https://js.sddan.com/GS.d?pa=21305&si=17&u=http%3A%2F%2Fwww.premiere.fr%2FCinema%2FNews-Cinema%2FJames-Bond-25-le-tournage-suspendu-Daniel-Craig-s-est-blesse&r=&s=&cat_name=Cinema&subcat_name=News-Cinema&pg_title=James+Bond+25+%3A+le+tournage+suspendu%2C+Daniel+Craig+s%E2%80%99est+bless%C3%A9+%7C+Premiere.fr&rand=1557934077854&bounce=1

Category: Engineering

Keywords: php4 php5 php6 cours votre client espace server install manager modules net2ftp netcraft bergement requested phpmyadmin disposition construction statistiques configuration


Last fetched: 2019-05-15T15:28:33.962295+00:00

HTTP status: 5 Sub-resource URL


TLS/SSL configuration report

TLS score
C
Grade capped at C
Grade capped due to 64-bit cipher (IDEA, RC2, DES or 3DES)

See full SSL/TLS security report for js.sddan.com

Security-related HTTP headers

  • Strict-Transport-Security: max-age=15724800; includeSubDomains; preload

    HTTP Strict Transport Security (HSTS) is an opt-in security enhancement that is specified by a web application through the use of a special response header.

    Read more...

  • P3P: CP="NOI DSP COR ADM PSAo PSDo OURo SAMo UNRo OTRo BUS COM NAV DEM STA PRE"

    Largely abandoned format for declaring website's privacy policy in machine-readable format. The only reason for many websites to use the header was that old versions of Microsoft Internet Explorer disallowed third-party cookies on websites missing P3P.

    Read more...

  • Access-Control-Allow-Origin: *

    Controls origins (websites) that are allowed to load data from this web service over JavaScript-based APIs as part of Cross-Origin Resource Sharing (CORS) standard. By default, a web browser will refuse to load data over XmlHttpRequest from a website that is not in the same origin, which is a precaution against various types of data stealing attacks. The target server has to explicitly allow the origin domain using the Access-Control-Allow-Origin (ACAO) header, or it may allow all origins to access it using a wildcard *. The latter however creates a potential security issue if the website in question is transactional and processing sensitive data, so the wildcard should be only used on websites consciously offering public APIs.

    Read more...

  • X-XSS-Protection: 0

    Controls an Cross-Site Scripting (XSS) filters built into the majority of web browsers. The filter is usually turned on by default anyway, but requirement to set the header to 1 became part of canonical set of "secure" HTTP headers. Over time, vulnerabilities in the "sanitizing" mode filter were found, so 1; mode=block became the recommended value. Some companies decided that they don't really need a browser-side XSS filter to mess with their web services which are XSS-free anyway and they became consciously disabling the XSS filter by setting the header to 0.

    Read more...

  • Server: nginx/1.11.3

    Announces web server software and optionally version details.

    Read more...

Fully automated RESTful API is now available. Subscribe for your free trial today!