Hacking with a Purpose 🚀 In the ever-evolving digital landscape, the terms "hacking" and "cybersecurity" often conjure images of shadowy figures and complex code. But what if we told you there's a side of hacking that's not just legal, but absolutely essential for...
Sandbox99 Chronicles
From My Sandbox to Yours — Practical IT Insights.
Build the Ultimate Terminal on Linux: WezTerm + Zsh + Powerlevel10k
🚀 Introduction I recently made the leap from Linux Mint to Pop!_OS, and its default GNOME Terminal can feel pretty basic, especially if you're coming from a setup like mine. On my macOS, I've long enjoyed a modern, visually rich, and highly customizable terminal...
Linux File Truncation: Wipe File Contents Without Deleting the File
Introduction Have you ever found yourself needing to clear the contents of a file in Linux, but without actually deleting the file itself? Perhaps a rapidly growing log file is eating up disk space, or you need to reset a temporary data file for an application without...
The Unsung Stage: Why Penetration Test Reporting is Your Most Critical Deliverable
Introduction In our previous discussion, we explored the five foundational stages of ethical hacking: reconnaissance, scanning and enumeration, gaining access, maintaining access, and clearing tracks. For those familiar with professional penetration testing or...
Hacking for Good: Unpacking the Five Stages of Ethical Hacking
Introduction In a world increasingly reliant on digital infrastructure, the battle against cyber threats is constant. But what if there were individuals who could think like the bad guys, without being the bad guys? Enter the world of ethical hacking, a crucial...
Writing ISO to USB in Linux Using dd (with Caution!)
Introduction Creating a bootable USB drive is often the first step toward installing or testing a Linux distribution. Whether you're setting up a new system, repairing an existing one, or simply exploring different distros, having a reliable installer on a USB stick...