Tagged articles
7 articles
Page 1 of 1
MaGe Linux Operations
MaGe Linux Operations
May 6, 2022 · Backend Development

Master Go’s net/url: URL Parsing, Escaping, and Query Handling Explained

This article provides a comprehensive guide to Go's net/url package, covering import methods, key functions like PathEscape, PathUnescape, QueryEscape, QueryUnescape, as well as the URL type fields and methods such as Parse, ResolveReference, and utilities for query manipulation, all illustrated with practical code examples.

BackendGoURL parsing
0 likes · 16 min read
Master Go’s net/url: URL Parsing, Escaping, and Query Handling Explained
Sohu Tech Products
Sohu Tech Products
Feb 23, 2022 · Mobile Development

iOS Closures – Part Two

This article provides an in‑depth exploration of Swift closures on iOS, covering their definition, three forms, practical use cases, underlying SIL generation, capture lists, context capture, storage mechanisms, escaping and autoclosure variants, and important memory‑management considerations such as reference cycles.

Capture Listautoclosureclosure
0 likes · 17 min read
iOS Closures – Part Two
Programmer DD
Programmer DD
Jun 22, 2021 · Databases

Mastering Backslash Escapes in MySQL: Insert & SELECT Gotchas

This article explains how MySQL treats backslashes in INSERT and SELECT statements, demonstrates the resulting storage differences with practical examples, and clarifies the double‑escaping rules that developers must handle to avoid unexpected query results.

Insertbackslashescaping
0 likes · 6 min read
Mastering Backslash Escapes in MySQL: Insert & SELECT Gotchas
Qunar Tech Salon
Qunar Tech Salon
Oct 18, 2018 · Information Security

XSS Attacks: Introduction, Classification, Prevention, and Detection

This article explains the fundamentals of Cross‑Site Scripting (XSS) attacks, presents real‑world examples, classifies stored, reflected, and DOM‑based XSS, and provides comprehensive prevention, detection, and mitigation techniques for frontend developers, including proper escaping, whitelist schemes, CSP, and secure coding practices.

CSPWeb SecurityXSS
0 likes · 27 min read
XSS Attacks: Introduction, Classification, Prevention, and Detection
MaGe Linux Operations
MaGe Linux Operations
Oct 3, 2018 · Fundamentals

Master Linux Shell Wildcards: How * and ? Really Work

This article explains Linux shell wildcard behavior, demonstrates common patterns with practical examples, clarifies the difference between wildcards, meta characters, and escape sequences, and outlines the shell's parsing steps, helping readers avoid common pitfalls when using * , ?, [] and {} in commands.

Command parsingLinuxMeta characters
0 likes · 6 min read
Master Linux Shell Wildcards: How * and ? Really Work
ITPUB
ITPUB
May 26, 2016 · Fundamentals

Mastering Shell Command Substitution: Backticks vs $() and Escape Tricks

This article explains shell command substitution, comparing backticks and the modern $(…) syntax, details their handling of special characters, demonstrates nesting and backslash escaping tricks across various shells, and provides practical examples and solutions for reliable quoting and path handling.

BashShellcommand substitution
0 likes · 10 min read
Mastering Shell Command Substitution: Backticks vs $() and Escape Tricks