About Us
Thilan Dissanayaka Computing Concepts Jun 11, 2020

About Us

Welcome to Hacksland, your go-to corner on the internet for computer science and cyber security related articles.

Our Story

Hi! I’m Thilan Dissanayaka, the face (and fingers on the keyboard) behind Hacksland.net. I started this blog in 2016 because I wanted a place where I could not only share my passion for technology, but also help others navigate the fast-evolving world of coding, web development, and digital productivity.

Over time, Hacksland has grown — from a small personal project into a resource hub where readers can find in-depth guides, quick tips, and deep dives across topics like [list core topics: e.g. “JavaScript, cybersecurity, low-code tools, productivity”]. My mission? To demystify tech and empower you to build skills that matter, whether you're a student, a budding developer, or just someone who loves efficient workflows.

What We Believe In

  • Practicality: Every post aims to give you useful, actionable advice — not just theory.

  • Clarity: Complex topics should be broken down into digestible, easy-to-understand content.

  • Learning: The tech world never stands still; neither does Hacksland. I’m always learning, testing, and sharing.

  • Community: Hacksland is not just about me — it’s about you. Your feedback, questions, and suggestions shape the blog.

Why Hackland Is Different

I write from experience. I’ve built real projects, made mistakes, and learned lessons — and I share both wins and failures.

My posts are not just tutorials, but explorations: I often explain “why” things work, not just “how.”

I stay current: I regularly update old posts, try out new tools, and adapt to the changing landscape of tech.

Join the Journey

If you like what you see, feel free to:

Subscribe to the newsletter [or email list] for updates.

Follow Hacksland on [social media platforms / Twitter / LinkedIn / etc.]

Reach out: You can contact me via [your email address or contact page]. I love hearing from readers — whether it’s a question, feedback, or a guest post idea.

Thank you for being part of this journey. Let’s hack the ordinary into something extraordinary.

ALSO READ
 OWASP Top 10 explained - 2021
Feb 11 Application Security

The Open Worldwide Application Security Project (OWASP) is a nonprofit foundation focused on improving the security of software. It provides free, vendor neutral tools, resources, and standards that...

Exploiting a  Stack Buffer Overflow  on Linux
Apr 01 Exploit development

Have you ever wondered how attackers gain control over remote servers? How do they just run some exploit and compromise a computer? If we dive into the actual context, there is no magic happening....

Exploiting a format string vulnerebility on Linux
Apr 12 Exploit development

A misused printf can leak stack contents, read arbitrary memory, and write to arbitrary addresses. Format string vulnerabilities are one of the most powerful bug classes in C and they're the key to defeating ASLR. In this post, we exploit printf from leak to shell.

Exploiting a heap buffer overflow in linux
Apr 12 Exploit development

In the [previous article](/heap-internals-how-glibc-malloc-works/), we dissected glibc's malloc — chunks, bins, tcache, coalescing, and the metadata that holds it all together. Now we break...

Basic concepts of Cryptography
Mar 01 Cryptography

Ever notice that little padlock icon in your browser's address bar? That's cryptography working silently in the background, protecting everything you do online. Whether you're sending an email,...

Understanding the Heap Internals
Apr 12 Exploit development

So far in this series, we've exploited the **stack** buffer overflows, ROP chains, format strings. The stack is predictable: local variables go in, function returns pop them out, everything follows a...