Informatica-legal.es - SEO Checker

Overview of the SEO Check
Meta information
77% 
Page quality
80% 
Page structure
58% 
Link structure
77% 
Server
87% 
External factors
100% 
SEO Score
Response time
0.68 s
File size
145.50 kB
Words
3430
Media files
21
Number of links
98 internal / 5 external

Task list of SEO Improvements

Meta specifications

Title
(Critically important)
Perito Informatico | Informática Forense | Peritajes
The length of the page title is perfect. (450 pixels out of 580 max pixel length)
There are no duplicate words in the title
Meta description
(Critically important)
The meta description is missing.
Crawlability
(Critically important)
There are no problems in accessing the website.
Canonical URL
(Important)
https://informatica-legal.es/
There is a valid canonical link specified.
Language
(Somewhat important)
Language detected in text: es
Language defined in HTML: es
Server location: United States of America
The following language is defined by HTML: es
Alternate/Hreflang Links
(Somewhat important)
There are no alternate links specified on this page.
Other meta tags
(Somewhat important)
There is no rel next meta tag on this page.
There is no rel prev meta tag on this page.
Domain
(Somewhat important)
The domain is no subdomain.
The domain length is good.
The domain does not contain non-latin characters.
Page URL
(Somewhat important)
No parameters were found in the URL.
No session ID was found in the URL.
The URL does not have too many subdirectories.
Charset encoding
(Somewhat important)
The charset encoding (UTF-8) is set correctly.
Doctype
(Nice to have)
The doctype HTML 5 is set correctly.
The doctype is placed at first in the HTML code.
Favicon
(Nice to have)
No favicon is linked in the HTML code.

Meta tags

NameValue
robotsmax-image-preview:large
generatorPowered by WPBakery Page Builder - drag and drop page builder for WordPress.
viewportwidth=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=0
langes
X-UA-CompatibleIE=edge
charsetUTF-8

Test up to 1.000 webpages of informatica-legal.es with our free plan!

Try For Free
No trial. It's just free!

Page quality

Content
(Critically important)
These Typos were found:
  • leido => leído
  • movil => móvil
  • ultimos => últimos
  • tecnico => técnico
This page contains 3430 words. That's ok.
30.7% of the text are stop words.
Keywords used in the page title are also used in the page content. That's good!
Words from the H1 heading are used in the page content.
The page contains a listing, which indicates a good text layout.
48 paragraphs were found on this page.
No placeholders texts or images were found.
There are no duplicates on the site.
The average number of words per sentence of 22.43 words is good.
Frames
(Critically important)
This page does not use a frameset.
Mobile optimization
(Somewhat important)
No Apple touch icon is specified.
A viewport "width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=0" is provided.
Bold and strong tags
(Somewhat important)
The following tag is repeated too often: perito ingeniero informático
Some tags are too long. With 126 characters this one is longer than 70 characters:
"¿buscas un perito judicial informático forense que extraiga los datos informáticos que permitan tu vic..."
Image SEO
(Somewhat important)
2 images have no alt attribute. The content of alt attributes is used by search engines.
Social Networks
(Nice to have)
There are only a few social sharing widgets on the page. Make your website popular in social networks with social sharing widgets.
Additional markup
(Nice to have)
This page uses Google authorship information without an image.
HTTPS
(Somewhat important)
This website uses HTTPS to protect privacy and integrity of the exchanged data.
All included files are also transferred via HTTPS.

Media list

URLAlt attributeTitle
data:[...] Base64Perito Informatico
...nt/uploads/2021/01/slider-carlos-3-1.jpgNo alt attribute provided
...ntent/uploads/slider3/slider-forense.jpgNo alt attribute provided
data:[...] Base64previous arrow
data:[...] Base64next arrow
...ent/uploads/2014/05/home-informacion.jpgperitajes informaticos
data:[...] Base64casos reales
data:[...] Base64solicita informacion peritos
data:[...] Base64carlos aldama perito informaticoaldama-perito-informatico-04
data:[...] Base64¿Por qué es clave el papel del perito forense al denunciar un delito informático?
data:[...] Base645 delitos informáticos más comunes de lo que crees
data:[...] Base64¿Qué hace realmente un perito informático?
data:[...] Base64contratar perito informaticoail-isotipo-02-1
data:[...] Base64ambito de actuacionambitos-de-actuacion-01
data:[...] Base64ventajas perito informatico
data:[...] Base64perito tecnico informatico
data:[...] Base64perito informatico en madrid
data:[...] Base64Informática ForenseInformática Forense
data:[...] Base64Call Now Button
data:[...] Base64logo aldama
Video URLWidthHeight
...ube.com/embed/wjhV660a4_g?feature=oembed1080608

