PHP Regular Expression also known as regex are powerful pattern matching algorithm that can be performed in a single expression. Regular expressions use arithmetic operators such as (+,-,^) to create complex expressions. They can help you accomplish tasks such as validating email addresses, IP address etc.
preg_match('/^[\pL]+$/u', $case); //allow multi language only
preg_match('/^[\pL\s]+$/u', $case); //allow multi language and spaces
PHP Regular expressions simplify identifying patterns in string data by calling a single function. This saves us coding time.
When validating user input such as email address, domain names, telephone numbers, IP addresses,
Highlighting keywords in search results
When creating a custom HTML template. Regex in PHP can be used to identify the template tags and replace them with actual data.
Regular Expression Metacharacters
The above examples used very basic patterns; metacharacters simply allow us to perform more complex pattern matches such as test the validity of an email address. Let’s now look at the commonly used metacharacters.
Metacharacter
Description
Example
.
Matches any single character except a new line
/./ matches anything that has a single character
^
Matches the beginning of or string / excludes characters
/^PH/ matches any string that starts with PH
$
Matches pattern at the end of the string
/com$/ matches guru99.com,yahoo.com Etc.
*
Matches any zero (0) or more characters
/com*/ matches computer, communication etc.
+
Requires preceding character(s) appear at least once
/yah+oo/ matches yahoo
\
Used to escape meta characters
/yahoo+\.com/ treats the dot as a literal value
[…]
Character class
/[abc]/ matches abc
a-z
Matches lower case letters
/a-z/ matches cool, happy etc.
A-Z
Matches upper case letters
/A-Z/ matches WHAT, HOW, WHY etc.
0-9
Matches any number between 0 and 9
/0-4/ matches 0,1,2,3,4
Regex Metacharacter Table
Difference of preg_match() and preg_match_all() functions
preg_match() stops looking after the first match. preg_match_all(), on the other hand, continues to look until it finishes processing the entire string. Once match is found, it uses the remainder of the string to try and apply another match.
<?php
// TESTCASES FOR ALL UNICODE GOOGLE TRANSLATE LANGUAGE 2023
// ALLOWING MULTI LANGUAGE AND SPACES
$testCases = [ 'Unë të dua', 'i love you', 'አፈቅርሃለሁ', 'Ես սիրում եմ քեզ', 'মই আপোনাক ভাল পাওঁ', 'munsmawa', 'Mən səni sevirəm', "n b'i fɛ", 'я цябе кахаю', 'আমি তোমাকে ভালোবাসি', 'हम तोहसे प्यार करेलीं', 'Обичам те', "T'estimo", 'Miluji tě', 'އަހަރެން ތިބާ ދެކެ ލޯބިވަން', 'में तुगी हिरख करना', 'Melɔ̃ wò', 'Minä rakastan sinua', 'Ik hâld fan dy', 'Quérote', 'მიყვარხარ', "Σ'αγαπώ", 'હું તને પ્રેમ કરું છુ', 'Aloha wau iā ʻoe', 'אני אוהב אותך', 'मुझे तुमसे प्यार है', 'ég elska þig', "a hụrụ m gị n'anya", 'Ay-ayaten ka', 'Is breá liom tú', 'ನಾನು ನಿನ್ನನ್ನು ಪ್ರೀತಿಸುತ್ತೇನೆ', 'мен сені жақсы көремін', 'ខ្ញុំស្រលាញ់អ្នក', 'हांव तुजेर मोग करता', '사랑해요', 'A lɛk yu', 'تۆم خۆش دەوێت', 'Сени сүйөм', 'ຂ້ອຍຮັກເຈົ້າ', 'Es mīlu Tevi', 'Aš tave myliu', 'Ech hunn dech gär', 'Те сакам', 'हम अहां सँ प्रेम करैत छी', 'ഞാൻ നിന്നെ സ്നേഹിക്കുന്നു', 'inħobbok', 'मी तुझ्यावर प्रेम करतो', 'Би чамд хайртай', 'ମୁଁ ତୁମକୁ ଭଲପାଏ', 'မင်းကိုချစ်တယ်', 'म तिमीलाई माया गर्छु', 'Kocham cię', 'jag älskar dig', 'мин сине яратам', 'నేను నిన్ను ప్రేమిస్తున్నాను', 'مەن سېنى ياخشى كۆرىمەن', 'Tha gaol agam ort', 'Kuyaykim', 'أحبك', '愛してます', '我爱你', 'Anh Yêu Em', 'ฉันรักคุณ',
];
foreach($testCases as $case) {
echo '<b>"' . $case . '" letters only? </b><br>' . var_export((bool) preg_match('/^[\pL\s]+$/u', $case), TRUE) . "\n<br><br>";
}
Kata Doxing berasal dari bahasa Inggris, yang berasal dari kata document dan biasa disingkat menjadi dox. Menurut kamus Cambridge, doxing adalah tindakan mempublikasikan data atau informasi pribadi seseorang. Seseorang menemukan lalu membagikan informasi pribadi ini seperti nama panjang, alamat rumah, nomor ponsel, dan lainnya.
