He tried to hack me...

Поділитися
Вставка
  • Опубліковано 27 гру 2024

КОМЕНТАРІ • 983

  • @grant8653
    @grant8653 2 роки тому +251

    This is my first video but right off the bat question..... BRUNCH?!?!? Brunch bro? You fancy

    • @calholli
      @calholli 2 роки тому +21

      You guys have friends? wuh??

    • @HansBelphegor
      @HansBelphegor 2 роки тому +26

      @@calholli imho opinion, brunch is just breakfast for those who sleep in

    • @dheijnemans
      @dheijnemans 2 роки тому +6

      @@HansBelphegor No, it's second breakfast :)

    • @randomyoutuberthatdoesntex5236
      @randomyoutuberthatdoesntex5236 Рік тому +4

      @@dheijnemansbreakfast and lunch had a baby, people got so excited for the baby they fell asleep for an extra 2 hours, and so brunch was made

    • @ElectricoGamez
      @ElectricoGamez Рік тому

      @@dheijnemans no its a meal that occurs between breakfast and lunch

  • @abdelfattahhilmi5213
    @abdelfattahhilmi5213 2 роки тому +558

    john is so good at what he does to the point where if you wanted to attack him he would think you are submitting a malware for analysis

    • @ultimate8673
      @ultimate8673 2 роки тому +9

      bruh.... XD

    • @visual-graffix
      @visual-graffix 2 роки тому

      lmao

    • @McNooby142
      @McNooby142 2 роки тому

      that sounds pretty good actually, could get some interesting stuff out of it

  • @_JohnHammond
    @_JohnHammond  2 роки тому +334

    What do you think, would you fall for a phishing email like that? What other kinds of social engineering scams and malware attempts have you seen that have been successful?

    • @LeonVQZ
      @LeonVQZ 2 роки тому +12

      I receive about 2 spam email/day, and it seems that they gave up mostly, they just send a hyperlink and google flags it as spam. No interesting story, no fancy pictures or threat, just a hyperlink.

    • @y3wtub3
      @y3wtub3 2 роки тому +5

      I don't know if it's a coincidence or not but, anytime I order something online, I will receive all these emails titled with tracking number blah blah has been put on hold awaiting potential import tax. Usually titled as DHL. I never even open them because I'm scared it will infect me lol

    • @TheCastorPlays
      @TheCastorPlays 2 роки тому +3

      This barebones, off-the-cuff, low level approach is exactly what makes your videos so interesting and relatable, John. Thank you for doing these. I almost fell for the classic 'Your work mailbox will be locked' phishing once. what tripped me off was the password box not showing asterisks or stars, but clear text. so yes, they came within 5 keystrokes from success...

    • @4a6f62
      @4a6f62 2 роки тому +10

      Working as an ethical hacker, I'm too paranoid to click on links in e-mail that _are_ legit 😀But having something so pressing, trying to be a youtuber myself... scary stuff

    • @popeyehacks
      @popeyehacks 2 роки тому +1

      Sir can u give that malware for my study on digital forensics

  • @pcsecuritychannel
    @pcsecuritychannel 2 роки тому +36

    I’ve received similar emails but never a Google drive notification. Interesting how they keep changing small things within the same scams.

  • @scottspa74
    @scottspa74 2 роки тому +23

    I just completed a 2yr degree at community college for cyberdefense and digital forensics, and it was still fascinating and instructive to see such a brief, streamlined, walk-thru of how it's done. 2yrs of school summarized in 30 min. Lol. It's really great to see it in practical application.

  • @G6PBS
    @G6PBS 2 роки тому +4

    DEFINITELY not boring. If you're serious about cyber security then ANY knowledge is good knowledge. Thanks for the video.

  • @ShadowImpressive
    @ShadowImpressive 2 роки тому +99

    Funny, it's a good time to bring up how DMCA requests actually work: you don't typically receive them, UA-cam will give you a notice they have received it but they won't provide you, the creator, with a copy. That may be slightly different now, but generally you won't receive some lawyer-speak notice about violating copyright unless you are a company, own your own business where you are the CEO. In that case, you should have your own lawyer(s) anyway. So, don't open anything in any emails ever, don't trust DMCA notices because you wouldn't personally receive them anyway, and definitely question all links and attachments. If you get an attachment from a coworker, notify them and ask if they sent it, even if it's a legitimate email address and came from them. Remember, emails can be spoofed very well, just as phone numbers.

