Hagaha SEO Talaabada 7: Amniga — Aasaaska Google uu filayo sanadka 2026
Hagaha SEO Talaabada 7: Amniga
Tani waa Talaabada 7 ee Hagaha SEO 13-Tallaabo. Amniga ma ahan oo kaliya ilaalinta isticmaaleyaasha — waxa uu si toos ah u saameeyaa darajooyinkaaga raadinta. Google wuxuu tan iyo 2014 isticmaalaa HTTPS sida calaamad darajo ah, filashada ayaa si joogto ah u kordhaysay.
Inta badan milkiilayaasha goobaha waxay u arkaan amniga inay yihiin laba-geesood: "Waxaan haynaa SSL, sidaas darteed waxaan nahay kuwo ammaan ah." Dhab ahaan, Google waxay qiimeysaa toban-toban calaamadaha amniga. Goobaha leh cinwaanno amni oo sax ah, shahaadooyin sax ah, iyo maadooyin aan isku dhafaneyn ayaa ka sarreeya goobaha leh shahaadada SSL aasaasiga ah — dhammaan kale iska eg.
Warka wanaagsan: badankood hagaajinta amniga waa qaabeyn hal mar ah. U dejiso mar mar ah, waana ay ilaalin doonaan darajooyinkaaga si joogto ah.
Qaabeynta SSL
SSL (tani waa TLS) waxay sirta ku ilaalisaa xiriirka u dhexeeya server-kaaga iyo booqdayaasha. Tan iyo 2014, Google waxay si cad u xaqiijisay HTTPS sida calaamad darajo ah. Sanadka 2026, aan helin HTTPS maahan keliya arrin darajo — Chrome wuxuu calaamadeeyaa goobaha HTTP sida "Aan Ammaan ahayn" ee barta cinwaanka, oo burburinaya kalsoonida isticmaalaha.
Shuruudaha saxda ah ee SSL:
| Shuruud | Maxay Tahay | Sida loo Hubiyo | |---------|-------------|-----------------| | Shahaado sax ah | Dhacday = digniin browser = isticmaalayaasha ka tagay | Hubi taariikhda dhicitaanka | | Silsilad dhammaystiran | Silsiladaha aan dhamaystirnayn waxay ku fashilmaan qalabyo qaar | Tijaabada SSL Labs | | TLS 1.2+ | Noocyada hore waxay leeyihiin daciifnimo la ogyahay | Tijaabada SSL Labs | | Maya SHA-1 | La joojiyey, browsers-ka ayaa diida | Faahfaahinta shahaadada | | Coverage SAN | www iyo non-www labaduba waa inay dabooshaan | Faahfaahinta shahaadada | | Aut-renewal | Ka hortagga musiibooyinka dhicitaanka | Let's Encrypt / qaabeynta adeeg bixiyaha |
Dhibcaha SSL:
100% = Shahaado sax ah + Silsilad dhammaystiran + TLS 1.3 + Cipher xooggan + Auto-renew
0% = Shahaado dhacday ama maqan
Khaladaadka caadiga ah ee SSL:
- Shahaadada dhacday iyada oo aan ogeysiis la siisay — Samee kormeer (Tallaabada 6) ugu yaraan 30 maalmood kahor dhicitaanka
- Silsilad shahaado la'aan ah — Server-ka wuxuu u baahan yahay inuu diro shahaadooyinka dhexe, kaliya ma ahan caleenta
- Maadada isku dhafan — Bogga HTTPS wuxuu dajisaa ilo HTTP (sawirada, scripts, stylesheets)
- Wareegyada jeediya — HTTP → HTTPS → HTTP oo la sababay qaabeynta khaldan ee CDN/proxy
- Khalad u dhexeeya non-www vs www — Shahaadada waxay dabooshaa mid laakiin ma daboosho kan kale
Guul degdeg ah: Ku qor domain-kaaga SSL Labs (ssllabs.com/ssltest). Wax kasta oo ka hooseeya qaddarka "A" waxay leeyihiin dhibaatooyin la shaqeyn karo. Badankood bixiyeyaasha martigelinta waxay ku hagaajiyaan hal guji.