Doxing adalah kependekan dari Dropping Dox (dokumen), dan hanya memiliki konotasi negatif. Niat doxers adalah untuk melecehkan korban dengan mengungkapkan informasi yang memberatkan, memfitnah atau hanya sangat memalukan.
Doxing Deanonymizing
Doxing yang satu ini dilakukan dengan mengungkapkan identitas seseorang yang sebelumnya atau dari awal menganonimkan diri. Anonim berarti tidak menggunakan nama asli.
Contohnya adalah membongkar akun media sosial milik seseorang yang anonim.
Padahal, mereka yang memilih untuk menganonimkan identitasnya memiliki alasan tersendiri yang seharusnya dihargai.
Doxing Targeting
Doxing targeting dilakukan dengan mengungkapkan informasi spesifik tentang seseorang yang memungkinkan mereka untuk dihubungi atau ditemukan. Dengan kata lain, keamanan online mereka telah dilanggar.
Contoh dari doxing jenis ini adalah disebarkannya nomor telepon, alamat rumah, atau kata sandi akun seseorang. Data-data tersebut sangatlah krusial sehingga dapat membahayakan bagi korban.
Doxing Delegitimizing
Jenis doxing yang terakhir ini dilakukan dengan mengungkapkan informasi yang bersifat sensitif atau intim tentang seseorang.
Disebarkannya data tersebut dapat merusak kredibilitas atau reputasinya karena sifatnya yang sangat pribadi sehingga tidak banyak diketahui oleh orang lain.
Beberapa contohnya adalah catatan medis, keuangan pribadi, catatan hukum, atau pesan dan foto pribadi yang biasanya sulit atau tidak bisa terlihat oleh publik.
Korban pun pasti memiliki alasan untuk menyimpan sendiri data-data tersebut.
Oleh karena itu, doxing jenis ini benar-benar melanggar dan mengganggu privasi sang korban.
Informasi berikut ditargetkan dalam serangan doxing:
Foto pribadi
Kontak informasi
Akun email
Foto anggota keluarga
Nomor Jaminan Sosial (SSN)
Nomor telepon
Nama lengkap Anda
Nama asli
Detail pribadi yang memalukan
Alamat rumah
Informasi Kartu Kredit
Detail rekening bank
Sejarah kriminal
Mengapa Seseorang Melakukan Doxing?
Doxing dapat dilakukan untuk berbagai alasan, termasuk untuk membantu penyelidikan hukum atau untuk digunakan dalam analisis bisnis, namun dalam konteks cyberbullying, doxing digunakan untuk tujuan pemaksaan, mempermalukan online, pemerasan, dan bahkan keadilan main hakim sendiri. Ini sering dikaitkan dengan penggunaan oleh ‘massa’ online yang berusaha mengintimidasi atau mengancam korban dengan membuat mereka takut akan keselamatan dan kemanan pribadi mereka mereka . Terkadang, pelaku dapat menggunakan ancaman membocorkan informasi pribadi untuk memanipulasi atau berpotensi memeras seseorang agar melakukan atau mengatakan hal-hal yang tidak nyaman bagi mereka.
Cara Mencegah Doxing
Doxing bisa dicegah jika seseorang tidak mengunggah informasi penting dan pribadi secara online. Anda perlu memastikan dan berhati-hati ketika mengunggah informasi di media sosial. Berikut cara mencegah doxing:
1. Pakai Jaringan Pribadi Mengutip dari fortinet.com, anda bisa menggunakan jaringan pribadi atau Virtual Private Network (VPN). Pemakaian VPN membantu melindungi informasi dan alamat IP asli dapat disembunyikan.
2. Memakai Kata Sandi Kuat Ketika anda masuk ke situs website atau aplikasi, gunakan kata sandi kuat. Anda bisa membuat kata sandi yang sulit diprediksi dan ditebak oleh orang lain.
3. Mengubah Pengaturan Pribadi Langkah ketiga menghindari Doxing yaitu mengubah pengaturan pribadi. Anda bisa mengubah pengaturan privasi media sosial. Anda bisa membuat media sosial hanya dilihat orang beberapa orang. Selain itu jangan berikan informasi pribadi seperti tanggal lahir, kota asal, dan lainnya.
4. Hapus Email Phishing Cara lain yaitu menghapus email spam atau tidak klik tautan dari pesan email. Anda perlu mewaspadai email phising untuk meminta alamat rumah, kata sandi, dan informasi pribadi. Contohnya saja email dari perusahaan kartu kredit atau bank meminta data pribadi. Hal ini termasuk penipuan, karena lembaga keuangan tidak pernah meminta informasi melalui email.
