Sandbox99 Chronicles
From My Sandbox to Yours — Practical IT Insights.
About this site
Welcome to Sandbox99.cc – a space where I share my IT journey, lessons learned, and practical insights. The tagline “Learning IT by Doing, Sharing What I Know” captures the essence of this blog. Every article here is based on my real-world experiences, reflecting what I’ve encountered, solved, and applied in my day-to-day IT work.
Why Sandbox99.cc?
This blog is my digital sandbox – a place to experiment, document, and share the knowledge I’ve gained from hands-on work, training, and personal projects. Unlike traditional resources that might focus on theory, I prefer to write about practical scenarios, offering genuine insights and lessons that others might find useful.
Expand your IT perspective — Follow me on LinkedIn and share your views!
Recent Blog Post
Web Application Architecture: Your Blueprint for Robust IT Systems
Introduction Every time you interact with a website – whether it's checking your email, Browse an online store, or streaming a video – you're engaging with a web application. These applications are complex systems, and understanding their underlying structure, or...
Penetration Testing Explained: Your Guide to Ethical Hacking & Digital Defense
Hacking with a Purpose 🚀 In the ever-evolving digital landscape, the terms "hacking" and "cybersecurity" often conjure images of shadowy figures and complex code. But what if we told you there's a side of hacking that's not just legal, but absolutely essential for...
Build the Ultimate Terminal on Linux: WezTerm + Zsh + Powerlevel10k
🚀 Introduction I recently made the leap from Linux Mint to Pop!_OS, and its default GNOME Terminal can feel pretty basic, especially if you're coming from a setup like mine. On my macOS, I've long enjoyed a modern, visually rich, and highly customizable terminal...
Linux File Truncation: Wipe File Contents Without Deleting the File
Introduction Have you ever found yourself needing to clear the contents of a file in Linux, but without actually deleting the file itself? Perhaps a rapidly growing log file is eating up disk space, or you need to reset a temporary data file for an application without...
The Unsung Stage: Why Penetration Test Reporting is Your Most Critical Deliverable
Introduction In our previous discussion, we explored the five foundational stages of ethical hacking: reconnaissance, scanning and enumeration, gaining access, maintaining access, and clearing tracks. For those familiar with professional penetration testing or...
Hacking for Good: Unpacking the Five Stages of Ethical Hacking
Introduction In a world increasingly reliant on digital infrastructure, the battle against cyber threats is constant. But what if there were individuals who could think like the bad guys, without being the bad guys? Enter the world of ethical hacking, a crucial...






