website spell check user manual


INTRODUCTION

This document presents information for users of the accuratespelling.com spell check service. Most of the operations described in this handbook are performed from within the secure areas of the site.

html spell check features
html character entities
ascii code charts
english language spelling rules


QUICKSTART

Simple Account Setup Sequence

There are only 3 steps to a default spell check setup.

REPORTS AND GRAPHS

sample reports page


WORKING WITH SPELL CHECK JOBS

Creating Jobs
Use the job settings menu selection to navigate to the job control page. To add a job, click on the add new server target link. An input screen will be displayed at the top of the page. Space is provided for:

The url will start with http: if it is a normal site, and https: if it is a secure site. If the site requires a user login, then the optional user fields must be completed. The site administrator must ensure that those credentials are permitted to access the site.

Once you are satisfied with the settings, click the save settings button to add the job to your account.

Modifying Jobs
All existing jobs are displayed after you click on the job settings menu selection. To modify the main settings, click on the job name to access the settings edit panel.

Scheduling Jobs
All existing jobs are displayed after you click on the job settings menu selection. To modify the schedule settings, click on the schedule link of the job to set or review the job schedule.

The schedule settings permit the setting or cancellation of a job start time, and repetition pattern.

The optional advanced settings are bandwidth limit, directory scanning depth, and the maximum number of pages. If these are not set, the crawler will scan all eligible pages at all directory depths at it's normal retrieval rate.

Job Completion Notification
Users are notified of job completion by an email sent to the email account used to register for the service. The email is sent as the last step after processing the retrieved pages. At that time, the reports are ready for viewing.


WORKING WITH CUSTOM DICTIONARIES

Maintaining custom dictionaries
To access the custom dictionaries page click on the dictionaries menu link.

Use the drop down selection menu to specify the dictionary you wish to work with.

Multiple words to be added to the dictionary are added one word to a line in the text box area. If you have a list from another source, you can use the clipboard to paste them into the text box.

After entering the words, click the save words button to add them to the dictionary.


WORKING WITH SPELL CHECK REPORTS

Accessing Reports
The central access point for reports is the job reports menu link. The job reports page lists summary information of all reports performed for the account. Active reports have a clickable name link.

Click on the name link to access the reports for that job.

Site Summary Reports and Graphs
The site summary page displays overall statistics for the complete job. The graphs contain histograms for word lengths, page lengths and error counts. Click on the view page details navigation link to access the page summary.

Page Summary Report
The page summary report lists a number of statistics for each page. There are three types of navigating links. The page number links open the detailed page report of a particular page. The url link opens the page itself in a new window. And, the section links open new summary reports covering the numbered page range.

Page Detail Report and Graph
The page detail report is reached by clicking on the page number in the page summary report. The graph displays a histogram of the word lengths found in the page. The url link immediately below the graph allows the user to see the actual page.

The view tag map link at the top of the report will open a html tag map of the page.

Clicking the omit page in future scans link will hide the page from future reports. This is useful for static pages that have been reviewed and no longer need review in the future.

The first text section of the report lists each suspect word that was not found in the standard or custom dictionaries. The word is preceded by the number of occurrences in the page. A clickable dictionary link is provided which opens a query to an online dictionary service. The ignore link will add the the word to your custom dictionary.

The second text section of the report is the highlighted words section. Highlighted words are words that appear in both the body and other tags with semantic meaning. Each word is accompanied by two numbers, the first is the tag bitmap and the second is the occurrence count. The tag bitmap number is clickable. When it is clicked, a message will be displayed listing the tags in which the word appears.

HTML Tag Map
The html tag map is an indented listing of the html tags appearing in the page which identifies the structure of the page. This is a simple way of determining whether the page structure being delivered matches the intended structure. The tag structure is important in helping automated processes understand the relative importance of the words contained within the nested structures. This map is usually of interest only to advanced users.


EMAIL AND ACCOUNT REMOVAL

All users are able to independently deactivate the sending of emails to their email address by using the email removal page. All request are confirmed through an automated validation link to avoid fraudulent account changes. In the case of an administrator, deactivating the default email address will close the account completely. Changes to the administrator account without closing the account are performed through the administrator account page.


USER ACCESS

Browser Requirements
The administration site requires javascript and session cookies to be enabled on your browser. Many users can use the site without any changes to their browser settings. If you do not normally have these turned on, you can limit these features to this site by using the customisation features of your browser. The login page will warn you if these features are not detected during login.

User Security
The basis of the security features built into the system is the session cookie created when the user logs in. The session cookie will continue to exist until either the browser is completely closed down or the user explicitly logs out. If the user only closes the particular browser window, the session cookie will remain available to anyone using the browser.

While it may be acceptable for the user to only close the window in a trusted environment, it is absolutely necessary to log out explicitly when using the system in an insecure environment such as an internet cafe. Also remember to clear the browser cache when in an insecure environment.

User Login
To login, a user should click on the user login link available from the menu.. Attempts to access any protected area of the site while not logged in will be redirected to the login page.

User Logout
To logout a user should use the logout selection in the main menu.

User Lockout
Automatic system access protection has been implemented to prevent password guessing. Any user who fails to login correctly within three attempts will be refused further login attempts for a period of sixty minutes.

The user account is automatically enabled again after the delay period and the user will be able to login again if the proper credentials are supplied. There is no need to contact support for manual intervention. The procedure is entirely automatic.

There is no feedback to the user as to which element of the supplied credentials are incorrect or invalid. This design discourages casual account probing and dictionary attacks.

Password Recovery
If a user forgets their password, the user can request a password reminder be sent by email to their email account by supplying the registered email account.

A reminder will only be sent if the account exists on the system. To avoid account probing, there is no indication to a user whether the account exists or not. These reminders are created automatically by the system and sent immediately.

If a user account needs to be completely reset because the user has lost access to the email account, it will be done only upon proof of authority that is acceptable to the system administrators.

This method of recovery is considered to be an exceptional circumstance and will be subject to significant delay due to the nature of the request.

Login Information
Any user can change their email address and password using this menu selection. When changes are made, they are recorded by the system as pending changes and one or more confirmation emails are sent by the system. The changes become effective when confirmed by following the instructions contained in the email.

A password change will only require one email. An email address change will result in two emails. A warning email is sent to the old email address with instructions on preventing an unauthorised change. A confirmation email is sent to the new email address with instructions on confirming the new email address.

These measures protect the accounts from unauthorised changes by requiring the party requesting the change to prove access to the email accounts and that the new email address is valid.


ACCOUNT INFORMATION

Account information is entirely optional. If it is left blank, the account management page will not have any details to display to the user. The account management page permits the editing of account information and the addition of sites associated with the account.


AGENT IDENTIFICATION

Page requests from testing activity in site logs can be identified by means of the user-agent header. The user agent is identified as:

Mozilla/4.0 (compatible; MSIE 6.0 Windows 2000; http://accuratespelling.com/)

Page requests will not appear in web analytics reports that depend on javascript or beacon images because the images are not requested and javascript is not processed during testing.


source: accuratespelling.com