    • @BobBob-qm2bm
      @BobBob-qm2bm 2 роки тому

      Thanks for sharing the knowledge👨‍💻

    • @QUIX-KIWI
      @QUIX-KIWI 2 роки тому

      The funniest thing about receiving a "spoofed" email address sender, is when you OWN the TLD/URL and have zero outbound email clients in there.
      Thus - YOU know no one sent anything thus anything with an alias email address from that "sleeping" Domain name absolutely HAS to have been illegally spoofed.
      But then to see it being sent to the same domain name as if to the alias that doesn't exist - how fucken daft are those scammers?

  • @zvimelkman4407
    @zvimelkman4407 2 роки тому +60

    I'm taking my first steps in cyber security. To see such a pro how you deal with this was extraordinarily educational and very interesting. Thnks!

  • @THEAbhimanyuKumar90s
    @THEAbhimanyuKumar90s 2 роки тому +4

    Such content should reach out to every UA-cam creators.
    It will surely help them to stay away their hands on clicking such links !!
    Thank you for posting it,

  • @DavidAlvesWeb
    @DavidAlvesWeb 2 роки тому +21

    Your face in the thumbnail had me like 😂😂😂😂

  • @jeremiahdurotola5921
    @jeremiahdurotola5921 2 роки тому +653

    This is wonderful, specific and detailed. You should consider createing a malware analysis class. FYI, you have your first student. 😆

    • @alimustafa2682
      @alimustafa2682 2 роки тому +16

      He already did that

    • @JeremiahRamirez
      @JeremiahRamirez 2 роки тому +2

      @@alimustafa2682 LOL

    • @biraj599
      @biraj599 2 роки тому +1

      @@alimustafa2682 link

    • @BrandonMoeller
      @BrandonMoeller 2 роки тому +2

      *creating

    • @jane2303
      @jane2303 2 роки тому +2

      The guy across the street hacked my wifi, my phone. His buddy upstairs shares everything with him. They know everything I do online, passwords included. The woman upstairs stomps on the floor and they both walk up on me from upstairs when they hear a noise and follow me around my apartment.
      VPN and Tor are no help, they're already in them. Got rid of WiFi because they're in my TV's, too. Any suggestions?

  • @WyzzWowClassic
    @WyzzWowClassic 2 роки тому +58

    Your the best John. I work in IT myself but not in the security segment, you always make content so interesting to watch. Love your work. Keep it up!

  • @kidbullet
    @kidbullet 2 роки тому +12

    Educational, fun, not boring at all!
    Thanks a lot for your work. Studies computer networks myself and I only regret not having a teacher like your. Certainty would have a much better professional path by now! You, Bombal, Chuck: great lads!
    I wish I could study and learn more from you. Such a knowledge base!

  • @TheDrMayonnaise
    @TheDrMayonnaise 2 роки тому +14

    I honestly love these kind of videos if im honest. Good stuff John thank you

  • @boywarrick
    @boywarrick 2 роки тому +1

    NetworkChuck sent me here, but wow, what a video! Absolutely superb and appreciate the breakdown. Very interesting to watch and an eye opener for sure.
    Thanks John, you have another subscriber!

  • @muzamaze
    @muzamaze 2 роки тому +10

    One of the best TI and Malware analysis I've watched. This is a great video for new SOC analysts. Thank you so much JH 💓

  • @1Alex925
    @1Alex925 2 роки тому +2

    Wow, it's the first time seeing how a virus works and what calls make to a computer. It's both amazing and terrifying in the same time! Thank you for the informative video!
    P.S. I'm coming from NetworkChuck who made a video with you :) I'm now a subscriber of your channel as well.

  • @an3ssh
    @an3ssh 2 роки тому +10

    Every content creator need to see this video!!! This analysis is so simple yet so effective i bet everyone would understand.

  • @trapOrdoom
    @trapOrdoom 2 роки тому +68

    Insane how well crafted these security threats are becoming. They’re literally almost easily able to get any IT professional to fall for it… that’s scary.

