Tech Glossary

Comprehensive definitions for all the technical concepts, data formats, and computing algorithms utilized across UniversalTools.

Base64 Encoding

Data Formats

A group of similar binary-to-text encoding schemes that represent binary data in an ASCII string format by translating it into a radix-64 representation.

Base64 is not an encryption mechanism—it is easily decodable by anyone. It is used primarily to encode binary data (like images or encrypted keys) so it can be safely embedded into text-based formats that only support safe ASCII characters, such as CSS files, HTML attributes, or JSON bodies in API requests. Encoding data to Base64 increases document size by roughly 33%.

Bcrypt

Security

A password-hashing function designed by Niels Provos and David Mazières, based on the Blowfish cipher.

Unlike MD5 or simple SHA algorithms, Bcrypt is highly resistant to brute-force search attacks because it deliberately is slow. It implements "key stretching" with an adjustable computational cost parameter (work factor). As computers get faster natively, developers can trivially increment the work factor to ensure the time taken to hash a password remains high enough to thwart attackers, while being virtually imperceptible to the end user logging in.

Cron

Web Development

A time-based job scheduler in Unix-like computer operating systems.

The name "cron" stems from the Greek word for time, chronos. Users configure cron jobs using a cron expression—a string comprising five or six fields separated by white space that represents a set of times (e.g., `0 0 * * *` executes a task at midnight every single day). It is used to automate backups, clear cache folders, send out daily digest emails, and maintain server health.

Encryption vs. Hashing

Security

Two core data protection methodologies often confused for one another; encryption is a two-way function while hashing is a one-way function.

When data is encrypted, the objective is to conceal it until it is required. It is run through an algorithm with a secret key, and can later be perfectly decrypted if you possess that identical key. Hashing, however, is permanent. Once data is hashed, it cannot be un-hashed. Hashing is used for storing sensitive payloads like user passwords (so even the server engineers don't know the true password), whereas encryption is used for transmitting secrets over networks (like credit card numbers via SSL).

Sponsored
ADVERTISEMENT

IP Address (Internet Protocol)

Networking

A unique block of numbers that identifies each computer or device communicating over a computer network utilizing the Internet Protocol.

It executes two principal functions: host network interface identification and spatial location addressing. The older standard, IPv4, consists of four numbers separated by periods (e.g., 192.168.1.15). Due to the explosive proliferation of digital devices exhausting available IP combinations, IPv6 was introduced, formatted as eight groups of four hexadecimal digits, dramatically expanding the pool of available unique addresses.

JSON (JavaScript Object Notation)

Data Formats

A lightweight, text-based data interchange format that is easy for humans to read and write and easy for machines to parse and generate.

JSON is built on two structures: a collection of name/value pairs (like an object or dictionary) and an ordered list of values (like an array). It is incredibly common in modern web services; heavily utilized for API responses across all programming languages due to its minimal footprint and native Javascript support.

JWT (JSON Web Token)

Security

An open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object.

JWTs are commonly used for authorization and information exchange. They consist of three parts separated by dots (xxxxx.yyyyy.zzzzz): a Header indicating the algorithm, a Payload containing the claims, and a Signature used to verify that the sender is who it says it is and the message wasn't changed along the way. Because it is signed, you can trust the data inside it without a database query.

MD5 (Message-Digest Algorithm)

Security

A widely used cryptographic hash function producing a 128-bit (16-byte) hash value, usually expressed in text format as a 32 digit hexadecimal number.

Historically, MD5 was used as a secure password hashing mechanism. However, over time, extensive vulnerabilities have been found, displaying its susceptibility to collision attacks (where two different files output the same hash). Today, MD5 is strictly used as a checksum to verify data integrity against unintentional corruption rather than secure cryptography.

Minification

Web Development

The process of removing all unnecessary characters from source code without changing its functionality.

During minification, tools (like UglifyJS or CSSNano) will strip out whitespace, line breaks, block delimiters, and comments. Some minifiers go further by shortening variable and function names. This massively reduces file overhead sizes, leading to faster web page download speeds and better Google Core Web Vitals rankings.

Regular Expression (Regex)

Web Development

A sequence of characters that specifies a search pattern in text.

Usually such patterns are used by string-searching algorithms for "find" or "find and replace" operations on strings, or for input validation. They are notoriously powerful and concise but incredibly difficult for humans to quickly read. An example Regex to validate an email address looks like: `^[\w-\.]+@([\w-]+\.)+[\w-]{2,4}$`. It is a foundational tool in any developer parsing data.

SHA-256

Security

Secure Hash Algorithm 256 is a novel cryptographic hash function that produces a 256-bit (32-byte) signature.

Considered extremely secure in modern computing, SHA-256 is utilized heavily in Internet security protocols like SSL/TLS, and it is the foundational algorithm that powers the Bitcoin blockchain network. It takes an input (ranging from a simple string to a petabyte file) and returns an absolutely unique, fixed-length 64-character hexadecimal string. Attempting to reverse a SHA-256 hash is currently computationally impossible.

SVG (Scalable Vector Graphics)

Media

An XML-based vector image format for two-dimensional graphics with support for interactivity and animation.

Unlike traditional raster formats like JPEG or PNG (which define pixels), SVGs define shapes using mathematical formulas written in XML code. Because of this, an SVG image will retain its crisp definition and high quality no matter how large it is scaled up, without increasing its file size. SVGs are fundamentally perfect for logos, UI icons, and flat illustration vectors.

URI/URL Encoding

Networking

A mechanism for encoding information in a Uniform Resource Identifier (URI). Often called percent-encoding.

URLs can only be sent over the Internet using the US-ASCII character set. Since URLs often contain characters outside the ASCII set (like spaces, Arabic text, or emojis), the URL must be converted into a valid ASCII format. URL encoding replaces unsafe ASCII characters with a "%" followed by two hexadecimal digits. For example, a space (" ") becomes "%20", and an ampersand ("&") becomes "%26".

UUID (Universally Unique Identifier)

Data Formats

A 128-bit label used for information in computer systems, guaranteed to be unique across space and time without a central point of coordination.

Often represented in a standard 36-character string format with hyphens (e.g., 123e4567-e89b-12d3-a456-426614174000). There are several versions, but Version 4 (randomly generated) is the most popular for generating completely unpredictable API keys, session IDs, and database primary keys. Due to their massive 128-bit space, the probability of generating a duplicate UUID is so close to zero that it is generally ignored.

WebP

Media

A modern image format developed by Google that provides superior lossless and lossy compression for images on the web.

WebP lossless images are 26% smaller in size compared to PNGs. WebP lossy images are 25-34% smaller than comparable JPEG images at an equivalent standard of quality indicator (SSIM). WebP also supports transparency (alpha channel) while providing lossy compression, which neither JPEG nor traditional PNG can do effectively. The vast majority of modern browsers now natively support WebP.

System Upgrade in Progress

We're currently upgrading our tools and internal infrastructure to bring you a faster, more powerful experience. UniversalTools will be back soon with exciting new features.

00
Days
00
Hours
00
Minutes
00
Seconds
Scheduled completion: June 1st, 2026