Похожие видео
array(10) {
[0]=>
object(stdClass)#5702 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "BT38K6NqETE"
["related_video_title"]=>
string(125) "Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках"
["posted_time"]=>
string(27) "6 месяцев назад"
["channelName"]=>
string(22) "Раскадровка"
}
[1]=>
object(stdClass)#5675 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "d_kLehooidQ"
["related_video_title"]=>
string(50) "Top Hacking Books to Learn Ethical Hacking in 2025"
["posted_time"]=>
string(27) "6 месяцев назад"
["channelName"]=>
string(13) "Yaniv Hoffman"
}
[2]=>
object(stdClass)#5700 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "ncG_ODKh8sY"
["related_video_title"]=>
string(54) "Turn Your Raspberry Pi Into a Pro WiFi Hacking Machine"
["posted_time"]=>
string(23) "8 часов назад"
["channelName"]=>
string(8) "TechChip"
}
[3]=>
object(stdClass)#5707 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "blWdjRUPP6E"
["related_video_title"]=>
string(72) "Разведчик о том, как использовать людей"
["posted_time"]=>
string(25) "4 недели назад"
["channelName"]=>
string(18) "Коллектив"
}
[4]=>
object(stdClass)#5686 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "p3vaaD9pn9I"
["related_video_title"]=>
string(50) "Networking For Hackers! (Common Network Protocols)"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(10) "Hacker Joe"
}
[5]=>
object(stdClass)#5704 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "trPJaCGBbKU"
["related_video_title"]=>
string(26) "Top Hacking Books for 2023"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
string(12) "David Bombal"
}
[6]=>
object(stdClass)#5699 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "6vj96QetfTg"
["related_video_title"]=>
string(38) "How the Best Hackers Learn Their Craft"
["posted_time"]=>
string(19) "6 лет назад"
["channelName"]=>
string(14) "RSA Conference"
}
[7]=>
object(stdClass)#5709 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "AF8LSurfct4"
["related_video_title"]=>
string(68) "Programming ▫️ Coding ▫️ Hacking ▫️ Designing Music 🦠"
["posted_time"]=>
string(28) "10 месяцев назад"
["channelName"]=>
string(6) "FilFar"
}
[8]=>
object(stdClass)#5685 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "7HgAN5cEmkk"
["related_video_title"]=>
string(28) "I made the PC I couldn't buy"
["posted_time"]=>
string(21) "1 день назад"
["channelName"]=>
string(15) "Christian Selig"
}
[9]=>
object(stdClass)#5703 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "AP_O-Xo0J78"
["related_video_title"]=>
string(45) "Every Level Of Hacking Explained in 8 Minutes"
["posted_time"]=>
string(19) "4 дня назад"
["channelName"]=>
string(15) "Privacy Matters"
}
}
Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках
Top Hacking Books to Learn Ethical Hacking in 2025
Turn Your Raspberry Pi Into a Pro WiFi Hacking Machine
Разведчик о том, как использовать людей
Networking For Hackers! (Common Network Protocols)
Top Hacking Books for 2023
How the Best Hackers Learn Their Craft
Programming ▫️ Coding ▫️ Hacking ▫️ Designing Music 🦠
I made the PC I couldn't buy
Every Level Of Hacking Explained in 8 Minutes