Nowadays, anything – and we mean that, ANYTHING – that makes the news, deserves its own .com
The resulting traffic, even for a short period of time, can be rewarding and many times worthy of a simple registration fee.
Last week it was “Grandpa Gaga” and his amazing dancing skills – hey presto, some smart marketer immediately grabbed the dot com and pointed it to his own business.
Brand out of the virtual box is the cryptic – and cryptographic – string that appears on the logo of a new government organization called the “U.S. Cyber Command“.
Inscribed inside the shield depicted in the logo, the string reads as “9ec4c12949a4f31474f299058ce2b22a” – apparently an MD5 hash of something that the agency does not wants us to know, in lieu of secrecy or for decorative purposes.
Regardless, someone has gone and registered 9ec4c12949a4f31474f299058ce2b22a.com and he’s pointing it to their personal web site related to technology and other geeky, personal stuff.
That’s a clever way to appeal to worldwide geeks and domainers who would never type in the domain itself, but would most likely did as we did: copied then pasted the string and added .com to it.
Remember, this still counts as type-in traffic!
Meanwhile, USCYBERCOM.com – the nickname of the newly formed agency – is a parked page at Sedo.
Copyright © 2024 DomainGang.com · All Rights Reserved.
Now that is totally BullShitDomains
Hey Lucius might be able to get this guy Chris Claborne for Cyber-squatting
I’ve seen worse domains being sold by so called “domainers” LOL This one is actually based on something. The worst crap is peddled as minisites, wordpress “case studies” etc. by some questionable domainers.
Since it’s under the 67 character limit, I was able to register:
9-e-c-4-c-1-2-9-4-9-a-4-f-3-1-4-7-4-f-2-9-9-0-5-8-c-e-2-b-2-2-a.com
🙂
Tricolorro – I used to think you are a genius, now I simply believe you are completely insane 😀 There’s no difference between those two, of course 😀
USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.
above,over.
just simply MD5.
Ace, that’s the hash/checksum of the message, it’s not THE message itself. There’s a difference.