How to set up smartphones and PCs. Informational portal
  • home
  • Windows 10
  • Attention, error detected. Text formatting errors and how to fix it

Attention, error detected. Text formatting errors and how to fix it

“Chief editor of GetGoodRank blog, web analyst, blogger.
Incorrectly formatted text affects the user's desire to read and the perception of information. GetGoodRank Highlighted the main mistakes in the design of texts on the sites being checked "

On 3 sites out of 5 checked, we find errors in the design of texts. We have repeatedly talked about the fact that poorly formatted text worsens the user's perception in the blog (a selection of publications at the end of the mailing list).

We have collected the most common text formatting errors that we found during the checks.

In this issue:

  • What happens on the site page
  • Text formatting errors
  • How to fix it

What happens on the site page

Text is the main information tool on the site. A regular site page combines:

  • graphic elements- logo, pictures, color design of sections of the site (highlighting or background in menu items), video materials
  • text and graphic elements- text, decorated with a picture
  • clear text- this is actually an article, description, instructions

Users' attention is distributed in the same order. First of all, we will see pictures and graphics, then text in the form of pictures, then clear text.

An image is processed by the brain thousands of times faster than text. 90% of information and 93% of communication with the outside world occurs through visual perception.

Text cannot compete with images. Consciousness will perceive and process the picture faster. Moreover, reading is an acquired skill, not an innate skill. We do not put any effort into image processing, while text processing requires a certain amount of stress on the brain.

Improper formatting increases physical and cognitive stress, and reduces the likelihood that the text will be read. Moreover, the design of the text affects the user's trust.

The worse the text is designed, the higher the doubts about the competence and reliability of the company.

Errors in the design of texts on sites (according to GetGoodRank estimates)

Small font

  • documents, in which they are trying to hide something (everyone remembers the postscripts in small print in contracts)
  • seo-texts which in practice are absolutely useless for the reader



You can check the quality of text formatting and get recommendations on what factors worsen the perception of information on the site in

Hacking with Google

Alexander Antipov

The Google search engine (www.google.com) provides many search options. All these capabilities are an invaluable search tool for a first-time Internet user and, at the same time, an even more powerful weapon of invasion and destruction in the hands of people with evil intentions, including not only hackers, but also non-computer criminals and even terrorists.
(9475 views in 1 week)


Denis Batrankov
denisNOSPAMixi.ru

Attention:This article is not a guide to action. This article was written for you, administrators of WEB servers, so that you lose the false feeling that you are safe, and you finally understand the insidiousness of this method of obtaining information and set about protecting your site.

Introduction

For example, I found 1670 pages in 0.14 seconds!

2. Let's introduce another line, for example:

inurl: "auth_user_file.txt"

a little less, but this is already enough for free download and for brute-force attacks (using the same John The Ripper). Below I will give some more examples.

So, you need to realize that the Google search engine has visited most of the sites on the Internet and stored in the cache the information they contain. This cached information allows you to get information about the site and the content of the site without a direct connection to the site, just digging into the information that is stored inside Google. Moreover, if the information on the site is no longer available, then the information in the cache may still be preserved. All it takes for this method is to know some Google keywords. This technique is called Google Hacking.

For the first time, information about Google Hacking appeared on the Bugtruck mailing list 3 years ago. In 2001, this topic was brought up by a French student. Here is a link to this letter http://www.cotse.com/mailing-lists/bugtraq/2001/Nov/0129.html. It provides the first examples of such requests:

1) Index of / admin
2) Index of / password
3) Index of / mail
4) Index of / + banques + filetype: xls (for france ...)
5) Index of / + passwd
6) Index of / password.txt

This topic made a splash in the English-reading part of the Internet quite recently: after Johnny Long's article published on May 7, 2004. For a more complete study of Google Hacking, I recommend visiting this author's site at http://johnny.ihackstuff.com. In this article, I just want to bring you up to date.

Who can use it:
- Journalists, spies and all those people who like to poke their nose into other matters can use this to search for compromising evidence.
- Hackers looking for suitable targets for hacking.

How Google works.

To continue the conversation, let me remind you of some of the keywords used in Google queries.

