Lessons
-
Introduction
-
Search engine optimization
- Broken links
- Site map
- Micro-markup
- Robots.txt
- References
- Text
- Duplicates
- Basic
- Pictures
-
Speed
-
Minification
-
Minification of CSS to reduce its volume
Minification of the embedded JavaScript code of the page
Minification of the embedded CSS code of the page
Minification of images without loss of quality
Minification of JavaScript files to reduce its volume
Unused CSS code
Data optimization:Image URLs
Animated image format MP4, WEBM, SVG instead of GIF and WEBP
Unused JavaScript code
Using the WebP format in images
Too high-quality images without using compression
Suitable video bitrate
-
Reducing requests
-
An overabundance of small pictures
Grouping CSS files
Grouping JavaScript files
An overabundance of font files
Availability of end-to-end CSS, JS files
The presence of a monochrome font
Uploading duplicate files
Using JavaScript facades
Redirecting JavaScript code
Adding lazy loading
Redirect from/to www version
- Fonts
- Loading time
- Server Settings
- Pictures
-
The first content
-
The sequence of connecting JavaScript files
Font display mode
Setting up a pre-connection
Removing lazy loading
Long JavaScript code execution time
File upload delayed or on demand
The server is located in the same country where the users of the site live
No requests to another country that cause page loading to be blocked
-
Minification
-
Mobility
-
Screen support
-
Adapting the layout to a Full HD computer monitor
Adapting the layout for a horizontal tablet
Adapting the layout for a horizontal phone
Screenshots for the mini-report
How blocks break the page layout
Adapting the layout to an HD computer monitor
Adapting the layout for a vertical tablet
Adapting the layout for a vertical phone
- Comfort
-
Screen support
- Bugs
-
Convenience
- Social networks
- Web Application Manifest
- Favicons
- Basic
- Text readability
-
Security
- Encrypted connection
- Exploits
-
Vulnerabilities
-
Vulnerable JavaScript code
Vulnerable JavaScript libraries
Antiviruses
Vulnerabilities of a secure SSL connection
Vulnerable JavaScript libraries
Usually, an attacker uses a whole chain of vulnerabilities in an attack. A single problem does not mean that your site can be hacked. But it’s still worth fixing the problem.
We use the library [Retire.js ](https://retirejs .github.io/retire.js/) to search for vulnerabilities. It contains more than 450 different popular libraries that are used on almost every site.
In this check, we check the JavaScript files themselves.
Each vulnerability is relevant for a specific version of the library.When a new security breach becomes known, a new version of the library is released. Thus, if you are using the latest version, you can be sure that no vulnerabilities have been detected.
Any comments or additions? Send us an email admin@site-alarm.com or in telegram channel.
Check your website