    • @xulux9028
      @xulux9028 2 роки тому +1

      yeah it's not 2010 anymore

    • @drygordspellweaver8761
      @drygordspellweaver8761 2 роки тому +3

      don't click any links or run any executables on your desktop

    • @anonwilczek6044
      @anonwilczek6044 Рік тому +1

      yes its nice in bad way... show how evrything change and if you dont know how to adapt, you be in trouble

    • @lazix9769
      @lazix9769 Рік тому

      @@drygordspellweaver8761 😂😂

    • @dark_sunset
      @dark_sunset Рік тому +1

      @@drygordspellweaver8761 Put your PC in a Faraday cage and board up the windows and move to another state. Never use technology again.

  • @Alisson-Faoli
    @Alisson-Faoli 2 роки тому +1

    You're my hero! That knowledge level on cyber-security... dude, you're the absolute best!

  • @dougOptics
    @dougOptics 2 роки тому +3

    This was so awesome. Kudos to you John. Really appreciate you taking us along with you.

  • @grzegorztlusciak
    @grzegorztlusciak 2 роки тому +7

    It was very interesting and informative! Great job John!

  • @NotGeri
    @NotGeri 2 роки тому +2

    Very useful, and intriguing. You aren't rambling or anything like that, thank you mate!

  • @cynicalthoughts
    @cynicalthoughts 2 роки тому +3

    Welcome... to Jurassic Hack
    👏 great video

  • @CyberDevilSec
    @CyberDevilSec 2 роки тому +1

    This is not boring at all John.
    I watched the complete video and it was hanging tight in my chair and being fascinated for the last half hour in my university library!
    I learned some things i had no idea things like a Linux Distro existed for Malware analyses until now.
    Thanks for being such a great help in the IT comminity!

  • @JoeC_aka_PwnerJoe
    @JoeC_aka_PwnerJoe 2 роки тому +31

    Incredibly useful and helpful video, thank you John! It's interesting seeing under the hood for threats related to content creators.

  • @slugbones
    @slugbones 2 роки тому +1

    Heya just came from the Network Chuck channel just wanted to say that I appreciate that you explain smaller details of stuff that more advanced users probably don't need to hear. But some of us are dumb :)

  • @bradsen
    @bradsen 2 роки тому +8

    Hey John, thanks for sharing your thought process with us. I love the detailed explanation of how you analyze suspicious files.

  • @andresvillarroel1236
    @andresvillarroel1236 2 роки тому

    I loved the “rumbling”. This was fun, I subscribed, keep going!

  • @pierre-huguesaubertin1654
    @pierre-huguesaubertin1654 2 роки тому +20

    It’s nice to see what an analyst would do. Very well explained, and use free tools to do your PoC. Bravo!

  • @cmsupreme5832
    @cmsupreme5832 2 роки тому +1

    The details, the way you dive in to the malware is superb. Nice video. You earned a Sub and I'm your student now even I'm new to these threat analysis

  • @quentincaldway
    @quentincaldway 2 роки тому +12

    John Hammond, I feel confident enough to say - "we", as in the community can most definitely feel as if this was absolutely amazing!
    This (as well as most of your videos if not all), are always practical and showcase actual steps.
    Steps that a "poor man's" way of doing things is most likely a more advance way of doing some actual poking for those of us who value cyber security and ethical hacking but haven't made it a career.
    For all of the tinkerers out there, and even for just study purposes this is an excellent!
    We don't need to see the Mr. Robot type hacking all the time...though we love it...- Don't get me wrong I absolutely love the movie, i've done my review / some of thee tactic used are legit.
    But anyway, this video was an absolute treat for us and all the more very educational indeed.
    Definitely appreciate as always brother, stay blessed and safe out there.
    I'm very thankful you did not fall victim to this attack!
    ~ Cheers!

  • @BobBob-qm2bm
    @BobBob-qm2bm 2 роки тому +2

    Dude! This walk-through was real, relevant, and sweet to my tech buds. Got me seeing BLUE again, dang-it! Thanks John for taking us on this journey.👨‍💻

  • @dannyboycalifornia
    @dannyboycalifornia 2 роки тому +4

    Honestly feel pretty fortunate to be able to watch videos like this while I’m going to school studying cyber security 😅

  • @ChrisGreer
    @ChrisGreer 2 роки тому

    Boy I'd love to see a pcap of what that thing looks like on the wire! If you run it again grab on and lemme see! AWESOME video John!!

  • @duscraftphoto
    @duscraftphoto 2 роки тому +1

    I saw that this had happened to both David Bombal and the Corridor Crew and thought to myself "I almost hope they try this garbage with John Hammond so he can make a video about how they were doing this to other creators..." ha ha ha! Great content as usual and they can't mess with the best!

