Resources
Guide

Guides

Evergreen reference pages that explain formats, security concepts, and practical utilities.

A practical reference to encoding, hashing, encryption, and signing—what they are and when to use each.

Security
Developer Reference
Encoding

A practical guide to hashing and HMAC—how they differ, what problems they solve, and how to choose the right approach for integrity and authentication.

Security
Hashing
HMAC
Developer Reference

A practical guide to authenticated encryption — what AEAD is, how AES-GCM and ChaCha20-Poly1305 work, and when to use each mode over CBC or CTR.

Security
Encryption
AES-GCM
Developer Reference

Learn how password hashing works, why MD5 and SHA-256 are insufficient for passwords, what salting and key stretching do, and which algorithm to use today.

Security
Password Storage
bcrypt
Argon2
+1

A practical explanation of TLS — what it protects, how the handshake works, certificates and trust, and common mistakes developers make.

Security
TLS
HTTPS
Developer Reference

The difference between encryption at rest and in transit — threat models, technologies, key management, real-world examples, and common mistakes.

Security
Encryption
TLS
Developer Reference

How digital signatures work — hash, sign with private key, verify with public key. Covers signature vs HMAC, real-world uses (JWTs, TLS, code signing), and common mistakes.

Security
Cryptography
PKI
Developer Reference

Avoid the most costly encryption errors: using encryption for passwords, hardcoding keys, skipping authenticated modes, ignoring certificate warnings, and more.

Security
Encryption
Best Practices
Developer Reference

A practical guide to API authentication — understand API keys, JWT, OAuth 2.0, and HMAC request signing, when to use each, and how to choose the right approach.

API
Security
JWT
OAuth
+1

A practical guide to HMAC API signing — how to sign requests with a shared secret, prevent replay attacks with timestamps, and verify webhook payloads from Stripe, GitHub, and AWS.

API
Security
HMAC
Webhooks
+1

API rate limiting controls how many requests a client can make in a given window. Covers fixed window, sliding window, token bucket, and leaky bucket algorithms, where to enforce limits, and common mistakes.

API
Security
Rate Limiting
Developer Reference

Understand the full JWT authentication flow — token structure, signing algorithms (HS256 vs RS256 vs ES256), refresh token patterns, and the vulnerabilities that break most implementations.

API
JWT
Security
Authentication
+1

A practical guide to data formats for engineers — understand CSV, JSON, XML, and Excel, when to use each, and how to validate, convert, and transform data without writing a pipeline.

Data
CSV
JSON
XML
+1

A practical guide to working with JSON data — how to validate, flatten, diff, convert, and move JSON between systems without writing a full pipeline.

Data
JSON
Developer Reference

JSON Schema is a vocabulary for defining structure and validation rules for JSON documents. Learn core keywords, practical validation workflows, and when to use JSON Schema in APIs, pipelines, and config files.

Data
JSON
Developer Reference

A practical guide to DevOps configuration and deployment — understand YAML, DNS records, SSL/TLS certificates, HTTP headers, cron schedules, and robots.txt. Includes validation workflows and common deployment mistakes.

DevOps
YAML
DNS
SSL
+1

A practical guide to SSL/TLS certificates — certificate types (DV, OV, EV), how certificate chains and trust work, how Let's Encrypt issues certificates via ACME, SANs and wildcards, and how to debug common certificate problems.

DevOps
SSL
TLS
HTTPS
+1

A practical guide to cron jobs and task scheduling — understand the five-field cron expression syntax, special strings, common patterns, timezone behaviour, and how cron works in Linux, GitHub Actions, Kubernetes CronJobs, and cloud schedulers.

DevOps
Cron
Automation
Developer Reference

A practical reference to HTTP request and response headers — what they are, common types, debugging workflows, and how headers affect caching, authentication, and browser security.

DevOps
HTTP
Networking
API

A practical guide to API and webhook integrations — request-response vs event-driven patterns, debugging API calls, inspecting webhook payloads, common integration mistakes, and the tools that make it faster.

SaaS
API
Webhooks
Backend
+1

A practical guide to debugging webhook integrations — common failure modes, step-by-step inspection workflows, logging strategies, and the tools that make it faster.

SaaS
API
Webhooks
Backend
+1

A step-by-step guide to diagnosing API request failures — from reading status codes and inspecting headers to reproducing errors with cURL and fixing CORS, auth, and payload issues.

SaaS
API
Backend
Integration

Webhook senders retry on failure — your handler will receive the same event more than once. Covers how retries work, deduplication strategies, and how to design idempotent webhook handlers.

SaaS
API
Webhooks
Backend
+1