5. Pakai Akun Email Terpisah Anda bisa menggunakan email terpisah untuk media sosial dan pribadi. Gunakan email kantor dan bisnis untuk pekerjaan dan profesional. anda bisa menggunakan email terpisah untuk akun media sosial. Selain itu pakai kata sandi yang berbeda untuk media sosial anda.
6. Waspadai Izin Aplikasi Cara menghindari doxing yaitu mewaspadai izin aplikasi. Sebelum melakukan pendaftaran, anda bisa membaca terlebih dahulu ketentuan yang ditawarkan aplikasi. Contohnya saja penawaran mengizinkan akses informasi dari media sosial. Hal ini perlu diwaspadai jika aplikasi tidak punya keamanan memadai. Peretas doxing dapat menembus sistem dan mendapatkan informasi pengguna.
7. Melindungi Akun Keuangan Seorang doxer dapat membagikan informasi keuangan seseorang. Anda perlu mengambil langkah untuk menghubungi bank dan penyedia kartu. Pastikan kartu anda terlindungi dan ditutup untuk mencegah doxing.
Jerat Hukum Doxing
Pada intinya, perilaku doxing tidak dapat dibenarkan atas alasan apapun. Data pribadi seseorang merupakan ranah privat yang tidak dapat dibagikan begitu saja. Namun, sayangnya peraturan perundang-undangan di Indonesia belum mengatur perlindungan data pribadi dalam satu undang-undang khusus.
Disarikan dari Dasar Hukum Perlindungan Data Pribadi Pengguna Internet, peraturan tentang perlindungan data pribadi sebenarnya sudah dirancang dalam RUU Perlindungan Data Pribadi. Namun, hingga saat ini, RUU tersebut belum disahkan dan aturan mengenai perlindungan data pribadi masih terpisah dan tersebar dalam beberapa peraturan.
Bentuk perlindungan data pribadi secara tersirat dapat ditemukan dalam ketentuan Pasal 26 ayat (1) UU ITEjo. UU 19/2016 yang menerangkan bahwa kecuali ditentukan lain oleh peraturan perundang-undangan, penggunaan setiap informasi melalui media elektronik yang menyangkut data pribadi seseorang harus dilakukan atas persetujuan orang yang bersangkutan.
Lebih lanjut, Penjelasan Pasal 26 ayat (1) UU ITE jo. UU 19/2016 menerangkan bahwa dalam pemanfaatan teknologi informasi, perlindungan data pribadi merupakan salah satu bagian dari hak pribadi (privacy rights). Hak pribadi mengandung pengertian sebagai berikut:
Hak pribadi merupakan hak untuk menikmati kehidupan pribadi dan bebas dari segala macam gangguan.
Hak pribadi merupakan hak untuk dapat berkomunikasi dengan Orang lain tanpa tindakan memata-matai.
Hak pribadi merupakan hak untuk mengawasi akses informasi tentang kehidupan pribadi dan data seseorang.
Kemudian, apabila terjadi penggunaan data pribadi tanpa izin sebagaimana yang dilakukan pelaku doxing, ketentuan Pasal 26 ayat (1) dan (2) UU ITE jo. UU 19/2016 menerangkan bahwa korban dapat mengajukan gugatan atas kerugian yang ditimbulkan.
4 Pelanggaran Bisa Dipidana dengan UU PDP
Berdasarkan UU PDP, mengungkapkan data pribadi orang lain seperti itu bisa berujung pidana maksimal penjara empat tahun dan denda maksimal Rp4 miliar.
Pelanggaran kedua adalah mengumpulkan data pribadi secara tidak sah, pelaku bisa dikenakan pidana penjara maksimal lima tahun dan denda maksimal Rp5 miliar.
Menggunakan data pribadi yang bukan miliknya. Contoh pelanggaran ini misalnya mendaftarkan kartu SIM dengan KTP milik orang lain. Pelaku bisa dikenakan pidana penjara maksimal 5 tahun dan denda maksimal Rp5 miliar.
Membuat data pribadi palsu atau memalsukan data pribadi. Pelaku pelanggaran akan diberikan sanksi pidana maksimal enam tahun dan denda Rp6 miliar.
Dampak Doxing Bagi Korban
Rasa malu di depan umum dan mendapat penghinaan dari publik
Mendapat diskriminasi. Hal tersebut dapat terjadi jika karakteristik pribadi dirinya terungkap
Mengalami cyberstalking dan physical stalking
Mengalami pencurian identitas dan penipuan dalam hal finansial
Rusaknya reputasi personal maupun profesional. Lambat laun, hal tersebut akan menyebabkan kerugian secara sosial dan finansial
Meningkatnya kecemasan
Menurunnya kepercayaan dan harga diri
Kesimpulan
Meskipun mungkin tidak sepenuhnya dianggap ilegal, doxing dapat memiliki efek yang mengubah hidup dan bertahan lama pada korban . Di dunia sekarang ini, kita cenderung menaruh banyak detail pribadi secara online tanpa berpikir dua kali. Yang diperlukan hanyalah satu interaksi dengan seseorang di internet menjadi buruk dan semua detail itu bisa menjadi target pengguna internet yang jahat. Ini dapat mengakibatkan segala macam masalah, seperti misalnya memukul . Singkatnya, Anda perlu melindungi identitas Anda secara online.