Page structure

H1 heading
(Critically important)
Perito informático Madrid
The H1 heading is perfect.
Headings
(Important)
Some headings occur twice on the page.
There are 41 headings on the page. The amount of headings should be in a more proper relation to the amount of text.

Heading structure

Heading levelContent
H1 Perito informático Madrid
H2 Perito Informático
H2 Informática Forense
H2 Referencias
H2 ¿Por qué es clave el papel del perito forense al denunciar un delito informático?
H2 5 delitos informáticos más comunes de lo que crees
H2 ¿Qué hace realmente un perito informático?
H2 Solicita información
H2 Perito ingeniero informático
H2 ¿Quieres contratar un perito técnico informático?
H2 Ámbito de actuación
H2 Metodología
H2 Ventajas
H2 Tu perito informático de confianza en Madrid
H2 Informe pericial informático
H2 ¿Por qué es clave el papel del perito forense al denunciar un delito informático? Duplicate text
H2 5 delitos informáticos más comunes de lo que crees Duplicate text
H2 ¿Qué hace realmente un perito informático? Duplicate text
H3 Peritajes Informáticos
H3 CASOS REALES
H3 SOLICITA INFORMACIÓN
H3 Profesionalidad
H3 Cercanía
H3 Medios tecnológicos avanzados
H3 Formación (Ingeniero superior en informática, expertos informáticos, colegiados y profesores universitarios)
H3 Actuación en todo el territorio nacional y con total disponibilidad
H3 Años de experiencia (más de 14 años en el sector en exclusiva
H3 Experiencia como peritos judiciales y cientos de ratificaciones realizadas en todos los ámbitos)
H3 Detallada preparación de cada vista/juicio
H3 Medios tecnológicos avanzados Duplicate text
H4 Política de Cookies
H5 Perito ingeniero informático Duplicate text
H5 ÁMBITO DE ACTUACIÓN
H5 metodología
H5 VENTAJAS
H5 Blog – Peritajes informáticos
H6 Carlos Aldama Saínz
H6 Perito Ingeniero Informático
H6 INFORMÁTICA FORENSE
H6 Llámanos al teléfono
H6 Envíanos un email
Some internal links have dynamic parameters. All internal URLs, which are not marked as nofollow, should not contain dynamic parameters.
Some anchor texts are used more than once.
1 links don't have an anchor text.
The number of internal links is ok.
None of the anchor texts is too long.
There are 5 external links on this page.
LinkAttributesAnchor text
https://informatica-legal.es/IMG-ALT Perito Informatico
/perito-colegiado-ingeniero-te...Carlos Aldama
/perito-colegiado-ingeniero-te...Curriculum
/perito-medios-comunicacion/En los medios
/perito-analisis-documentacion...Análisis de documentación técnica
/informes-periciales-perito-co...Informes peritajes informáticos
/perito-procesos-laborales-con...Peritaje procesos laborales
/perito-arbitraje-judicial-lit...Arbitraje informático
/perito-localizacion-recuperac...Localización de documentos
/tribunales-perito-juicio-oral...Defensa peritajes ante tribunales
/peritaje-judicial-informes-li...Peritaje Informático
/perito-extrajudicial-experto-...Perito extrajudicial
/perito-mediacion-conflictos-l...Mediación
/perito-documentoscopia-grafos...Documentoscopia
/perito-espana-sevilla-valenci...Ámbitos de actuación
/procesos-penales-perito-juici...PERITAJE PROCESOS PENALES
/perito-revelacion-secretos-es...Revelación de secretos
/perito-ciberdelitos-denunciar...Delitos económicos por ordenadores
/perito-ciberestafas-internet-...Estafa por medios informáticos
/perito-propiedad-intelectual-...Contra la propiedad
/perito-sabotaje-delito-denunc...Sabotaje
/perito-injurias-delito-honor-...Injurias
/perito-vulneracion-derecho-in...Vulneración de la intimidad
/perito-difusion-material-priv...Difusión material privado
/suplantacion-identidad-intern...Suplantación identidad
/uso-indebido-equipos-internet...Uso indebido
/vulneracion-informacion-confi...Confidencialidad
/pornografia-infantil-contrata...Pornografía infantil
/valoracion-riesgos-danos-segu...Valoración riesgos
/despido-causas-tecnologicas-p...Despido causas tecnológicas
/analisis-forense-cibersegurid...ANÁLISIS FORENSE
/perito-analisis-actividad-dis...Análisis actividad dispositivos
/perito-recuperacion-archivos-...Recuperación de archivos
/perito-incumplimiento-contrat...Incumplimiento de contrato
/analisis-fotografias-pericial...Análisis fotografías
