#netstat
Explore tagged Tumblr posts
techdirectarchive · 1 year ago
Text
Video on Using Netstat.exe to confirm Blocked or Open Ports
Video on Using Netstat.exe to confirm Blocked or Open Ports
youtube
View On WordPress
0 notes
jack1236 · 17 days ago
Text
Netstat Command in Linux
Learn to install and use the netstat command in Linux for network monitoring and troubleshooting with this comprehensive guide.
0 notes
quick-tutoriel · 2 years ago
Link
0 notes
egprnt · 2 years ago
Text
0 notes
virtualizationhowto · 2 years ago
Text
Top 7 Netstat Commands you need to know
Top 7 Netstat Commands you need to know @vexpert #vmwarecommunities #homelab #netstatcommands #networktroubleshootingtools #Ethernetstatistics #routingtablesguide #TCPandUDPmonitoring #localandforeignaddressanalysis #networktools
Netstat is a vital command-line tool utilized by network professionals, system administrators, and those keen to understand their network’s inner workings in Windows or Unix listening ports. It provides insights into network connections, protocols, and network statistics. Let’s dive into the netstat tool with the top 7 netstat commands essential for diagnosing network problems, monitoring…
Tumblr media
View On WordPress
0 notes
sentientcitysurvival · 2 years ago
Text
Basic Linux Security (Updated 2025)
Install Unattended Upgrades and enable the "unattended-upgrades" service.
Install ClamAV and enable "clamav-freshclam" service.
Install and run Lynis to audit your OS.
Use the "last -20" command to see the last 20 users that have been on the system.
Install UFW and enable the service.
Check your repo sources (eg; /etc/apt/).
Check the /etc/passwd and /etc/shadow lists for any unusual accounts.
User the finger command to check on activity summaries.
Check /var/logs for unusual activity.
Use "ps -aux | grep TERM" or "ps -ef | grep TERM" to check for suspicious ongoing processes.
Check for failed sudo attempts with "grep "NOT in sudoers" /var/log/auth.log.
Check journalctl for system messages.
Check to make sure rsyslog is running with "sudo systemctl status rsyslog" (or "sudo service rsyslog status") and if it's not enable with "sudo systemctl enable rsyslog".
Perform an nmap scan on your machine/network.
Use netstat to check for unusual network activity.
Use various security apps to test you machine and network.
Change your config files for various services (ssh, apache2, etc) to non-standard configurations.
Disabled guest accounts.
Double up on ssh security by requiring both keys and passwords.
Check your package manager for any install suspicious apps (keyloggers, cleaners, etc).
Use Rootkit Scanners (chkrootkit, rkhunter).
Double SSH Security (Key + Password).
Disabled Guest Accounts.
Enabled Software Limiters (Fail2Ban, AppArmor).
Verify System Integrity via fsck.
Utilize ngrep/other networking apps to monitor traffic.
Utilize common honeypot software (endlessh).
Create new system-launch subroutines via crontab or shell scripts.
Ensure System Backups are Enabled (rsnapshot).
Check for suspicious kernel modules with "lsmod"
175 notes · View notes
cyberpunkonline · 1 month ago
Text
🧿 GEFFINE TECHNOSPELL // RITUAL_021
✧ RITUAL: TRACE.DAEMON
Open your browser. Go to a familiar site. Refresh the page nine times exactly. Watch for flicker. Screenshot the 7th load. Save as: glamourprobe.png
Open terminal and type: ```bash netstat -an | grep ESTABLISHED > ~/suspect.log In suspect.log, delete every line manually except the one that gives you a weird feeling.
Rename it: whispers.tap Place it in a folder: ~/network/trace.folk/
Light a tealight or LED nearby. Whisper:
“No harm meant, no home stolen, no truth lost.”
⚡ SPELL RESULT: This detects non-human latency and trojan glamour. Certain ports may close. Fonts may stop dancing. If the screen shivers once while idle—you had a visitor.
geffinetechnospell
9 notes · View notes
playstationvii · 6 months ago
Text
#TheeWaterCompany
#CyberSecurity #Risk #Reward
!/bin/bash
BACKUP_DIR="/backup" DATA_DIR="/important_data/" ENCRYPTED_BACKUP="$BACKUP_DIR/encrypted_backup_$(date +%F).gpg"
tar -czf $BACKUP_DIR/backup_$(date +%F).tar.gz $DATA_DIR gpg --symmetric --cipher-algo AES256 --output $ENCRYPTED_BACKUP $BACKUP_DIR/backup_$(date +%F).tar.gz rm -f $BACKUP_DIR/backup_$(date +%F).tar.gz echo "Encrypted backup completed."