Cinwaannada Amniga
Cinwaannada amniga waa cinwaannada jawaabta HTTP ee tilmaamaya browsers-ka sida loo shaqeeyo marka la rarayo goobtaada. Waxay ka hortagayaan dhammaan noocyada weerarada — waxayna crawlers-ka Google ka raadiyaan.
Cinwaannada amniga ayaa ah kuwo muhiim ah:
Content-Security-Policy (CSP)
CSP waa cinwaanka amniga ugu awoodda badan. Waxay tilmaamaysaa browsers-ka dhab ahaan ilaha (scripts, styles, sawirro, farta) ee la oggol yahay in lagu soo raro bogaggaaga.
Content-Security-Policy: default-src 'self'; script-src 'self' https://cdn.example.com; style-src 'self' 'unsafe-inline'; img-src 'self' data: https:; font-src 'self' https://fonts.gstatic.com; connect-src 'self' https://api.example.com; frame-ancestors 'none';
CSP waxay ka hortagtaa:
- Weerarrada Cross-site scripting (XSS)
- Weerarrada data gelinta
- Clickjacking (iya
frame-ancestors) - Fulinta scripts aan la oggolaan (cryptominers, ad injectors)
Istaraatiijiyadda hirgelinta CSP:
- Ku bilow
Content-Security-Policy-Report-Only(hubi xad-gudubyada adoon xirin) - Kormeer warbixinaha 1-2 toddobaad
- White-list ilaha saxda ah
- U guur dhiga wakhti degdeg ah
- Ku dar
report-uriamareport-tosi loo diiwaan geliyo xad-gudubyada socda
X-Frame-Options
Ka hortagaya goobtaada in lagu daro iframes-ka domains kale (ilaalinta clickjacking).
X-Frame-Options: DENY
Ama haddii aad u baahan tahay inaad oggolaato qaabeynta isku mid ah:
X-Frame-Options: SAMEORIGIN
X-Content-Type-Options
Ka hortagayaa browsers-ka inay dhadhamiyaan nooca MIME (u turjumaan faylasha inay yihiin noocyo ka duwan kuwii la shaaciyey).
X-Content-Type-Options: nosniff
Tani hal-liner waxay ka hortagtaa weerarada halka faylka .jpg uu ku jiro JavaScript qarsoon oo browser-ku laga yaabo inuu fuliyo.
Referrer-Policy
Xakameeya inta badan macluumaadka tixraaca ee la diro marka isticmaaleyaashu gujiyaan xiriiriyeyaasha ka yimaada goobtaada.
Referrer-Policy: strict-origin-when-cross-origin
Tani waxay u diraysaa URL-ka oo dhan codsiyada isku mid ah laakiin kaliya asal (domain) codsiyada ka baxsan. Waxay isu dheeli tirtaa baahiyaha falanqaynta iyo arrimaha asturnaanta.
Permissions-Policy
Xakameeya astaamaha browser-ka (kaamirada, makarafoonka, geolocation, iwm.) oo loo adeegsan karo goobtaada.
Permissions-Policy: camera=(), microphone=(), geolocation=(), payment=()
Daboolka astaamaha aadan isticmaalin waxay ka hortagaysaa scripts-ka dhinac saddexaad labadaba.
