Loading...
Statistics

TekSec ~ My Scribbles on security and whatever strikes my fancy . . .
www.teksecurityblog.com/
My Scribbles on security and whatever strikes my fancy . . .

Teksecurityblog.com

Teksecurityblog.com is hosted in United States / Chicago . Teksecurityblog.com uses HTTPS protocol. Number of used technologies: 8. First technologies: CSS, Gravatar, Html, Number of used javascripts: 14. First javascripts: Jquery.min.js, Superfish.js, Smthemes.js, Number of used analytics tools: 1. First analytics tools: Google Analytics, Number of used plugins, modules: 6. Its server type is: Managed WordPress Hosting by Lightning Base. Its CMS is: Wordpress.

Technologies in use by Teksecurityblog.com

Technology

Number of occurences: 8
  • CSS
  • Gravatar
  • Html
  • Javascript
  • jQuery Cycle
  • Php
  • Pingback
  • SuperFish

Javascripts

Number of occurences: 14
  • jquery.min.js
  • superfish.js
  • smthemes.js
  • jquery.cycle.all.js
  • Bootstrap.js
  • photon.js
  • devicepx-jetpack.js
  • gprofiles.js
  • wpgroho.js
  • wp-embed.min.js
  • jquery.validationEngine-en.js
  • jquery.validationEngine.js
  • front-subscribers.js
  • e-201623.js

Content Management System

Number of occurences: 1
  • Wordpress

Analytics

Number of occurences: 1
  • Google Analytics

Server Type

  • Managed WordPress Hosting by Lightning Base

Powered by

  • PHP/5.6.21

Used plugins, modules

Number of plugins and modules: 6
  • jetpack
  • wysija newsletters
  • acurax social media widget
  • simple pull quote
  • photon
  • wpgroho.js https:

Conversion rate optimization

visitors Clickable call number Not founded!
visitors Conversion form (contact form, subcriber) Founded!
visitors Clickable email Not founded!
visitors CTA (call to action) button Not founded!
visitors List Founded!
visitors Image Not founded!
visitors Enhancement Not founded!
visitors Responsive website Not founded!
visitors Facebook sharing Not founded!
visitors Google+ sharing Not founded!
visitors Twitter sharing Not founded!
visitors Linkedin sharing Not founded!
visitors Blog on the webiste Not founded!

HTTPS (SSL) - Teksecurityblog.com

SSL certificate

    • name: /OU=Domain Control Validated/CN=teksecurityblog.com
    • subject:
      • OU: Domain Control Validated
      • CN: teksecurityblog.com
    • hash: e8313a48
    • issuer:
      • C: BE
      • O: GlobalSign nv-sa
      • CN: AlphaSSL CA - SHA256 - G2
    • version: 2
    • serialNumber: 1492150500326338600915297262648460362472021
    • validFrom: 150624115958Z
    • validTo: 160624115958Z
    • validFrom_time_t: 1435147198
    • validTo_time_t: 1466769598
    • extensions:
      • keyUsage: Digital Signature, Key Encipherment
      • certificatePolicies: Policy: 2.23.140.1.2.1 CPS: https://www.globalsign.com/repository/
      • subjectAltName: DNS:teksecurityblog.com
      • basicConstraints: CA:FALSE
      • extendedKeyUsage: TLS Web Server Authentication, TLS Web Client Authentication
      • crlDistributionPoints: Full Name: URI:http://crl2.alphassl.com/gs/gsalphasha2g2.crl
      • authorityInfoAccess: CA Issuers - URI:http://secure2.alphassl.com/cacert/gsalphasha2g2r1.crt OCSP - URI:http://ocsp2.globalsign.com/gsalphasha2g2
      • subjectKeyIdentifier: F9:13:06:0E:67:94:8B:54:39:E0:D8:0A:40:4B:91:2D:FE:6A:5E:4D
      • authorityKeyIdentifier: keyid:F5:CD:D5:3C:08:50:F9:6A:4F:3A:B7:97:DA:56:83:E6:69:D2:68:F7

