing cybercrimes there’s always an uproar among geeks about the misappropriation of the word “hacker”. Sadly it’s the geeks who are mistaken and not for once the media. A few years ago Fred Shapiro tracked down the earliest known reference to computer hackers: 1963 The Tech (MIT student newspaper) 20 Nov. 1 Many telephone services have been curtailed because of so-called hackers, according to Prof. Carlton Tucker, administrator of the Institute phone system. … The hackers have accomplished such things as tying up all the tie-lines between Harvard and MIT, or making long-distance calls by charging ...
redirect type
30 (window.location)
block type
0 (no issues)
detected language
1 (English)
category id
Other [en] (231)
index version
2025123101
spam phrases
0
text nonlatin
0
text cyrillic
0
text characters
8478
text words
1751
text unique words
683
text lines
151
text sentences
75
text paragraphs
27
text words per sentence
23
text matched phrases
7
text matched dictionaries
4
links self subdomains
0
links other subdomains
links other domains
59 - imranontech.com, catb.org, blossomcap.com, coderstack.co.uk
links spam adult
0
links spam random
0
links spam expired
0
links ext activities
1
links ext ecommerce
2 - amazon.com
links ext finance
0
links ext crypto
0
links ext booking
0
links ext news
0
links ext leaks
0
links ext ugc
28 - s0.wp.com, widgets.wp.com, wp.me, s1.wp.com, wordpress.com, en.wikipedia.org, en.wordpress.com
links ext klim
0
links ext generic
0
dol status
0
dol updated
2025-12-29 06:01:14
rss path
rss status
1 (priority 1 already searched, no matches found)
rss found date
-
rss size orig
0
rss items
0
rss spam phrases
0
rss detected language
0 (awaiting analysis)
inbefore feed id
-
inbefore status
0 (new)
sitemap path
sitemap status
1 (priority 1 already searched, no matches found)
sitemap review version
2
sitemap urls count
0
sitemap urls adult
0
sitemap filtered products
0
sitemap filtered videos
0
sitemap found date
-
sitemap process date
-
sitemap first import date
-
sitemap last import date
-