Endpoint-security.info

Search Preview

Endpoint Security Information. Latest News for Security Professionals

www.endpoint-security.info/

Endpoint Security, Data Leakage, Intrusion Prevention, USB Lockdown, Data Loss news, for security professionals.

Most Used Html Elements

  • <a> : 227
  • <li> : 74
  • <p> : 53
  • <div> : 53
  • <strong> : 12
  • <h1> : 10
  • <meta> : 9
  • <img> : 8
  • <link> : 8
  • <br> : 8
  • <input> : 7
  • <script> : 7
  • <ul> : 4
  • <label> : 3
  • <form> : 2
  • <html> : 2
  • <body> : 2
  • <sup> : 2

Most Used Html Classes

  • "descr" : 10
  • "shareaholic-canvas" : 10
  • "lbl" : 8
  • "widget" : 8
  • "page_item" : 3

Where is www.endpoint-security.info hosted?

Country:
United States
City:
Scottsdale
Registrar:
Afilias Global Registry Services
Latitude:
33.61
Longitude:
-111.89
IP address:
208.109.181.128
IP Binary address:
11010000011011011011010110000000
IP Octal address:
32033332600
IP Hexadecimal address:
d06db580

Context analysis of endpoint-security.info

Number of letters on this page:
11 562
Number of words on this page:
2 463
Number of sentences on this page:
120
Average words per sentences on this page:
21
Number of syllables on this page:
3 859
Number of Strong texts:
12

Domain name architecture

Domain name length:
22
Hyphens:
Domain contain 1 hyphens!
Domain name with Hindi letters:
ए ञ द प ओ इ ञ ट - स ए च उ र इ ट ग़ . इ ञ फ़ ओ
Domain name with Hebrew letters:
(e) נ ד פּ (ο) (i) נ ת - שׂ (e) ק(c) (u) ר (i) ת י . (i) נ ף (ο)
Domain name with Cyrillic letters:
e н д п о и н т - с e ц у р и т y . и н φ о
Domain name with Arabic letters:
(e) ن د (p) (o) (i) ن ت - ص (e) (c) (u) ر (i) ت ي . (i) ن ف (o)
Domain name with Greek letters:
ε ν δ π ο ι ν τ - σ ε χ υ ρ ι τ y . ι ν φ ο
Domain name with Chinese letters:
伊 艾娜 迪 屁 哦 艾 艾娜 提 - 艾丝 伊 西 伊吾 艾儿 艾 提 吾艾 . 艾 艾娜 艾弗 哦
Domain without Consonants:
ndpnt-scrty.nf
Domain without Vowels:
eoi-euiy.io
Alphabet positions:
e5 n14 d4 p16 o15 i9 n14 t20 s19 e5 c3 u21 r18 i9 t20 y25 . i9 n14 f6 o15
Domain name pattern:
V: Vowel, C: Consonant, N: Number
V C C C V V C C C V C V C V C C . V C C V

<HEAD> DATA INFORMATION

Encoding:
UTF-8
generator:
WordPress 113
verify-v1:
zw5jcXFyOQ8dHDUgFG0y73YAhBO+BzDHZyatYhg7+IU=
description:
Endpoint Security, Data Leakage, Intrusion Prevention, USB Lockdown, Data Loss news, for security professionals.
keywords:
Endpoint Security, Data Leakage, Intrusion Prevention, USB Lockdown, USB Threats, Portable Device Policy, Data Loss, Insider Threat, Data Theft, Data Security
shareaholic:site_name:
Endpoint Security Info
shareaholic:language:
en-US
shareaholic:site_id:
d07716a8a33218b4c1b32a28f9c0f6dd
shareaholic:wp_version:
7.6.1.4

