Sandbox99 Chronicles
From My Sandbox to Yours — Practical IT Insights.
About this site
Welcome to Sandbox99.cc – a space where I share my IT journey, lessons learned, and practical insights. The tagline “Learning IT by Doing, Sharing What I Know” captures the essence of this blog. Every article here is based on my real-world experiences, reflecting what I’ve encountered, solved, and applied in my day-to-day IT work.
Why Sandbox99.cc?
This blog is my digital sandbox – a place to experiment, document, and share the knowledge I’ve gained from hands-on work, training, and personal projects. Unlike traditional resources that might focus on theory, I prefer to write about practical scenarios, offering genuine insights and lessons that others might find useful.
Expand your IT perspective — Follow me on LinkedIn and share your views!
Recent Blog Post
Python: Setting Up a Virtual Environment like a Pro
🧭 Introduction Python is a powerful language—lightweight, expressive, and beloved by developers, sysadmins, and data scientists alike. But if you're installing packages globally or juggling multiple Python projects without isolation, you're setting yourself up for...
SMTP for Script Notifications: A Comparison of Self-Hosted and Online Services
Email Notifications for Your Scripts Ever wondered if that long-running cron job actually finished? Or if your nightly backup script encountered an unexpected error? As IT professionals, we can't afford to be in the dark. We need our automated systems to communicate...
How to Setup Kali Linux in Oracle VirtualBox in Less Than 30 Minutes
🧠 Introduction Kali Linux is a powerful, Debian-based operating system built specifically for penetration testing, digital forensics, and cybersecurity research. Packed with hundreds of pre-installed tools, it’s a favorite among ethical hackers and security...
Why You Should Monitor Your Server: A Look into UptimeRobot Free Tier
Introduction Your website going down is one thing — not knowing it’s down is another. I recently experienced a 10-hour outage on this blog site without noticing. No alerts. No emails. Nothing. I only discovered it after logging in for a routine check. That downtime...
GTFOBins Offline: Essential Post-Exploitation Resource for Ethical Hackers
Introduction In penetration testing and ethical hacking, the post-exploitation phase is where you gain the most insight—and control—over a compromised system. Whether you're escalating privileges, exfiltrating data, or executing commands through seemingly harmless...
NETCONF Fundamentals: Automating Network Configuration with Confidence
Introduction In today’s fast-paced IT landscape, network engineers are shifting from manual, CLI-based management to automated, programmable solutions. At the heart of this transformation is NETCONF (Network Configuration Protocol) — a powerful protocol designed to...