What is a URL address and how to work with it. Url with a slash or without - why correctly this is? What is URI

Disputes on this issue - how to write a URL correctly, with a slash at the end or without? - Was and be. The argument is diverse, and often contradictory. And the rules for the wrong entry of the universal resource locator (URL) imagine two types. From the search engines - these are supposedly penalties for duplicate pages. From the point of view of performance - supposedly an extra redirect to the right recording page that is automatically generated by the server.

However, when analyzing the technical specifications of the Internet standards, in particular, the document "RFC 1738 - Uniform Resource Locators (URL)", you have to admit that both options for recording the address of the web resource are formally correct, and the sanction for using one or another option is nothing more than Bzik search engine or bike pseudo-SEO-Shnikov.

From the position of laconicity, the option is more correct, an option without a slash at the end, regardless of whether your link "file" is addressed on the server or "folder", indirect proof that will be shown below. But there is not a single statement in the document that the other option is incorrect or referred to another to another resource.

I will not load you by the multi-page translation of the RFC mentioned, since, first of all, the purpose of the question was in the end of the URL, and secondly, the publication is addressed to simple users of the engines, including all the details are not interesting, they are waiting for brief explanations and evidence essentially. Accordingly, I will quote excerpts from this document as an evidence base and explain. To whom it is not interesting, can immediately look at the end of the article.

URL shared syntax

First of all, I will attract attention to exposure from paragraph 2. General URL SYNTAX (URL shared syntax). In each case, I will give a fragment of the text in the original language and the translation into Russian.

URLS Are Used to `Locate" Resources, by providing An Abstract Identification of the Resource Location. URLs are used to "find" resources by providing an abstract designation of the resource location.

That is, the URL itself is a pure abstraction. That it may seem out of us outwardly similar to the file name or folder, does not at all mean a physical indication to just such a file, and not any other in the server file space. Below in the document will be announced directly.

The note In general, in relation to HTTP links, in principle, it is wrong to say that for example

  • http://domain.com/path/subpath/filename.txt - Allegedly indicates the file
  • http://domain.com/path/subpath/ - Allegedly indicates the folder
  • http://domain.com/path - supposedly incorrectly indicates folder

We just got used to so to say, because it is convenient to associate links with files on the site. In fact, all these links indicate some resources, in no way indicate the type of resource. What is hidden behind every resource, that is, what kind of real file or folder and which type of content will be given on this link, then the server configuration is already determined.

It is important to understand that in the references there is no such thing as a "file", "folder", "subfolder", "text", "picture", "HTML", "script", "style table" and so on. No slaum at the end or its absence does not mean anything level, nothing until the link will pass the transformation inside the server, and he will already decide, where does the link actually indicate and what content is what type is hidden behind it. Only this solution refers to the internal server architecture.

Hierarchical schemes

Next, exposure from paragraph 2.3 Hierachical Schemes and Relative Links (hierarchical schemes and relative links).

Some URL Schemes (Such As The FTP, HTTP, And File Schemes) Contain Names That Can Be Considered Hierarchical; The Components of the Hierarchy Are separated by "/". Some URL schemes (such as FTP, HTTP and File) contain names that can be considered hierarchical; Elements of hierarchies are separated by the symbol "/".

That is, it is argued that in certain address schemes, the contents of the resource locator are not allowed to mean hierarchical, and have not yet stipulated that the hierarchy is equivalent to any form, say the file.

Network scheme syntax

Next, exposure from paragraph 3.1. COMMON Internet Scheme Syntax (network circuit shared syntax).

//:@:/ Some OR All of the Parts " :@", ":", ":", and" / "May Be Excluded. Some or all parts" :@", ":", ":"and" / "You can exclude.

The note This, by the way, the answer to the question derived from the considered by us. Often, on this issue argue: how to give a reference to the domain (host) - without a slash at the end or with a slash?

As correct http://domain.com/ or http://domain.com?

