| Server IP : 68.178.164.50 / Your IP : 216.73.216.142 Web Server : Apache System : Linux 50.164.178.68.host.secureserver.net 5.14.0-611.26.1.el9_7.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Jan 29 05:24:47 EST 2026 x86_64 User : rathinambschool ( 1053) PHP Version : 8.2.30 Disable Function : exec,passthru,shell_exec,system MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /etc/nginx/conf.d/ |
Upload File : |
####
# per NGINX (http://nginx.org/en/docs/http/ngx_http_gzip_module.html):
# - When using the SSL/TLS protocol, compressed responses may be subject to BREACH attacks.
# - https://en.wikipedia.org/wiki/BREACH
# The best mitigation (besides not using compression at all) is:
# 1. Not sending sensitive data as part of your HTTP response
# 2. Use strict samesite cookies
# - https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Set-Cookie/SameSite
#
# If that is not an acceptable risk please uninstall `ea-nginx-gzip`
##
# enable it and make it work
gzip on;
gzip_proxied any;
gzip_vary on;
gzip_disable "msie6";
# tune it
gzip_buffers 16 8k;
gzip_comp_level 5;
gzip_min_length 256;
# text/html is always included so it does not need to be in `gzip_types`
# if you do add it you will getting:
# `nginx: [warn] duplicate MIME type "text/html" in …`
gzip_types
application/atom+xml
application/javascript
application/json
application/ld+json
application/manifest+json
application/rss+xml
application/vnd.geo+json
application/vnd.ms-fontobject
application/x-font-opentype
application/x-font-truetype
application/x-font-ttf
application/x-javascript
application/x-web-app-manifest+json
application/xhtml+xml
application/xml
font/eot
font/opentype
font/otf
font/truetype
image/bmp
image/svg+xml
image/vnd.microsoft.icon
image/x-icon
image/x-win-bitmap
text/cache-manifest
text/css
text/json
text/javascript
text/plain
text/shtml
text/vcard
text/vnd.rim.location.xloc
text/vtt
text/x-component
text/x-cross-domain-policy
text/x-js
text/xml;