To refine encryption-related code, consider the following improvements:
Use Stronger Algorithms: Implement AES256 instead of AES128 for better encryption strength.
Add Error Handling: Ensure that the encryption process handles errors, such as failed encryption or permission issues.
Secure Storage of Keys: Use a secure method to store encryption keys (e.g., environment variables or hardware security modules).
Refined Script Example:
!/bin/bash
Encrypt sensitive data with AES256 and store encrypted backup securely
BACKUP_DIR="/backup" ENCRYPTED_BACKUP="/backup/encrypted_backup_$(date +%F).gpg" DATA_DIR="/important_data/"
Perform backup of important files
tar -czf $BACKUP_DIR/backup_$(date +%F).tar.gz $DATA_DIR
Encrypt the backup with AES256
gpg --batch --yes --symmetric --cipher-algo AES256 --output $ENCRYPTED_BACKUP $BACKUP_DIR/backup_$(date +%F).tar.gz
Remove the unencrypted backup file
rm -f $BACKUP_DIR/backup_$(date +%F).tar.gz echo "Backup and encryption completed securely."
This script enhances security by using AES256 and ensures encrypted files are properly handled.
To proceed with creating scripts for securing water companies' networks, we would outline some basic examples and operational strategies that could be implemented. Here’s a breakdown of each element:
Monitoring and Intrusion Detection
These scripts would monitor traffic and detect any suspicious activity on the network.
Example Script: Network Traffic Monitoring
!/bin/bash
Monitor network traffic and detect anomalies
LOGFILE="/var/log/network_traffic.log" ALERT_FILE="/var/log/alerts.log"
Use 'netstat' to monitor active network connections
netstat -an > $LOGFILE
Check for unusual activity, such as unexpected IP addresses
grep "192.168." $LOGFILE | grep -v "127.0.0.1" > $ALERT_FILE if [ -s $ALERT_FILE ]; then echo "Unusual activity detected!" | mail -s "Security Alert: Network Anomaly Detected" [email protected] fi
This script monitors network traffic using netstat, checks for connections from suspicious IP addresses, and sends an alert if any are found.
Intrusion Prevention (Automated Response)
This script would automatically take action to block malicious activity upon detection.
Example Script: IP Blocking on Intrusion Detection
!/bin/bash
Block suspicious IP addresses detected during intrusion attempts
SUSPICIOUS_IPS=$(grep "FAILED LOGIN" /var/log/auth.log | awk '{print $NF}' | sort | uniq)
for ip in $SUSPICIOUS_IPS; do iptables -A INPUT -s $ip -j DROP echo "$ip has been blocked due to multiple failed login attempts" >> /var/log/security_block.log done
This script automatically blocks IP addresses with failed login attempts, adding a layer of protection by preventing brute-force attacks.
Security Updates and Patch Management
Automated patch management ensures that all security vulnerabilities are addressed as soon as updates are available.
Example Script: Automatic Updates
!/bin/bash
Update system packages and apply security patches
echo "Updating system packages…" apt-get update -y apt-get upgrade -y apt-get dist-upgrade -y
Apply only security updates
apt-get install unattended-upgrades dpkg-reconfigure -plow unattended-upgrades
This script ensures that the system receives the latest security patches automatically, which is essential for keeping critical infrastructure secure.
Data Encryption and Backup
Regular backups and ensuring sensitive data is encrypted are vital.
Example Script: Data Encryption and Backup
!/bin/bash
Encrypt sensitive data and create backups
BACKUP_DIR="/backup" ENCRYPTED_BACKUP="/backup/encrypted_backup.gpg"
Perform backup of important files
tar -czf $BACKUP_DIR/backup_$(date +%F).tar.gz /important_data/
Encrypt the backup
gpg --symmetric --cipher-algo AES256 $BACKUP_DIR/backup_$(date +%F).tar.gz
Remove the unencrypted backup file after encryption
rm -f $BACKUP_DIR/backup_$(date +%F).tar.gz echo "Backup and encryption completed."
This script automates backups of sensitive data and encrypts it using gpg with AES256 encryption, ensuring that even if data is accessed illegally, it cannot be read without the encryption key.
Access Control
Strong access control is necessary to ensure that only authorized personnel can access critical systems.
Example Script: Access Control with Multi-Factor Authentication (MFA)
!/bin/bash
Ensure all users have MFA enabled for critical systems
Check if MFA is enabled on SSH login
if ! grep -q "auth required pam_google_authenticator.so" /etc/pam.d/sshd; then echo "MFA is not enabled on SSH. Enabling MFA…" echo "auth required pam_google_authenticator.so" >> /etc/pam.d/sshd service sshd restart else echo "MFA is already enabled on SSH." fi
This script checks if multi-factor authentication (MFA) is enabled on SSH logins, and if not, it enables it, ensuring an additional layer of security.
