When PHP queries the content of the text field of the MSSQL database, if the content is too long, part of the content will be intercepted. This may not be the result we want. Solution:
1. Modify the php.ini file
Open the php.ini file and search for mssql.textlimit. You can find the following content: (Recommended learning: PHP video tutorial)
;Valid range 0 - 2147483647. Default = 4096. ;mssql.textlimit = 4096 ; Valid range 0 - 2147483647. Default = 4096. ;mssql.textsize = 4096
Put mssql.textlimit = 4096 and mssql.textsize = 4096 Remove the semicolon in front of the two lines, change the value to a larger value, and restart the service.
2. Set through ini_set
The above is the solution when you have server management permissions. Maybe sometimes we don't have server management rights, so we can only set it up on the program.
@ini_set( mssql.textsize , 200000) ;
Add this sentence to complete the setting.
3. Solve the problem by executing SQL statements
For example: mssql_query ('SET TEXTSIZE 65536', $myConn);
where , $myConn is the data connection identifier. This is a relatively primitive way of writing. What it means is to execute a SQL statement like 'SET TEXTSIZE 65536'.
Note: If the field type is ntext, sometimes garbled characters will appear, which looks like the content has been intercepted abnormally. In this case, the content can be converted into text type in the SQL statement, written as follows:
select id,convert(text,content) as content from news
The above is the detailed content of How to get text field in php. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SublimeText3 English version
Recommended: Win version, supports code prompts!

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

Dreamweaver Mac version
Visual web development tools

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools
