Похожие видео
array(10) {
[0]=>
object(stdClass)#5069 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "6YEs87n_f4o"
["related_video_title"]=>
string(63) "Gone in 60 seconds: Crypto Attacks Leaving Victims High and Dry"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
string(12) "Hive Systems"
}
[1]=>
object(stdClass)#5042 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "8xAuvl0Cp90"
["related_video_title"]=>
string(48) "The Truth about Ransomware: Its not Complicated!"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
string(44) "SANS Digital Forensics and Incident Response"
}
[2]=>
object(stdClass)#5067 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "CwSG5sa0Nao"
["related_video_title"]=>
string(50) "Introduction To Advanced Persistent Threats (APTs)"
["posted_time"]=>
string(27) "5 месяцев назад"
["channelName"]=>
string(12) "HackerSploit"
}
[3]=>
object(stdClass)#5074 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "EHD5hpnc6fY"
["related_video_title"]=>
string(78) "LOCKED OUT! Detecting, Preventing, & Reacting to Human Operated Ransomware"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
string(44) "SANS Digital Forensics and Incident Response"
}
[4]=>
object(stdClass)#5053 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "dtZaXP6W3fA"
["related_video_title"]=>
string(40) "APT Malware (advanced persistent threat)"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(12) "John Hammond"
}
[5]=>
object(stdClass)#5071 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "01oeaBb85Xc"
["related_video_title"]=>
string(71) "DEF CON 30 - Sam Bent - Tor - Darknet Opsec By a Veteran Darknet Vendor"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
string(16) "DEFCONConference"
}
[6]=>
object(stdClass)#5066 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "95Mkwbsk2HQ"
["related_video_title"]=>
string(79) "Можно ли поменять родину так быстро? / вДудь"
["posted_time"]=>
string(19) "3 дня назад"
["channelName"]=>
string(10) "вДудь"
}
[7]=>
object(stdClass)#5076 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "A_TPZxuTzBU"
["related_video_title"]=>
string(60) "License to Kill: Malware Hunting with the Sysinternals Tools"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
string(16) "Mark Russinovich"
}
[8]=>
object(stdClass)#5052 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "TLPHmHPaCiQ"
["related_video_title"]=>
string(42) "Where People Go When They Want to Hack You"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(9) "Cybernews"
}
[9]=>
object(stdClass)#5070 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "p3vaaD9pn9I"
["related_video_title"]=>
string(50) "Networking For Hackers! (Common Network Protocols)"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(10) "Hacker Joe"
}
}
Gone in 60 seconds: Crypto Attacks Leaving Victims High and Dry
The Truth about Ransomware: Its not Complicated!
Introduction To Advanced Persistent Threats (APTs)
LOCKED OUT! Detecting, Preventing, & Reacting to Human Operated Ransomware
APT Malware (advanced persistent threat)
DEF CON 30 - Sam Bent - Tor - Darknet Opsec By a Veteran Darknet Vendor
Можно ли поменять родину так быстро? / вДудь
License to Kill: Malware Hunting with the Sysinternals Tools
Where People Go When They Want to Hack You
Networking For Hackers! (Common Network Protocols)