Frequently Asked Questions
Common questions about SimpleTool and our developer tools.
General
What is SimpleTool and who is it for?
SimpleTool is a privacy-first set of browser-based utilities for developers, operators, and power users. Tasks like formatting JSON, decoding tokens, or generating credentials run locally in the browser instead of on our servers.
Is SimpleTool really free?
Yes. The public site is free to use, with advertising helping cover hosting and maintenance. There are no paid tiers required to access the core tools.
Do I need to create an account?
No. You can open a tool and use it immediately without creating an account or logging in.
Is my data safe? How does client-side processing work?
For most tools, processing happens locally in your browser using JavaScript and browser APIs. That means the input usually stays on your device unless you explicitly copy, export, or send it elsewhere.
Which browsers are supported?
SimpleTool supports modern versions of Chrome, Edge, Firefox, and Safari, plus up-to-date mobile browsers. Older browsers without ES modules or Web Crypto support may not work correctly.
Can I use SimpleTool offline?
Many tools continue working after the page loads because the logic runs client-side. For a dependable offline workflow, self-hosting the project is the safest option.
Security & Cryptography
What makes a password truly secure?
A secure password is long, random, and unique per service. Length and unpredictability matter more than clever substitutions or memorable patterns.
What's the difference between MD5, SHA-256, and SHA-512?
MD5 is obsolete for security. SHA-256 and SHA-512 are modern SHA-2 hashes; SHA-512 has a larger output, while SHA-256 is the common default for integrity and signing workflows.
Why is MD5 considered broken?
MD5 is vulnerable to practical collision attacks, so two different inputs can be crafted to produce the same hash. That makes it unsuitable for trust, signatures, or password storage.
What is HMAC and when should I use it?
HMAC combines a hash function with a shared secret key. Use it when you need both integrity and authenticity, such as signed API requests or webhook verification.
How does bcrypt compare to Argon2 for password hashing?
Both are purpose-built password hashing algorithms, but Argon2 is the more modern choice because it is memory-hard and easier to tune against GPU attacks. bcrypt remains common for compatibility.
What is a JWT and when should I use one?
A JWT is a compact token format for carrying claims between systems. It is useful for stateless authentication and service-to-service identity, but only when signatures, expiration, and validation are handled correctly.
How do I verify a file's integrity using hash checksums?
Compute the file hash locally and compare it with the official value from the publisher. If the hashes match exactly, the file is very likely unchanged.
What is Content Security Policy (CSP) and why does it matter?
CSP is a browser-enforced security policy that restricts where scripts, styles, images, and other resources can come from. It is one of the strongest defenses against XSS and injected content.
Data Formats
What's the difference between JSON and YAML?
JSON is stricter, more predictable, and usually better for APIs and machine exchange. YAML is easier for humans to edit, but indentation and advanced syntax can introduce hidden mistakes.
How do I validate JSON?
First check that the syntax is valid, then validate the structure against a schema if the data must follow a contract. Syntax validation alone does not guarantee the right fields or types.
What is Base64 encoding and when is it used?
Base64 is a text-safe encoding for binary data. It is commonly used in tokens, email payloads, data URLs, and transport formats that require plain text.
What are regular expressions and why are they useful?
Regular expressions are compact patterns for matching and transforming text. They are useful for validation, extraction, search, and cleanup, but they should be written carefully to avoid complexity and performance problems.
How do I convert between different timestamp formats?
Normalize the source into a clear reference such as Unix seconds, Unix milliseconds, or ISO 8601, then render it in the target format and timezone. Most timestamp bugs come from timezone and unit mismatches.
What is a UUID and when should I use one?
A UUID is a globally unique identifier that can be generated without a central database. It is useful for distributed systems, test data, and identifiers that should not be easy to enumerate.
What is JSON Schema and why should I use it?
JSON Schema defines the allowed structure, types, and rules for JSON documents. It helps keep APIs, events, and configuration files consistent and testable.
How do I compare two text files for differences?
Use a diff tool that highlights added, removed, and changed sections side by side. A visual diff is faster and safer than manually scanning large files.
Networking & Web
How do CIDR subnets and IP ranges work?
CIDR uses a prefix length to split an IP address into network and host bits. From that prefix you can calculate the subnet mask, usable range, broadcast address, and route scope.
What information does a User-Agent string contain?
A User-Agent string usually exposes the browser family, version, rendering engine, operating system, and sometimes device hints. It is useful for debugging, but it can be incomplete or intentionally misleading.
How do I use cURL to debug APIs?
Start with the method, URL, headers, and body, then add verbose output to inspect the request and response. cURL is ideal for isolating network behavior from application code.
What is SAML and how does SSO work?
SAML is an XML-based protocol used heavily in enterprise SSO. An identity provider authenticates the user and sends a signed assertion to the service provider so the user can access the app without a separate password.
What are SPF, DKIM, and DMARC in email security?
SPF authorizes sending servers, DKIM signs the message, and DMARC tells receivers how to enforce failures. Together they reduce spoofing and improve trust in incoming mail.
Developer Productivity
How do I estimate API token costs for LLMs?
Estimate the prompt tokens, output tokens, and the pricing model for your provider, then calculate cost per request and at expected volume. The most important variables are model choice, context length, and response size.
What is a cron expression and how do I write one?
A cron expression is a compact schedule definition for recurring jobs. Build it field by field, verify the timezone, and preview the next run times before putting it into production.
How do I create effective prompt templates for AI?
Use a stable structure with clear instructions, placeholders for dynamic data, and explicit output requirements. Good prompt templates are reusable, testable, and narrow enough to reduce ambiguity.