Security

Practical guides on cryptography, authentication, and secure coding. Covers JWT, hashing algorithms, HMAC, Base64 encoding, and password security - with code examples and common pitfalls to avoid.

← Dev Blog

Password Security and Entropy: Why Length Beats Complexity

A technical guide to password entropy for developers. Covers entropy calculation, character sets, passphrases vs random strings, brute force and rainbow table attacks, and secure password generation.

Last Thursday

Base64 Encoding Explained: How It Works and When to Use It

A thorough guide to Base64 encoding for developers. Covers the encoding algorithm, all variants (standard, URL-safe, MIME), real use cases, common mistakes, and code examples in PHP, Python, and JavaScript.

Last Tuesday

JWT Deep Dive: Structure, Algorithms, and Security Pitfalls

A thorough guide to JSON Web Tokens for developers. Covers the three-part structure, signing algorithms (HS256, RS256, ES256), standard claims, and the most common security vulnerabilities to avoid.

21 February