Meta - Teksecurityblog.com

Number of occurences: 7
  • Name:
    Content: TekSec
  • Name: Description
    Content: Teksquisite is an Internet security advocate who is dedicated to making the web more secure. She blogs on a variety of Internet security, social media, and technology-related topics.
  • Name: Keywords
    Content: Internet security, cybercrime, scams, technology, social media
  • Name: description
    Content: My Scribbles on security and whatever strikes my fancy . . .
  • Name: robots
    Content: noodp
  • Name: google-site-verification
    Content: QFMWugXzVW1JZYTpfivTK1aVYGpO4umom4TrVKTlAkU
  • Name: msapplication-TileImage
    Content: https://i2.wp.com/teksecurityblog.com/wp-content/uploads/2015/04/cropped-Hacked-how-safe-is-your-data-on-adult-sites.png?fit=270%2C270&ssl=1

Server / Hosting

  • IP: 65.60.53.37
  • Latitude: 41.88
  • Longitude: -87.64
  • Country: United States
  • City: Chicago

Rname

  • ns2.lightningbase.com
  • ns4.lightningbase.com
  • ns3.lightningbase.com
  • ns1.lightningbase.com
  • ALT4.ASPMX.L.GOOGLE.com
  • ASPMX.L.GOOGLE.com
  • ALT1.ASPMX.L.GOOGLE.com
  • ALT2.ASPMX.L.GOOGLE.com
  • ALT3.ASPMX.L.GOOGLE.com

Target

  • chi355.lightningbase.com

HTTP Header Response

HTTP/1.1 301 Moved Permanently X-Powered-By: PHP/5.6.21 Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Location: https://teksecurityblog.com/ Vary: User-Agent Content-Type: text/html; charset=UTF-8 Server: Managed WordPress Hosting by Lightning Base LBC: LBNONE LBVIS: DYN X-Cacheable: YES Content-Length: 0 Accept-Ranges: bytes Date: Thu, 09 Jun 2016 12:11:52 GMT X-Varnish: 1051060086 1051059921 Age: 0 X-Cache: LBV-HIT X-Cache-Hits: 1 X-Cache: MISS from s_hk1 X-Cache-Lookup: MISS from s_hk1:80 Via: 1.1 varnish, 1.1 s_hk1 (squid/3.5.9) Connection: keep-alive HTTP/1.1 200 Connection established HTTP/1.1 200 OK Date: Thu, 09 Jun 2016 12:11:53 GMT Server: Apache Last-Modified: Thu, 09 Jun 2016 11:25:20 GMT Accept-Ranges: bytes Content-Length: 54300 Vary: Accept-Encoding,Cookie Cache-Control: max-age=3600, public Expires: Thu, 09 Jun 2016 12:11:56 GMT Pragma: public Connection: close Content-Type: text/html; charset=UTF-8

DNS

host: teksecurityblog.com
  1. class: IN
  2. ttl: 7067
  3. type: A
  4. ip: 65.60.53.37
host: teksecurityblog.com
  1. class: IN
  2. ttl: 86400
  3. type: NS
  4. target: ns2.lightningbase.com
host: teksecurityblog.com
  1. class: IN
  2. ttl: 86400
  3. type: NS
  4. target: ns4.lightningbase.com
host: teksecurityblog.com
  1. class: IN
  2. ttl: 86400
  3. type: NS
  4. target: ns3.lightningbase.com
host: teksecurityblog.com
  1. class: IN
  2. ttl: 86400
  3. type: NS
  4. target: ns1.lightningbase.com
host: teksecurityblog.com
  1. class: IN
  2. ttl: 86400
  3. type: SOA
  4. mname: ns1.lightningbase.com
  5. rname: chi355.lightningbase.com
  6. serial: 2016040600
  7. refresh: 43200
  8. retry: 10800
  9. expire: 2419200
  10. minimum-ttl: 86400
host: teksecurityblog.com
  1. class: IN
  2. ttl: 14400
  3. type: MX
  4. pri: 10
  5. target: ALT4.ASPMX.L.GOOGLE.com
host: teksecurityblog.com
  1. class: IN
  2. ttl: 14400
  3. type: MX
  4. pri: 1
  5. target: ASPMX.L.GOOGLE.com
host: teksecurityblog.com
  1. class: IN
  2. ttl: 14400
  3. type: MX
  4. pri: 5
  5. target: ALT1.ASPMX.L.GOOGLE.com
host: teksecurityblog.com
  1. class: IN
  2. ttl: 14400
  3. type: MX
  4. pri: 5
  5. target: ALT2.ASPMX.L.GOOGLE.com
host: teksecurityblog.com
  1. class: IN
  2. ttl: 14400
  3. type: MX
  4. pri: 10
  5. target: ALT3.ASPMX.L.GOOGLE.com
host: teksecurityblog.com
  1. class: IN
  2. ttl: 14400
  3. type: TXT
  4. txt: v=spf1 +a +mx +ip4:65.60.53.37 +include:relay.mailchannels.net +ip4:208.94.37.4 +include:spf.mandrillapp.com -all
  5. entries: Array
host: teksecurityblog.com
  1. class: IN
  2. ttl: 14400
  3. type: TXT
  4. txt: globalsign-domain-verification=dmVDebnb6Cxyr6IsPQKBL8Hs3jQuui3N8U1kBOP-mR
  5. entries: Array

