Похожие видео
array(10) {
[0]=>
object(stdClass)#5726 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "OTea54BelTg"
["related_video_title"]=>
string(40) "Windows MACB Timestamps (NTFS Forensics)"
["posted_time"]=>
string(19) "7 лет назад"
["channelName"]=>
string(7) "13Cubed"
}
[1]=>
object(stdClass)#5699 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "reRzWHUwI80"
["related_video_title"]=>
string(84) "12 Days of Defense - Day 4: How to Analyze Email Headers and How Spoofed Email Works"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
string(12) "John Hubbard"
}
[2]=>
object(stdClass)#5724 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "yuhOgyz1cXs"
["related_video_title"]=>
string(56) "Email authentication Explained, SPF, DKIM, DMARC records"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(17) "Office365Concepts"
}
[3]=>
object(stdClass)#5731 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "1PAGcPJFwbE"
["related_video_title"]=>
string(32) "Introduction to Memory Forensics"
["posted_time"]=>
string(19) "8 лет назад"
["channelName"]=>
string(7) "13Cubed"
}
[4]=>
object(stdClass)#5710 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "YSIs1M91uS8"
["related_video_title"]=>
string(51) "Email Headers Explained and How They Might Help You"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
string(8) "Ask Leo!"
}
[5]=>
object(stdClass)#5728 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "qedIyy5KesQ"
["related_video_title"]=>
string(43) "Email Header Analysis and Digital Forensics"
["posted_time"]=>
string(19) "5 лет назад"
["channelName"]=>
string(9) "BlackPerl"
}
[6]=>
object(stdClass)#5723 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "wu4-nREmzGM"
["related_video_title"]=>
string(24) "LNK Files and Jump Lists"
["posted_time"]=>
string(19) "7 лет назад"
["channelName"]=>
string(7) "13Cubed"
}
[7]=>
object(stdClass)#5733 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "do3JVxf_Cu8"
["related_video_title"]=>
string(82) "КАК я стал IT специалистом за ПОЛ ГОДА после 30."
["posted_time"]=>
string(23) "1 месяц назад"
["channelName"]=>
string(30) "WebTestingPro | Sergey Yaushev"
}
[8]=>
object(stdClass)#5709 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "c9fLp5uIxp8"
["related_video_title"]=>
string(55) "How DKIM SPF & DMARC Work to Prevent Email Spoofing"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
string(20) "Thobson Technologies"
}
[9]=>
object(stdClass)#5727 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "o-935Oep7Cg"
["related_video_title"]=>
string(44) "SOC Analyst Phishing Email Analysis Tutorial"
["posted_time"]=>
string(27) "9 месяцев назад"
["channelName"]=>
string(15) "Sohail Ershadi "
}
}
Windows MACB Timestamps (NTFS Forensics)
12 Days of Defense - Day 4: How to Analyze Email Headers and How Spoofed Email Works
Email authentication Explained, SPF, DKIM, DMARC records
Introduction to Memory Forensics
Email Headers Explained and How They Might Help You
Email Header Analysis and Digital Forensics
LNK Files and Jump Lists
КАК я стал IT специалистом за ПОЛ ГОДА после 30.
How DKIM SPF & DMARC Work to Prevent Email Spoofing
SOC Analyst Phishing Email Analysis Tutorial