And so right. Just the first slant after the host name is intended for separating the name of the path on behalf of the host. The same paragraph of the document reports this as:

URL-PATH THE REST OF THE LOCATOR CONSISTIS OF DATA SPECIFIC TO THE SCHEME, AND IS KNOWN AS THE "URL-PATH". IT Supplies The Details of How The Specified Resource Can Be Accessed. Note That The "/" Between The Host (Or Port) and the Url-Path Is Not Part of the Url-Path. The rest of the locator consists of data characteristic of the schema, and is known as the "URL-PATH" (URL path). She informs details how to access the specified resource. Please note that the "/" symbol between the host (or port) and the URL passage is not part of the URL-PATH.

Neither the word was obliged to put you this closing symbol or not to put when the URL-path is equal to an empty string (as many of us would say when the URL refers to the site root). No one has the right to apply penalties "for two doubles of the main page", because according to the specification, in both cases you refer to the URL to the same resource.

Continue Another excerpt from the same paragraph.

The URL-Path Syntax Depends on the Scheme Being Used, AS Does The Manner in Which it is interpreted. The URL-PATH syntax depends on the scheme used, as well as the way it is interpreted.

This is an excess confirmation that each locator scheme has its own concept of "hierarchy" and the method of its interpretation.

Hierarchy

For Some File Systems, The "/" Used to Denote The Hierarchical Structure of the URL CORRECT A FILENAME WILL LOOK SIMILAR TO THE URL PATH. This Does Not Mean That The Url Is A Unix Filename. The "/" symbol is used to designate the hierarchical structure of the URL, respectively, the separator used in the design of the file name hierarchy, and thus in some file systems the file name looks like a URL path. But this does not mean that the URL is a UNIX-like file name.

Despite the fact that this paragraph refers to the FTP scheme, nevertheless, its approval is distributed and other schemes (HTTP, Gopher, Prospero and so on). Only in the FILE scheme, the slash symbol logically denotes the same as in file names, for example file: //Server_or_Device/Path/Subpath/FileName.txt.

Http.

An HTTP URL Takes The Form: http: // :/? Where. And. Are AS Described in Section 3.1. If: Is Omitted, The Port Defaults to 80. No User Name or Password is Allowed. IS AN HTTP SELECTOR, AND IS A QUERY STRING. Their IS Optional, As Is The and its preceding "?". If neiTher. NOR. IS PRESENT, THE "/" MAY ALSO BE OMITTED. Within the And. COMPONENTS, "/", ";", "?" Are reserved. The "/" Character May Be USED WITHIN HTTP TO Designate a Hierarchical Structure. The URL of the HTTP circuit takes shape: http: // :/? Where and The same as described in paragraph 3.1. If a: Omitted, the default port is considered to be 80. The username or password is invalid. This is an HTTP selector, and - query string. Is optional like Together with the symbol prior to it "?" If n. N. Not present, the symbol "/" can also be omitted. In elements AND Symbols "/", ";", "?" are reserved. The "/" symbol can be used in HTTP to determine the hierarchical structure.

The note It also argues that you can specify a link without a terminal slash. In this case, it was about the situation when the way the link is empty - indicates the root of the host.

Formal entry

And finally exposure from paragraph 5. BNF for Specific URL Schemes (Formal entry for specific URL schemas).

Here in square brackets indicate optional parts. The stars in front of the bracket denotes 0 or more repetitions of such a fragment, as specified in brackets. The vertical line should be understood as or.

Hostport \u003d host [":" port] ... ... httpurl \u003d "http: //" HostPort ["/" HPath ["?" SEARCH]] hpath. \u003d Hsegment * ["/" hsegment] hsegment \u003d * [uchar | ";" | ":" | "@" | "&" | "\u003d"] search \u003d * [uchar | ";" | ":" | "@" | "&" | "\u003d"] ... ... lowalpha \u003d "a" | "B" | "C" | "D" | "E" | "F" | "G" | "H" | "I" | "J" | "K" | "L" | "M" | "N" | "O" | "P" | "Q" | "R" | "S" | "T" | "U" | "V" | "W" | "X" | "Y" | "z" Hialpha \u003d "A" | "B" | "C" | "D" | "E" | "F" | "G" | "H" | "I" | "J" | "K" | "L" | "M" | "N" | "O" | "P" | "Q" | "R" | "S" | "T" | "U" | "V" | "W" | "X" | "Y" | "Z" Alpha \u003d Lowalpha | Hialpha Digit \u003d "0" | "1" | "2" | "3" | "4" | "5" | "6" | "7" | "8" | "9" Safe \u003d "$" | "-" | "_" | "." | "+" Extra \u003d "!" | "*" | "" "|" ("|") "|", "hex \u003d digit |" a "|" b "|" c "|" d "|" E "|" f "|" a "|" b " | "C" | "D" | "E" | "f" escape \u003d "%" hex hex unreserved \u003d alpha | Digit | Safe | Extra Uchar \u003d Unreserved | Escape

