Похожие видео
array(10) {
[0]=>
object(stdClass)#5230 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "AkxqkoxErRk"
["related_video_title"]=>
string(59) "Routers, The Internet & YouTube Offline - Computerphile"
["posted_time"]=>
string(20) "10 лет назад"
["channelName"]=>
string(13) "Computerphile"
}
[1]=>
object(stdClass)#5203 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "h7IeCPhTBxs"
["related_video_title"]=>
string(40) "Hacking Out of a Network - Computerphile"
["posted_time"]=>
string(21) "3 года назад"
["channelName"]=>
string(13) "Computerphile"
}
[2]=>
object(stdClass)#5228 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "SVo6cDnQQm0"
["related_video_title"]=>
string(13) "BGP Deep Dive"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
string(27) "Kevin Wallace Training, LLC"
}
[3]=>
object(stdClass)#5235 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "86cQJ0MMses"
["related_video_title"]=>
string(39) "TLS Handshake Explained - Computerphile"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
string(13) "Computerphile"
}
[4]=>
object(stdClass)#5214 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "JjQpll8QUVw"
["related_video_title"]=>
string(68) "Networks by Rebrain Основы работы протокола BGP"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(7) "REBRAIN"
}
[5]=>
object(stdClass)#5232 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "QRYzre4bf7I"
["related_video_title"]=>
string(28) "How TOR Works- Computerphile"
["posted_time"]=>
string(19) "8 лет назад"
["channelName"]=>
string(13) "Computerphile"
}
[6]=>
object(stdClass)#5227 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "0TLDTodL7Lc"
["related_video_title"]=>
string(46) "Transport Layer Security (TLS) - Computerphile"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
string(13) "Computerphile"
}
[7]=>
object(stdClass)#5237 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "6XW5cRa3ZKM"
["related_video_title"]=>
string(39) "What is Border Gateway Protocol (BGP)?"
["posted_time"]=>
string(19) "5 лет назад"
["channelName"]=>
string(13) "LearnCantrill"
}
[8]=>
object(stdClass)#5213 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "7MT1F0O3_Yw"
["related_video_title"]=>
string(35) "DNS Cache Poisoning - Computerphile"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
string(13) "Computerphile"
}
[9]=>
object(stdClass)#5231 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "XDsLDhKG8Cs"
["related_video_title"]=>
string(83) "For 9 Years Tor Ignored Princeton's Proof: BGP Attacks Can Unmask Millions of Users"
["posted_time"]=>
string(25) "2 недели назад"
["channelName"]=>
string(8) "Sam Bent"
}
}
Routers, The Internet & YouTube Offline - Computerphile
Hacking Out of a Network - Computerphile
BGP Deep Dive
TLS Handshake Explained - Computerphile
Networks by Rebrain Основы работы протокола BGP
How TOR Works- Computerphile
Transport Layer Security (TLS) - Computerphile
What is Border Gateway Protocol (BGP)?
DNS Cache Poisoning - Computerphile
For 9 Years Tor Ignored Princeton's Proof: BGP Attacks Can Unmask Millions of Users