/perito-proceso-mercantil-civi...PERITAJE PROCESOS MERCANTILES/CIVILES
/perito-publicidad-enganosa-me...Publicidad engañosa
/perito-competencia-desleal-co...Competencia desleal
/contra-peritaje-impugnar-info...CONTRA PERITAJE INFORMÁTICO
/analisis-peritajes-fuerzas-se...Fuerzas de seguridad del estado
/contratos-software-compra-ven...Contratos compra-venta
/perito-auditoria-documentos-c...Auditoría de documentos informáticos
/perito-auditoria-seguridad-si...Auditoría de Seguridad
/perito-auditoria-proyectos-de...Auditoría de proyectos
/asesoria-legal-perito-judicia...Asesoría de procesos judiciales
/perito-auditoria-sistemas-red...Auditoría de sistemas informáticos
/tasacion-hardware-perito-valo...Hardware
/perito-tasacion-licencia-soft...Tasación licencias software
/perito-tasacion-aplicaciones-...Apps
/perito-tasacion-sistemas-tecn...Informática
/tasacion-software-perito-tasa...Valor del software
/perito-tasacion-software-gest...ERP
/perito-tasacion-paginas-proye...Proyectos web
/referencias-experiencias-opin...Referencias
/ejemplos-informe-pericial-cas...Casos Reales
/blog/Blog
/contacto/Contacta
/peritaje-judicial-informes-li...MÁS INFORMACIÓN
/politica-de-privacidad/política de privacidad
/informatica-forense/Text duplicate MÁS INFORMACIÓN
/peritaje-informaticoSubdomain No Text
/contacta-perito-carlos-aldama/Contactar
/peritaje-judicial-informes-li...
/peritaje-judicial-informes-li...ÁMBITO DE ACTUACIÓN
/peritaje-judicial-informes-li...d
/peritaje-judicial-informes-li...metodología
/peritaje-judicial-informes-li...
/peritaje-judicial-informes-li...VENTAJAS
/referencias-experiencias-opin...Consulta más referencias
/denunciar-delito-perito-foren...IMG-ALT ¿Por qué es clave el papel del perito forense al denunciar un delito informático?
/denunciar-delito-perito-foren...Text duplicate ¿Por qué es clave el papel del perito forense al denunciar un delito informático?
/author/perito-informatico/peritoinformatico
A-TITLE Mensajes de peritoinformatico
/category/delitos-informaticos/Delitos informáticos
/category/peritaje-informatico/Text duplicate Peritaje Informático
/delitos-informaticos-comunes-...IMG-ALT 5 delitos informáticos más comunes de lo que crees
/delitos-informaticos-comunes-...Text duplicate 5 delitos informáticos más comunes de lo que crees
/author/perito-informatico/Text duplicate peritoinformatico
A-TITLE Mensajes de peritoinformatico
/category/delitos-informaticos/Text duplicate Delitos informáticos
/que-hace-perito-principales-f...IMG-ALT ¿Qué hace realmente un perito informático?
/que-hace-perito-principales-f...Text duplicate ¿Qué hace realmente un perito informático?
/author/perito-informatico/Text duplicate peritoinformatico
A-TITLE Mensajes de peritoinformatico
/category/peritaje-informatico/Text duplicate Peritaje Informático
/page/2/?et_blog« Entradas más antiguas
/blog/Visita nuestro blog
/politica-de-privacidad/Text duplicate política de privacidad
/contacta-perito-carlos-aldama/Text duplicate Contactar
https://www.linkedin.com/in/ca...New window External Subdomain Seguir
A-TITLE Seguir en LinkedIn
https://twitter.com/carlosaldamaNew window External Text duplicate Seguir
A-TITLE Seguir en Twitter
https://www.facebook.com/perit...New window External Subdomain Text duplicate Seguir
A-TITLE Seguir en Facebook
https://www.youtube.com/channe...New window External Subdomain Text duplicate Seguir
A-TITLE Seguir en Youtube
/denunciar-delito-perito-foren...Text duplicate ¿Por qué es clave el papel del perito forense al denunciar un delito informático?
/delitos-informaticos-comunes-...Text duplicate 5 delitos informáticos más comunes de lo que crees
/que-hace-perito-principales-f...Text duplicate ¿Qué hace realmente un perito informático?
/page/2/?et_blogText duplicate « Entradas más antiguas
/curriculum/Text duplicate Carlos Aldama
/peritaje-informaticoSubdomain Peritajes Informáticos
/informatica-forenseSubdomain Informática Forense
https://impactoseo.com/External No Text
/politica-de-privacidad/Política de Privacidad
/politica-de-cookies/Política de cookies
/aviso-legal/Aviso legal
/politica-de-cookies/Nofollow Política de Cookies
/politica-de-cookies/New window política de cookies