External links in endpoint-security.info

  • http://www.endpointprotector.com
  • http://www.bloomberg.com/news/2013-05-03/credit-suisse-sues-ex-vice-president-who-left-for-goldman.html
  • http://www.scmagazine.com/lost-unencrypted-usb-thumb-drive-impacts-more-than-50k-medicaid-providers/article/284000/
  • http://www.endpointprotector.com/solutions/content_aware_data_loss_prevention
  • http://www.staysafeonline.org/data-privacy-day/
  • http://www.staysafeonline.org/
  • https://www.3v.ie/index.html
  • http://www.endpointprotector.com/products/easylock
  • https://twitter.com/DataPrivacyDay
  • https://www.facebook.com/DataPrivacyNCSA
  • https://www.facebook.com/events/310180069102896/
  • http://www.scmagazine.com/canada-student-loan-record-breach-affects-583k/article/276083/
  • http://www.endpointprotector.com/
  • http://www.huffingtonpost.com/huff-wires/20121010/cn-canada-navy-spy-case/
  • http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?_r=2&pagewanted=2&seid=auto&smid=tw-nytimespolitics&pagewanted=all
  • http://www.cososys.com/press_releases/Press_Release_Endpoint_Protector_adds_Content_Aware_Protection_to_prevent_data_leaks_to_the_cloud_15-May-2012_EN.html
  • http://www.thevarguy.com/2012/04/10/endpoint-protector-4-adds-linux-support/
  • http://darkreading.com/insider-threat/167801100/security/vulnerabilities/232800425/tech-insight-getting-ready-for-data-loss-prevention-dlp.html
  • http://www.endpointprotector.com/en/index.php/products/my_endpoint_protector_SaaS
  • http://www.endpointprotector.com/en/index.php/products/endpoint_protector
  • http://securityincite.com
  • http://www.cososys.com/software/carryiteasy+plus.html
  • http://www.endpointprotector.com/en/index.php/products/secure_it_easy
  • http://tinyurl.com/cxn27j
  • http://feeds.feedburner.com/EndpointSecurityInfo
  • http://templates.arcsin.se/
  • http://arcsin.se/
  • http://www.blogarama.com/
  • http://www.blogcatalog.com/directory/technology
  • http://www.blogdire.com
  • http://www.getblogs.com
  • http://jigsaw.w3.org/css-validator/check/referer
  • http://validator.w3.org/check?uri=referer