The first thing to do in a new system is to update our repositories in order to make them up to date. Run upgrade command also.
sudo apt update && apt upgrade -y
2. Add Ondrej sury PPA repository
To run PHP 8.2 on Ubuntu 22.04, we need to add Ondrej sury PPA into our system. This is the maintainer of the PHP repository at the moment. This PPA is not currently checked so installing from it will not be guaranteed 100% results.
To add this PPA use the following command on our terminal.
sudo add-apt-repository ppa:ondrej/php
After installation is complete we need to update the repositories again for the changes to take effect.
sudo apt update
3. Install PHP 8.2 on Ubuntu 22.04
We should now be able to install PHP 8.2 on Ubuntu 22.04 Linux machine. The commands to run are as shared below:
sudo apt install php8.2 -y
Check for the currently active version of PHP with the following command:
php --version
4. Install PHP 8.2 Extensions
Besides PHP itself, you will likely want to install some additional PHP modules. You can use this command to install additional modules, replacing PACKAGE_NAME with the package you wish to install:
sudo apt-get install php8.2-PACKAGE_NAME
You can also install more than one package at a time. Here are a few suggestions of the most common modules you will most likely want to install:
Comparing Extra Baggage Price between Traveloka VS Scoot
Traveloka Extra Baggage Price
Scoot Extra Baggage Price
40 kg – Rp. 2,020,594.00
40 kg – Rp. 1,158,069.00
Scoot Extra Baggage View
Baggage Allowance That Suits Your Needs No more rearranging your stuff at the airport to avoid additional baggage charges. Whether you are in the middle of booking your flight or already have an e-ticket, you can now select your preferred baggage allowance at Traveloka. So get that travel checklist out and make sure to pack everything you need.
When traveling far for a long period of time, it’s likely that we carry more baggage. We may even end up with more suitcases upon our return, thanks to all the souvenirs we bought for our friends and family. It is no wonder to find our baggage exceeding the limit allowed by the airline.
Airlines usually provide a free baggage allowance for each passenger. However, the amount can be different for each airline. Some may give a free allowance only for cabin baggage, some may give a free allowance for checked baggage. The free checked baggage allowance itself can differ between airlines, ranging from 15 – 35 kilograms per passenger, depending on the type of airline and the flight route.
However, since passengers often need an extra baggage allowance, many popular airlines offers Extra Baggage Allowances to their passengers. This is to prevent the high additional charge due to excess baggage. This extra baggage allowance is offered in packages, so passengers can buy it at a more affordable price compared to paying the excess baggage load per kilogram.
AirAsia baggage service, for example, offers packages of 15, 20, 25, 30, and 40 kilograms of Extra Baggage Allowance. The AirAsia Extra Baggage Allowance is available for their domestic and international flights, with varied prices depending on the route, schedule, and travel period.
Passengers can buy Extra Baggage Allowances prior to flying from the airline’s website or application, or from online ticket booking services such as Traveloka. Extra Baggage can be purchased up to 12 hours before departure except for VNA, up to 24 hours, or at the same time during flight ticket bookings, depending on the policies of each airline. However, at Traveloka, passengers can buy the necessary baggage allowances together with their flight tickets.
So if you can anticipate that your baggage would exceed the free baggage allowance provided by the airline, buying an Extra Baggage Allowance as early as possible is always a good idea. This is also important to avoid inconveniences during your check-in process only because you have to pay an extra charge for your excess baggage.
By buying an Extra Baggage Allowance before your flight, you will be able to proceed through check-in smoothly. In addition, you will also feel comfortable throughout your flight even with a lot of baggage in tow.
An update which added a capsule containing Talent Stickers that unlocked talent voice lines. Upon doing so, fans and talent alike reached out expressing unhappiness with the product. Our intention was to create a compelling system that allowed fans to connect with their favorite talent in a different way than in previous years, and we fell short of that goal. We are sorry for that and we intend to correct it.
In order to address these issues, and after talking to some of the talent that reached out with concerns and proposals, we are adding the option to directly purchase a talent’s voice line with 50% of the revenue going exclusively to that talent. Players can purchase these voice lines directly from the Talent page in the Battle Pass.
For players that have already purchased and opened talent sticker capsules, those stickers will continue to function as before. As with voice lines unlocked via stickers, directly purchased voice lines are also usable permanently.