Search using the + sign

Google excludes from the search, in its opinion, words that are unimportant. For example, question words, prepositions and articles in English: for example are, of, where. In Russian, Google seems to consider all words important. If the word is excluded from the search, then Google writes about it. In order for Google to start looking for pages with these words in front of them, you need to add a + sign without a space in front of the word. For instance:

ace + of base

Search using the sign -

If Google finds a large number of pages from which it is necessary to exclude pages with a specific topic, then you can force Google to search only for pages that do not have specific words. To do this, you need to indicate these words, putting in front of each sign - without a space in front of the word. For instance:

fishing vodka

Search using ~

You may want to find not only the specified word, but also its synonyms. To do this, precede the word with the ~ symbol.

Finding the exact phrase using double quotes

Google searches on each page for all occurrences of the words that you wrote in the query string, and it does not care about the relative position of words, the main thing is that all the specified words are on the page at the same time (this is the default action). To find the exact phrase, you need to enclose it in quotes. For instance:

"bookend"

To have at least one of the specified words, you need to specify the logical operation explicitly: OR. For instance:

book safety OR protection

In addition, in the search bar, you can use the * sign to denote any word and. to denote any character.

Finding words using additional operators

There are search operators that are specified in the search string in the format:

operator: search_term

Spaces next to the colon are not needed. If you insert a space after the colon, you will see an error message, and before it, then Google will use them as a normal search string.
There are groups of additional search operators: languages ​​- indicate in what language you want to see the result, date - limit results for the past three, six or 12 months, occurrences - indicate where in the document you need to search for a string: everywhere, in the title, in the URL, domains - search the specified site or, on the contrary, exclude it from the search, safe search - block sites containing the specified type of information and remove them from the search results pages.
At the same time, some operators do not need an additional parameter, for example, the request " cache: www.google.com"can be called as a full-fledged search string, and some keywords, on the contrary, require a search word, for example" site: www.google.com help". In light of our topic, let's look at the following operators:

Operator

Description

Requires an additional parameter?

search only on the site specified in search_term

search only in documents with the search_term type

find pages containing search_term in title

find pages containing all the words search_term in the title

find pages containing the word search_term in their url

find pages containing all the words search_term in their url

Operator site: restricts the search only to the specified site, and you can specify not only the domain name, but also the IP address. For example, enter:

Operator filetype: restricts searches to files of a specific type. For instance:

As of the article's release date, Google can search within 13 different file formats:

  • Adobe Portable Document Format (pdf)
  • Adobe PostScript (ps)
  • Lotus 1-2-3 (wk1, wk2, wk3, wk4, wk5, wki, wks, wku)
  • Lotus WordPro (lwp)
  • MacWrite (mw)
  • Microsoft Excel (xls)
  • Microsoft PowerPoint (ppt)
  • Microsoft Word (doc)
  • Microsoft Works (wks, wps, wdb)
  • Microsoft Write (wri)
  • Rich Text Format (rtf)
  • Shockwave Flash (swf)
  • Text (ans, txt)

Operator link: shows all pages that point to the specified page.
It's probably always interesting to see how many places on the Internet know about you. Trying:

Operator cache: shows the version of the site in Google's cache as it looked when Google last visited this page. We take any site that changes frequently and look at:

Operator intitle: searches for the specified word in the page title. Operator allintitle: is an extension - it looks for all specified multiple words in the page title. Compare:

intitle: flight to mars
intitle: flight intitle: to intitle: mars
allintitle: flight to mars

Operator inurl: forces Google to display all pages containing the specified string in the URL. Operator allinurl: Searches for all words in a URL. For instance:

allinurl: acid acid_stat_alerts.php

This command is especially useful for those who do not have SNORT - at least they can see how it works on a real system.

Hacking Methods Using Google

So, we found out that using a combination of the above operators and keywords, anyone can start collecting the necessary information and looking for vulnerabilities. These techniques are often referred to as Google Hacking.

site `s map

You can use the site: operator to see all the links Google finds on the site. Usually, pages that are dynamically created by scripts are not indexed using parameters, so some sites use ISAPI filters so that links are not in the form /article.asp?num=10&dst=5, and with slashes / article / abc / num / 10 / dst / 5... This is done so that the site is generally indexed by search engines.

