Simon
78266d5b7b
Protect yourself from malicious exploitation via MIME sniffing. MIME-Type sniffing explained Internet Explorer and Chrome browsers have a feature called "MIME-Type sniffing" that automatically detects a web resource's type. This means, for example, that a resource identified as an image can be read as a script if its content is a script. This property allows a malicious person to send a file to your website to inject malicious code. We advise you to disable the MIME-Type sniffing to limit such activity. Chrome has been working on a feature called Site Isolation which provides extensive mitigation against exploitation of these types of vulnerabilities. Site Isolation is more effective when MIME types are correct. How to prevent MIME-Type sniffing Configure a "X-Content-Type-Options" HTTP header. Add the "X-Content-Type-Options" HTTP header in the responses of each resource, associated to the "nosniff" value. It allows you to guard against such misinterpretations of your resources. https://www.justegeek.fr/proteger-un-peu-plus-son-site-avec-la-balise-x-content-type-options/ |
||
---|---|---|
assets/css | ||
config | ||
content | ||
data | ||
layouts | ||
static | ||
themes | ||
.env | ||
.gitignore | ||
.gitmodules | ||
.htaccess | ||
Dockerfile | ||
README.md | ||
auto-publish.sh | ||
docker-compose.yml | ||
nginx-compression.conf | ||
nginx-default.conf | ||
nginx-hide.conf | ||
package-lock.json | ||
package.json |
README.md
Source du site web Histoire d'un Pied
Vous trouverez ici les sources du site web https://histoiredunpied.com
Pour information, il utilise plusieurs technologies :
- Hugo pour la génération du site static
- docker-compose pour publier le site
Hugo
Pour construire le site :
hugo -D
Exemple de site
Voici quelques sites pour s'inspirer :
- http://paradestud.io/
- https://lepontdesartistes.com/
- http://chloeromengas.com/
- https://www.rayuresetratures.fr/
- https://www.grapheine.com/regards-graphiques
Voici quelques template wordpress :