Lessons
-
Introduction
-
Search engine optimization
- Broken links
- Site map
- Micro-markup
- Robots.txt
- References
- Text
- Duplicates
- Basic
- Pictures
-
Speed
-
Minification
-
Minification of CSS to reduce its volume
Minification of JavaScript files
Minification of inline CSS code
Minification of images without loss of quality
Minification of JavaScript files to reduce its volume
Unused CSS code
Data optimization:Image URLs
Animated image format MP4 and WEBM instead of GIF and WEBP
Unused JavaScript code
Using the WebP format in images
Too high-quality images without using compression
Suitable video bitrate
-
Reducing requests
-
An overabundance of small pictures
Grouping CSS files
Grouping JavaScript files
An overabundance of font files
Availability of end-to-end CSS, JS files
The presence of a monochrome font
Uploading duplicate files
Using JavaScript facades
Redirecting JavaScript code
Adding lazy loading
Redirect from/to www version
- Fonts
-
Loading time
-
Acceptable size of the HTML code of the page
HTML code generation time
The total volume of all images on the page
Total loading time
Total page load time.
Display time of the first graphic
Optimal time to download files from the server
Time to download files from the server under load
Blocking files
- Server Settings
- Pictures
-
The first content
-
The sequence of connecting JavaScript files
Font display mode
Setting up a pre-connection
Removing lazy loading
Long JavaScript code execution time
File upload delayed or on demand
The server is located in the same country where the users of the site live
Requests to another country that cause page loading to be blocked
-
Minification
- Mobility
- Bugs
-
Convenience
- Social networks
- Web Application Manifest
- Favicons
- Basic
- Text readability
-
Security
- Encrypted connection
- Exploits
-
Vulnerabilities
-
Vulnerable JavaScript code
Vulnerable JavaScript libraries
Antiviruses
Vulnerabilities of a secure SSL connection
Vulnerabilities of a secure SSL connection
Explanation of each sequence:
- TLS is a data transfer protocol. Can be equal to TLS1, TLS1.1, SSLv3, etc.
- ECDHE is a temporary (ephemeral) key.
- ECDSA is an authentication algorithm.
- AES 128 GCM is a symmetric encryption algorithm.
- SHA256 is a data hashing algorithm.
All these components should be safe both individually and in combination.
We check:
- Security of the cipher suites available for use by your server. We check for the presence of obviously vulnerable cipher suites: NULL, aNULL, EXPORT, LOW,3DES_IDEA, OBSOLETE, STRONG_NOFS.
- Using the modern SSL connection protocol.
- Support for advanced encryption standards.
- 19 types of popular attacks using SSL such as: heartbleed, CCS, ticketbleed, ROBOT, secure renego, secure client renego, CRIME TLS, POODLE SSL, fallback SCSV, SWEET32, FREAK, DROWN, DROWN hint, LOGJAM, LOGJAM common primes, BEAST, LUCKY13, winshock. The possibility of these attacks is a serious security problem.
Due to the presence of a critical vulnerability, you are likely to get into all the lock sheets, as your site is easily hacked. Browser and search engine manufacturers maintain a registry of unsafe sites. The presence of vulnerability is also a reason to get on such a list. Most likely, you will be excluded from being shown in search results, and the browser will show a security warning when going to your site.
Any comments or additions? Send us an email admin@site-alarm.com .
Check your website