Please note how the HPath element is formed by the rules - the link path. Hsegment path elements - segments - separated by a slash. As if hinting at an important idea that the slash divides the path to the hierarchical parts and is always inside. In principle, it is not excluded that the last element of Hsegment can be an empty string (it follows from its definition), and then at the end of the URL involuntarily appears a closing slash.

Output

The division of the path to segments with the symbol of the slasha implies the presence of non-empty names of these segments. Accordingly, the reference with a slash at the end is seen illogical (although not being prohibited) in the sense that it seems to indicate a certain last segment of the path, but this segment does not call any way. Exactly as illogical (but also not being prohibited) link http://domain.com/level1////levelx.noting the interim segments of the path if the way is considered not as a set of parameters, but as a hierarchical structure.

Spatrical language, the semantic filling of two links can be explained as follows:

  • - addresses in the default starting point of the second level of the hierarchy
  • - Addresses in an indefinite point inside the second level of the hierarchy, that is, however, the task is to be placed on the server that "we appeal to the second level of the hierarchy, and you yourself determine which point you consider at this level default initial."

From all the above should bewhat is similar to how links

  • http://domain.com.
  • http://domain.com/

address visitor to the root of the site and for example links

  • http://domain.com/level1/level2.
  • http://domain.com/level1/level2/

address a visitor to the second level of the resource hierarchy. And the fact that a certain server can interpret the layer at the end in its own way and start internally redo the default starting point - say to the index.html file, this is a special case of a specific configuration. In addition, in the implementation of the system of human-understandable URL, all records of redirects using the mod_rewrite server module determine their (inherent in a specific engine) The concept of the url hierarchical structure, in which the elements of the path can equate to the query parameters and not to have a common with the site file structure ( Classic example: http://domain.com/ru/path, element RU is the parameter of the current language, and not a folder on the site).

We emphasize that this is the internal knowledge of the server, due to its configuration, as well as installed on the site engine. External service, let's say the same search engine, the speculation can not do and does not have the concepts, whether they are distinguished and what the links with the slash and without, unless the site server has not specifically configured so that in such links to produce different content.

For your information

At the implementation level, the issue of layers at the ends does not have a fundamental importance, which many confirmations among family portals. On some, all links are completed by a slash, on others - without a slash. The main thing that the content on the links does not turn out to be different, and more for Yandex you need to register the 301th redirect with those links that you do not use (let's say the ending slabs), on those that use. The fact is that according to unconfirmed statements of support for Yandex support, this search engine allegedly can be wrong and not to "glue" (memorize in your knowledge) or with some intake to glue the slash-without-scene addresses in one.

Here is an example of implementing such a redirect using the .htaccess root file:

# If the input URL ends the layer (EM, AMI), # Set the 301th redirect to the page without a flat RewriteCond% (Request_uri) ^ /. + / $ Rewriterule ^ (*?) / + $ http: //% (http_host ) / $ 1

Google (again, according to the information not confirmed by the experiment), these redirects are not important, as it seems to be able to glue such addresses correctly and without redirects.

