Sandbox99 Chronicles
From My Sandbox to Yours — Practical IT Insights.
About this site
Welcome to Sandbox99.cc – a space where I share my IT journey, lessons learned, and practical insights. The tagline “Learning IT by Doing, Sharing What I Know” captures the essence of this blog. Every article here is based on my real-world experiences, reflecting what I’ve encountered, solved, and applied in my day-to-day IT work.
Why Sandbox99.cc?
This blog is my digital sandbox – a place to experiment, document, and share the knowledge I’ve gained from hands-on work, training, and personal projects. Unlike traditional resources that might focus on theory, I prefer to write about practical scenarios, offering genuine insights and lessons that others might find useful.
Expand your IT perspective — Follow me on LinkedIn and share your views!
Recent Blog Post
Understanding File Inclusion Vulnerabilities
Introduction In the ever-evolving landscape of web security, one of the most underestimated yet critical vulnerabilities is File Inclusion. It often lurks in poorly coded PHP-based applications, silently waiting for an opportunity to expose sensitive server files or...
Automating SSH Hardening with Ansible Playbooks
Introduction Getting started with Ansible Building a baseline In a previous blog post, we walked through the essential steps of initial server setup using Ansible, laying the groundwork for secure and automated infrastructure management. Continuing that journey, this...
Building a Baseline: Ansible Playbook for Initial Server Prep
Introduction In our previous post, we demonstrated how to set up a basic Ansible demo environment with a control node and a target In the previous post, we built a basic Ansible demo environment with a control node and a target node. Now it’s time to write your first...
Getting Started with Ansible: Initial Setup Guide
Introduction Ansible is an open-source IT automation tool developed by Michael DeHaan and later acquired by Red Hat in 2015. It is designed to simplify automation tasks such as configuration management, application deployment, and orchestration of complex workflows....
Linux Firewall Defense: A Scripted Approach to Secure IPTables
Introduction In a previous blog post, I introduced iptables as a foundational tool for Linux firewall management. While understanding the basic syntax is crucial, it's equally important to harden your firewall — reducing your attack surface and enforcing security at...
Persistent Log Management: Dump JSON Logs into SQLite
Introduction In the world of self-hosted applications and microservices, structured logging is essential for debugging, monitoring, and long-term storage. JSON logs, like those generated by Authelia, are machine-readable but can become difficult to manage as they grow...