Today, I got a news from one of my stuff tat, Some Security Researchers from Myanmar are comming out, ya!. Named themselves “MyanmarCyberSecurityTeam or MCST“, WoW! So many hackers (Black | White). I don’t know what going on with those guys but I like da action and activities of this MCST for Researching and Pointing security weakness of Myanmar IT Development in Software/Hardware and Network. I glad to heard and hope that they’ll always keep their good sakes forever.

As for my I don’t want any new generations are going on with the wrong ways…
We research for test and penetrate,
We suggest them to fix their security weakness as soon as possible,
We share our knowledge with everybody..

WE ARE SMALL, BUT TOGETHER WE ARE BIG!

Explore More

What are snort rules?

Snort rules are the conditions specified by a Network Administrator that differentiate between normal Internet activities and malicious activities. Snort rules are made up of two basic parts: * Rule

EU Police learning hacking tricks. They are about to “Remote search” your PCs.

Law enforcement at European Union is working on ethical hacking proposal that will allow them to remotely access and monitor any PC without warrant. This is adopted after a decision

Introduction on benchmarking attacks

Affected operating systems: ————————— Windows XP Pro Windows 2003 Windows Vista Windows 2008 (all service packs…) And probably some UNIX/Linux systems with some variants… Look by yourself. ================================================== ================================================== Abstract: