Today, I got a news from one of my stuff tat, Some Security Researchers from Myanmar are comming out, ya!. Named themselves “MyanmarCyberSecurityTeam or MCST“, WoW! So many hackers (Black | White). I don’t know what going on with those guys but I like da action and activities of this MCST for Researching and Pointing security weakness of Myanmar IT Development in Software/Hardware and Network. I glad to heard and hope that they’ll always keep their good sakes forever.

As for my I don’t want any new generations are going on with the wrong ways…
We research for test and penetrate,
We suggest them to fix their security weakness as soon as possible,
We share our knowledge with everybody..

WE ARE SMALL, BUT TOGETHER WE ARE BIG!

Explore More

Hacking Computers Illegal Violation Access To Machines Cyber Crime

The term “hacking” has become one of those words today that are often frowned upon by people who occasionally have no idea what it involves. This homogenization of the signification

Hacked Information and Proof of Concept @ PlanetCreator.net

“Hacking” In this category, We’re going to post Hacker’s proof-of-concept. Unless you know how to hack, you can not defend yourself from hackers. We’ll know how hack hacks and how

What is Buffer Overflows?

Buffer Overflows Buffer Overflows have been around since the very beginnings of the Von-Neuman architecture. They first gained widespread notoriety in 1988 with the Morris Internet worm. Unfortunately, the same