Last September 28, BurmeseHackers Group Hacked Irrawaddy Online Store twice, and we’ve been discussed about that.

After a month, 27/09/2010: Irrawaddy, Mizzima and the Democratic Voice of Burma (DVB), were attacked on last Monday,

According to their official sites, The attacks coincided with the anniversary of the 2007 “Saffron Revolution.” A similar attack was launched against exile media in September 2008, on the uprising’s first anniversary. Websites were crippled for several days. The Irrawaddy’s website host in the US reported that the volume of the DDoS attack on The Irrawaddy was 4 gigabytes, 3 gigabytes larger than in September 2008.

The massive cyber attacks that shut down The Irrawaddy and Mizzima  came largely from Chinese internet provider addresses, while the attacks on the DVB website, measuring about 120 megabytes per second, came from Russia, Georgia, Israel, Kazakhstan, Ukraine and Vietnam.

In September 2008, the website was also attacked by a DDoS attack. The volume of the DDoS attack on Monday was 2 gigabytes, one gigabyte larger than the attack in Sept. 2008, according to Win Thu, the general manager of The Irrawaddy. Win Thu said that the attack would be short-term, but it has disrupted the daily news production and access by our readers. Hackers began the attack on the English and Burmese website address: www.irrawaddy.org at 1 a.m on Monday and later attacked The Irrawaddy’s mirror website: www.irrawaddymedia.com.

I can’t tell exactly and there’s no comment right now. I just wanna ask myself “Is it a begin of Myanmar Cyber War?”

Explore More

You’ve Hired a Hacker (Section 1)

Section 1: Basic Understanding 1.1: Won’t my hacker break into my computer and steal my trade secrets? Point of clarification. There are two communities of people that call themselves ‘hackers’.

How to send fake emails from any email address

Firstly this isnt my tutorial and i just found it on the net so please dont say that i stole someone elses tutorial. And I dont know if someone has

Local File Inclusion (LFI) tutorial

This tutorial will guide you into the process of exploiting a website through the LFI (Local File Inclusion). First lets take a look at a php code that is vulnerable