Let's try:

site: www.whitehouse.gov whitehouse

Google thinks every page on the site contains the word whitehouse. This is what we use to get all the pages.
There is also a simplified version:

site: whitehouse.gov

And the best part is that the comrades from whitehouse.gov did not even know that we looked at the structure of their site and even looked at the cached pages that Google downloaded for itself. This can be used to study the structure of sites and view content without being noticed for the time being.

Viewing a list of files in directories

WEB servers can display lists of server directories instead of regular HTML pages. This is usually done to get users to select and download specific files. However, in many cases, administrators do not have the goal of showing the contents of a directory. This occurs due to incorrect configuration of the server or the absence of the main page in the directory. As a result, the hacker has a chance to find something interesting in the directory and use it for his own purposes. To find all such pages, just notice that they all contain the words: index of in their title. But since the words index of contain not only such pages, we need to clarify the query and take into account the keywords on the page itself, so queries of the form are suitable for us:

intitle: index.of parent directory
intitle: index.of name size

Since most of the directory listings are intentional, you may find it difficult to find erroneous listings the first time around. But at least you can already use the listings to determine the version of the WEB server, as described below.

Getting the version of the WEB server.

Knowing the version of the WEB server is always useful before starting any hacker attack. Again thanks to Google it is possible to get this information without connecting to the server. If you look closely at the listing of the directory, you can see that the name of the WEB server and its version are displayed there.

Apache1.3.29 - ProXad Server at trf296.free.fr Port 80

An experienced administrator can change this information, but, as a rule, it is true. Thus, to get this information, it is enough to send a request:

intitle: index.of server.at

To get information for a specific server, we clarify the request:

intitle: index.of server.at site: ibm.com

Or vice versa, we are looking for servers running on a specific server version:

intitle: index.of Apache / 2.0.40 Server at

This technique can be used by a hacker to find a victim. If, for example, he has an exploit for a certain version of the WEB server, then he can find it and try the existing exploit.

You can also get the server version by looking at the pages that are installed by default when installing a fresh version of the WEB server. For example, to see the Apache 1.2.6 test page, just type

intitle: Test.Page.for.Apache it.worked!

Moreover, some operating systems immediately install and run the WEB server during installation. At the same time, some users are not even aware of this. Naturally, if you see that someone has not deleted the default page, then it is logical to assume that the computer has not undergone any configuration at all and is probably vulnerable to attacks.

Try to find IIS 5.0 pages

allintitle: Welcome to Windows 2000 Internet Services

In the case of IIS, you can determine not only the server version, but also the Windows version and Service Pack.

Another way to determine the version of the WEB server is to search for manuals (help pages) and examples that can be installed on the site by default. Hackers have found many ways to use these components to gain privileged access to a site. That is why you need to remove these components on the production site. Not to mention the fact that by the presence of these components you can get information about the type of server and its version. For example, let's find the apache manual:

inurl: manual apache directives modules

Using Google as a CGI scanner.

CGI scanner or WEB scanner is a utility for searching for vulnerable scripts and programs on the victim's server. These utilities should know what to look for, for this they have a whole list of vulnerable files, for example:

/cgi-bin/cgiemail/uargg.txt
/random_banner/index.cgi
/random_banner/index.cgi
/cgi-bin/mailview.cgi
/cgi-bin/maillist.cgi
/cgi-bin/userreg.cgi

/iissamples/ISSamples/SQLQHit.asp
/SiteServer/admin/findvserver.asp
/scripts/cphost.dll
/cgi-bin/finger.cgi

We can find each of these files using Google, using the words index of or inurl in addition to the file name in the search bar: we can find sites with vulnerable scripts, for example:

allinurl: /random_banner/index.cgi

Using additional knowledge, a hacker can exploit a script vulnerability and use this vulnerability to force the script to return any file stored on the server. For example a password file.

How to protect yourself from Google hacking.

1. Do not post important data to the WEB server.

Even if you posted the data temporarily, then you can forget about it or someone will have time to find and take this data before you erase it. Don't do that. There are many other ways to transfer data to protect it from theft.