Tusaalaha hirgelinta cinwaanka (Next.js):
// next.config.js
module.exports = {
async headers() {
return [{
source: '/(.*)',
headers: [
{ key: 'X-Content-Type-Options', value: 'nosniff' },
{ key: 'X-Frame-Options', value: 'SAMEORIGIN' },
{ key: 'Referrer-Policy', value: 'strict-origin-when-cross-origin' },
{ key: 'Permissions-Policy', value: 'camera=(), microphone=(), geolocation=()' },
{ key: 'Strict-Transport-Security', value: 'max-age=31536000; includeSubDomains; preload' },
]
}]
}
}
Hirgelinta cinwaanka (Apache .htaccess):
Header always set X-Content-Type-Options "nosniff"
Header always set X-Frame-Options "SAMEORIGIN"
Header always set Referrer-Policy "strict-origin-when-cross-origin"
Header always set Permissions-Policy "camera=(), microphone=(), geolocation=()"
Header always set Strict-Transport-Security "max-age=31536000; includeSubDomains; preload"
Hirgelinta cinwaanka (Nginx):
add_header X-Content-Type-Options "nosniff" always;
add_header X-Frame-Options "SAMEORIGIN" always;
add_header Referrer-Policy "strict-origin-when-cross-origin" always;
add_header Permissions-Policy "camera=(), microphone=(), geolocation=()" always;
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" always;
Guul degdeg ah: Ku dar dhammaan 5-da cinwaan kor ku xusan qaabeynta server-kaaga. Tani waxay qaadaneysaa 5 daqiiqo waxayna si degdeg ah u hagaajinaysaa tayada amnigaaga aalad kasta.
HSTS Preload
HTTP Strict Transport Security (HSTS) wuxuu u sheegayaa browsers-ka inay had iyo jeer isticmaalaan HTTPS domain-kaaga — xitaa ka hor dhigista ugu horreysa. Iyadoo aan HSTS, booqashada ugu horreysa ee goobtaada waxay weli isticmaali kartaa HTTP (u nugul in la jabsado) ka hor intaan dib loogu dhigin HTTPS.
HSTS cinwaan:
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Saddexda tilmaamood:
| Tilmaam | Micnaha | |---------|---------| | max-age=31536000 | Xasuuso tan hal sano (ilaa seconds) | | includeSubDomains | Ku dabaq dhammaan subdomains-kana | | preload | Codso ka mid noqoshada liisaska preload browser-ka |
Liiska HSTS preload:
Iyada oo ah difaac HSTS ugu dambeeya. Browsers-ka waxay la keenaan liis dhisan oo domains ah oo had iyo jeer isticmaali kara HTTPS. Marka aad soo dirto domain-kaaga hstspreload.org waxay ka dhigan tahay:
- Booqdayaasha markii ugu horreysay waxay helaan HTTPS si toos ah (eeg HTTP → HTTPS dib u dhigid)
- Khatar ma jirto in weeraryahannadu ay hoos udhigeen xiriirka
- Joogto ah (way adag tahay in laga saaro kadib marka la soo gudbiyo)
Shuruudaha HSTS preload:
- Shahaado HTTPS sax ah
- Dhammaan HTTP-ka si joogto ah u dhigo HTTPS (oo ay kujirto subdomains)
- HSTS cinwaanka oo leh
max-age>= 31536000 - HSTS cinwaanka waxaa ku jira
includeSubDomains - HSTS cinwaanka waxaa ku jira
preload - Dhammaan subdomains waa inay taageeraan HTTPS
Digniin: Kaliya waxaa la soo gudbinayaa preload haddii DHAMMAAN subdomains-kaagu taageeraan HTTPS. Tilmaamaha includeSubDomains waxay ka dhigan tahay in subdomain kaliya oo ah HTTP uu noqon doono mid aan la heli karin.
Guul degdeg ah: Haddii aad horey u haysatay HTTPS dhammaan subdomains-ka waxaad ku dari kartaa dhammaan HSTS cinwaanka oo aad ugu dirtaa hstspreload.org. Geedi socodku wuxuu qaadanayaa dhowr toddobaad laakiin difaaca waa joogto.
Baaritaanka Dhibaatooyinka
Baaritaanka dhibaatooyinka otomaatiga ah wuxuu aqoonsadaa arrimaha amniga ee la yaqaan qaab-dhismeedkaaga ka hor intaan weeraryahannadu ka faa'idaystaan.