Remember There are quite a few people who consider themselves SEO specialists. But not each of them is so. Moreover, the topic SEO is often speculated without proper knowledge and grounds, simply in terms of the fact that you are not excluded in this area, so it is easy to believe in any "noodle". When you say that some kind of your page "flew out of the index", take advantage of a very good recommendation of Yandex: to learn about indexing errors, if any, you can in the Yandex.Vebmaster service. In this service, you can always see a list of your pages in the search and list of pages, for some reason excluded from the search. There is a similar service and Google. Trust these knowledge, and not the opinion of pseudo-specialists, who heard something somewhere the edge of the ear, and on the grounds recommend that you do how it seems to be the only right.

Here Very interesting publication of little-known SEO facts, published in April 2017. There is a large study with many screenshots, which began in order to verify the justice of several popular judgments in the field of search promotion and on understandable examples to convey the results to the usual site owner. The same study simultaneously demonstrates a number of obvious, ordinary, and rather inconspicuous, but still amazing features of organic issuance in search of Google and Yandex.

Here Although the next link almost does not concern SEO, it will still be attractive for SEO masters, which are now in finding additional orders. Lodified by a commercial offer, the guys found a curious way to use the site. Private businesses are offered to create an advertising shield online on the basis of some special topic, running the site, and more precisely its first screen looks like a banner stretching on the bilboards of outdoor advertising. On the smartphone turned the screen, stretching became vertical and takes the entire area of \u200b\u200bthe screen, turned back, became horizontal and again to the whole screen. And under the first screen there is a text appendage where users usually do not scribe, but the search engine sees well this text. So, the most chunk mefinos of regional business buy these inexpensive online billboards as a profitable alternative to the contextual advertising and the context-media network of Yandex and Google. And in order to hang out the maximum in the local search index, to promote your shield is ready to steal money immediately to a bunch of SEO texts, which smells like a nonclicat. Judging by the rumors, the orders for 30 kilubles are slipped, and since the guys outline their partners to Ceeshniks, there can be bridges of the partnership and receive a good acquaintance.

: Always wanted to understand it, but his significance was so small that he was always a reason not to do :)

And you wondered: Url - what is it?

Always come across such a thing, but still did not want to understand what the difference between the terms of the URI, URL, URN, and here suddenly the post (unfortunately, he had already gone in the summer), I decided - and I myself read, and I will tell others, though As mentioned above, it will not change anything, but I love sometimes to samp, so read the intelligent transcender:

Have you ever paid attention to the address bar in your browser? What is it? URI, URL or URN? Many of us do not make differences between the URI, the URL, URN, and someone even did not hear the terms of the URI and URN, everything is simply used by the term URL. Let's try to figure it out together.

Decoding Abbrevia

URI - Uniform Resource Identifier (Unified identifier resource)
URL - Uniform Resource Locator (Unified location determinant resource)
URN - UNIFRORM RESOURCE NAME (Unified name resource)

ATTENTION, here in trifles lies truth, but so far nothing is clear, some kind of porridge. Going on.

Definition

URI: Indicates the name and address of the resource on the network. As a rule, it is divided into URL and URN, so the URL and URN are the components of the URI.
URL: address of some resource in the web. The URL determines the location of the resource and the way to appeal to it.
URN: Name of some resource in web. The meaning of the URN is that it determines only the name of a specific subject, which may be in a variety of specific places.

There is nothing better than a specific example

URI \u003d http: //Site/2009/09/uri-URL-RN.html
URL \u003d http: // Site
URN \u003d /2009/09/uri-URL-RN.html.

Let's summarize

URI is the concept of an abstract identifier, while the URL and URN specific implementation - addresses and name.
I hope everything is understandable. Be competent!

The perception of each of us individually, therefore - argue and read discussions in the comments to the article, there is a lot of interesting things.

You can get lost not only in the forest, but also online. And the wrong way or the address leading to the resource can be faithful. You do not know what a URL address is? Then, before going to the further journey through the virtual space, let's understand the system of email addresses.

What is url

The URL is the generally accepted standard for recording the address and guidance on the location of the resource on the Internet. From English his name ( Uniform Resource Locator) It is translated as a single resource pointer. You can find earlier decoding of abbreviation URL - UNIVERSAL RESOURCE LOCATOR (universal resource locator). But both values \u200b\u200bare most likely complemented by the URL concept than to reprove each other.

