
Open-source components and their direction towards the future against cyber security aspects
Open-source components are becoming major building blocks of the application economy. The software giants have moved into the open-source…
As a cybersecurity professional, I hold a BSc (Hons) in Information Technology with a specialization in Cyber Security from SLIIT. Currently, I am pursuing a Master’s Degree in Information Security at the University of Colombo School of Computing. I have worked on a wide variety of projects that have allowed me to put what I have learned in the classroom into practice. If you would like to get more details, here is my resume to Download
Open-source components are becoming major building blocks of the application economy. The software giants have moved into the open-source…
In this article, we are going to solve the Attactive Directory vulnerable machine from TryHackMe. This room has numbered several tasks to follow. So, we'll follow them one by one. However, I give you some points to read & understand...
Here I will begin with the Archetype machine, the first machine of the "Starting Point" machine series offered by HackTheBox. Basically, it is a series of 9 machines rated as "Very Easy" and...
This is an individual assignment that I did under the Secure Software Systems module when I was in the 3rd year 1st semester. This research paper is about Petya Ransomware. It will help anyone to get an understanding of what...
Binge watching එහෙමත් නැතිනම්, එක අවස්ථාවකදී නොනවත්වා episode ගණනාවක් නැරඹීම සහ On-demand watching, එනම් තමන්ට අවශ්යය වූ විට අදාල වැඩසටහන නැරඹීම යන...
අපගෙන් බොහෝ දෙනෙක් මෙම ලාංඡන ගැන හොදින් දැන හැදින ගෙන තිබුනත් ඒවායෙන් අදහස් කර ඇති අර්ථයන් සෑම දෙනෙකුටම නොවැටහේ. මේවා අපගේ ප්රියතම වෙළඳ නාමයන් වුවත්...
+94 76 277 0349
Kalutara, Sri Lanka.
info [at] shehan [dot] engineer