If Google’s crawler, Googlebot, encounters an issue when it tries to crawl your site and doesn’t understand a page on your website, it’s going to give up and move on. This means your page will not be indexed and will not be visible to searchers, which greatly affects your search performance.
Here are some of those errors:
Server Error (5xx)
Redirect Error
Blocked by robots.txt
Marked ‘noindex’
Soft 404
Unauthorized request (401)
Not Found (404)
Crawl Issue
Crawled – currently not indexed:
The page was crawled by Google, but not indexed. It may or may not be indexed in the future; no need to resubmit this URL for crawling.
If you see this, take a good hard look at your content. Does it answer the searcher’s query? Is the content accurate? Are you offering a good experience for your users? Are you linking to reputable sources? Is anyone else linking to it?
Make sure to provide a detailed framework of all the page content that needs to be indexed through the use of structured data. This allows search engines to not only index your content but for it to come up in future queries and possible featured snippets.
Optimizing the page may increase the chances that Google chooses to index it the next time it is crawled.
Discovered – currently not indexed:
The page was found by Google, but not crawled yet.
Even though Google discovered the URL it did not feel it was important enough to spend time crawling. If you want this page to receive organic search traffic, consider linking to it more from within your own website. Be sure to promote this content to others with the hope that you can earn backlinks from external websites. External links to your content is a signal to Google that a page is valuable and considered to be trustworthy, which increases the odds of it being indexed.
Alternate page with proper canonical tag:
This page is a duplicate of a page that Google recognizes as canonical, and it correctly points to that canonical page, so nothing for you to do here!
Just as the tool says, there’s really nothing to do here. If it bothers you that the same page is accessible through more than one URL, see if there is a way to consolidate.
Duplicate without user-selected canonical::
This page has duplicates, none of which is marked canonical. We think this page is not the canonical one. You should explicitly mark the canonical for this page.
Google is guessing which page you want them to index. Don’t make it guess. You can explicitly tell Google which version of a page should be indexed using a canonical tag.
Duplicate non-HTML page:
A non-HTML page (for example, a PDF file) is a duplicate of another page that Google has marked as canonical.
Google discovered a PDF on your site that contained the same information as a normal HTML page, so they chose to only index the HTML version. Generally, this is what you want to happen, so no action should be necessary unless for some reason you prefer they use the PDF version instead.
Duplicate, Google chose different canonical than user:
This URL is marked as canonical for a set of pages, but Google thinks another URL makes a better canonical.
Google disagrees with you on which version of a page they should be indexing. The best thing you can do is make sure that you have canonical tags on all duplicate pages, that those canonicals are consistent, and that you’re only linking to your canonical internally. Try to avoid sending mixed signals.
We’ve seen this happen when a website specifies one version of a page as the canonical, but then redirects the user to a different version. Since Google cannot access the version you have specified, it assumes perhaps that you’ve made an error, and overrides your directive.
Soft 404:
The page request returns what we think is a soft 404 response.
In Google’s eyes, these pages are a shell of their former selves. The remnants of something useful that once existed, but no longer does. You should convert these into 404 pages, or start populating them with useful content.
Submitted URL dropped:
You submitted this page for indexing, but it was dropped from the index for an unspecified reason.
This issue ‘s description is pretty vague, so it’s hard to say with certainty what action you should take. Our best guess is that Google looked at your content, tried it out for a while, then decided to no longer include it.
Investigate the page and critique its overall quality. Is the page thin? Outdated? Inaccurate? Slow to load? Has it been neglected for years? Have your competitors put out something that’s infinitely better?
Try refreshing and improving the content, and secure a few new links to the page. It may lead to a re-indexation of the page.
Duplicate, Submitted URL not selected as canonical:
The URL is one of a set of duplicate URLs without an explicitly marked canonical page. You explicitly asked this URL to be indexed, but because it is a duplicate, and Google thinks that another URL is a better candidate for canonical, Google did not index this URL. Instead, we indexed the canonical that we selected.
Viewport not set
The page does not define a viewport property, which tells browsers how to adjust the page’s dimension and scaling to suit the screen size. Because visitors to your site use a variety of devices with varying screen sizes—from large desktop monitors, to tablets and small smartphones—your pages should specify a viewport using the meta viewport tag.
The “viewport” is the technical way that your browser knows how to properly scale images and other elements of your website so that it looks great on all devices. Unless your HTML savvy, this will likely require the help of a developer. If you want to take a stab at it, this guide might be helpful.
Viewport not set to “device-width”
The page defines a fixed-width viewport property, which means that it can’t adjust for different screen sizes. To fix this error, adopt a responsive design for your site’s pages, and set the viewport to match the device’s width and scale accordingly.
In the early days of responsive-design, some developers preferred to tweak the website for mobile-experiences rather than making the website fully responsive. The fixed-width viewport is a great way to do this, but as more and more mobile devices enter the market, this solution is less appealing.
