Lessons
-
Introduction
-
SEO
- Snippet's clickability in search engines
-
Indexing
-
Headings H1-H6
Images have the "alt" attribute.
The Title attribute of links
Content robots.txt
Duplicate "title"
Duplicate "description"
Human-understandable name of the picture
Rules for formatting text on a page
Micro-markup format requirements and recommendations
Validation microdata Google
Human-friendly link format
Errors in Robots.txt
The content of the site map
The site map file
Link formatting requirements
Hreflang tag
"canonical" tag
Spelling of interactive interface elements
-
Speed
-
Reduce the number of network requests
-
An overabundance of small pictures
Grouping CSS files
Grouping JavaScript files
An overabundance of font files
Redirects when uploading files
Availability of end-to-end CSS, JS files
Uploading duplicate files
Using JavaScript facades
Redirecting JavaScript code
Redirect from/to www version
Using sprite technology
The video player is connected correctly
- General assessment
- Configure the server
- Speed up the display of the first content
-
Reduce the size of graphic files
-
Minification of the embedded JavaScript code of the page
Minification of the embedded CSS code of the page
Minification of images without loss of quality
The total size of all images on the page
Font Optimization
An overabundance of monochrome icons
The presence of a monochrome font
Data optimization:Image URLs
Animated image format MP4, WEBM, SVG instead of GIF and WEBP
Cropping monophonic fields in images
Using the WebP format in images
Too high-quality images without using compression
Suitable video bitrate
Excessively large images
- Server performance
- Fix the locks
- Reduce the amount of code
-
Reduce the number of network requests
- Mobile adaptation
-
Software errors
- Code
- Mail operation
- Availability
- Server Settings
-
Convenience
- Text readability
- Interface
- Visual defects
- Interaction with other programs
- Image Favicon
-
Vulnerabilities
- Code
-
Server Settings
-
Uploading all page files via HTTPS
Strict-https header for increased security
Private access to service files
Encrypted IPv6 connection
Enabled error display in the north
SSL certificate validity
HTTPS Availability
Redirects to protected
Vulnerabilities of a secure SSL connection
HTTP headers for increased security
- Third-party services
Vulnerabilities of a secure SSL connection
SSL cipher is a combination of 5 technologies involved in establishing an encrypted connection. For example, the TLS_ECDHE_ECDSA_AES_128_GCM_SHA256 cipher also consists of the following technologies:
- TLS is a data transfer protocol. Can be equal to TLS1, TLS1.1, SSLv3, etc.
- ECDHE is a temporary (ephemeral) key.
- ECDSA is an authentication algorithm.
- AES_128_GCM is a symmetric encryption algorithm.
- SHA256 is a data hashing algorithm.
Despite the fact that some vulnerabilities have existed for more than 10 years still hundreds of sites are affected by them.
All these components should be safe both individually and in combination.
We check:
- Vulnerability of the cipher suites available for use by your server. We check for the presence of obviously vulnerable cipher suites: NULL, aNULL, EXPORT, LOW, 3DES_IDEA, OBSOLETE, STRONG_NOFS.
- Using the modern SSL connection protocol.
- Support for advanced encryption standards.
- 19 types of popular attacks using SSL such as: heartbleed, CCS, ticketbleed, ROBOT, secure renego, secure client renego, CRIME TLS, POODLE SSL, fallback SCSV, SWEET32, FREAK, DROWN, DROWN hint, LOGJAM, LOGJAM common primes, BEAST, LUCKY13, winshock. The possibility of these attacks is a serious security problem.
A critical or fatal vulnerability of an SSL connection is equal to the absence of encryption on the site at all, as it is easily breakable.