Internal links in endpoint-security.info

  • http://www.endpoint-security.info/
  • http://www.endpoint-security.info/2013/05/07/famous-cases-of-data-breaches-comercial-secrets-of-credit-suisse-go-to-goldman-sachs/
  • http://www.endpoint-security.info/2013/05/07/famous-cases-of-data-breaches-comercial-secrets-of-credit-suisse-go-to-goldman-sachs/#respond
  • http://www.endpoint-security.info/category/data-theft-loss/
  • http://www.endpoint-security.info/category/default/
  • http://www.endpoint-security.info/category/dlp/
  • http://www.endpoint-security.info/category/security-breach/
  • http://www.endpoint-security.info/2009/07/16/oops-i-accidently-copied-the-goldman-sachs-secret-sauce/
  • http://www.endpoint-security.info/2013/03/29/hope-for-the-best-but-expect-the-worst/
  • http://www.endpoint-security.info/2013/03/29/hope-for-the-best-but-expect-the-worst/#respond
  • http://www.endpoint-security.info/2013/01/28/data-privacy-day-2013-the-perfect-day-to-start-protecting-your-personal-data/
  • http://www.endpoint-security.info/2013/01/28/data-privacy-day-2013-the-perfect-day-to-start-protecting-your-personal-data/#respond
  • http://www.endpoint-security.info/category/encryption/
  • http://www.endpoint-security.info/category/data-privacy-day-2013/
  • http://www.endpoint-security.info/category/identity-theft/
  • http://www.endpoint-security.info/2013/01/17/not-another-lost-usb-stick/
  • http://www.endpoint-security.info/2013/01/17/not-another-lost-usb-stick/#respond
  • http://www.endpoint-security.info/category/endpoint-security/
  • http://www.endpoint-security.info/category/in-the-news/
  • http://www.endpoint-security.info/category/in-the-spotlight/
  • http://www.endpoint-security.info/2012/11/01/an-officer-of-the-canadian-army-sold-informations-to-the-russians-for-3000-per-month/
  • http://www.endpoint-security.info/2012/11/01/an-officer-of-the-canadian-army-sold-informations-to-the-russians-for-3000-per-month/#respond
  • http://www.endpoint-security.info/2012/08/21/how-to-steal-the-plans-of-the-elysee-palace-on-an-usb-stick/
  • http://www.endpoint-security.info/2012/08/21/how-to-steal-the-plans-of-the-elysee-palace-on-an-usb-stick/#comments
  • http://www.endpoint-security.info/2012/06/01/%e2%80%9cthere-is-always-an-idiot-around-who-doesnt-think-much-about-the-thumb-drive-in-their-hand%e2%80%9d/
  • http://www.endpoint-security.info/2012/06/01/%e2%80%9cthere-is-always-an-idiot-around-who-doesnt-think-much-about-the-thumb-drive-in-their-hand%e2%80%9d/#respond
  • http://www.endpoint-security.info/category/malware-infections/
  • http://www.endpoint-security.info/category/research-and-studies/
  • http://www.endpoint-security.info/2012/05/17/endpoint-protector-now-provides-content-aware-protection/
  • http://www.endpoint-security.info/2012/05/17/endpoint-protector-now-provides-content-aware-protection/#respond
  • http://www.endpoint-security.info/category/sneak-peeks/
  • http://www.endpoint-security.info/2012/04/17/endpoint-protector-4-for-linux-gets-a-warm-welcome-from-the-online-community/
  • http://www.endpoint-security.info/2012/04/17/endpoint-protector-4-for-linux-gets-a-warm-welcome-from-the-online-community/#respond
  • http://www.endpoint-security.info/category/byod/
  • http://www.endpoint-security.info/2012/04/10/data-loss-prevention-do-we-really-understand-it/
  • http://www.endpoint-security.info/2012/04/10/data-loss-prevention-do-we-really-understand-it/#respond
  • http://www.endpoint-security.info/page/2/
  • http://www.endpoint-security.info/tag/biometrics/
  • http://www.endpoint-security.info/tag/cososys/
  • http://www.endpoint-security.info/tag/credit-cards/
  • http://www.endpoint-security.info/tag/cybercrime/
  • http://www.endpoint-security.info/tag/cybersecurity/
  • http://www.endpoint-security.info/tag/data-breach/
  • http://www.endpoint-security.info/tag/data-breaches/
  • http://www.endpoint-security.info/tag/encryption/
  • http://www.endpoint-security.info/tag/data-encryption/
  • http://www.endpoint-security.info/tag/data-leak/
  • http://www.endpoint-security.info/tag/data-leakage/
  • http://www.endpoint-security.info/tag/data-loss/
  • http://www.endpoint-security.info/tag/data-loss-prevention/
  • http://www.endpoint-security.info/tag/data-security/
  • http://www.endpoint-security.info/tag/data-theft/
  • http://www.endpoint-security.info/tag/data-theft-loss/
  • http://www.endpoint-security.info/tag/device-control/
