Sandbox99 Chronicles
From My Sandbox to Yours — Practical IT Insights.
About this site
Welcome to Sandbox99.cc – a space where I share my IT journey, lessons learned, and practical insights. The tagline “Learning IT by Doing, Sharing What I Know” captures the essence of this blog. Every article here is based on my real-world experiences, reflecting what I’ve encountered, solved, and applied in my day-to-day IT work.
Why Sandbox99.cc?
This blog is my digital sandbox – a place to experiment, document, and share the knowledge I’ve gained from hands-on work, training, and personal projects. Unlike traditional resources that might focus on theory, I prefer to write about practical scenarios, offering genuine insights and lessons that others might find useful.
Expand your IT perspective — Follow me on LinkedIn and share your views!
Recent Blog Post
cURL Pentest Cheatsheet — Requests, Exploitation & Brute Forcing
Introduction curl is a command-line HTTP client that doubles as a surgical pentesting tool — crafting raw requests, testing auth mechanisms, exploiting web vulnerabilities, and automating recon without firing up a full framework. If you live in a terminal, this is...
Automating Docker Setup on Linux Mint (and Other Ubuntu Derivatives)
Introduction Setting up Docker and Docker Compose on an Ubuntu derivative like Linux Mint can occasionally throw a wrench in your gears. The main culprit? The official Docker repository expects standard Ubuntu codenames (like jammy or noble), while your system...
The “Pro” Choice: Managed vs. Self-Hosted WordPress: A Security Engineer’s Perspective
Introduction If you’re an IT pro, you know the itch. You look at a cloud provider’s pricing for a raw Linux instance and think, "I can build a WordPress stack for $5 a month and have total control." It’s tempting. As a Security Engineer, I’ve been there—obsessing over...
The IT Pro’s Guide: Why Startups Need Professional Email Domains
Introduction As a Senior Platform Engineer, I’ve seen it all—from massive corporate data breaches to small startups losing their entire client list because of a single hacked password. When you’re starting a business or running an SMB, every penny counts. I get it. To...
Authelia: The Open-Source Gateway to Secure Authentication
Introduction In today’s IT landscape, security is no longer optional—it’s a necessity. Whether you are managing a self-hosted blog, a file server, or a complete production environment, protecting your applications from unauthorized access is critical. This is where...
Webtop: A Linux Desktop Environment in Your Browser
Introduction In my previous blog, I discussed building a Debian XFCE desktop inside Docker — walking through the process of creating an image from a Dockerfile and customizing it to fit specific needs. That approach is powerful, but it requires manual setup and...