2. Check your site.

Use the methods described to research your site. Check your site periodically with new methods that appear on the site http://johnny.ihackstuff.com. Remember that if you want to automate your actions, you need to get special permission from Google. If you read carefully http://www.google.com/terms_of_service.html then you will see the phrase: You may not send automated queries of any sort to Google "s system without express permission in advance from Google.

3. You may not need Google to index your site or part of it.

Google allows you to remove a link to your site or part of it from its database, as well as remove pages from the cache. In addition, you can prohibit the search for images on your site, prohibit showing short fragments of pages in search results. All options for deleting a site are described on the page http://www.google.com/remove.html... To do this, you must confirm that you are actually the owner of this site or insert tags into the page or

4. Use robots.txt

It is known that search engines look into the robots.txt file located at the root of the site and do not index those parts that are marked with the word Disallow... You can take advantage of this to prevent part of the site from being indexed. For example, to avoid indexing the entire site, create a robots.txt file containing two lines:

User-agent: *
Disallow: /

What else happens

So that life does not seem like honey to you, I will say in the end that there are sites that monitor those people who, using the above methods, are looking for holes in scripts and WEB servers. An example of such a page is

Appendix.

A little bit sweet. Try something from the following list yourself:

1. #mysql dump filetype: sql - find dumps of mySQL databases
2. Host Vulnerability Summary Report - will show you what vulnerabilities other people have found
3.phpMyAdmin running on inurl: main.php - this will force close control via phpmyadmin panel
4.not for distribution confidential
5. Request Details Control Tree Server Variables
6. Running in Child mode
7. This report was generated by WebLog
8.intitle: index.of cgiirc.config
9.filetype: conf inurl: firewall -intitle: cvs - can anyone need firewall configuration files? :)
10. intitle: index.of finances.xls - hmm ....
11.intitle: Index of dbconvert.exe chats - icq chat logs
12.intext: Tobias Oetiker traffic analysis
13.intitle: Usage Statistics for Generated by Webalizer
14.intitle: statistics of advanced web statistics
15.intitle: index.of ws_ftp.ini - ws ftp config
16.inurl: ipsec.secrets holds shared secrets - the secret key is a good find
17.inurl: main.php Welcome to phpMyAdmin
18.inurl: server-info Apache Server Information
19.site: edu admin grades
20. ORA-00921: unexpected end of SQL command - getting paths
21. intitle: index.of trillian.ini
22. intitle: Index of pwd.db
23. intitle: index.of people.lst
24. intitle: index.of master.passwd
25. inurl: passlist.txt
26. intitle: Index of .mysql_history
27. intitle: index of intext: globals.inc
28. intitle: index.of administrators.pwd
29. intitle: Index.of etc shadow
30. intitle: index.of secring.pgp
31.inurl: config.php dbuname dbpass
32. inurl: perform filetype: ini

  • "Hacking mit Google"
  • Training Center "Informzashita" http://www.itsecurity.ru - a leading specialized center in the field of information security training (License of the Moscow Education Committee No. 015470, State accreditation No. 004251). The only authorized training center for Internet Security Systems and Clearswift in Russia and the CIS. Microsoft Authorized Training Center (Security specialization). The training programs are coordinated with the State Technical Commission of Russia, the FSB (FAPSI). Certificates of training and state documents on professional development.

    SoftKey is a unique service for buyers, developers, dealers and affiliate partners. In addition, this is one of the best online software stores in Russia, Ukraine, Kazakhstan, which offers customers a wide assortment, many payment methods, prompt (often instant) order processing, tracking the order fulfillment process in the personal section, various discounts from the store and manufacturers ON.

    Two years passed unnoticed in Naruto's world. Former newcomers joined the ranks of experienced shinobi in the ranks of tunin and jonin. The main characters did not sit still - each became a student of one of the legendary Sannin - the three great ninja of Konoha. The guy in orange continued his studies with the wise but eccentric Jiraiya, gradually ascending to a new level of martial prowess. Sakura has been promoted to assistants and confidants of the healer Tsunade - the new leader of the Village of Foliage. Well, Sasuke, whose pride led to the expulsion from Konoha, entered into a temporary alliance with the sinister Orochimaru, and each believes that only uses the other for the time being.

