diff --git a/Clickjacking/README.md b/Clickjacking/README.md
index a55f425f..512a1177 100644
--- a/Clickjacking/README.md
+++ b/Clickjacking/README.md
@@ -20,7 +20,7 @@
* [XSS Filter](#xss-filter)
* [IE8 XSS filter](#ie8-xss-filter)
* [Chrome 4.0 XSSAuditor filter](#chrome-40-xssauditor-filter)
-* [Challenge]
+* [Challenge](#challenge)
* [Practice Environments](#practice-environments)
* [Reference](#references)
@@ -149,13 +149,14 @@ Example in HTML meta tag:
```
* The previous technique requires the user interaction but, the same result, can be achieved without prompting the user. To do this the attacker have to automatically cancel the incoming navigation request in an onBeforeUnload event handler by repeatedly submitting (for example every millisecond) a navigation request to a web page that responds with a _"HTTP/1.1 204 No Content"_ header.
-`204 page`
+
+
_204 page:_
```php
```
-`Attacker's Page`
+_Attacker's Page_
```js