  • http://www.endpoint-security.info/tag/dlp/
  • http://www.endpoint-security.info/tag/endpoint-protector/
  • http://www.endpoint-security.info/tag/endpoint-security/
  • http://www.endpoint-security.info/tag/fraud/
  • http://www.endpoint-security.info/tag/hack/
  • http://www.endpoint-security.info/tag/hackers/
  • http://www.endpoint-security.info/tag/hacking/
  • http://www.endpoint-security.info/tag/healthcare/
  • http://www.endpoint-security.info/tag/identity-theft/
  • http://www.endpoint-security.info/tag/insider-threat/
  • http://www.endpoint-security.info/tag/it-security/
  • http://www.endpoint-security.info/tag/lost-data/
  • http://www.endpoint-security.info/tag/lost-hardware/
  • http://www.endpoint-security.info/tag/malware/
  • http://www.endpoint-security.info/tag/network-security/
  • http://www.endpoint-security.info/tag/online-fraud/
  • http://www.endpoint-security.info/tag/private-records/
  • http://www.endpoint-security.info/tag/research/
  • http://www.endpoint-security.info/tag/security/
  • http://www.endpoint-security.info/tag/security-breach/
  • http://www.endpoint-security.info/tag/stolen-data/
  • http://www.endpoint-security.info/tag/stolen-hardware/
  • http://www.endpoint-security.info/tag/stolen-laptop/
  • http://www.endpoint-security.info/tag/stuxnet/
  • http://www.endpoint-security.info/tag/tjx/
  • http://www.endpoint-security.info/tag/uk/
  • http://www.endpoint-security.info/tag/usb/
  • http://www.endpoint-security.info/tag/usb-stick/
  • http://www.endpoint-security.info/about-us/
  • http://www.endpoint-security.info/contact-us/
  • http://www.endpoint-security.info/disclosure-policy/
  • http://www.endpoint-security.info/2013/05/
  • http://www.endpoint-security.info/2013/03/
  • http://www.endpoint-security.info/2013/01/
  • http://www.endpoint-security.info/2012/11/
  • http://www.endpoint-security.info/2012/08/
  • http://www.endpoint-security.info/2012/06/
  • http://www.endpoint-security.info/2012/05/
  • http://www.endpoint-security.info/2012/04/
  • http://www.endpoint-security.info/2012/03/
  • http://www.endpoint-security.info/2012/02/
  • http://www.endpoint-security.info/2012/01/
  • http://www.endpoint-security.info/2011/12/
  • http://www.endpoint-security.info/2011/11/
  • http://www.endpoint-security.info/2011/10/
  • http://www.endpoint-security.info/2011/09/
  • http://www.endpoint-security.info/2011/08/
  • http://www.endpoint-security.info/2011/07/
  • http://www.endpoint-security.info/2011/06/
  • http://www.endpoint-security.info/2011/05/
  • http://www.endpoint-security.info/2011/04/
  • http://www.endpoint-security.info/2011/03/
  • http://www.endpoint-security.info/2011/02/
  • http://www.endpoint-security.info/2011/01/
  • http://www.endpoint-security.info/2010/12/
  • http://www.endpoint-security.info/2010/11/
  • http://www.endpoint-security.info/2010/10/
  • http://www.endpoint-security.info/2010/09/
  • http://www.endpoint-security.info/2010/08/
  • http://www.endpoint-security.info/2010/07/
  • http://www.endpoint-security.info/2010/06/
  • http://www.endpoint-security.info/2010/05/
  • http://www.endpoint-security.info/2010/04/
  • http://www.endpoint-security.info/2010/03/
  • http://www.endpoint-security.info/2010/02/
  • http://www.endpoint-security.info/2010/01/
  • http://www.endpoint-security.info/2009/12/
  • http://www.endpoint-security.info/2009/11/
  • http://www.endpoint-security.info/2009/10/
  • http://www.endpoint-security.info/2009/09/
  • http://www.endpoint-security.info/2009/08/
  • http://www.endpoint-security.info/2009/07/
  • http://www.endpoint-security.info/2009/06/
  • http://www.endpoint-security.info/2009/05/
  • http://www.endpoint-security.info/2009/04/
  • http://www.endpoint-security.info/2009/03/
  • http://www.endpoint-security.info/2009/02/
  • http://www.endpoint-security.info/2009/01/
  • http://www.endpoint-security.info/2008/12/
  • http://www.endpoint-security.info/2008/11/
  • http://www.endpoint-security.info/2008/10/
  • http://www.endpoint-security.info/2008/09/
  • http://www.endpoint-security.info/2008/08/
  • http://www.endpoint-security.info/2008/07/
  • http://www.endpoint-security.info/2008/06/
  • http://www.endpoint-security.info/2008/05/
  • http://www.endpoint-security.info/2008/04/
  • http://www.endpoint-security.info/2008/03/
  • http://www.endpoint-security.info/2008/02/
  • http://www.endpoint-security.info/2007/12/
  • http://www.endpoint-security.info/2007/11/

