[{"id":"478185","video_id":"JG6FJJs1fJk","title":"Computer hacking and hacktivism","start":"100","url":"https:\/\/www.learnthat.org\/dictionary\/video_popup\/478185\/8797","thumb":"https:\/\/img.youtube.com\/vi\/JG6FJJs1fJk\/1.jpg"},{"id":"478199","video_id":"yVLdAjgO84Y","title":"Cisco Services-Ready Engine (SRE) Modules Video Data Sheet","start":"125","url":"https:\/\/www.learnthat.org\/dictionary\/video_popup\/478199\/8797","thumb":"https:\/\/img.youtube.com\/vi\/yVLdAjgO84Y\/1.jpg"},{"id":"80392","video_id":"kIzMZtQ9NwQ","title":"Interview with Anton Zeilinger - Part 2","start":"347","url":"https:\/\/www.learnthat.org\/dictionary\/video_popup\/80392\/8797","thumb":"https:\/\/img.youtube.com\/vi\/kIzMZtQ9NwQ\/1.jpg"}]