Common Typos/Mistakes

This list shows You some spelling mistakes at internet search for this domain.

www.eksecurityblog.com, www.tqeksecurityblog.com, www.qeksecurityblog.com, www.taeksecurityblog.com, www.aeksecurityblog.com, www.t eksecurityblog.com, www. eksecurityblog.com, www.tweksecurityblog.com, www.weksecurityblog.com, www.teeksecurityblog.com, www.eeksecurityblog.com, www.tzeksecurityblog.com, www.zeksecurityblog.com, www.txeksecurityblog.com, www.xeksecurityblog.com, www.tceksecurityblog.com, www.ceksecurityblog.com, www.tksecurityblog.com, www.texksecurityblog.com, www.txksecurityblog.com, www.tesksecurityblog.com, www.tsksecurityblog.com, www.tewksecurityblog.com, www.twksecurityblog.com, www.terksecurityblog.com, www.trksecurityblog.com, www.tefksecurityblog.com, www.tfksecurityblog.com, www.tevksecurityblog.com, www.tvksecurityblog.com, www.tecksecurityblog.com, www.tcksecurityblog.com, www.teqksecurityblog.com, www.tqksecurityblog.com, www.teaksecurityblog.com, www.taksecurityblog.com, www.teyksecurityblog.com, www.tyksecurityblog.com, www.tesecurityblog.com, www.tektsecurityblog.com, www.tetsecurityblog.com, www.teksecurityblog.com, www.tesecurityblog.com, www.tekgsecurityblog.com, www.tegsecurityblog.com, www.tekbsecurityblog.com, www.tebsecurityblog.com, www.teknsecurityblog.com, www.tensecurityblog.com, www.tekhsecurityblog.com, www.tehsecurityblog.com, www.tekysecurityblog.com, www.teysecurityblog.com, www.teklsecurityblog.com, www.telsecurityblog.com, www.tekosecurityblog.com, www.teosecurityblog.com, www.tekusecurityblog.com, www.teusecurityblog.com, www.tekisecurityblog.com, www.teisecurityblog.com, www.tekmsecurityblog.com, www.temsecurityblog.com, www.tekecurityblog.com, www.tekseecurityblog.com, www.tekeecurityblog.com, www.tekswecurityblog.com, www.tekwecurityblog.com, www.teksdecurityblog.com, www.tekdecurityblog.com, www.teksxecurityblog.com, www.tekxecurityblog.com, www.teksfecurityblog.com, www.tekfecurityblog.com, www.teksgecurityblog.com, www.tekgecurityblog.com, www.tekstecurityblog.com, www.tektecurityblog.com, www.tekscurityblog.com, www.teksxcurityblog.com, www.teksescurityblog.com, www.teksscurityblog.com, www.teksewcurityblog.com, www.tekswcurityblog.com, www.teksercurityblog.com, www.teksrcurityblog.com, www.teksefcurityblog.com, www.teksfcurityblog.com, www.teksevcurityblog.com, www.teksvcurityblog.com, www.tekseccurityblog.com, www.teksccurityblog.com, www.tekseqcurityblog.com, www.teksqcurityblog.com, www.tekseacurityblog.com, www.teksacurityblog.com, www.tekseycurityblog.com, www.teksycurityblog.com, www.tekseurityblog.com, www.teksecdurityblog.com, www.teksedurityblog.com, www.teksecrurityblog.com, www.tekserurityblog.com, www.teksecturityblog.com, www.tekseturityblog.com, www.teksecvurityblog.com, www.teksevurityblog.com, www.teksecfurityblog.com, www.teksefurityblog.com, www.teksecgurityblog.com, www.teksegurityblog.com, www.teksechurityblog.com, www.teksehurityblog.com, www.teksecnurityblog.com, www.teksenurityblog.com, www.teksecmurityblog.com, www.teksemurityblog.com, www.teksecjurityblog.com, www.teksejurityblog.com, www.teksecrityblog.com, www.teksecuwrityblog.com, www.teksecwrityblog.com, www.teksecuerityblog.com, www.teksecerityblog.com, www.teksecusrityblog.com, www.teksecsrityblog.com, www.teksecuarityblog.com, www.teksecarityblog.com, www.teksecuityblog.com, www.teksecuriityblog.com, www.teksecuiityblog.com, www.teksecuroityblog.com, www.teksecuoityblog.com, www.teksecurlityblog.com, www.tekseculityblog.com, www.teksecurlityblog.com, www.tekseculityblog.com, www.teksecur.ityblog.com, www.teksecu.ityblog.com, www.teksecurtyblog.com, www.teksecurirtyblog.com, www.teksecurrtyblog.com, www.teksecuriftyblog.com, www.teksecurftyblog.com, www.teksecurivtyblog.com, www.teksecurvtyblog.com, www.teksecuriktyblog.com, www.teksecurktyblog.com, www.teksecuri,tyblog.com, www.teksecur,tyblog.com, www.teksecuribtyblog.com, www.teksecurbtyblog.com, www.teksecurigtyblog.com, www.teksecurgtyblog.com, www.teksecurittyblog.com, www.teksecurttyblog.com, www.teksecuriytyblog.com, www.teksecurytyblog.com, www.teksecuriutyblog.com, www.teksecurutyblog.com, www.teksecurijtyblog.com, www.teksecurjtyblog.com, www.teksecurimtyblog.com, www.teksecurmtyblog.com, www.teksecurintyblog.com, www.teksecurntyblog.com,