    The brief respite was over, and events once again raced with a hurricane. In Konoha, the seeds of old strife, sown by the first Hokage, are re-sprouting. The mysterious leader Akatsuki set in motion a plan to gain world domination. Restlessly in the Sand Village and neighboring countries, old secrets are emerging everywhere, and it is clear that someday you will have to pay the bills. The long-awaited sequel to the manga has breathed new life into the series and new hope in the hearts of countless fans!

    © Hollow, World Art

  • (52182)

    Swordsman Tatsumi, a simple boy from the countryside, travels to the Capital to earn money for his starving village.
    And when he gets there he soon learns that the great and beautiful Capital is just an appearance. The city is mired in corruption, brutality and lawlessness that comes from the prime minister who rules the country from behind the scenes.
    But as everyone knows - "One is not a warrior in the field" and nothing can be done about it, especially when your enemy is the head of state or, more precisely, the one who hides behind him.
    Will Tatsumi find like-minded people and will be able to change something? See and find out for yourself.

  • (52116)

    Fairy Tail is the Guild of Wizards for Hire famous all over the world for its reckless antics. The young sorceress Lucy was sure that, having become one of its members, she got into the most wonderful Guild in the world ... until she met her comrades - the explosive fire-breathing and sweeping away everything in his path Natsu, the flying talking cat Happy, exhibitionist Gray , the bore berserker Elsa, the glamorous and loving Loki ... Together they will have to defeat many enemies and experience many unforgettable adventures!

  • (46768)

    Sora, 18, and Shiro, 11, are half-brothers and sisters, consummate recluses and gambling addicts. When two loneliness met, an indestructible union "Empty Space" was born, terrifying all eastern gamers. Although in public the guys are shaken and twisted not like a child, on the Web, little Shiro is a genius of logic, and Sora is a monster of psychology that cannot be fooled. Alas, worthy opponents soon ended, because Shiro was so delighted with the chess game, where the master's handwriting was visible from the first moves. Having won at the limit of their strength, the heroes received an interesting offer - to move to another world, where their talents will be understood and appreciated!

    Why not? In our world, Sora and Shiro do not hold anything, and the cheerful world of Disboard is ruled by the Ten Commandments, the essence of which boils down to one thing: no violence and cruelty, all disagreements are resolved in fair play. 16 races live in the game world, of which the human is considered the weakest and most untalented. But the miracle guys are already here, in their hands is the crown of Elkia - the only country of people, and we believe that the successes of Sora and Shiro will not be limited to this. The messengers of the Earth just need to unite all the races of Disboard - and then they will be able to challenge the god Thet - their, by the way, an old acquaintance. Only if you think about it, is it worth doing?

    © Hollow, World Art

  • (46470)

    Fairy Tail is the Guild of Wizards for Hire famous all over the world for its reckless antics. The young sorceress Lucy was sure that, having become one of its members, she got into the most wonderful Guild in the world ... until she met her comrades - the explosive fire-breathing and sweeping away everything in his path Natsu, the flying talking cat Happy, exhibitionist Gray , the bore berserker Elsa, the glamorous and loving Loki ... Together they will have to defeat many enemies and experience many unforgettable adventures!

  • (62978)

    University student Kaneki Ken is accidentally taken to the hospital, where he is mistakenly transplanted the organs of one of the ghouls - monsters that feed on human flesh. Now he himself becomes one of them, and for people he turns into an outcast to be destroyed. But can he become his own for other ghouls? Or is there no more room for him in the world now? This anime will tell about the fate of Kaneki and the impact he will have on the future of Tokyo, where there is an ongoing war between the two species.