Possible email addresses for endpoint-security.info

  • info@endpoint-security.info
  • email@endpoint-security.info
  • support@endpoint-security.info
  • contact@endpoint-security.info
  • admin@endpoint-security.info
  • postmaster@endpoint-security.info
  • hostmaster@endpoint-security.info
  • domain@endpoint-security.info
  • abuse@endpoint-security.info

Possible Domain Typos

www.ndpoint-security.info, www.ewndpoint-security.info, www.wndpoint-security.info, www.esndpoint-security.info, www.sndpoint-security.info, www.edndpoint-security.info, www.dndpoint-security.info, www.efndpoint-security.info, www.fndpoint-security.info, www.erndpoint-security.info, www.rndpoint-security.info, www.e3ndpoint-security.info, www.3ndpoint-security.info, www.e4ndpoint-security.info, www.4ndpoint-security.info, www.edpoint-security.info, www.enbdpoint-security.info, www.ebdpoint-security.info, www.engdpoint-security.info, www.egdpoint-security.info, www.enhdpoint-security.info, www.ehdpoint-security.info, www.enjdpoint-security.info, www.ejdpoint-security.info, www.enmdpoint-security.info, www.emdpoint-security.info, www.en dpoint-security.info, www.e dpoint-security.info, www.enpoint-security.info, www.endxpoint-security.info, www.enxpoint-security.info, www.endspoint-security.info, www.enspoint-security.info, www.endwpoint-security.info, www.enwpoint-security.info, www.endepoint-security.info, www.enepoint-security.info, www.endrpoint-security.info, www.enrpoint-security.info, www.endfpoint-security.info, www.enfpoint-security.info, www.endvpoint-security.info, www.envpoint-security.info, www.endcpoint-security.info, www.encpoint-security.info, www.endoint-security.info, www.endpooint-security.info, www.endooint-security.info, www.endploint-security.info, www.endloint-security.info, www.endp0oint-security.info, www.end0oint-security.info, www.endp-oint-security.info, www.end-oint-security.info, www.endp_oint-security.info, www.end_oint-security.info, www.endpint-security.info, www.endpoiint-security.info, www.endpiint-security.info, www.endpokint-security.info, www.endpkint-security.info, www.endpolint-security.info, www.endplint-security.info, www.endpopint-security.info, www.endppint-security.info, www.endpo9int-security.info, www.endp9int-security.info, www.endpo0int-security.info, www.endp0int-security.info, www.endpont-security.info, www.endpoiunt-security.info, www.endpount-security.info, www.endpoijnt-security.info, www.endpojnt-security.info, www.endpoiknt-security.info, www.endpoknt-security.info, www.endpoilnt-security.info, www.endpolnt-security.info, www.endpoiont-security.info, www.endpoont-security.info, www.endpoi8nt-security.info, www.endpo8nt-security.info, www.endpoi9nt-security.info, www.endpo9nt-security.info, www.endpoi*nt-security.info, www.endpo*nt-security.info, www.endpoit-security.info, www.endpoinbt-security.info, www.endpoibt-security.info, www.endpoingt-security.info, www.endpoigt-security.info, www.endpoinht-security.info, www.endpoiht-security.info, www.endpoinjt-security.info, www.endpoijt-security.info, www.endpoinmt-security.info, www.endpoimt-security.info, www.endpoin t-security.info, www.endpoi t-security.info, www.endpoin-security.info, www.endpointr-security.info, www.endpoinr-security.info, www.endpointf-security.info, www.endpoinf-security.info, www.endpointg-security.info, www.endpoing-security.info, www.endpointh-security.info, www.endpoinh-security.info, www.endpointy-security.info, www.endpoiny-security.info, www.endpoint5-security.info, www.endpoin5-security.info, www.endpoint6-security.info, www.endpoin6-security.info, www.endpointsecurity.info, www.endpoint-=security.info, www.endpoint=security.info, www.endpoint-_security.info, www.endpoint_security.info, www.endpoint-0security.info, www.endpoint0security.info, www.endpoint-+security.info, www.endpoint+security.info, www.endpoint-*security.info, www.endpoint*security.info, www.endpoint-9security.info, www.endpoint9security.info, www.endpoint-ecurity.info, www.endpoint-sqecurity.info, www.endpoint-qecurity.info, www.endpoint-swecurity.info, www.endpoint-wecurity.info, www.endpoint-seecurity.info, www.endpoint-eecurity.info, www.endpoint-szecurity.info, www.endpoint-zecurity.info, www.endpoint-sxecurity.info, www.endpoint-xecurity.info, www.endpoint-scecurity.info, www.endpoint-cecurity.info, www.endpoint-scurity.info, www.endpoint-sewcurity.info, www.endpoint-swcurity.info, www.endpoint-sescurity.info, www.endpoint-sscurity.info, www.endpoint-sedcurity.info, www.endpoint-sdcurity.info, www.endpoint-sefcurity.info, www.endpoint-sfcurity.info, www.endpoint-sercurity.info, www.endpoint-srcurity.info, www.endpoint-se3curity.info, www.endpoint-s3curity.info, www.endpoint-se4curity.info, www.endpoint-s4curity.info, www.endpoint-seurity.info, www.endpoint-secxurity.info, www.endpoint-secsurity.info, www.endpoint-sesurity.info, www.endpoint-secdurity.info, www.endpoint-sedurity.info, www.endpoint-secfurity.info, www.endpoint-sefurity.info, www.endpoint-secvurity.info, www.endpoint-sevurity.info, www.endpoint-sec urity.info, www.endpoint-se urity.info,