Server configuration

HTTP redirects
(Critically important)
This page redirects to "https://informatica-legal.es/"
HTTP header
(Important)
No X-Powered HTTP header is sent.
This page uses GZip for compressed data transmission.
Performance
(Somewhat important)
The page response time of 0.68 seconds is longer than the recommended limit of 0.4 seconds. A high response time unnecessarily slows down search engine crawling and results in bad user experience as well.
A Content Delivery Network like Google Hosted Libraries can save bandwidth for the JQuery files.
The file size of the HTML document is fine (146 kB).

HTTP Response Header

NameValue
dateWed, 05 Feb 2025 23:06:00 GMT
content-typetext/html; charset=UTF-8
content-length28372
last-modifiedWed, 05 Feb 2025 07:43:23 GMT
cache-controlmax-age=2592000
expiresFri, 07 Mar 2025 23:06:00 GMT
varyAccept-Encoding
content-encodinggzip
age0
serverHTTPd
accept-rangesbytes
statuscode200
http_versionHTTP/2

External factors

This page is referenced by wikipedia.
This website has excellent links from other websites.
This page has backlinks from 92 referring domains.
This page has 1,385 backlinks.
This page has backlinks from 70 different ip addresses.

Robots.txt

# Archivo robots.txt para informatica-legal.es.


User-agent: *
Disallow: /wp-admin/
Disallow: /wp-includes/
Disallow: /*/feed/
Disallow: /*/trackback/
Disallow: /*/attachment/
Disallow: /author/
Disallow: /*/page/
Disallow: /tag/
Disallow: /page/
Disallow: /comments/
Disallow: /xmlrpc.php
Disallow: /*?s=
Disallow: /*/*/*/feed.xml
Disallow: /?attachment_id*
Disallow: /cgi-bin/         
Disallow: /trackback/            
Disallow: /feed/   
Disallow: /category/*/*   
Disallow: */comments/
Disallow: /*/*/*/feed.xml  
Disallow: /wp-login

