http://upvac.ocpb.go.th/th/index.html
					http://upvac.ocpb.go.th/th/index.html notified by Ashiyane Digital Security Team                
																																	
												                
																								                
						
																    
http://bnhm.brm3.go.th/templates/angola.html
					http://bnhm.brm3.go.th/templates/angola.html notified by Ashiyane Digital Security Team                
																																	
												                
																								                
						
																    
http://bnb.brm3.go.th/templates/angola.html
					http://bnb.brm3.go.th/templates/angola.html notified by Ashiyane Digital Security Team                
																																	
												                
																								                
						
																    
http://bprp.brm3.go.th/templates/angola.html
					http://bprp.brm3.go.th/templates/angola.html notified by Ashiyane Digital Security Team                
																																	
												                
																								                
						
																    
http://bpsr.brm3.go.th/templates/angola.html
					http://bpsr.brm3.go.th/templates/angola.html notified by Ashiyane Digital Security Team                
																																	
												                
																								                
						
																    
http://brrd.brm3.go.th/templates/angola.html
					http://brrd.brm3.go.th/templates/angola.html notified by Ashiyane Digital Security Team                
																																	
												                
																								                
						
																    
Hacked companies fight back with controversial steps
					(Reuters) - Frustrated by their inability to stop sophisticated hacking attacks or use the law to punish their assailants, an increasing number of U.S. companies are taking retaliatory action. Known in the cyber security industry as "active defense" or "strike-back" technology, the reprisals range from modest steps to distract and delay a hacker to more controversial measures.                 
																																	
												                
																								                
						
																    
http://pathumpao.go.th/pic_banner/crypt0.htm
					http://pathumpao.go.th/pic_banner/crypt0.htm notified by Ashiyane Digital Security Team