Thilan Dissanayaka Application Security Nov 23

About Us

Welcome to Hacksland, your go-to corner on the internet for computer science and cyber security related articles.

Our Story

Hi! I’m Thilan Dissanayaka, the face (and fingers on the keyboard) behind Hacksland.net. I started this blog in 2016 because I wanted a place where I could not only share my passion for technology, but also help others navigate the fast-evolving world of coding, web development, and digital productivity.

Over time, Hacksland has grown — from a small personal project into a resource hub where readers can find in-depth guides, quick tips, and deep dives across topics like [list core topics: e.g. “JavaScript, cybersecurity, low-code tools, productivity”]. My mission? To demystify tech and empower you to build skills that matter, whether you're a student, a budding developer, or just someone who loves efficient workflows.

What We Believe In

  • Practicality: Every post aims to give you useful, actionable advice — not just theory.

  • Clarity: Complex topics should be broken down into digestible, easy-to-understand content.

  • Learning: The tech world never stands still; neither does Hacksland. I’m always learning, testing, and sharing.

  • Community: Hacksland is not just about me — it’s about you. Your feedback, questions, and suggestions shape the blog.

Why Hackland Is Different

I write from experience. I’ve built real projects, made mistakes, and learned lessons — and I share both wins and failures.

My posts are not just tutorials, but explorations: I often explain “why” things work, not just “how.”

I stay current: I regularly update old posts, try out new tools, and adapt to the changing landscape of tech.

Join the Journey

If you like what you see, feel free to:

Subscribe to the newsletter [or email list] for updates.

Follow Hacksland on [social media platforms / Twitter / LinkedIn / etc.]

Reach out: You can contact me via [your email address or contact page]. I love hearing from readers — whether it’s a question, feedback, or a guest post idea.

Thank you for being part of this journey. Let’s hack the ordinary into something extraordinary.

ALSO READ
Remote Command Execution
Mar 23 Application Security

Remote Command Execution (RCE) is a critical security vulnerability that allows an attacker to execute arbitrary commands on a remote server. This vulnerability can lead to unauthorized access, data....

Introduction to Edge Computing
Mar 23 Computing Concepts

Edge computing is a distributed computing paradigm where computation and data storage are performed closer to the location where it is needed. Instead of relying solely on a centralized data center,....

Common Web Application Technologies
Feb 11 Application Security

# JWT - JSON Web Tokens JWT is short for JSON Web Token. It is a compact and secure way to send information between two parties – like a client (browser) and a server. We usually use JWTs....

The Stack architecture explained
Mar 23 Application Security

The stack is an important concept in computer science. If you are planning to learn reverse engineering, malware analyzing, exploitation, etc., this concept is a must to learn. After learning about....

HTTP Header Injection Explained
May 27 Application Security

HTTP Header Injection is a critical web security vulnerability that occurs when an application allows user-controlled input to be inserted into HTTP response headers without proper validation or....

Understanding Assembly Language: Purpose and Structure
Mar 23 Low level Development

Assembly language is a low-level programming language that provides a human-readable representation of a computer's binary instructions. Unlike high-level languages like C, C++, or Python, which are....