Google now favors responsive web experiences. If you’re seeing this issue, it’s likely that you’re frustrating some of your mobile users, and potentially losing out on some organic traffic. It may be time to call an agency or hire a developer to make your website responsive.
Content wider than screen
Horizontal scrolling is necessary to see words and images on the pageThis happens when pages use absolute values in CSSdeclarations, or use images designed to look best at a specific browser width (such as 980px). To fix this error, make sure the pages use relative width and position values for CSS elements, and make sure images can scale as well.
This usually occurs when there is a single image or element on your page that isn’t sizing correctly for mobile devices. In WordPress, this can commonly occur when an image is given a caption or a plug-in is used to generate an element that isn’t native to your theme.
The easy way to fix this issue is to simply remove the image or element that is not sizing correctly on mobile devices. The correct way to fix it is to modify your code to make the element responsive.
Text too small to read
The font size for the page is too small to be legible and would require mobile visitors to “pinch to zoom” in order to read. After specifying a viewport for your web pages, set your font sizes to scale properly within the viewport.
Simply put, your website is too hard to read on mobile devices. To experience this first-hand, simply load the page in question on a smartphone and experience it first hand.
According to Google, a good rule of thumb is to have the page display no more than 70 to 80 characters (about 8-10 words) per line on a mobile device. If you’re seeing more than this, you should hire an agency or developer to modify your code.
How To Fix A Server error (5xx):
Your server returned a 500-level error when the page was requested.
A 500 error means that something has gone wrong with a website’s server that prevented it from fulfilling your request. In this case, something with your server prevented Google from loading the page.
First, check the page in your browser and see if you’re able to load it. If you can, there’s a good chance the issue has resolved itself, but you’ll want to confirm.
Email your IT team or hosting company and ask if the server has experienced any outages in recent days, or if there’s a configuration that might be blocking Googlebot and other crawlers from accessing the site.
How To Fix A Redirect error:
The URL was a redirect error. Could be one of the following types: it was a redirect chain that was too long; it was a redirect loop; the redirect URL eventually exceeded the max URL length; there was a bad or empty URL in the redirect chain.
This basically means your redirect doesn’t work. Go fix it!
A common scenario is that your primary URL has changed a few times, so there are redirects that redirect to redirects. Example: http://yourdomain.com redirects to http://www.yourdomain.com which then redirects to https://www.yourdomain.com.
Google has to crawl a ton of content, so it doesn’t like wasting time and effort crawling these types of links. Solve this by ensuring your redirect goes directly to the final URL, eliminating all steps in the middle.
Submitted URL blocked by robots.txt:
You submitted this page for indexing, but the page is blocked by robots.txt. Try testing your page using the robots.txt tester.
There is a line of code in your robots.txt file that tells Google it’s not allowed to crawl this page, even though you’ve asked Google to do just that by submitting it to be indexed. If you do actually want it to be indexed, find and remove the line from your robots.txt file.
If you don’t, check your sitemap.xml file to see if the URL in question is listed there. If it is, remove it. Sometimes WordPress plugins will sneak pages into your sitemap file that don’t belong.
Submitted URL marked ‘noindex’:
You submitted this page for indexing, but the page has a ‘noindex’ directive either in a meta tag or HTTP response. If you want this page to be indexed, you must remove the tag or HTTP response.
Submitted URL seems to be a Soft 404:
You submitted this page for indexing, but the server returned what seems to be a soft 404.
These are pages that look like they are broken to Google, but aren’t properly showing a 404 Not Found response. These tend to bubble up in two ways:
You have a category page with no content within that category. It’s like an empty shelf at a grocery store.
Your website’s theme is automatically creating pages that shouldn’t exist.
You should either convert these pages to proper 404 pages, redirect them to their new location, or populate them with some real content.
For more on this issue, be sure to read our in-depth guide to fixing Soft 404 errors.
Submitted URL returns unauthorized request (401):
You submitted this page for indexing, but Google got a 401 (not authorized) response. Either remove authorization requirements for this page, or else allow Googlebot to access your pages by verifying its identity.
This warning is usually triggered when Google attempts to crawl a page that is only accessible to a logged-in user. You don’t want Google wasting resources attempting to crawl these URLs, so you should try to find the location on your website where Google discovered the link, and remove it.
For this to be “submitted”, it would need to be included in your sitemap, so check there first.
Submitted URL not found (404):
You submitted a non-existent URL for indexing.
If you remove a page from your website but forget to remove it from your sitemap, you’re likely to see this error. This can be prevented from regular maintenance of your sitemap file.
Deep Dive Guide: For a closer look at how to fix this error, read our article about how to fix 404 errors on your website.
Submitted URL has crawl issue:
You submitted this page for indexing, and Google encountered an unspecified crawling error that doesn’t fall into any of the other reasons. Try debugging your page using the URL Inspection tool.
