Masonic alphabet. Discussions about the semantics of HTML code with examples. Semantic layout - what is it?

Or substitutions. A table of one-to-one correspondence of the alphabet is compiled source text and code symbols, and in accordance with this table, one-to-one encoding occurs. To decode, you need to know the code table.

Exists big number codes used in different areas of human life. Well-known codes are used mostly for the convenience of transmitting information in one way or another. If the code table is known only to the transmitter and receiver, then the result is a rather primitive cipher that is easily amenable to frequency analysis. But if a person is far from coding theory and is not familiar with frequency analysis of text, then it is quite problematic for him to unravel such ciphers.

A1Z26

The simplest cipher. Called A1Z26 or in the Russian version A1Я33. Letters of the alphabet are replaced by their serial numbers.

"NoZDR" can be encrypted as 14-15-26-4-18 or 1415260418.

Morse code

Letters, numbers and some signs are associated with a set of dots and dashes, which can be transmitted by radio, sound, knocking, light telegraph and flag signal. You can read more about Morse code on the page.

Braille

Braille is a tactile reading system for the blind, consisting of six-dot characters called cells. The cell consists of three dots in height and two dots in width.

Different braille characters are formed by placing dots at different positions within a cell.

For convenience, the points are described when reading as follows: 1, 2, 3 from the left from top to bottom and 4, 5, 6 from the right from top to bottom.

When composing the text, adhere to the following rules:

    one cell (space) is skipped between words;

    after comma and semicolon the cell is not skipped;

    a dash is written together with the previous word;

    a digital sign is placed in front of the number.

Code pages

In computer quests and riddles, letters can be encoded according to their codes in various code pages - tables used on computers. For Cyrillic texts, it is best to use the most common encodings: Windows-1251, KOI8, CP866, MacCyrillic. Although for complex encryption you can choose something more exotic.

You can encode hexadecimal numbers, or you can convert them to decimal. For example, the letter E in KOI8-R has the code B3 (179), in CP866 - F0 (240), and in Windows-1251 - A8 (168). Or you can look for a match for the letters in the right tables in the left ones, then the text will turn out to be typed in “crazy words” like èαᬫº∩íαδ (866→437) or Êðàêîçÿáðû (1251→Latin-1).

Here https://www.artlebedev.ru/tools/decoder/advanced/ There is a good decoder for such encrypted texts :)

Masonic cipher

The Masonic cipher is also known as “pigpen” or “tic-tac-toe”. This cipher is a simple substitution cipher in which each letter of the alphabet has a corresponding graphic symbol calculated from one of the grids below.

To encrypt a specific letter using this cipher, you must first locate where that letter is in one of the four grids, and then draw the portion of the grid that surrounds that letter. That is, something like this:

If you know the key (how the letters are arranged in the grids), then it is quite easy to unravel such an inscription. But if the letters in the grids are initially arranged according to some unknown rule (with keyword, one by one or even by chance), then in this situation it can always help

Usage graphic symbols instead of letters is not a big obstacle to cryptanalysis, and this system is identical to others simple circuits monoalphabetic substitution. Due to its simplicity, this cipher is often mentioned in children's books about encryption, secret writing and all sorts of other spy stuff.

The exact time of origin of the cipher is unknown, but some of the found records of this system date back to the 18th century. Variations of this cipher were used by the Rosicrucian Order and the Freemasons. The latter used it quite often in their secret documents and correspondence, which is why the cipher began to be called the Masonic cipher. Even on the tombstones of Masons you can see inscriptions using this code. Similar system encryption was used during the American Civil War by George Washington's army, as well as by prisoners in federal prisons of the Confederate States of the United States.

Below are two (blue and red) options for filling the grid of such ciphers. The letters are arranged in pairs, the second letter from the pair is drawn with a symbol with a dot:

Copyright ciphers

A great variety of ciphers, where one character of the alphabet (letter, number, punctuation mark) corresponds to one (rarely more) graphic sign, has been invented. Most of them were invented for use in science fiction films, cartoons and computer games. Here are some of them:

Dancing men

One of the most famous author's substitution ciphers is “”. It was invented and described by the English writer Arthur Conan Doyle in one of his works about Sherlock Holmes. The letters of the alphabet are replaced by symbols that look like little men in different poses. In the book, little men were not invented for all letters of the alphabet, so fans creatively modified and reworked the symbols, and the result was this cipher:

Thomas More's Alphabet

But such an alphabet was described by Thomas More in his treatise “Utopia” in 1516:

Bill Cipher from the animated series "Gravity Falls"

Jedi alphabet from Star Wars

Alien alphabet from Futurama

Superman's Kryptonian alphabet

Bionicle alphabets

The semantics of HTML code is always a hot topic. Some developers try to always write semantic code. Others criticize dogmatic adherents. And some even have no idea what it is and why it is needed. Semantics are defined in HTML in tags, classes, IDs, and attributes that describe the purpose but do not specify the exact content they contain. That is we're talking about about the separation of content and its format.

Let's start with an obvious example.

Bad code semantics

Article title
And the author
Inko Gnito.

Good code semantics

Article title

The text of an article that was written by someone. Inko Gnito- its author.

Whether you think HTML5 is ready for use or not, using the tag

in this case it will be more attractive than usual
indicating the class. The title of the article becomes the title, the table of contents becomes the paragraph, and the bold text becomes the tag. .

But not everything is represented so clearly by HTML5 tags. Let's look at a set of class names and see if they meet the semantic requirements.

Not semantic code. This is a classic example. Every CSS grid workbench uses these types of class names to define grid elements. Whether it's "yui-b", "grid-4", or "spanHalf" - such names are closer to specifying markup than to describing content. However, their use is unavoidable in most cases when working with modular grid templates.

Semantic code. The footer has gained a strong meaning in web design. This is the bottom part of the page, which contains elements such as repeating navigation, usage rights, author information, and so on. This class defines a group for all these elements without describing them.

If you have switched to using HTML5, then it is better to use the element

in such cases. The note also applies to all other parts of the web page (the header should be
, side panel -