  • @swillra
    @swillra 2 роки тому +4

    Great video and clearly useful information for many people! You can always add a writeup in the description with that uber-elite hacking skills you used. My degree is network security and I enjoy all of your content, especially those that include more technical information about what you're doing. Many of us don't have time to do what you do so get our "hacking" enjoyment from social media content.

  • @kavinpaulfaderagao5920
    @kavinpaulfaderagao5920 2 роки тому

    honestly the best soft tutorial ive ever seen. short and straight to the point ! i love it

  • @realdotty5356
    @realdotty5356 2 роки тому +9

    Imagine thinking that John Hammond would have hidden file extensions turned off

    • @ScottyDMcom
      @ScottyDMcom 2 роки тому +2

      Yeah, Window's default is to hide all known extensions. Call me old school, but I agree with you, this is a massive security hole in Windows. Same thing in Mac OS. The default should be to show extensions. Remember anna_kournikova.jpg.exe? Everyone should turn on their extensions. However in this case it was a virtual machine, so not much customization.

    • @helloitismetomato
      @helloitismetomato 2 роки тому +2

      It's literally the first thing I do when I install a new OS: turn on file extensions. In fact I think it's irresponsible of OS designers to have them be invisible by default.

  • @nswan363
    @nswan363 2 роки тому

    Great video! The Twitter thread was excellent too. This dissection was a fantastic learning experience, thank you for sharing it and going so in depth.

  • @Cole.Varial
    @Cole.Varial 2 роки тому +4

    I'm always amazed by just how far down the rabbit hole its possible to go looking into these malware attacks. Keep up the good work

  • @mrdakik8357
    @mrdakik8357 Рік тому

    dont hesitate! this video was just perfect, i really learn a lot from this video, the idea that i can restore VM to a state, that redline stealer was a thing, .scr, the ways they scam, and much much more, thank you very much, appreciated.

  • @ADHJkvsNgsMBbTQe
    @ADHJkvsNgsMBbTQe 2 роки тому +6

    Awareness of these TTPs is just as vital for those who are responsible for protecting access to critical infrastructure. Content creators may sometimes be more visible targets, but everyone should remain vigilant.

  • @faran_siddiqui-d3t
    @faran_siddiqui-d3t 2 роки тому +6

    Imagine the hackers themselves watching this videos. Well if they are, just learn from him 🤣🤣🤣

  • @Bulldogg6404
    @Bulldogg6404 2 роки тому

    The duality between channel profile picture and thumbnail makes this video already great before I even start watching.

  • @4a6f62
    @4a6f62 2 роки тому +4

    Really interesting to see how something like this actually works.

  • @biggiecheez6879
    @biggiecheez6879 2 роки тому +1

    Ive been learning basics of linux and hacking on OverTheWire and watching you has shown how much more i have to learn. Keep making content!

  • @dflosounds
    @dflosounds 2 роки тому +3

    I honestly really liked this video because it showed a real-world example, and gave me an idea of how someone might begin scratching the surface of malware to figure out what it's trying to do and where it comes from. I'm a web developer with a passing interest in cyber security and reverse engineering, so seeing your process (even if you consider it a fairly basic, poor man's way of doing things) was really fun and educational for me.

  • @JaiHaze
    @JaiHaze 2 роки тому

    I absolutely loved this video, some very very interesting information. You have no idea how many emails I get from *fake* youtube

  • @carjockey7
    @carjockey7 2 роки тому +5

    As a person with and analytical mind I do find this segment extremely interesting and I’m making a big shout out to you and everybody who views this film to have good luck and everything you do thank you for listening to me

  • @koledirks
    @koledirks 2 роки тому

    was listening and semi watching as I was playing a game but i realized I kind of just stopped playing my game to watch you do this...I didn't understand like most of the video but it was really awesome to watch :O

  • @coolmanberr1738
    @coolmanberr1738 2 роки тому +5

    John keeps dropping gems for us! Thank you so much for your endless efforts to spread knowledge and awareness among the community, very much appreciated!

  • @Popstylez
    @Popstylez 2 роки тому +1

    I just started my security+ classes and I feel like I’m learning a totally different language. Look forward to your content to help in my journey!

  • @techfunnels
    @techfunnels 2 роки тому +3

    We really need MORE people to enter the cybersecurity field. Like, even if they don't get a job in cyber, these are becoming life skills for survival.