The main format for recording the structure of the URL address looks like this:
://:@:/?#
- Most often mean the protocol.
login - User login used for authorization on the resource.
password - user password for authorization.
host - domain name host.
the port is the host port used during connection.
The URL is the path where the requested resource is on the server.
parameters and anchor- The value of variables and identifier on a specific resource.

Transmission of variables in the query string is possible only using the GET method.

Consider the format of the URL address of the page of the requested resource in practical examples. On the client side, the URL is displayed in the browser address bar:

Most often there are options:

  • http: // ru.wikipedia.org/wiki/Nagal - HTTP is used to send a query ( hypertext transmission protocol);
  • https://ru.wikipedia.org/wiki/Nagal_Strica - HTTPS is used as a transmission method. Is a protected form of HTTP protocol using encryption (SSL or TLS);
  • fttp: //wikipedia.org/wiki/file.txt - FTTP file transfer protocol;
  • http://mail.ru/script.php?num\u003d10&type\u003dnew&v\u003dtext - Transfer of variables in the query string using the GET method.

Any format of the address URL is, first of all, the character string. It may include:
2; Letters.
2; Arabic numbers (0-9).
2; Reserved characters ("+", "\u003d", "!" And others).
2; Special characters - they will dwell in more detail.

Using special characters in URL

Of course, such too "special" characters in the URL are not used. But there are several:

  • ? - serves to separate in the block query bar with transmitted parameters;
  • & - separates the transmitted parameters from each other;
  • \u003d - separated in the parameter variable from its value;
  • : - serves to separate the protocol from the rest of the URL;
  • # - The symbol is used in the local part of the address. Allows you to refer to a certain part of the requested page;
  • @ - indicates user registration data and data transfer using the MailTo protocol.

But all this is only the theory. Therefore, before finding out the rest, consider a small practical example.

Visual example

Take for clarity here is such a simple form of registration:

Here is her code:

Registration form


Enter your nickname:

Enter your age:


The first line at the beginning of the form, we prescribed the handler file (PHP) and the data transfer method via the URL address of the server:

Now give the handler file code (1.PHP):

Your nickname: "$ _ Get [" Nick "]."

"; Echo"

Your age: "$ _ GET [" AGE "]."

"; ?>

We introduce data into the form and send them to process the server. That's what we get in the end:

Pay attention to the URL format in the address bar on the first screenshot. After entering data and pressing the "Send Data" button, the values \u200b\u200bof all fields are sent to the server processing. And it is redirected to the 1.PHP page, where the handler code is posted.

Before viewing the result of processing, take a look at the address string in the second figure. It displays the values \u200b\u200bof the fields transmitted to the processing using the GET method.

In order to hide the data sent to the server, the POST method is used. Then the URL above will look like this:

http: //localhost/home/1.php.

URL format addresses on sites

Most often on sites using a tree URL tree. That is, the correct URL address consists of several elements invested in each other, the last of which is the desired web page.

For clarity, take a specific URL, which is one of the branching addresses of our site:

https: //www..html.

We will analyze it in parts:

  • www.Site - This part is a domain name of the site. If you type it in the address bar of the browser, then it will lead to the main page of the site. In most cases, this is an index file. HTML;
  • tEMPLATES - This part of the address indicates a specific section of the site. In our case, this is a section with templates;
  • page_2.html - is a URL ended element on the web page of the thematic section of the resource.

Most often, the URL addresses of the main sections fully displays the site map. But not everything is so easily with redirection on sites deployed on the basis of popular engines (CMS).

FEATURES OF BUILDING URL IN WORDPRESS

In WordPress, as in any engine built on PHP, the generation of all pages of the site occurs dynamically. That is, one part is taken from one template, the other is generated by "on the fly" based on several. ... But such a volatility has one significant drawback - the presence of pieces of transmitted parameters in the URL.

Moreover, this infringe on not only the aesthetic component of the addresses, but is also ambiguously perceived by the search engines. And it can adversely affect website promotion:

Therefore, it is better to use pure URL addresses on your website. But where to take them if the CMS system does not provide for their editing capabilities.

Pure URLs are addresses that do not contain transmitted parameters (in the case of WordPress - elements of requests to the database), but only the path to the document. That is https: //www..html is an example of a pure URL.

The easiest way to configure the URL display in WordPress is the use of specialized plug-ins.

According to various data from 50 to 95% of all email letters in the world - spam from cyber speakers. The goals of sending such letters are simple: to infect the recipient's computer with a virus, steal passwords of the user, make a person translate money "for charity", enter the data of your bank card or send scans of documents.

Often spam strains at first sight: a layout curve, automatically translated text, forms to enter a password directly in the subject of the letter. But there are malicious letters who look decently, firmly play on human emotions and do not cause doubts about their truthfulness.

The article will be described about 4 types of fraudulent letters, which are most often conducted by Russians.

1. Letters from "State Organizations"

Fraudsters may prevent tax, pension fund, Rospotrebnadzor, Sanbeidemstancy and other government agencies. To persuade a letter, watermarks are inserted, scans of seals and state symbolism. Most often, the task of criminals is to scare a person and convince it to open a file with a virus in attachment.

This is usually an encrypter or a Windows blocker that displays a computer and requires send a paid SMS to resume work. Malicious file can be masked for a court ruling or agenda to call to the head of the organization.

Fear and curiosity turn off the user's consciousness. In the accountants' forums describe cases when employees of organizations brought files with viruses to their home computers, as they could not open them in the office because of antivirus.

Sometimes fraudsters are asked to send documents to a letter to collect information about the firm that will be useful for other debit schemes. Last year, one group of fraudsters was able to deceive many people, using the receipt of attention "request to send paper by fax."

When an accountant or manager read it, he immediately cursed the tax "Here the Mammoths sit there, E-Moe!" and switched his thoughts from the letter itself to solve technical problems with sending.

2. Letters from "banks"

Blockers Windows and encrypters can hide in fake letters not only from government agencies, but also from banks. Messages "In your name took a loan, read the lawsuit" can really scare and call a great desire to open the file.

Also, a person can convince entering the fake personal account by offering to see accrued bonuses or get a prize that he won in the Sberbank Lottery.

Less frequently scammers send bills to pay for service fees and additional interest on the loan, by 50-200 rubles, which is easier to pay than to understand.

3. Letters from "Colleagues" / "Partners"

Some people receive dozens of business letters with documents during the working day. With such a load, you can easily feature a label "Re:" in the subject of the letter and forget about the fact that you have not yet rewritten with this person.

Especially if the poisoner indicates "Alexander Ivanov", "Ekaterina Smirnova" or any simple Russian name, which are absolutely not delayed in the memory of a person permanent working with people.

If the purpose of the fraudsters is not a collection of SMS payments for unlocking Windows, but bringing the damage to a particular company, then letters with viruses and phishing links can be sent on behalf of real employees. The list of extension can be collected in social networks or look at the company's website.

If a person sees a letter from a person from a neighboring department in a drawer, he doesn't even look close to him, may even ignore the warning of antivirus and open the file in spite of everything.

4. Letters from "Google / Yandex / Mail"

Google sometimes send letters to the owners of Gmail boxes that someone tried to go to your account or that it was over the place on Google Drive. Scammers successfully copy them and force users to enter passwords on fake sites.

Fake letters from the administration of the Service also receive users of Yandex.mothes, Mail.Ru and other postal services. Standard legends Such: "Your address is added to the black list", "Password expired", "All letters from your address will be added to the Spam folder", "Look insane letters." As in the three previous items, the main weapons of criminals are the fear and curiosity of users.

How to protect yourself?

Install the antivirus to all your devices so that it automatically blocked the malicious files. If you for some reason do not want them to use, then check all at least some suspicious postal investments on virustotal.com.

Never enter passwords manually. Use password managers on all devices. They will never offer you a password option for entering on submarine sites. If for some reasons you do not want to use them, then manually type the URL of the page on which you are going to enter the password. This applies to all operating systems.

Wherever possible, connect a password confirmation by SMS or two-factor identification. And of course, it is worth remembering that unfamiliar people cannot send scans of documents, passport data and transfer money.