Waa maxay baaritaanka dhibaatooyinka oo hubiyaa:
- Barnaamijka duugoobay: WordPress, plugins, maktabadaha JavaScript ee leh CVEs la yaqaan
- Faylasha la shaaciyey:
.env,.git,wp-config.php, xirmooyinka database - Macluumaadka la sahanayo: Cinwaanada nooca server-ka, qaabka debug, raadadka stack
- Aqoonsiyo default: Bogagga maamulka oo aan lahayn oggolaansho, furayaasha default
- Ports adeegyo furan: Adeegyo aan loo baahnayn oo internet-ka laga muujinayo
- Barta gelinta: Foomamka aan lahayn ilaalinta CSRF, gelinta aan la xaqiijinin
Dhibaatooyinka caadiga ah ee ku yaal madal kasta:
| Madal | Dhibaatada ugu weyn | Xalka | |-------|---------------------|-------| | WordPress | Plugins duugoobay | Auto-update + WAF | | Shopify | Oggolaanshaha codsiga dhinaca saddexaad | Kormeer liiska codsiyada rubuca rubuca | | Next.js | Xiriirada API la shaaciyey | Middleware oggolaansho + xadidida rate | | Goobaha static | Qaabeynta khaldan ee CDN | Ka fiirso xeerarka keydinta | | Custom | Gelinta SQL | Su'aalaha parametartized |
Dhererka baaritaanka:
- Maalinle: Tijaabada dusha otomaatiga (SSL, cinwaannada, faylasha la shaacay)
- Toddobaadle: Hubinta Dhibatada Ku Tiirsan (npm audit, qalinka WordPress)
- Bil walba: Tijaabo qoto dheer oo leh baaritaanka la oggolaaday
- Kadib kasta oo la daabaco: Hubinta dib-u-qarinta
Guul degdeg ah: Ku socodsii npm audit (Node.js) ama fiiri liiska plugins-kaaga CMS si aad u aragto waxyaabaha duugoobay. Si degdeg ah u hagaaji arrimaha muhiimka ah/heerka sare.
Maadada Isku Dhafan
Maadada isku dhafan waxay dhacdaa marka bog HTTPS uu soo raro ilo (sawirada, scripts, stylesheets, iframes) oo ka socda HTTP. Tani waxay si qayb ah u jabinaysaa sirta waxayna keentaa digniinaha browser-ka.
Noocyada maadada isku dhafan:
| Nooc | Darajada | Tusaale | Dhaqanka Browser-ka | |------|----------|---------|---------------------| | Firfircoon | Sare | HTTP script, iframe, CSS | Si caadi ah ayaa loo xiraa | | Ka daawanaya | Dhexdhexaad | HTTP sawir, video, cod | La raray iyadoo la muujinayo digniin |
Maadada isku dhafan ee firfircoon waxay ku xiran tahay browsers casriga ah — taasi waxay ka dhigan tahay in scripts-kaaga iyo styles-kaaga si fudud aysan u imaan doonin. Maadada isku dhafan ka daawanaya ayaa la raro laakiin waxay muujinaysaa digniinaha amniga.
Helidda maadada isku dhafan:
- Furo Chrome DevTools → Console
- Eeg "Maadada Isku Dhafan" digniinaha
- Si kale, iska hubi qalabeeyeha (Screaming Frog, LANGR)
Ilo caadi ah oo maadada isku dhafan:
- URL-yada
http://oo la qorey gudaha maaddada (boogaagta qoraallada, sharraxidda alaabta) - Guddiga dhinaca saddexaad ee raarinaya HTTP ilo
- Mawduucyada ku jira (Embed YouTube duug ah, widgets-ka warbaahinta bulshada)
- CSS
background-imageoo leh URL-yada HTTP - Farta lagu raranayo HTTP
Hagaajinta maadada isku dhafan:
<!-- Xun -->
<img src="http://example.com/image.jpg" />
<!-- Wanaagsan -->
<img src="https://example.com/image.jpg" />
<!-- Ugu Wanaagsan (caadi ah, ku habboon habka bogga) -->
<img src="//example.com/image.jpg" />
Xalka database (WordPress):
UPDATE wp_posts SET post_content = REPLACE(post_content, 'http://yourdomain.com', 'https://yourdomain.com');
UPDATE wp_postmeta SET meta_value = REPLACE(meta_value, 'http://yourdomain.com', 'https://yourdomain.com');
Guul degdeg ah: Furo boggaaga hore ee Chrome, riix F12, hubi tabka Console ee digniinaha maadada isku dhafan. Hagaaji wixii soo muuqda — kuwan si toos ah ayaa loogu arki doonaa Google.