  • @SpaceTacos60316
    @SpaceTacos60316 2 роки тому +1

    Fantastic video!! I'm a cybersecurity noob so this is helpful, loads of great resources to flag and lots of info to be on the lookout for. Thanks again!!

  • @applePrincess
    @applePrincess 2 роки тому +3

    I'm not suggesting to attack to any unauthorised machines, but he did what you deserved for (as you have jokingly said, please try hack me).
    Love it!

  • @PhoDro1
    @PhoDro1 4 місяці тому

    Just now really discovering your videos. I’ve seen a couple here and there but you’re pretty much the only reason I open UA-cam at this point so thank you for the content. I’m about to start watching all of your videos back to back like a series. Over and over in hopes to learn some things. Keep on 🤘🏼

  • @shaolinsword6698
    @shaolinsword6698 2 роки тому +6

    FYI guys- at work we are seeing alot of "student loan forgiveness" phishing emails, I collect phishing emails and they are well designed. Be careful.

  • @bakaryk2435
    @bakaryk2435 2 роки тому +1

    It's always a pleasure to have your insight on malware attacks, there's habits we need to have in "alarming" emails/messages even calls

  • @zomgninja
    @zomgninja 2 роки тому +4

    Do you think its okay to share a possible victims email address? Might be just an unlucky user who got their account compromised and might now be spammed by UA-cam users.

    • @zomgninja
      @zomgninja 2 роки тому

      @No Name People who use redline or other cred stealing tools have 10,000s+ of victims emails, Its harder to make new gmails accounts then to just steal them.

  • @hannahsmith6095
    @hannahsmith6095 2 роки тому

    It is indeed beyond helpful and you are so modest.

  • @edwardbrennan3963
    @edwardbrennan3963 2 роки тому

    Dude, so fascinating! Found your channel through network chuck! Subscribed!

  • @chekov6668
    @chekov6668 2 роки тому

    Hey John, thanks for sharing this... definitely not boring and also not too lengthy!
    I suspect that the file was inflated to pass through web filters. Most firewalls with webfilter have a resource limit up to which size they scan downloads which is typically some 100 MB. So thats the easy or poor man way to bypass these.
    By the way, Hetzner is a large German hoster, which also has a datacenter in Finland. They rent everything from simple webspace to dedicated root servers or even colocation space. You can write them an mail, they have a good team!

  • @Flightful
    @Flightful 2 роки тому

    i am very thankful that i found this video. I've been just starting in content creation, and being aware of this is super helpful for the future (especially this early in the game when one may not know the emails of youtube, google, or the common formatting used for these emails). Thank you for spreading awareness

  • @markrhoades8822
    @markrhoades8822 Рік тому

    This has popped up a couple times recently so they're still at it. Glad you broke this one down👍😃

  • @M3TTRO
    @M3TTRO 2 роки тому

    Wow, so well done! Thanks for posting, man! Very helpful.

  • @Michael.McShane
    @Michael.McShane 2 роки тому +1

    This was awesome in its detail and I appreciate John's efforts to educate but also to tell a great story. Also I might add that if I were a content creator, I wouldn’t use a Microsoft product such as windows. Windows is clearly ground zero for these folks.

  • @gregf9160
    @gregf9160 2 роки тому +1

    Fantastic work, John. I heard about this horror-show form NetworkChuck and I just _could not believe_ this one so I've arrived here and watched the whole thing with my jaw hanging open! Now a subscriber. Cheers 👍🤗

  • @sirw369
    @sirw369 2 роки тому

    This right here! Is why I enjoy learning from you my friend. This was super enlightening. Thank you for doing a deep dive and sharing your findings with us. Stay safe John! 💪🏼

  • @milo_andrs
    @milo_andrs 2 роки тому

    Really cool vid John, I am getting into Cybersec and this was exquisite to watch. Thank you for the videos.

  • @theleadastray
    @theleadastray 2 роки тому

    So far the only tutorial I've seen that takes it slow and doesn't require prior experience to soft design.

  • @peterz2352
    @peterz2352 2 роки тому

    Hi John, responding to your worry "is it boring?". No absolutely not! Watched the video till the end and found it very informative! Thanks! Much appreciated. Cheers!

  • @muzikman5656
    @muzikman5656 2 роки тому

    Not boring at all. You did a great job going through it!!!