Indexed, though blocked by robots.txt:
The page was indexed, despite being blocked by robots.txt
Your robots.txt file is sort of like a traffic cop for search engines. It allows some crawlers to go through your site and blocks others. You can block crawlers at the domain level or on a page by page basis.
Unfortunately, this specific warning is something we see all the time. It usually happens when someone attempts to block a bad bot and puts in an overly strict rule.
Below is an example of a local music venue that we noticed was blocking all crawlers from accessing the site, including Google. Don’t worry, we let them know about it.
Submitted and indexed:
You submitted the URL for indexing, and it was indexed.
You wanted the page indexed, so you told Google about it, and they totally dug it. You got what you wanted, so go pour yourself a glass of champagne and celebrate!
Indexed, not submitted in sitemap:
The URL was discovered by Google and indexed.
Google found these pages and decided to index them, but you didn’t make it as easy as you could have. Google and other search engines prefer that you tell them about the content you want to have indexed by including them in a sitemap. Doing so can potentially increase the frequency in which Google crawls your content, which may translate into higher rankings and more traffic.
Indexed; consider marking as canonical:
The URL was indexed. Because it has duplicate URLs, we recommend explicitly marking this URL as canonical.
A duplicate URL is an example of a page that is accessible through multiple variations even though it is the same page. Common examples include when a page is accessible both with and without a backslash, or with a file extension at the end. Something like yoursite.com/index.html and yoursite.com, which both lead to the same page.
These are bad for SEO because it dilutes any authority a page accumulates through external backlinks between the two versions. It also forces a search engine to waste its resources crawling multiple URLs for a single page and can make your analytics reporting pretty messy as well.
A canonical tag is a single line in your HTML that tells search engines which version of the URL they should prioritize, and consolidates all link signals to that version. They can be extremely beneficial to have and should be considered.
Google Search Console Excluded URLs
These are the pages that Google discovered, but chose to not index. For the most part, these will be pages that you explicitly told Google not to index. Others are pages that you might actually want to have indexed, but Google chose to ignore them because they weren’t found to be valuable enough.
Dewa Tua Pek Kong (Hanzi : 大伯公; pinyin : Dàbó Gōng) merupakan salah satu Dewa Taoisme dalam kepercayaan masyarakat Tionghoa perantauan di Malaysia dan Indonesia.
Namanya sendiri memiliki beragam sebutan. Orang Hakka menyebutnya Thai phak kong, orang Hokkian memanggilnya Tua peh kong, sementara orang Kanton mengejanya Daai baak gung.
Di Indonesia sendiri, masyarakat Tionghoa sering disebutnya sebagai Toa Pekong, Toapekong, atau Topekong, yang secara harafiah berarti “Paman Agung”).
Dalam dialek Hokkian, Toa/Tua sendiri memiliki arti “yang paling besar, atau yang tertua”. Sementara Pek sendiri memiliki arti “paman, atau kakak“. Lalu Gong sendiri memiliki arti “kakek”.
Jadi, pengertian Da Bo Gong (atau Toa Pek Kong) secara keseluruhan adalah “Kakak Tertua dari Kakek, atau Paman Buyut”. Sebutan tersebut merupakan sebutan paling terhormat, karena kultur masyarakat Tiongkok sangat menghormati orang2 yang lebih tua.
Tua Pek Kong sendiri dianggap sebagai “Dewa Kemakmuran”. Menurut kisah hidupnya, beliau merupakan seorang pelaut dari wilayah Fujian Tiongkok, yang mengorbankan dirinya untuk umat manusia.
Beliau juga dipercaya sebagai reinkarnasi Dewa “Fu” dari trio Dewa Fu Lu Shou 福祿壽, yang mewakili “Kemakmuran, Keberuntungan, dan Umur Panjang”.
Berikut riwayat hidup Toa Pek Kong :
Terdapat beberapa versi sejarah tentang kehidupan Toa Pek Kong sebelum diangkat menjadi Dewa.
Versi pertama menyebutkan bahwa Beliau adalah seorang pelaut dari propinsi Fujian, yang memperoleh mimpi bahwa suatu ketika di tengah laut terdapat seseorang yang mengapung dalam kondisi keracunan. Ia menemukan orang tersebut, lalu menyedot racun dari mulut korban sehingga selamat, namun dirinya sendiri meninggal.
Masyarakat kemudian memujanya, untuk mengenang keberanian serta pengorbanannya.
Versi kedua menyebutkan bahwa Beliau adalah seorang pelajar Fujian yang lari ke wilayah Malaya (saat ini Malaysia) pada masa dinasti Qing, tepatnya pada pemerintahan Kaisar Qianlong 乾隆帝 (1736-1790). Ia digambarkan sebagai pria yang jujur, berbudi, ramah, dan memiliki jenggot yang panjang.
