Developer Guides
In-depth explainers on the formats, protocols, and concepts behind the tools on this site. Each guide is written to be technically accurate and practically useful - covering real-world use cases, common mistakes, and the reasoning behind best practices.
Pillar Guides
JSON: The Complete Developer Guide
Structure, syntax rules, schema validation, type coercion gotchas, and when JSON is the wrong choice. Everything you need to work with JSON confidently in production.
JWT: How It Works and Where It Goes Wrong
A full breakdown of the header, payload, and signature. Algorithm selection, expiry handling, common vulnerabilities, and how to actually verify a token correctly.
IP Addressing: IPv4, IPv6, CIDR, and Subnetting
How IP addresses are structured in binary, hex, and decimal. CIDR notation, subnet masks, private ranges, and the address format conversions engineers need daily.
Cryptographic Hashing: A Practical Guide
What hash functions actually do, the difference between MD5, SHA-1, SHA-256, and SHA-512, when each is appropriate, and how hashing differs from encryption.
Web Security Headers: CSP, HSTS, and Beyond
How Content Security Policy, Strict-Transport-Security, X-Frame-Options, and other response headers actually protect your application and users.
Deep Dives
Base64 Encoding: What It Is and What It Isn't
The full mechanics of Base64 and Base64url, where you encounter it in JWTs, HTTP auth, and data URIs, and why encoding is not the same as encryption.
CIDR Subnetting Explained with Real Examples
How to read CIDR notation, calculate host ranges and broadcast addresses, build subnet plans for real infrastructure, and understand VPC and firewall rules.
Hash Algorithm Comparison: MD5, SHA-1, SHA-256, SHA-512
Side-by-side comparison of output length, collision resistance, performance, and current security status. Which algorithm to use and which to stop using immediately.
Regex Fundamentals for Developers
Character classes, quantifiers, anchors, groups, and lookaheads. How to read and write patterns that actually work, with examples from log parsing and validation.