Perhaps many of the readers when looking at the screenshots of letters thought: "What is the fool files from such letters to open? For a kilometer it can be seen that it is a setup. I will not be bathed with password manager and two-factor identification. I'll just be attentive. "

Yes, most of the fraudulent letters can be exposed to the eye. But this does not concern when the attack is directed specifically for you.

The most dangerous spam is personal


If a jealous wife wants to read the husband's mail, then Google will offer her dozens of sites that offer a service "hacking mail and profiles in social networks without prepayment."

The scheme of their work is simple: they send high-quality phishing letters to humans, which are carefully compiled, carefully sparkles and take into account the personal features of a person. Such fraudsters are sincerely trying to hook a concrete sacrifice. It is found out from the customer her circle of communication, tastes, weaknesses. For the development of an attack on a particular person may take an hour or more, but efforts pay off.

If the victim comes across, then send the screen of the box of the box and is asked to pay (the average price of about $ 100) its services. After the receipt of money, the password from the box or archive with all letters is sent.

It often happens that when a person comes with a link to the "video compromising on Tanya Kotovo" file (hidden keylogger) from his brother, it is filled with curiosity. If the letter to provide text with details that are known to the limited circle of persons, then the person immediately denies the possibility that his brother could hack or someone else pretend. The victim relaxes and turns off the antivirus to the damn mother to open the file.

Similar services can apply not only jealous wives, but also unfair competitors. In such cases, the price tag is higher and the methods of thinner.

You should not hope for your attentiveness and common sense. Let the emotional antivirus and password manager insure you.

P.S. Why do spammers write such "stupid" letters?


Carefully prepared fraudulent letters - relative rarity. If you go to the Spam folder, you can have fun from the soul. What characters do not come up with fraudsters for extortion money: director of the FBI, the heroine of the series "Game of Thrones", clairvoyant, who sent the highest strength to you and he wants to tell the secret of your future for $ 15, a killer who ordered you, but he soulfully sucks off .

The abundance of exclamation marks, the buttons in the body of the letter, the strange address of the sender, the nameless greeting, the automatic translation, the gross mistakes in the text, explicitly bust of creativity - letters in the Spam folder simply "shout" about their dark origin.

Why scammers who send their messages to millions of recipients do not want to spend a couple of hours to draw up a neat letter and regret 20 bucks on a translator to increase the response of the audience?

In the study of Microsoft Why do Nigerian Scammers Say the Are From Nigeria? The question is deeply analyzed "Why fraudsters continue to send letters on behalf of billionaires from Nigeria, when about the" Nigerian letters "of the general public is known for 20 years." According to statistics, more than 99.99% of recipients ignores such spam.

Users often have questions that such a file is the URL (site), how to find out it and what is the value of such a details. Our article will give the necessary answers.

What is url

Uniform Resource Locator is decoded as "Site location in the network". The URL identifier consists of a domain name and path to a specific page titled its file. The inventor of the URL was a member of the European Council on Nuclear Military Problems, meeting in Geneva, Tim Berners Li. At the time of its creation in 1990, the URL of the site is just an address in the system by which the file is located. To find out the URL of the site, it is enough to look into the address bar, and to define the file address, you must go to the context menu by clicking on the appropriate object right-click. With a lot of advantages, in particular the availability of navigation on the network, such an address also has a disadvantage - the ability to work exclusively with a latin, some symbols and numbers. If necessary, the use of Cyrillic is carried out special transcoding.

URL varieties

    Static - does not imply changes on the page.

    Dynamic URL is that this can be understood if you submit a search form or other navigation tool in which the information is generated depending on the incoming requests.

    Address with the identifier of sessions, which is added every time users visit the page.

The value of the URL in SEO-Promotion

    Search engines take into account the keys included in the URL. Most of all affect the search promotion keywords in the domain and subdomains.

    If the address of the site is informative, it also raises the rating. The search robot is likely to give it back to the thematic request.

    The URL that corresponds to the request is highlighted in searching for bold font, attracting additional attention and increasing clicability.