Tagged articles
6 articles
Page 1 of 1
php Courses
php Courses
Sep 28, 2025 · Backend Development

Mastering PHP’s addcslashes(): Escape Characters Made Easy

This article explains the PHP addcslashes() function, its syntax, parameters, and practical examples for escaping specific characters—including letters, quotes, and backslashes—while also highlighting differences from addslashes() and providing clear code demonstrations.

BackendESCAPEPHP
0 likes · 3 min read
Mastering PHP’s addcslashes(): Escape Characters Made Easy
dbaplus Community
dbaplus Community
Jul 16, 2023 · Databases

Why MySQL DELETE Fails Without a Primary Key and How ESCAPE Fixes It

The article explains a puzzling MySQL DELETE failure caused by a missing primary key, shows how Navicat adds an ESCAPE clause to the generated SQL, clarifies the purpose of ESCAPE in LIKE patterns, and reveals that the real issue was a mistaken condition order in the query.

DELETEDebuggingESCAPE
0 likes · 4 min read
Why MySQL DELETE Fails Without a Primary Key and How ESCAPE Fixes It
Laravel Tech Community
Laravel Tech Community
Sep 7, 2021 · Databases

Handling Backslashes in MySQL INSERT and SELECT Statements

This article explains how MySQL treats backslashes as escape characters in INSERT and SELECT queries, demonstrates the effect of different numbers of backslashes through practical tests, and clarifies the double‑escaping required when using LIKE patterns.

ESCAPEInsertbackslash
0 likes · 6 min read
Handling Backslashes in MySQL INSERT and SELECT Statements
Aotu Lab
Aotu Lab
Oct 30, 2020 · Information Security

Can Node.js vm Sandbox Be Escaped? Understanding vm Security and Escape Techniques

This article explains how Node.js's vm module creates isolated execution contexts, demonstrates several sandbox‑escape techniques using prototype chain manipulation, and offers practical solutions such as code scanning, using vm2, or building a custom interpreter to mitigate security risks.

ESCAPEJavaScriptNode.js
0 likes · 7 min read
Can Node.js vm Sandbox Be Escaped? Understanding vm Security and Escape Techniques