  • (35433)

    The continent that lies in the center of the Ignol Ocean is a large central one and four more - South, North, East and West, and the gods themselves look after it, and it is called Ente Isla.
    And there is a name that plunges into Horror anyone on Ente Isla - the Lord of Darkness Mao.
    He is the master of the other world where all dark creatures live.
    He is the embodiment of fear and horror.
    The Lord of Darkness Mao declared war on the human race and sowed death and destruction throughout the continent of Ente Isla.
    The Lord of Darkness was served by 4 powerful generals.
    Adramelech, Lucifer, Alsiel and Malacoda.
    Four Demon Generals led an attack on 4 parts of the continent. However, a hero appeared that opposed the army of the underworld. The hero and his comrades defeated the troops of the Lord of Darkness in the west, then Adramelech in the north and Malakoda in the South. The hero led the united army of the human race and went by assault to the central continent where the castle of the Lord of Darkness stood ...

  • (33814)

    Yato is a wandering Japanese god in the form of a thin blue-eyed young man in a tracksuit. In Shinto, the power of a deity is determined by the number of believers, and our hero has neither a temple nor priests, all donations fit in a sake bottle. A guy in a scarf moonlights as a jack of all trades, painting ads on the walls, but things are going very badly. Even the tongue-tied Mayu, who has been working as a shinki as Yato's Sacred Weapon for many years, left the owner. And without a weapon, the junior god is no stronger than an ordinary mortal magician, you have to hide from evil spirits (what a shame!). And who even needs such a celestial?

    One day, a pretty high school student, Hiyori Iki, threw herself under a truck to rescue a guy in black. It ended badly - the girl did not die, but gained the ability to "leave" the body and walk on the "other side". Having met Yato there and having learned the culprit of her troubles, Hiyori convinced the homeless god to heal her, for he himself admitted that no one can live long between the worlds. But, having got to know each other better, Iki realized that the current Yato did not have enough strength to solve her problem. Well, you need to take matters into your own hands and personally direct the tramp on the right path: first, find the unlucky weapon, then help to earn money, and then, you see, what happens. No wonder they say: what a woman wants - God wants!

    © Hollow, World Art

  • (33785)

    Suimei University Art High School has many dormitories and the Sakura tenement house. If there are strict rules in the hostels, then everything is possible in Sakura, it's not for nothing that its local nickname is “insane asylum”. Since in art genius and madness are always somewhere nearby, the inhabitants of the "cherry orchard" are talented and interesting guys who are too far out of the "swamp". Take, for example, the noisy Misaki, who sells her own anime to major studios, her friend and playboy screenwriter Jin, or the reclusive programmer Ryunosuke, who communicates with the world only on the Internet and on the phone. Compared to them, the main character Sorata Kanda is a simpleton who ended up in a psychiatric hospital just for ... love of cats!

    Therefore, Chihiro-sensei, the head of the hostel, instructed Sorata, as the only sane guest, to meet her cousin Mashiro, who is being transferred to their school from distant Britain. The fragile blonde seemed to Kanda to be a real bright angel. True, at a party with new neighbors, the guest behaved stiffly and spoke little, but the freshly baked fan attributed everything to understandable stress and fatigue from the road. Only real stress was waiting for Sorata in the morning when he went to wake Mashiro. The hero realized with horror that his new acquaintance was a great artist absolutely out of this world, that is, she was not even able to dress on her own! And the insidious Chihiro is right there - from now on, Kanda will forever look after her sister, because the guy has already trained on cats!

    © Hollow, World Art

  • (34036)

    in the XXI century the world community finally managed to systematize the art of magic and raise it to a new level. Those able to use magic after finishing nine grades in Japan are now expected in magic schools - but only if applicants pass the exam. The quota for admission to the First School (Hachioji, Tokyo) is 200 students, the top hundred are enrolled in the first department, the rest - in the reserve, for the second, and teachers are assigned only to the first hundred, "Flowers". The rest, the Weeds, learn on their own. At the same time, an atmosphere of discrimination constantly hovers in the school, because even the forms of both departments are different.
    Shiba Tatsuya and Miyuki were born 11 months apart, which allowed them to study one year. Upon entering the First School, his sister finds himself among the Flowers, and his brother among the Weeds: despite his excellent theoretical knowledge, the practical part is not easy for him.
    In general, we are waiting for the study of a mediocre brother and an exemplary sister, as well as their new friends - Erika Chiba, Saijo Leonhart (you can just Leo) and Shibata Mizuki - in the school of magic, quantum physics, the Nine Schools Tournament and much more ...

