Skip to main content

Typographical Errors | Diving Deep into Typographical Errors and Mistakes

Typographical Errors

 

 

Most of this blog was put together with the help of ChatGPT. This was put together to create a typographical error generator given any string.

 

What is a Typographical Error?

A typographical error, commonly known as a "typo," is a mistake made in the typing or printing process of written material. These errors can arise from inadvertent keystrokes, inattention, or misjudgment during the editing phase. While they might seem minor, typos can sometimes alter the meaning of a sentence or lead to misunderstandings. They occur in various forms, including the omission, addition, transposition, or substitution of characters. With the advent of digital writing tools, auto-correct functions have also become a frequent source of unintentional typos. Regardless of their origin, it's essential for writers, editors, and publishers to thoroughly review content to ensure clarity and accuracy.

 

What are the types of Typographical Errors?

 

1. Substitution 

A substitution typo occurs when one character or set of characters is mistakenly replaced with another in the course of writing or typing. This form of typographical error can result from quick or inaccurate keystrokes, where a letter adjacent to the intended one on the keyboard is pressed, or from cognitive lapses where the writer misconstrues the correct spelling of a word. Such errors can be particularly problematic because they might produce another valid word, making the error harder to detect through spellcheck tools. For instance, substituting "form" with "from" might not be caught by automated spellcheckers but can change the entire meaning of a sentence.

Examples:

  1. Original: "piece" Typo: "peace"

  2. Original: "trail" Typo: "trial"

 

2. Transposition 

 

A transposition typo occurs when two adjacent characters are swapped in the course of typing or writing. This type of error is often a result of hasty typing or miscoordination of fingers, especially when touch-typing. Such mistakes can sometimes produce another valid word, but more often, they result in recognizable misspellings.

Examples:

  1. Original: "sample" Typo: "sapmle"

  2. Original: "friend" Typo: "freind"

     

3. Omission 


An omission typo occurs when one or more characters are unintentionally left out of a word or phrase during the typing or writing process. This kind of error can stem from rapid typing, distractions, or oversight during editing. Omitted characters might lead to words that are either nonsensical or, in some cases, form other valid words, potentially changing the intended meaning.

Examples:

  1. Original: "beginning" Typo: "begining"

  2. Original: "accidentally" Typo: "accidentaly"

     

 4. Insertion

An insertion typo happens when one or more extra characters are inadvertently added to a word or phrase during the writing or typing process. Such errors often arise from accidental double key presses, misjudgments in spelling, or overzealous auto-correction features. These unintended additions can distort the intended word or even inadvertently produce another valid word.

Examples:

  1. Original: "reading" Typo: "reaading"

  2. Original: "message" Typo: "messsage"

     

 5. Cognitive Errors


Cognitive errors in the context of typing and writing refer to mistakes that arise from misconceptions or misunderstandings about the correct form or spelling of a word. Unlike other typos that might result from physical typing mistakes, cognitive errors stem from genuine gaps or confusions in the writer's knowledge. These errors can be especially challenging to detect because they might not be flagged by spellcheckers if the incorrectly chosen word is a valid word itself 

Examples:

  1. Original: "definitely" Typo: "definately"

  2. Original: "separate" Typo: "seperate"

     

 6. Homophones and Homonyms


Homophones are words that sound the same but may have different meanings, origins, or spelling. Errors with homophones occur when a word is substituted with another word that sounds identical or very similar, leading to a change in meaning.

Homonyms, on the other hand, are a broader category that includes both homophones (words that sound alike) and homographs (words that are spelled the same). Homonyms can cause confusion if used in the wrong context.

 

Examples:

  1. Homophone: Original: "they're" Typo: "their" or "there"

  2. Homograph/Homonym: Original: "lead" (to guide or direct) Typo: "lead" (a type of metal)

 

7. Double Characters

Double character errors refer to typographical mistakes where a character is unintentionally repeated, resulting in an incorrect word or phrase. These errors often occur due to accidental prolonged key presses or a brief lapse in attention while typing. Double character errors can sometimes be overlooked, especially if a word's spelling is unfamiliar or if the mistake does not produce another valid word, making it essential to proofread texts carefully.

 

Examples:

  1. Original: "apple" Typo: "aapple"

  2. Original: "begin" Typo: "beggin"

 

8. Auto-correct Errors

Auto-correct errors occur when software-based typing aids, designed to help correct spelling or typing mistakes, inadvertently change a correctly typed word to something different, often based on algorithmic predictions or word frequency. While auto-correct features aim to enhance typing speed and accuracy, they can sometimes introduce unexpected and even humorous errors, especially when the context is not well-understood by the software. These mistakes can be particularly problematic in professional or formal contexts and highlight the need to review any auto-corrected content before finalizing it.


 


 

Comments

Popular posts from this blog

Mysterious Javascript Code Found Infecting Hundreds of Websites

  After installing Wappalyzer in my browser, I decided to test its functionality by visiting a familiar website. To my surprise, I was unexpectedly redirected to a spear phishing campaign. Knowing the website's usual practices, it seemed highly unlikely that they would intentionally redirect their visitors in such a manner. Intrigued by this anomaly, I took it upon myself to investigate the underlying cause of this redirection.   I have not yet known how threat actors implanted the Javascript Code in the victim's application but this is what it looked like.         What does the code do?   The code is simply importing script from biggerfun[.]org domain. In other words, it's simply doing <script src="biggerfun[.]org"></script> Further investigation I wanted to check if others think the website is bad, so I looked into it more. I observed they do things similar to another group called TA569. You can learn more about TA569 here: ...

Getting unlimited money by abusing the 'Send Money' feature

      It has been a while since I published a post. So, I am writing this one to share one of my interesting finding while testing an e-wallet application.     I glanced at my Total Balance and I was wondering if there was a way for me to increase it arbitrarily. So, I thought Race Condition would help me here.  What is a Race Condition vulnerability? "A race condition vulnerability typically occurs when your application has access to the same shared data and attempts to change variables within it simultaneously ." - automox.com So, I loaded up Turbo Intruder in Burp Suite and attempted testing it. I failed. I couldn't exploit it.  I didn't want to give up this soon. I kept that fire bottled up and changed my approach. I realized that the 'Send Money' feature uses basic maths to reduce balance from the sender's account and add it to the receiver's account. So, the feature did the following operations:   function sendMoney(sender, receiver, amoun...

Finding ways to misuse application features | An example

I am publishing this without reviewing or re-reading. I apologize if you see any mistake here. Have a great day!  Introduction  Hi, I hope you are well. I am writing this blog after a long time so some of my writing skills might have faded away. Talking about skills, I've mastered one, and it is my ability to spend unlimited amount of time trying to understand every single feature of a target application. Sometimes I find a way to leverage those features  into vulnerabilities other times I end up learning a lot of things from them. So, I'm using this article as a means to share one of the findings that ended up being duplicate.  Bypassing email verification step when registering new email addresses    I was looking at a bug bounty program and I found an application that allowed anyone to register and login to it. So, I created an account to poke around with the features. The first feature I looked at was the registration feature itself. When I created an ac...