Tua Pek Kong adalah seorang pria bernama Zhang Li (张理) yang berasal dari suku Hakka. Suatu ketika hendak menuju wilayah Sumatra, perahunya dilanda angin yang kuat, dan secara tidak sengaja mendarat di pulau Penang di Malaysia, yang ketika itu baru dihuni sekitar puluhan penduduk saja.
Beliau diyakini telah tiba di pulau itu 40 tahun lebih awal dari Francis Light (seorang penjelajah dan pendiri koloni Inggris di Penang, pada tahun 1746). Pasca kematiannya, penduduk setempat mulai memujanya dan membangun Kuil Tua Pek Kong di sana.
Ia dimakamkan di belakang pulau Mutiara kuil Tua Pek Kong (Sea Pearl Island) di Tanjung Tokong. Kisah Tua Pek Kong pertama di Penang menunjukkan tradisi persaudaraan tersumpah, diantara sesama perantauan orang2 Tiongkok :
Zhang Li (张理) tinggal di komunitas nelayan kecil sebagai guru. Dia dikenal karena kebaikan dan keramahannya, sehingga penduduk desa setempat selalu mencarinya untuk meminta bantuan dan bimbingan ketika mereka memiliki masalah.
Menurut catatan, 2 orang yang menjadi saudara lelakinya yang disumpah, yakni Chiu Hsiao Ching, pembuat arang, dan Ma Fu Choon, seorang pandai besi.
Karena Ia adalah anak tertua, Ia biasa dipanggil oleh anak-anak muda di desa itu dengan sebutan Tua Pek (dialek Hokkian). Dalam dialek Hokkian, Toa/Tua sendiri memiliki arti “yang paling besar, atau yang tertua”. Sementara Pek sendiri memiliki arti “paman, atau kakak“.
Sebutan tersebut merupakan sebutan paling terhormat, karena kultur masyarakat Tiongkok menghormati orang2 yang lebih tua. Mereka ber-3 tampak sangat dekat satu sama lain. Ketika pekerjaan di hari itu selesai, mereka selalu bertemu satu sama lain di satu tempat favorit mereka di desa.
Suatu hari, Chiu dan Ma, seperti biasa pergi menemui saudara tertua yang mereka segani, tetapi terkejut ketika menemukan dia duduk tidak bergerak di samping batu besar. Mereka mencoba membangunkannya, tetapi kemudian segera menyadari, bahwa sesepuh yang mereka hormati itu telah meninggal dunia.
Perasaan sedih membanjiri seisi penghuni desa, yang kemudian ikut membantu menguburnya tak jauh dari batu besar itu. Lalu ketika Chiu dan Ma meninggal, mereka juga dimakamkan di sana, di samping saudara tertua mereka yang disumpah.
Saat ini, kuburan ketiganya masih dapat ditemukan tepat di belakang kuil Sea Pearl Island Tua Pek Kong, Penang, Malaysia.
Sejak saat itu, masyarakat kemudian membangun sebuah kuil untuknya, dan menyembahnya sebagai seorang Dewa oleh masyarakat Tionghoa peranakan di Malaysia. Kepercayaannya kemudian menyebar hingga ke wilayah timur Malaysia, Singapore dan Indonesia.
Kuil Pagoda Tua Pek Kong di Sibu, Malaysia
Beliau dipercaya sebagai Dewa yang melindungi keselamatan para pelaut dalam pelayaran, yang dikenal luas di wilayah Malaya dan Indonesia.
Beliau juga dipuja oleh para buruh imigran Tiongkok (dinasti Qing) yang bekerja di perkebunan lada di Semenanjung Malaya, sekitar awal tahun 1800-an, dikarenakan banyak yang meninggal akibat malaria serta penyakit iklim tropis lainnya.
Namun masyarakat Tionghoa sendiri juga menganggap Toa Pek Kong sebagai Dewa perdagangan dan kekayaan (rezeki). karena melindungi para pekerja dari sakit dan kecelakaan, sehingga mereka dapat fokus untuk bekerja mencari kekayaan; serta akan memberkahi orang2 yang berhati baik.
Di Sarawak – Malaysia Timur, ada sekitar 76 kuil Tua Pek Kong yang tersebar disana. Di Batam, Indonesia, Kuil Tua Pek Kong yang paling terkenal terletak di Nagoya (Lubuk Baja).
Menurut penulis, Dewa Tua Pek Kong sendiri dapat dianggap seperti “Dewa Lokalnya” masyarakat Tionghoa di wilayah Malaya (Malaysia). Ini halnya seperti Dewa Wong Tai Sin (黄大仙; Huang Daxian) di Hongkong.
Karena kesamaan fisiknya juga (visualisasi), masyarakat Tionghoa sendiri sering keliru dalam membedakan, antara Tua Pek Kong dan Tu Di Gong.