Forum Moderators: travelin cat
%3A = :
%2F = /
%20 = (blank space)
%2B = _ (underline)
%26 = &
%3A = "
I need to know what the following represent:
%80
%9D
I'm wondering if others have anything to add to these?
You can get the whole story from these URLs:
[w3.org...]
[cl.cam.ac.uk...]
[unicode.org...]
1) these kind of characters are !ONLY! ever used in URLs (1st reference)
2) they are just the hexadecimal UTF-8 codes prefixed with a '%' (1st reference)
3) there's no need to switch your mac to anything
4) these kind of characters are !ONLY! ever used in programs connecting the internet and they are (in most cases) !PERFECTLY! capable of handling the conversion all by themselves
5) Mac OS X is using UTF-8 internally
Thus, by inference you can just look you 'strange' characters (without the '%' prefix) up in the tables in reference 3 and you'll have your translation.
If you've got BBEdit installed the way to convert is this:
Search string: %..
Replace string: \&#x\1;
check off 'Use Grep'
Then, use the 'Translate' dialogue to convert from HTML to Text where you check off the 'HTML entities' box.
I've been unable to find a program for Mac OS X that explicitly does the URL encoding to text conversion.
And your two strange characters are: %80 = € ; %9D =
Thus, by inference you can just look you 'strange' characters (without the '%' prefix) up in the tables in reference 3 and you'll have your translation.
Thanks for this. It explais why I couldn't find them on any list I read on the above pages.
I sometimes find these odd characters in search results in Google when searching for website Hijackers. I can't tell if it's a 302 redirect unless I can translate the characters back to what they should be.
I can't tell if it's a 302 redirect unless I can translate the characters back to what they should be.
The content of the URL is insufficient to tell what kind of redirect it is. (Unless the "hijackers" have been so kind as to call their script "302_redirect.php" Even then, why trust them?)
You can use Firefox [mozilla.org] with a live header plugin [livehttpheaders.mozdev.org], then just click on the suspect link in Google. You will be able to see any redirects and what type of redirect is being used.