    © Sa4ko aka Kiyoso

  • (30034)

    The Seven Deadly Sins, once great warriors revered by the British. But one day, they are accused of trying to overthrow the monarchs and killing a warrior from the Holy Knights. Later, the Holy Knights staged a coup d'état and seize power into their own hands. And the "Seven Deadly Sins", now outcasts, scattered throughout the kingdom, in every direction. Princess Elizabeth, was able to escape from the castle. She decides to go in search of Meliodas, the leader of the Seven of Sins. Now all seven must unite again to prove their innocence and avenge their exile.

  • (28781)

    2021 year. An unknown virus "Gastrea" got to the ground, which in a matter of days destroyed almost all of humanity. But this is not just a virus like some kind of Ebola or Plague. He does not kill a person. Gastrea is a sentient infection that rearranges DNA, turning the host into a terrible monster.
    The war broke out and in the end 10 years passed. People have found a way to isolate themselves from infection. The only thing that Gastrea cannot stand is a special metal - Varanium. It was from it that people built huge monoliths and fenced Tokyo with them. It seemed that now the few survivors can live behind the monoliths in the world, but alas, the threat has not gone anywhere. Gastrea is still waiting for the right moment to infiltrate Tokyo and destroy the few remnants of humanity. There is no hope. The extermination of people is only a matter of time. But the terrible virus also had a different effect. There are those who are already born with this virus in their blood. These children, "Cursed Children" (Exclusively Girls) have superhuman strength and regeneration. In their bodies, the spread of the virus is many times slower than in the body of an ordinary person. Only they can resist the products of "Gastreya" and there is nothing more for humanity to count on. Will our heroes be able to save the remnants of living people and find a cure for the terrifying virus? See and find out for yourself.

  • (27841)

    The story in Steins, Gate takes place a year after the events of Chaos, Head.
    The intense plot of the game takes place in part in a realistically recreated area of ​​Akahibara, in the famous otaku shopping spot in Tokyo. The plot is as follows: a group of friends mounts a device in Akihibara to send text messages to the past. A mysterious organization called CERN is interested in the experiments of the heroes of the game, which is also engaged in its own research in the field of time travel. And now friends have to make gigantic efforts in order not to be captured by CERN.

    © Hollow, World Art


    Added episode 23β, which is an alternate ending and lead to the continuation in SG0.
  • (27143)

    Thirty thousand players from Japan and many more from all over the world are suddenly trapped in the massively multiplayer online role-playing game Legend of the Ancients. On the one hand, gamers were physically transported to a new world, the illusion of reality turned out to be almost flawless. On the other hand, the "hitmen" kept the old avatars and acquired skills, user interface and pumping system, and death in the game only led to the resurrection in the cathedral of the nearest large city. Realizing that there was no great goal, and no one named the price for the exit, the players began to stray together - some to live and rule according to the law of the jungle, others to resist the lawlessness.

    Shiroe and Naotsugu, a student and a clerk in the world, a cunning magician and a mighty warrior in the game, have known each other for a long time from the legendary Mad Tea Party guild. Alas, those times are gone forever, but even in the new reality you can meet old acquaintances and just good guys with whom you will not be bored. And most importantly, an indigenous population has appeared in the world of "Legends", who consider the aliens to be great and immortal heroes. One will involuntarily want to become a kind of knight of the Round Table, beating dragons and saving girls. Well, there are enough girls around, monsters and robbers too, and for recreation there are cities like the hospitable Akiba. The main thing is that dying in the game is still not worth it, it is much more correct to live like a human being!

    © Hollow, World Art

  • (27238)

    In the world of Hunter x Hunter, there is a class of people called Hunters who, using psychic powers and trained in all kinds of fighting, explore the wilderness of the mostly civilized world. The main character is a young man named Gong (Gun), the son of the greatest Hunter. His father mysteriously disappeared many years ago, and now, having matured, Gong (Gong) decides to follow in his footsteps. Along the way, he finds several companions: Leorio, an ambitious medical doctor whose goal is enrichment. Kurapika is the only survivor of his clan whose goal is revenge. Killua is the heir to a family of assassins whose goal is training. Together they achieve their goal and become Hunters, but this is only the first step on their long journey ... And ahead is the story of Killua and his family, the story of Kurapiki's revenge and, of course, training, new tasks and adventures! The series was stopped for Kurapiki's revenge ... What awaits us further after so many years?