More Sites

Number of used Technologies: 13
Number of used Javascript files: 13
Server Software: nginx/1.12.0
Server Location: United States / Provo - 66.147.244.219
List of used Technologies: Wordpress CMS, CSS (Cascading Style Sheets), Flexslider, Google Font API, Html (HyperText Markup Language), Html5, Javascript, jQuery, Php (Hypertext Preprocessor), Pingback, Revslider, Shortcodes
Number of used Technologies: 1
Number of used Javascript files: 1
Server Software: Apache/2.4.23
Server Location: United States / Scottsdale - 107.180.60.78
List of used Technologies: CSS (Cascading Style Sheets), Html (HyperText Markup Language), Html5
Belsoft Infortix ist ein schweizer Informatik Unternehmen mit Fokus auf DataCenter, Security und Cloud Lösungen für kleinst-, mittel- und gross Unternehmen
Number of used Technologies: 10
Number of used Javascript files: 10
Server Software: LiteSpeed
Server Location: Switzerland / - 193.33.128.218
List of used Technologies: Wordpress CMS, Google Analytics, CSS (Cascading Style Sheets), Google Font API, Html (HyperText Markup Language), Html5, Javascript, jQuery, Php (Hypertext Preprocessor), Pingback, Shortcodes, SVG (Scalable Vector Graphics)
Number of used Technologies: 6
Number of used Javascript files: 6
Server Software: cloudflare-nginx
Server Location: United States / San Francisco - 104.18.58.21
List of used Technologies: Google Analytics, CSS (Cascading Style Sheets), Html (HyperText Markup Language), Javascript
Educators, Performers, and Practitioners of Circus and Street Performing Arts in the Phoenix Metro area of Arizona.
Number of used Technologies: 5
Number of used Javascript files: 5
Server Software: ATS/5.3.0
Server Location: United States / Sunnyvale - 98.139.135.129
List of used Technologies: Wordpress CMS, CSS (Cascading Style Sheets), Html (HyperText Markup Language), Html5, Javascript, jQuery, Php (Hypertext Preprocessor), Pingback, W3 Total cache
Uw lokale partner voor signprojecten, autoreclame en visuele communicatie.
Number of used Technologies: 18
Number of used Javascript files: 18
Server Software: Apache/2.4.6 (CentOS) PHP/5.4.16
Server Location: Netherlands / - 46.21.227.210
List of used Technologies: Wordpress CMS, Google Analytics, CSS (Cascading Style Sheets), Flexslider, Google Font API, Html (HyperText Markup Language), Html5, Iframe, Javascript, jQuery, jQuery Cycle, Php (Hypertext Preprocessor), Pingback, SVG (Scalable Vector Graphics), Facebook Like box
Number of used Technologies: 0
Number of used Javascript files: 0
Server Software: Apache
Server Location: Italy / - 195.36.1.100
List of used Technologies: CSS (Cascading Style Sheets), Html (HyperText Markup Language)
Atelier PIEN handgemaakte lederen schalen en objecten
Number of used Technologies: 7
Number of used Javascript files: 7
Server Software: nginx/1.12.0
Server Location: Netherlands / - 5.157.86.13
List of used Technologies: CSS (Cascading Style Sheets), Font Awesome, Html (HyperText Markup Language), Html5, Javascript
欢迎光缆南通市海之星实验器材有限公司,已经有超过1000家生物实验室耗材定点采购合作单位,联系人施经理,海门移动:13921663191 上海移动:13818412042 公司品牌:麦斯诺
Number of used Technologies: 8
Number of used Javascript files: 8
Server Software: Micro_Httpd
Server Location: China / Xiamen - 222.76.212.110
List of used Technologies: CSS (Cascading Style Sheets), Html (HyperText Markup Language), Javascript, jQuery Colorbox
Number of used Technologies: 2
Number of used Javascript files: 2
Server Software: nginx/1.10.2
Server Location: Russian Federation / - 82.202.224.243
List of used Technologies: CSS (Cascading Style Sheets), Html (HyperText Markup Language), Html5, Javascript, Php (Hypertext Preprocessor), Yandex.Metrika