While building a file verification tool recently, I revisited hash algorithms. Many developers know terms like MD5 and SHA, but few understand the …
Posts for: #Tutorial
Git Cheatsheet Architecture: From Command Organization to Search Filtering
My team recently got some new interns who keep forgetting Git commands. I tried several cheatsheets online, but they were either static pages witho…
Duplicate Line Finder: From Brute Force to Map Optimization
I was dealing with a log file containing tons of duplicate error messages. Manual checking was too slow, so I built a tool. Here are the different …
Integrating Excalidraw: Building an Online Diagramming Tool
I needed an online diagramming tool recently. After evaluating several open-source options, I chose Excalidraw. It’s free, open-source, powerful, a…
From String to Timeline: Building a Cron Expression Parser
I was building a scheduled task management dashboard and needed users to configure execution times. Initially, I thought about letting them enter C…
From RGB to WCAG: Understanding Color Contrast Calculation
During an accessibility audit, I found several color combinations in our design system that didn’t meet contrast requirements. When the designer as…
From Cyclomatic Complexity to Code Quality: Building an Online Code Analyzer
During code reviews, I often encounter “spaghetti code” — functions with hundreds of lines and seven or eight nested if-else blocks. To quantify co…
What 755 Really Means: A Closer Look at Unix File Permissions
Every developer who’s touched a Linux server knows chmod 755. But have you ever stopped to think about why read is 4, write is 2, and execute i…