  • @treelight1707
    @treelight1707 2 роки тому

    it's actually anti-boring. I rarely watch videos that long to the end at normal speed. Thanks for the info, I learned a ton.

  • @averageatbest8146
    @averageatbest8146 2 роки тому

    Dude your overview was great! I would've liked to see the whole process.

  • @aspilmichel3066
    @aspilmichel3066 5 місяців тому

    Hey John, I just wanted to say thank you for helping the community. I recently discovered your channel by asking AI questions, and it's pretty helpful.

  • @r_c_h_d7409
    @r_c_h_d7409 2 роки тому

    So cool, John! Neat to see you do your thing here.

  • @taiwotopesunday
    @taiwotopesunday 2 роки тому

    Am glad you shared this. Your analysis just saved me from a phishing attack just now.

  • @mhos5730
    @mhos5730 2 роки тому

    In addition to the content what I really appreciate about your videos is that you don't start with the usual "smash that like and subscribe". Bless you!

  • @OligoST
    @OligoST 2 роки тому

    Super educational! I get tons of phishing emails from Iceland and I've always wanted to know how to safely dive deeper to track down homebase. Of course I assume any risks involved.

  • @Darksunbird
    @Darksunbird Рік тому

    super awesome content ! ty for sharing this. my cousin is learning about cyber security. and i think this will help him as h progresses through his classes. you know give him something too write a report on. again ty so much for getting the word out.

  • @Cyber_Viking_TX
    @Cyber_Viking_TX 2 роки тому

    This is a fantastic video for breaking down how a very realistic spam message. I am going have my CyberPatriot teams watch this video and then we will discuss what happened and how it relates to what they are learning as part of being on my CyberPatriot team(s).

  • @refaiabdeen5943
    @refaiabdeen5943 2 роки тому

    That was Awesome Mate. Thanks for educating us all. Cheers!

  • @algorithminc.8850
    @algorithminc.8850 2 роки тому

    A channel I wish I had found many years ago. Great stuff - thanks ... Cheers

  • @rosecottagegarden
    @rosecottagegarden Рік тому

    Thank you for sharing this! It will help us to be aware and pay attention to details before opening any emails.

  • @smr6482
    @smr6482 2 роки тому

    Found you from Network Chuck. Love your content. Subbed!

  • @zexceed65
    @zexceed65 2 роки тому

    this was so informational & exciting to see & definitely not boring, hope to see videos like this in future!

  • @Robdeltonie
    @Robdeltonie Рік тому

    Just got a similar email myself. Glad I saw your video first!

  • @justinpinson8575
    @justinpinson8575 2 роки тому

    I miss these malware reversing videos. Love it

  • @KevinCrouch0
    @KevinCrouch0 2 роки тому

    Love these! So many creators are getting these lately - Corridor Crew, I think Mr Beast, and many others

  • @Jocke1234
    @Jocke1234 2 роки тому

    Awesome to see and would love to see more stuff like this!

  • @m4nc1n1
    @m4nc1n1 2 роки тому

    Subscribed! I have been in IT for 22 years

  • @dominickbitsui9596
    @dominickbitsui9596 2 роки тому

    Oh my gsoh. This was such a fun video to watch. I loved watching you analyze the malware. What a great video, thanks for sharing John!

  • @obaidullahnoori7066
    @obaidullahnoori7066 2 роки тому

    Wonderful ! well explained! best work John

  • @EdwardRLyons
    @EdwardRLyons 2 роки тому

    Very educational, and thank you! As a very small scale UA-camr (on behalf of a small, local club) it's useful to hear about such scams. Thanks to you (and NetworkChuck!) for the heads up!

  • @mr.a.7372
    @mr.a.7372 2 роки тому

    Super useful. I learned about some smart tools to do analise on the scam email.

  • @saltypatriot1768
    @saltypatriot1768 2 роки тому

    that was beautiful, I don't know 10 percent of what you're saying, but to watch you go through that and how you know every move to make and the next steps. its art. I would give anything for that knowledge

  • @emkaysr
    @emkaysr 2 роки тому

    I saw your post on LinkedIn and I really was shocked. John you’re gem. Thanks and its really interesting

  • @hunszaszist
    @hunszaszist 2 роки тому

    Really cool video - lots of useful tools showcased here, I should add these to my list!

  • @dani-uf1eo
    @dani-uf1eo 2 роки тому

    Not boring at all. We need more of this.