Other websites we recently analyzed

  1. love-artkit.com
    Scottsdale (United States) - 184.168.221.61
    Server software: Microsoft-IIS/7.5
    Technology: Html, Html5, Iframe, Php
  2. Best Insurance Value
    Houston (United States) - 192.185.236.163
    Server software: nginx/1.10.1
    Technology: CSS, Html, Iframe, Javascript, jQuery, Php, Pingback, Wordpress
    Number of Javascript: 6
    Number of meta tags: 2
  3. 越二国共鸣解决受采访认可造制
    gjc1}访网传官员猥亵,杨洁篪:以后世煤嫩板退没汗青。回到对话管控不,业消费 称有科湖北7款茶叶被,
    Walnut (United States) - 104.217.7.152
    Server software: Microsoft-IIS/7.5
    Technology: CSS, Html, Html5
    Number of meta tags: 6
  4. cbppk.com
    Hong Kong - 103.51.144.81
    Server software: Tengine/1.4.2
    Technology: Google Adsense, Html, Javascript, Php
    Number of Javascript: 2
    Number of meta tags: 1
  5. エラー
    Hong Kong - 103.12.216.237
    Server software: Apache
    Technology: CSS, Html
    Number of meta tags: 2
  6. Drawing-Software.com
    Kirkland (United States) - 98.124.245.24
    Server software: Apache/2.2.15 (CentOS)
    Technology: Google Adsense, CSS, Html, Javascript, Php
    Number of Javascript: 2
    Number of meta tags: 3
  7. Swissmania - Schweizer Shopping Portal
    Grösste Auswahl der Schweiz für Mobile Phones, Auto- und Karosserieteile, Werkzeuge für Handwerker & Werkstatt sowie Allerlei Nützliches.
    Los Angeles (United States) - 216.193.251.81
    Server software: Apache
    Technology: CSS, Html, Html5, Javascript, Php, SVG, Google Analytics
    Number of meta tags: 11
  8. Annas Hästliv - Välkommen till min blogg! Jag heter Anna Jarnald och bor i Trollhättan. Här kan du följa min vardag som dressyrryttare och tränare med många tips, råd och knep som jag delar med mig av.
    Sweden - 83.140.163.114
    Server software: nginx/1.8.0
    Technology: CSS, Html, Javascript, Php, SVG
    Number of Javascript: 9
    Number of meta tags: 3
  9. noronews.com
    United States - 208.91.197.27
    Server software: Apache
    Technology: Html
    Number of meta tags: 2
  10. Welcome to NUTRITIONALSUPPLEMENT.REVIEWS
    Scottsdale (United States) - 184.168.221.96
    Server software: Microsoft-IIS/7.5
    Technology: Google Adsense, CSS, Html, Javascript
    Number of Javascript: 3
    Number of meta tags: 2

Check Other Websites