Check server response of

Server response
NS records
Whois domain
Response headers
Request headers
Raw HTML code
200 OK - swsec.com
HTTP Status: 200
User-Agent: Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; [email protected])
Server: nginx/1.10.3 (Ubuntu)
Date: Sat, 03 May 2025 11:25:20 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive

HTTP Code 200 OK

200 OK is a standard successful HTTP server response. It means that the client’s request (e.g., from a browser) was successfully processed, and the server is delivering the requested data.

When is Code 200 used?

  • When loading a web page
  • When successfully receiving an API response
  • When processing a form or another HTTP request

What does Code 200 mean for the user?

The user receives content without errors, and the page or application functions properly. If Code 200 is accompanied by data, the browser or program processes and displays it to the user.

GET / HTTP/1.1
Host: swsec.com
Accept: */*
User-Agent: Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; [email protected])
<!DOCTYPE html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
<link rel="dns-prefetch" href="//www.cigital.com"><title>Software Security: Building Security In.</title>
     <link rel="stylesheet" href="/swsec.css" media="screen" />
</head>

<body>

<div id="header"><a href="/"><img src="/images/banner.gif" width="600" height="174" alt="Software Security" style="margin: 0; padding: 0; border: 0;" /></a></div>
<div id="container">
<div id="nav">
     <ul>
         <li><a href="/about/">About the Author</a></li>
          <li><a href="/press/">Press</a></li>
         <li><a href="/book/">Contents</a></li>
         <li><a href="/order/">Order Now</a></li>
         <li><a href="/resources/">Resources</a></li>
         <li><a href="/errata/">Errata</a></li>
          <li><a href="/contact/">Contact</a></li>
     </ul>
</div>

<div class="main">
   <div class="roundtop">
	 <img src="/images/tl.gif" alt="" 
	 width="15" height="15" class="corner" 
	 style="display: none" />
   </div><div class="ads">
	<p><a href="http://www.amazon.com/gp/product/0321418700/sr=1-1/qid=1138827454/ref=sr_1_1/104-2577668-4903944?%5Fencoding=UTF8"><img src="/images/box-set-sm.gif" width="77" height="80" alt="Software Security series" /></a><br/> Buy the box set now!</p>

	<p><a href="http://www.buildsecurityin.com/"><img src="/images/gem-yy-80.gif" width="77" height="80" alt="Software Security series" /></a><br/> The Software Security series</p>

	<p class="quote">"When it comes to software security, the devil is in the details. This book tackles the details."</p>

	<p class="quote">&#8212;Bruce Schneier<br/> CTO and founder, Counterpane<br/> Author of <em>Beyond Fear and Secrets and Lies</em>
	</p>

</div>

<div class="updates">
	<p style="float: right; text-align: center; font-size: 11px;  padding-left: 15px; font-weight: bold;"><a href="/order/"><img src="/images/cover-med.gif" width="175" height="231" alt="Software Security: Building Security In"  /></a><br/>
		<a href="http://www.amazon.com/exec/obidos/ASIN/0321356705/">Buy the book!</a>
	</p>

	<h1>Building Security In...</h1>

	<p>Beginning where the best-selling book <em>Building Secure Software</em> left off, <em>Software Security</em> teaches you how to put software security into practice. The software security best practices, or touchpoints, described in this book have their basis in good software engineering and involve explicitly pondering security throughout the software development lifecycle. This means knowing and understanding common risks (including implementation bugs and architectural flaws), designing for security, and subjecting all software artifacts to thorough, objective risk analyses and testing.</p>

	<p><em>Software Security</em> is about putting the touchpoints to work for you. Because you can apply these touchpoints to the kinds of software artifacts you already produce as you develop software, you can adopt this book's methods without radically changing the way you work. Inside you'll find detailed explanations of:</p>

	<ul>
		<li>Code review using static analysis tools</li>
		<li>Architectural risk analysis</li>
		<li>Penetration testing</li>
		<li>Security testing</li>
		<li>Abuse case development</li>
	</ul>

	<p>Also visit <a href="http://www.awprofessional.com/softwaresecurityseries">Addison-Wesley's Software Security Series' site</a>.</p>

	<h2>News</h2>

	<p>The <a href="/book/annotated-biblio-from-SS.pdf">annotated bibliography</a> is now available as a PDF.</p>

	<p><em>Software Security</em> is available - <a href="/order/">buy it now</a>!</p>
</div>


     <p class="copyright">Copyright &copy; 2006, Gary McGraw</p>

     <div class="roundbottom">
     	 <img src="/images/bl.gif" alt="" 
     	 width="15" height="15" class="corner" 
     	 style="display: none" />
     </div></div> <!-- end main -->
</body>
</html>
                               

Whois info of domain

Domain Name: SWSEC.COM
Registry Domain ID: 128720944_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.gkg.net
Registrar URL: http://www.gkg.net
Updated Date: 2020-07-08T21:13:37Z
Creation Date: 2004-08-30T17:08:06Z
Registry Expiry Date: 2029-08-30T17:08:06Z
Registrar: GKG.Net, Inc.
Registrar IANA ID: 93
Registrar Abuse Contact Email: [email protected]
Registrar Abuse Contact Phone: +1.8776951790
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Name Server: NS1.DIGITALOCEAN.COM
Name Server: NS2.DIGITALOCEAN.COM
Name Server: NS3.DIGITALOCEAN.COM
DNSSEC: unsigned
URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
>>> Last update of whois database: 2025-05-03T11:25:01Z <<<
For more information on Whois status codes, please visit https://icann.org/epp
NOTICE: The expiration date displayed in this record is the date the
TERMS OF USE: You are not authorized to access or query our Whois
by the following terms of use: You agree that you may use this Data only
to: (1) allow, enable, or otherwise support the transmission of mass