Lessons
-
Introduction
-
Search engine optimization
- Broken links
- Site map
- Micro-markup
- Robots.txt
- References
- Text
- Duplicates
- Basic
- Pictures
-
Speed
-
Minification
-
CSS minification
Minification of JavaScript files
Minification of inline CSS code
Minification of images without loss of quality
Minification of JavaScript files
Unused CSS code
Data optimization:Image URLs
Format of animated images
Unused JavaScript code
Using WebP
Image compression is missing
Video bitrate
-
Reducing requests
-
An overabundance of small pictures
Ungrouped CSS files
Ungrouped JavaScript files
An overabundance of fonts
Availability of end-to-end CSS, JS files
The presence of a monochrome font
Uploading duplicate files
Using JS facades
Redirecting JavaScript code
Adding lazy loading
Redirect from/to www version
- Fonts
- Loading time
- Server Settings
- Pictures
- The first content
-
Minification
- Mobility
- Bugs
-
Convenience
- Social networks
- Web Application Manifest
- Favicons
- Basic
- Text readability
-
Security
- Encrypted connection
- Exploits
-
Vulnerabilities
-
Vulnerable JavaScript code
Vulnerable JavaScript library
Antiviruses
SSL vulnerabilities
SSL vulnerabilities
Explanation of each sequence:
- TLS is a data transfer protocol. Can be equal to TLS1, TLS1.1, SSLv3, etc.
- ECDHE is a temporary (ephemeral) key.
- ECDSA is an authentication algorithm.
- AES 128 GCM is a symmetric encryption algorithm.
- SHA256 is a data hashing algorithm.
All these components should be safe both individually and in combination.
We check:
- Security of the cipher suites available for use by your server. We check for the presence of obviously vulnerable cipher suites: NULL, aNULL, EXPORT, LOW,3DES_IDEA, OBSOLETE, STRONG_NOFS.
- Using the modern SSL connection protocol.
- Support for advanced encryption standards.
- 19 types of popular attacks using SSL such as: heartbleed, CCS, ticketbleed, ROBOT, secure renego, secure client renego, CRIME TLS, POODLE SSL, fallback SCSV, SWEET32, FREAK, DROWN, DROWN hint, LOGJAM, LOGJAM common primes, BEAST, LUCKY13, winshock. The possibility of these attacks is a serious security problem.
Due to the presence of a critical vulnerability, you are likely to get into all the lock sheets, as your site is easily hacked. Browser and search engine manufacturers maintain a registry of unsafe sites. The presence of vulnerability is also a reason to get on such a list. Most likely, you will be excluded from being shown in search results, and the browser will show a security warning when going to your site.
Any comments or additions? Send us an email admin@site-alarm.com .
Check your website