  • (28057)

    The ghoul race has existed since time immemorial. Its representatives are not at all against people, they even love them - mostly raw. Lovers of human flesh are outwardly indistinguishable from us, strong, fast and tenacious - but there are few of them, because ghouls have developed strict rules for hunting and camouflage, and violators are punished themselves or quietly surrender to fighters against evil spirits. In the age of science, people know about ghouls, but as they say, they are used to it. The authorities do not see cannibals as a threat, moreover, they see them as the ideal basis for creating super soldiers. Experiments have been going on for a long time ...

    The main character, Ken Kaneki, will have a painful search for a new path, because he realized that people and ghouls are alike: they just eat each other literally, others figuratively. The truth of life is cruel, it cannot be altered, and the one who does not turn away is strong. And then somehow!

  • (26754)

    The action takes place in an alternative reality, where the existence of demons has long been recognized; there is even an island in the Pacific Ocean - "Itogamijima", where demons are full-fledged citizens and have equal rights with people. However, there are also human magicians who hunt them, in particular, vampires. An ordinary Japanese schoolboy named Akatsuki Kojo for some unknown reason turned into a "purebred vampire", the fourth in number. He is followed by a young girl named Himeraki Yukina, or "blade shaman," who must keep an eye on Akatsuki and kill him in case he gets out of control.

  • (25502)

    The story tells of a young man named Saitama who lives in a world ironically similar to ours. He is 25, he is bald and beautiful, moreover, he is so strong that with one blow he annihilates all the dangers to humanity. He is looking for himself on a difficult path in life, simultaneously handing out cuffs to monsters and villains.

  • (23225)

    Now you have to play a game. What kind of game it will be - the roulette wheel will decide. The stake in the game will be your life. After death, people who died at the same time go to Queen Decim, where they have to play a game. But in fact, what is happening to them here is the Heavenly Judgment.

  • How the errors appeared

    Strange, the site is just two weeks old and already the first errors. Where? I thought. I go to Google tools today, select structured data, then hentry (markup: microformats) and see as many as 19 errors!

    Don't be alarmed if you have 300 or 500 of them, or maybe even more - it turned out to solve the problem related to structured data not so difficult.

    How to fix author, entry-title, and updated structured data errors

    - copy the files in which we will make changes to the computer (in this case, most likely side in: single.php, search.php, index.php, archive.php). So it was with me;

    - make another copy of these files (we will change them and upload them through Filezilla after making changes).

    In order not to get confused, I will divide my post into conditional parts, in each of which I will tell you how to get rid of three problems at once. Begin?

    Error and solution to the entry-title problem. There is no article title information.

    Now I just started to understand that I needed to learn English better. Here, in fact, everything is trite. The error is corrected by adding the phrase entry-title.

    This is done as follows: we are looking for a piece of code in the file or files being edited (I had a construction in all four that is responsible for displaying header information):or similar to it (not by question marks, but by php the_title).

    Note your code may differ, but chances are good that it is the same or very similar. Once found, we need to add entry-title. Actually, how it was and became visible in the picture:

    Do not be alarmed if the entry-title needs to be written in a slightly distant place from, although this, frankly, confused me (I was afraid that it would not work out), but the poke method) helped. It will be easier further.

    Attention, do not forget to do this in all the files that I wrote about above.

    Solution updated - there is no information about the publication date of the article.

    Here we will need to add to the php the_time or php the_date part of the code (who has it) class = "updated" and enclose the construction in the tag ... Who does not know - look at the picture:

    Get rid of the author structured data problem. Error - author is missing 🙂.

    Of course, it would be wrong not to take care of the author, since everything has already been done. If you were attentive, you could already cope without me and find a part of the php the_author code to do everything as in the picture:

    By the way, I was pleased that you can immediately check whether the problem has been fixed. I will not drive in unnecessary characters, I just recommend looking at the pictures.

    Top related articles