# Enlace al Sitemap
Sitemap: https://informatica-legal.es/sitemap_index.xml

# Robots SEO
User-agent: AhrefsBot
Disallow: /

User-agent: sistrix
Disallow: /

User-agent: MJ12bot
Disallow: /

User-agent: SemrushBot
Disallow: /

# Bloqueo de robots de SPAM

User-agent: Aqua_Products
Disallow: /

User-agent: asterias
Disallow: /

User-agent: b2w/0.1
Disallow: /

User-agent: BackDoorBot/1.0
Disallow: /

User-agent: Black Hole
Disallow: /

User-agent: BlowFish/1.0
Disallow: /

User-agent: Bookmark search tool
Disallow: /

User-agent: BotALot
Disallow: /

User-agent: BuiltBotTough
Disallow: /

User-agent: Bullseye/1.0
Disallow: /

User-agent: BunnySlippers
Disallow: /

User-agent: Cegbfeieh
Disallow: /

User-agent: CheeseBot
Disallow: /

User-agent: CherryPicker
Disallow: /

User-agent: CherryPicker /1.0
Disallow: /

User-agent: CherryPickerElite/1.0
Disallow: /

User-agent: CherryPickerSE/1.0
Disallow: /

User-agent: CopyRightCheck
Disallow: /

User-agent: cosmos
Disallow: /

User-agent: Crescent
Disallow: /

User-agent: Crescent Internet ToolPak HTTP OLE Control v.1.0
Disallow: /

User-agent: DittoSpyder
Disallow: /

User-agent: EmailCollector
Disallow: /

User-agent: EmailSiphon
Disallow: /

User-agent: EmailWolf
Disallow: /

User-agent: EroCrawler
Disallow: /

User-agent: ExtractorPro
Disallow: /

User-agent: FairAd Client
Disallow: /

User-agent: Flaming AttackBot
Disallow: /

User-agent: Foobot
Disallow: /

User-agent: Gaisbot
Disallow: /

User-agent: GetRight/4.2
Disallow: /

User-agent: grub
Disallow: /

User-agent: grub-client
Disallow: /

User-agent: Harvest/1.5
Disallow: /

User-agent: hloader
Disallow: /

User-agent: httplib
Disallow: /

User-agent: humanlinks
Disallow: /

User-agent: ia_archiver
Disallow: /

User-agent: ia_archiver/1.6
Disallow: /

User-agent: InfoNaviRobot
Disallow: /

User-agent: Iron33/1.0.2
Disallow: /

User-agent: JennyBot
Disallow: /

User-agent: Kenjin Spider
Disallow: /

User-agent: Keyword Density/0.9
Disallow: /

User-agent: larbin
Disallow: /

User-agent: LexiBot
Disallow: /

User-agent: libWeb/clsHTTP
Disallow: /

User-agent: LinkextractorPro
Disallow: /

User-agent: LinkScan/8.1a Unix
Disallow: /

User-agent: LinkWalker
Disallow: /

User-agent: LNSpiderguy
Disallow: /

User-agent: lwp-trivial
Disallow: /

User-agent: lwp-trivial/1.34
Disallow: /

User-agent: Mata Hari
Disallow: /

User-agent: Microsoft URL Control
Disallow: /

User-agent: Microsoft URL Control - 5.01.4511
Disallow: /

User-agent: Microsoft URL Control - 6.00.8169
Disallow: /

User-agent: MIIxpc
Disallow: /

User-agent: MIIxpc/4.2
Disallow: /

User-agent: Mister PiX
Disallow: /

User-agent: moget
Disallow: /

User-agent: moget/2.1
Disallow: /

User-agent: mozilla/4
Disallow: /

User-agent: Mozilla/4.0 (compatible; BullsEye; Windows 95)
Disallow: /

User-agent: Mozilla/4.0 (compatible; MSIE 4.0; Windows 2000)
Disallow: /

User-agent: Mozilla/4.0 (compatible; MSIE 4.0; Windows 95)
Disallow: /

User-agent: Mozilla/4.0 (compatible; MSIE 4.0; Windows 98)
Disallow: /

User-agent: Mozilla/4.0 (compatible; MSIE 4.0; Windows ME)
Disallow: /

User-agent: Mozilla/4.0 (compatible; MSIE 4.0; Windows NT)
Disallow: /

User-agent: Mozilla/4.0 (compatible; MSIE 4.0; Windows XP)
Disallow: /

User-agent: mozilla/5
Disallow: /

User-agent: MSIECrawler
Disallow: /

User-agent: NetAnts
Disallow: /

User-agent: NetMechanic
Disallow: /

User-agent: NICErsPRO
Disallow: /

User-agent: Offline Explorer
Disallow: /

User-agent: Openbot
Disallow: /

User-agent: Openfind 
Disallow: /

User-agent: Openfind data gathere
Disallow: /

User-agent: Oracle Ultra Search
Disallow: /

