Sandbox99 Chronicles
From My Sandbox to Yours — Practical IT Insights.
About this site
Welcome to Sandbox99.cc – a space where I share my IT journey, lessons learned, and practical insights. The tagline “Learning IT by Doing, Sharing What I Know” captures the essence of this blog. Every article here is based on my real-world experiences, reflecting what I’ve encountered, solved, and applied in my day-to-day IT work.
Why Sandbox99.cc?
This blog is my digital sandbox – a place to experiment, document, and share the knowledge I’ve gained from hands-on work, training, and personal projects. Unlike traditional resources that might focus on theory, I prefer to write about practical scenarios, offering genuine insights and lessons that others might find useful.
Expand your IT perspective — Follow me on LinkedIn and share your views!
Recent Blog Post
Understanding VLANs: Isolating Traffic in Modern Computer Networks
🧩 Introduction In today’s increasingly complex network environments, efficiency, security, and scalability are more than just buzzwords—they’re fundamental design requirements. One of the foundational technologies that helps achieve all three is the Virtual Local Area...
Cisco Hierarchical Three-Tier Model: Scalable Network Design for Modern Enterprises
🚀 Introduction In modern enterprise environments, designing a robust, scalable, and manageable network infrastructure is essential. Cisco’s Hierarchical Network Design Model provides a proven framework to achieve these goals. By organizing a network into distinct...
The Evolution of Cisco IOS XE – A Journey to Modern Networking
Introduction In the rapidly evolving landscape of network infrastructure, the operating system at the heart of our devices plays a pivotal role. For decades, Cisco IOS has been synonymous with robust, reliable networking. However, as networks grow in complexity,...
The Shebang Line Explained: Why Every IT Pro Should Care
What is the Shebang Line? The shebang line (also called hashbang or sharp-bang) is the character sequence #! followed by the path to an interpreter, placed at the very beginning of executable script files. It tells the system which interpreter to use when executing...
Stored XSS Explained: A Hands-On Demo with DVWA and OWASP ZAP
🧭 Introduction In this demonstration, we explore one of the most dangerous yet commonly found web vulnerabilities—Stored Cross-Site Scripting (XSS). Unlike its reflected counterpart, stored XSS involves injecting malicious scripts that are permanently stored on the...
Nmap Cheat Sheet: Essential Scans for Ethical Hackers and Network Admins
🧹 Introduction Nmap (Network Mapper) is a powerful open-source tool used by ethical hackers, network administrators, and security professionals for network discovery and security auditing. Whether you're scanning for open ports, fingerprinting services, or detecting...