About Us
Thilan Dissanayaka Computing Concepts Jun 11, 2020

About Us

Welcome to Hacksland, your go-to corner on the internet for computer science and cyber security related articles.

Our Story

Hi! I’m Thilan Dissanayaka, the face (and fingers on the keyboard) behind Hacksland.net. I started this blog in 2016 because I wanted a place where I could not only share my passion for technology, but also help others navigate the fast-evolving world of coding, web development, and digital productivity.

Over time, Hacksland has grown — from a small personal project into a resource hub where readers can find in-depth guides, quick tips, and deep dives across topics like [list core topics: e.g. “JavaScript, cybersecurity, low-code tools, productivity”]. My mission? To demystify tech and empower you to build skills that matter, whether you're a student, a budding developer, or just someone who loves efficient workflows.

What We Believe In

  • Practicality: Every post aims to give you useful, actionable advice — not just theory.

  • Clarity: Complex topics should be broken down into digestible, easy-to-understand content.

  • Learning: The tech world never stands still; neither does Hacksland. I’m always learning, testing, and sharing.

  • Community: Hacksland is not just about me — it’s about you. Your feedback, questions, and suggestions shape the blog.

Why Hackland Is Different

I write from experience. I’ve built real projects, made mistakes, and learned lessons — and I share both wins and failures.

My posts are not just tutorials, but explorations: I often explain “why” things work, not just “how.”

I stay current: I regularly update old posts, try out new tools, and adapt to the changing landscape of tech.

Join the Journey

If you like what you see, feel free to:

Subscribe to the newsletter [or email list] for updates.

Follow Hacksland on [social media platforms / Twitter / LinkedIn / etc.]

Reach out: You can contact me via [your email address or contact page]. I love hearing from readers — whether it’s a question, feedback, or a guest post idea.

Thank you for being part of this journey. Let’s hack the ordinary into something extraordinary.

ALSO READ
Exploiting a Stack Buffer Overflow on Windows
Apr 12 Exploit development

In a previous tutorial we discusses how we can exploit a buffer overflow vulnerability on a Linux machine. I wen through all theories in depth and explained each step. Now today we are going to jump...

Access Control Models
Apr 08 Identity & Access Management

Access control is one of the most fundamental concepts in security. Every time you set file permissions, assign user roles, or restrict access to a resource, you're implementing some form of access control. But not all access control is created equal...

Boolean Based Blind SQL Injection
Feb 12 Application Security

In regular SQL injection, you can see the database output right there on the page. Blind SQL injection is different — the application gives you nothing. No errors, no data, no feedback. But with boolean-based blind SQLi, you can still extract the entire database — one true/false question at a time.

SQL Injection Login Bypass
Feb 10 Application Security

SQL Injection (SQLi) is one of the oldest and most fundamental web application vulnerabilities. While modern frameworks have made it harder to introduce, understanding SQL injection is essential for anyone learning web security. In this post, we'll break it down from the ground up using a classic login bypass.

Exploiting a heap buffer overflow in linux
Apr 12 Exploit development

In the [previous article](/heap-internals-how-glibc-malloc-works/), we dissected glibc's malloc — chunks, bins, tcache, coalescing, and the metadata that holds it all together. Now we break...

Identity and Access Management (IAM)
May 11 Identity & Access Management

Who are you — and what are you allowed to do? That's the fundamental question every secure system must answer. And it's exactly what Identity and Access Management (IAM) is built to solve.