Thilan Dissanayaka Application Security Nov 23

About Us

Welcome to Hacksland, your go-to corner on the internet for computer science and cyber security related articles.

Our Story

Hi! I’m Thilan Dissanayaka, the face (and fingers on the keyboard) behind Hacksland.net. I started this blog in 2016 because I wanted a place where I could not only share my passion for technology, but also help others navigate the fast-evolving world of coding, web development, and digital productivity.

Over time, Hacksland has grown — from a small personal project into a resource hub where readers can find in-depth guides, quick tips, and deep dives across topics like [list core topics: e.g. “JavaScript, cybersecurity, low-code tools, productivity”]. My mission? To demystify tech and empower you to build skills that matter, whether you're a student, a budding developer, or just someone who loves efficient workflows.

What We Believe In

  • Practicality: Every post aims to give you useful, actionable advice — not just theory.

  • Clarity: Complex topics should be broken down into digestible, easy-to-understand content.

  • Learning: The tech world never stands still; neither does Hacksland. I’m always learning, testing, and sharing.

  • Community: Hacksland is not just about me — it’s about you. Your feedback, questions, and suggestions shape the blog.

Why Hackland Is Different

I write from experience. I’ve built real projects, made mistakes, and learned lessons — and I share both wins and failures.

My posts are not just tutorials, but explorations: I often explain “why” things work, not just “how.”

I stay current: I regularly update old posts, try out new tools, and adapt to the changing landscape of tech.

Join the Journey

If you like what you see, feel free to:

Subscribe to the newsletter [or email list] for updates.

Follow Hacksland on [social media platforms / Twitter / LinkedIn / etc.]

Reach out: You can contact me via [your email address or contact page]. I love hearing from readers — whether it’s a question, feedback, or a guest post idea.

Thank you for being part of this journey. Let’s hack the ordinary into something extraordinary.

ALSO READ
Observer Pattern explained simply
Apr 26 Software Architecture

When one object needs to notify many other objects about changes in its state **automatically**, the **Observer Pattern** steps in. ## What is the Observer Pattern? - Defines a....

Proxy Pattern explained simply
Apr 26 Software Architecture

Sometimes you don't want or can't allow direct access to an object. Maybe it's expensive to create, needs special permissions, or you want to control access in some way. This is where the **Proxy....

Building a Web3 CLI Tool for the Ballerina Language: From Idea to Reality
Apr 26 WSO2

🚀 Excited to finally share my journey of building a web3 CLI tool for Ballerina! This tool bridges the gap between Ethereum smart contracts and the Ballerina programming language by automatically....

Netcat The Hacker's Swiss Army Knife
May 02 Penetration Testing

Netcat, often abbreviated as `nc`, is a versatile command-line networking tool that can be used for almost anything related to TCP, UDP, or UNIX-domain sockets. It's beloved by network engineers,....

HTTP Header Injection Explained
May 27 Application Security

HTTP Header Injection is a critical web security vulnerability that occurs when an application allows user-controlled input to be inserted into HTTP response headers without proper validation or....

 OWASP Top 10 explained - 2021
Mar 03 Application Security

The Open Worldwide Application Security Project (OWASP) is a nonprofit foundation focused on improving the security of software. It provides free, vendor-neutral tools, resources, and standards that....