Thilan Dissanayaka Application Security Nov 23

About Us

Welcome to Hacksland, your go-to corner on the internet for computer science and cyber security related articles.

Our Story

Hi! I’m Thilan Dissanayaka, the face (and fingers on the keyboard) behind Hacksland.net. I started this blog in 2016 because I wanted a place where I could not only share my passion for technology, but also help others navigate the fast-evolving world of coding, web development, and digital productivity.

Over time, Hacksland has grown — from a small personal project into a resource hub where readers can find in-depth guides, quick tips, and deep dives across topics like [list core topics: e.g. “JavaScript, cybersecurity, low-code tools, productivity”]. My mission? To demystify tech and empower you to build skills that matter, whether you're a student, a budding developer, or just someone who loves efficient workflows.

What We Believe In

  • Practicality: Every post aims to give you useful, actionable advice — not just theory.

  • Clarity: Complex topics should be broken down into digestible, easy-to-understand content.

  • Learning: The tech world never stands still; neither does Hacksland. I’m always learning, testing, and sharing.

  • Community: Hacksland is not just about me — it’s about you. Your feedback, questions, and suggestions shape the blog.

Why Hackland Is Different

I write from experience. I’ve built real projects, made mistakes, and learned lessons — and I share both wins and failures.

My posts are not just tutorials, but explorations: I often explain “why” things work, not just “how.”

I stay current: I regularly update old posts, try out new tools, and adapt to the changing landscape of tech.

Join the Journey

If you like what you see, feel free to:

Subscribe to the newsletter [or email list] for updates.

Follow Hacksland on [social media platforms / Twitter / LinkedIn / etc.]

Reach out: You can contact me via [your email address or contact page]. I love hearing from readers — whether it’s a question, feedback, or a guest post idea.

Thank you for being part of this journey. Let’s hack the ordinary into something extraordinary.

ALSO READ
Build A Simple Web shell
Mar 23 Application Security

A web shell is a type of code that hackers use to gain control over a web server. It is particularly useful for post-exploitation attacks, and there are various types of web shells available. Some of....

Remote Command Execution
Mar 23 Application Security

Remote Command Execution (RCE) is a critical security vulnerability that allows an attacker to execute arbitrary commands on a remote server. This vulnerability can lead to unauthorized access, data....

Singleton Pattern explained simply
Apr 26 Software Architecture

Ever needed just one instance of a class in your application? Maybe a logger, a database connection, or a configuration manager? This is where the Singleton Pattern comes in — one of the simplest....

SSRF - Server Side Request Forgery
May 27 Application Security

Server-Side Request Forgery (SSRF) is a web security vulnerability that allows an attacker to induce the server-side application to make HTTP requests to an arbitrary domain of the attacker's....

Understanding Assembly Language: Purpose and Structure
Mar 23 Low level Development

Assembly language is a low-level programming language that provides a human-readable representation of a computer's binary instructions. Unlike high-level languages like C, C++, or Python, which are....

HTTP Header Injection Explained
May 27 Application Security

HTTP Header Injection is a critical web security vulnerability that occurs when an application allows user-controlled input to be inserted into HTTP response headers without proper validation or....