{"version":"1.0","provider_name":"Positioning Magazine","provider_url":"https:\/\/positioningmag.com","author_name":"admin","author_url":"https:\/\/positioningmag.com\/author\/admin","title":"Cyber tools : July 2008 \u0e40\u0e1e\u0e34\u0e48\u0e21\u0e04\u0e27\u0e32\u0e21\u0e16\u0e35\u0e48 \u0e42\u0e08\u0e17\u0e22\u0e4c\u0e40\u0e27\u0e47\u0e1a\u0e22\u0e38\u0e04\u0e19\u0e35\u0e49","type":"rich","width":600,"height":338,"html":"
Cyber tools : July 2008 \u0e40\u0e1e\u0e34\u0e48\u0e21\u0e04\u0e27\u0e32\u0e21\u0e16\u0e35\u0e48 \u0e42\u0e08\u0e17\u0e22\u0e4c\u0e40\u0e27\u0e47\u0e1a\u0e22\u0e38\u0e04\u0e19\u0e35\u0e49<\/a><\/blockquote>\n