User-agent: PerMan
Disallow: /

User-agent: ProPowerBot/2.14
Disallow: /

User-agent: ProWebWalker
Disallow: /

User-agent: psbot
Disallow: /

User-agent: Python-urllib
Disallow: /

User-agent: QueryN Metasearch
Disallow: /

User-agent: Radiation Retriever 1.1
Disallow: /

User-agent: RepoMonkey
Disallow: /

User-agent: RepoMonkey Bait & Tackle/v1.01
Disallow: /

User-agent: RMA
Disallow: /

User-agent: searchpreview
Disallow: /

User-agent: SiteSnagger
Disallow: /

User-agent: SpankBot
Disallow: /

User-agent: spanner
Disallow: /

User-agent: suzuran
Disallow: /

User-agent: Szukacz/1.4 
Disallow: /

User-agent: Teleport
Disallow: /

User-agent: TeleportPro
Disallow: /

User-agent: Telesoft
Disallow: /

User-agent: The Intraformant
Disallow: /

User-agent: TheNomad
Disallow: /

User-agent: TightTwatBot
Disallow: /

User-agent: Titan
Disallow: /

User-agent: toCrawl/UrlDispatcher
Disallow: /

User-agent: True_Robot
Disallow: /

User-agent: True_Robot/1.0
Disallow: /

User-agent: turingos
Disallow: /

User-agent: URL Control
Disallow: /

User-agent: URL_Spider_Pro
Disallow: /

User-agent: URLy Warning
Disallow: /

User-agent: VCI
Disallow: /

User-agent: VCI WebViewer VCI WebViewer Win32
Disallow: /

User-agent: Web Image Collector
Disallow: /

User-agent: WebAuto
Disallow: /

User-agent: WebBandit
Disallow: /

User-agent: WebBandit/3.50
Disallow: /

User-agent: WebCopier
Disallow: /

User-agent: WebEnhancer
Disallow: /

User-agent: WebmasterWorldForumBot
Disallow: /

User-agent: WebSauger
Disallow: /

User-agent: Website Quester
Disallow: /

User-agent: Webster Pro
Disallow: /

User-agent: WebStripper
Disallow: /

User-agent: WebZip
Disallow: /

User-agent: WebZip/4.0
Disallow: /

User-agent: Wget
Disallow: /

User-agent: Wget/1.5.3
Disallow: /

User-agent: Wget/1.6
Disallow: /

User-agent: WWW-Collector-E
Disallow: /

User-agent: Xenu's
Disallow: /

User-agent: Xenu's Link Sleuth 1.1c
Disallow: /

User-agent: Zeus
Disallow: /

User-agent: Zeus 32297 Webster Pro V2.9 Win32
Disallow: /

User-agent: Zeus Link Scout
Disallow: /


User-agent: Zealbot
Disallow: /

User-agent: MSIECrawler
Disallow: /

User-agent: SiteSnagger
Disallow: /

User-agent: WebStripper
Disallow: /

User-agent: WebCopier
Disallow: /

User-agent: Fetch
Disallow: /

User-agent: Offline Explorer
Disallow: /

User-agent: Teleport
Disallow: /

User-agent: TeleportPro
Disallow: /

User-agent: WebZIP
Disallow: /

User-agent: linko
Disallow: /

User-agent: HTTrack
Disallow: /

User-agent: Microsoft.URL.Control
Disallow: /

User-agent: Xenu
Disallow: /

User-agent: larbin
Disallow: /

User-agent: libwww
Disallow: /

User-agent: ZyBORG
Disallow: /

User-agent: Download Ninja
Disallow: /

User-agent: wget
Disallow: /

User-agent: grub-client
Disallow: /

Search preview

Most important keywords

Following keywords were found. You can check the keyword optimization of this page for each keyword.

KeywordResultRecheck
Perito76%Check
Informática Forense68%Check
de perito65%Check
FORENSE63%Check
en Madrid63%Check
Perito Informatico62%Check
Madrid61%Check
Perito Judicial61%Check
Perito Ingeniero61%Check
perito en ciberseguridad60%Check

Test up to 1.000 webpages of informatica-legal.es with our free plan!

Try For Free
No trial. It's just free!

Cookie Policy

We use cookies to make our site work and also for analytics and advertising purposes. You can enable or disable optional cookies as desired. See the following links for more information.

We need these so the site can function properly

So we can better understand how visitors use our website

So we can serve you tailored ads and promotions