Sandbox99 Chronicles
From My Sandbox to Yours — Practical IT Insights.
About this site
Welcome to Sandbox99.cc – a space where I share my IT journey, lessons learned, and practical insights. The tagline “Learning IT by Doing, Sharing What I Know” captures the essence of this blog. Every article here is based on my real-world experiences, reflecting what I’ve encountered, solved, and applied in my day-to-day IT work.
Why Sandbox99.cc?
This blog is my digital sandbox – a place to experiment, document, and share the knowledge I’ve gained from hands-on work, training, and personal projects. Unlike traditional resources that might focus on theory, I prefer to write about practical scenarios, offering genuine insights and lessons that others might find useful.
Expand your IT perspective — Follow me on LinkedIn and share your views!
Recent Blog Post
The Unsung Stage: Why Penetration Test Reporting is Your Most Critical Deliverable
Introduction In our previous discussion, we explored the five foundational stages of ethical hacking: reconnaissance, scanning and enumeration, gaining access, maintaining access, and clearing tracks. For those familiar with professional penetration testing or...
Hacking for Good: Unpacking the Five Stages of Ethical Hacking
Introduction In a world increasingly reliant on digital infrastructure, the battle against cyber threats is constant. But what if there were individuals who could think like the bad guys, without being the bad guys? Enter the world of ethical hacking, a crucial...
Writing ISO to USB in Linux Using dd (with Caution!)
Introduction Creating a bootable USB drive is often the first step toward installing or testing a Linux distribution. Whether you're setting up a new system, repairing an existing one, or simply exploring different distros, having a reliable installer on a USB stick...
Data Loss Prevention: Deep Dive Analysis
Introduction In an age where data breaches are increasingly common and regulatory compliance is more stringent than ever, organizations must adopt proactive strategies to safeguard sensitive information. Data Loss Prevention (DLP) has emerged as a vital component of...
Mastering Client-Side SSH: Elevate Your Productivity with .ssh/config
Introduction Do you ever find yourself typing long, cumbersome SSH commands, replete with usernames, IP addresses, and obscure port numbers? We've all been there. It's a recipe for typos, frustration, and wasted time. But what if I told you there's a secret weapon in...
SSH Server Configuration Guide: From Defaults to Defense
Introduction If you've felt overwhelmed by the Ansible playbooks, Bash scripts, or Python snippets in my previous blogs—don’t worry. This time, we’re focusing solely on the sshd_config file for SSH hardening and configuration. No complex automation, just...