Guides
In-depth references that go beyond the tool UI — concepts, structure, common pitfalls, and safe usage patterns.
- What is JWT? Token Structure and Secure Use
JSON Web Token (JWT) explained from header/payload/signature to verification, secret rotation, and common security pitfalls.
~9 min
- Base64 Encoding — How It Works and When to Use It
Base64 is binary-to-text encoding, not encryption. Understand padding, URL-safe variants, common pitfalls, and the encoded size overhead.
~7 min
- UUID vs ULID — Which Identifier Should You Use?
UUID v4, UUID v7, ULID, and Snowflake compared on sortability, database performance, URL friendliness, and collision risk.
~8 min
- Regex Tutorial — From Basics to Lookarounds and Catastrophic Backtracking
Hands-on regex tutorial covering character classes, quantifiers, groups, lookaround, and the catastrophic backtracking patterns to avoid.
~10 min
- Cron Expression Guide — Syntax, Timezones, and Common Mistakes
Cron field-by-field syntax, special tokens, timezone behavior across Unix cron, Kubernetes, and AWS, and the patterns that cause silent failures.
~8 min