Khataraha Scriptka Dhinaca Saddexaad
Qof kasta oo script ah oo aad ka soo rarto waa khatar amni (iyo waxqabad). Scripts-ka dhinaca saddexaad waxay noqon karaan:
- La jabsado (weerarada sahayda)
- Ku raad raacaya isticmaaleyaashaaga iyada oo aan oggolaansho la helin (ku-xad-gudubka GDPR)
- Hiddo-dhaafaya goobtaada (hagida curinta, dib-u-dhigid)
- Burburinaya shaqada (cusboonaysiinta nooca, jarno)
- Gelinaya waxyaabo aan la rabin (scripts-ka xayaysiinta ee si qalad ah u dhacaya)
Kormeer scripts-kaaga dhinaca saddexaad:
| Script | Loo Baahan Yahay? | Heerka Khatar | Ikhtiyaar | |--------|-------------------|---------------|-----------| | Google Analytics | Badanaa haa | Hoose | Raadinta server-ka | | Widgets-ka wada hadalka | Malaha | Dhexdhexaad | Xalka iskiis ah | | Badhamada wadaagista bulshada | Marar badan | Dhexdhexaad | Xiriirada wadaagga go'an | | Tijaabinta A/B | Mararka qaar | Sarre | Tijaabinta server-ka | | Pixels-ka dib-u-yaalinta | Go'aan ganacsi | Sarre | Xogta first-party | | Font CDNs | Raaxo | Hoose | Font-ka iskiis ah |
Yareynta khatarta ee scripts-ka dhinaca saddexaad ee muhiimka ah:
- Subresource Integrity (SRI): Hubinta hash-ka waxay ka hortagtaa scripts-ka isbedelka ah inay soo raacaan
<script src="https://cdn.example.com/lib.js"
integrity="sha384-oqVuAfXRKap7fdgcCY5uykM6+R9GqQ8K/uxAE+sO0..."
crossorigin="anonymous"></script>
- Xaddidaadaha CSP: Kaliya oggolaada scripts ka imanaya domains la yaqaan
- Iframes-ka la xaddiday: Kala sooc widgets-ka dhinaca saddexaad
- Kormeer joogto ah: Dib-u-eegista rubuca dhammaan ilaha dibadda
- Kormeer: Ka digtoonoow domains-kale oo cusub oo ka soo muuqda bogaggaaga
Guul degdeg ah: Liis garee dhammaan tag-yadaaga HTML ee ka yimaada domain dibadda. Ka saar kuwa aadan aqoonsan ama aanad u baahnayn. Ka saarista kasta waxay hagaaji doontaa amniga iyo xawaaraha bogga.
Ogaanshaha Malware & Google Badbaadada Browsing
Google waxay haystaa liiska Badbaadada Browsing ee goobaha la yaqaan inay faafiyaan malware ama ay martigelinayaan waxyaabo phishing ah. In laga shaaciyo halkan waa dhibaato weyn oo SEO ah — Google waxay muujinaysaa digniin buuxda kahor intaan ay isticmaaleyaashu u oggolaan inay booqdaan goobtaada.
Sidee goobuhu u helaan calaamad:
- Gooba leh oo la jabsaday oo faafinaya malware (WordPress la jabsaday, iwm.)
- Scripts-ka la geliyay ee u jeedinaya goobaha khatarta ah
- Bogagga phishing-ka oo lagu martigelinayo domain-kaaga
- Mawduucyada isticmaalaha ee isku xira malware
- Martigelinta faylasha lagu calaamadeeyay in ay khatar yihiin
Hubinta xaaladdaada Badbaadada Browsing:
https://transparencyreport.google.com/safe-browsing/search?url=yourdomain.com
Ama Googata Falanqaynta Gaadiidka: Qaybta Arrimaha Amniga.
Ka Hortagga:
- Jizraha waxkasta cusbooneysii (CMS, plugins, maktabadaha)
- Isticmaal fureyaal xooggan oo gaar ah + 2FA
- Kormeer joogto ah oo hufnaan (ogow isbadalo aan ogolaan)
- Scan waxyaabaha ay isticmaalaan isticmaaleyaasha
- Ka saar plugins/naqshado aan la isticmaalin
- Dib-u-eegista isticmaaleyaasha maamulka si joogto ah
Haddii lagu calaamadeeyo:
- Ogoow oo ka saar waxyaabaha malware/phishing ah
- Cusboonaysii dhammaan software-ka iyo beddel dhammaan furayaasha
- Codso dib u eegis Google Search Console
- Dib u eegista caadi ahaan waxay qaadataa 1-3 maalmood
- Si dhow u kormeer 30 maalmood (dib u infekshan waa caadi)
Guul degdeg ah: Hubi goobtaada ee transparencyreport.google.com. Haddii nadiif ah, hubi in CMS-kaaga iyo dhammaan plugins-ka la cusboonaysiiyay si aad u ilaaliso sidan.
Liiska Hubinta Amniga SEO
- [ ] Shahaado SSL sax ah oo leh aut-renewal la sameeyay
- [ ] HTTP → HTTPS dib u dhigid dhammaan bogagga (301, ee maahan 302)
- [ ] HSTS cinwaan oo leh max-age >= 31536000
- [ ] Content-Security-Policy cinwaan la dejiyey
- [ ] X-Content-Type-Options: nosniff
- [ ] X-Frame-Options: DENY ama SAMEORIGIN
- [ ] Referrer-Policy: strict-origin-when-cross-origin
- [ ] Permissions-Policy oo joojineysa astaamo aan la isticmaalin
- [ ] Ma jiraan maado isku dhafan (ilaha HTTP bogagga HTTPS)
- [ ] Ma jiraan faylal xasaasi ah oo daboolan (.env, .git, faylasha qaabeynta)
- [ ] Cinwaanada nooca server-ka la saaray ama guud
- [ ] Dhammaan software/plugins waxaa la cusboonaysiiyay
- [ ] Xaaladda Google Badbaadada Browsing: nadiif
- [ ] Scripts-ka dhinaca saddexaad la kormeeray oo la yareeyay
- [ ] SRI hashes ku yaal scripts-ka dibadda ee muhiimka ah
Khaladaadka Amniga Caadiga ah (Dhiirrigelinta SEO)
- Shahaadada SSL ee dhacday — Dhibic darajo degdeg ah + digniin browser
- Maadada isku dhafan — Dhib dhiga calaamadaha kalsoonida, sirta qaybta waa aan waxtar lahayn
- HSTS la'aan — Codsiga ugu horreeya waa nugul, calaamadeynta amniga daciifka
- CSP maqan — U ogolaanaya script kasta in la fuliyo (XSS vector)
- Faylasha xasaasiga ah ee la shaaciyey —
.envoo leh furayaasha API,.gitoo leh koodhka ilaha - Software/plugins duugoobay — Weeraro la yaqaan, xadgudub mustaqbalka
- Wax maqnaansho ah cinwaanada amniga — calaamado adiga oo aan ka fiirsan amniga
- Scripts-ka dhinaca saddexaad oo aad u ogolaansho badan — Holes amni oo aadan xorayn karin
Maxaa Xiga?
Tallaabada 8: Muuqaalka AI — Xadka sare ee SEO sanadka 2026. Sida loo hagaajiyo Google AI Overview, tixraacyada ChatGPT, tixraacyada Perplexity, iyo Gemini — kanaalka helitaanka sii kordhaya uguna dhaqsiyaha badan ee tartamayaashu xitaa ma tixgeliyeen.
Hagahan wuxuu ka mid yahay taxanaha 13-tallaabo ee SEO ee LANGR. Samee baaritaan bilaash ah si aad u aragto xaaladda goobtaada dhammaan 13 maaddo.