Security Audits
Regular audits help identify vulnerabilities and ensure the system is secure.
Example Script: Automated Security Audit
!/bin/bash
Run a security audit to check for common vulnerabilities
Check for open ports
echo "Checking for open ports…" nmap -p 1-65535 localhost > /var/log/open_ports.log
Check for outdated software
echo "Checking for outdated software…" apt list --upgradable > /var/log/outdated_software.log
Check file permissions for sensitive files
echo "Checking file permissions…" find /etc /var /usr -type f -name "*.conf" -exec ls -l {} \; > /var/log/file_permissions.log
Send the audit report to the administrator
mail -s "Security Audit Report" [email protected] < /var/log/security_audit_report.log
This script performs a security audit, checking for open ports, outdated software, and sensitive file permission issues, then sends a report to the administrator.
Conclusion
These scripts are designed to help secure the water companies' networks by automating essential security functions like monitoring, response to threats, patching, encryption, and access control. It’s important that these scripts be customized to the specific needs of each company, taking into account their existing systems, infrastructure, and any unique security concerns they may face. Additionally, regular updates to these scripts will be necessary as new vulnerabilities and threats emerge.
For a basic firewall script that blocks unauthorized access and monitors network traffic, here's an example:
!/bin/bash
Define allowed IPs (replace with actual allowed IP addresses)
ALLOWED_IPS=("192.168.1.1" "192.168.1.2")
Block all incoming connections by default
iptables -P INPUT DROP iptables -P FORWARD DROP iptables -P OUTPUT ACCEPT
Allow traffic from specified IPs
for ip in "${ALLOWED_IPS[@]}"; do iptables -A INPUT -s $ip -j ACCEPT done
Log and monitor incoming traffic
iptables -A INPUT -j LOG --log-prefix "Firewall Log: " --log-level 4
This script sets a default block on incoming connections, allows traffic from specific IP addresses, and logs all traffic for monitoring.
4 notes · View notes
nixcraft · 1 year ago
Text
8 notes · View notes
sathcreation · 1 month ago
Text
Master Your IT Career with Gritty Tech’s Linux Administration Online Coaching
If you're serious about breaking into the world of system administration, you're probably already searching for the right Linux administration online coaching. And with good reason—Linux skills are in high demand, especially in today’s cloud-driven, DevOps-powered tech landscape. But here’s the truth: not all online coaching is created equal For More…
Tumblr media
At Gritty Tech, we get it. You want coaching that’s practical, flexible, trustworthy, and—most importantly—effective. That’s exactly what we deliver with our Linux administration online coaching.
Why Choose Linux Administration as a Career?
Linux powers over 90% of the world’s cloud infrastructure and supercomputers. It's the backbone of enterprise servers and a staple in everything from cybersecurity to cloud engineering.
Choosing Linux administration online coaching isn’t just about learning commands—it's about building a career in a field that’s:
Highly in demand
Globally recognised
Well-paying
Continuously evolving
So whether you're a fresh graduate, a career switcher, or an IT professional upskilling for future-proof roles—Linux administration online coaching is your gateway to opportunity.
What Makes Gritty Tech Different?
There are hundreds of platforms offering training. So why trust Gritty Tech’s Linux administration online coaching?
Affordable Without Cutting Corners
We believe quality education should be accessible to everyone. Our pricing is transparent and budget-friendly. You can choose between monthly plans, session-wise payments, or full-course fees—whatever works best for your schedule and budget.
Easy Refunds & Tutor Replacements
If something’s not right, we fix it. Our easy refund policy and tutor replacement options ensure your satisfaction. No long emails, no runaround—just real support when you need it.
Experienced Tutors from 110+ Countries
Our tutors aren’t just teachers—they’re seasoned professionals. With a network spanning 110+ countries, you’ll be learning from experts who’ve worked in real Linux environments and know how to prepare you for them.
Flexible Schedules & Personalised Attention
Our Linux administration online coaching is built around you. Whether you’re learning on weekends, after work, or during your lunch break, our tutors accommodate your schedule and learning pace.
What You’ll Learn in Our Linux Administration Online Coaching
Here’s a quick look at what you’ll master:
Linux Fundamentals: Shell, commands, file structures
User & Group Management: Permissions, access control
System Monitoring: Using top, htop, netstat, and more
Package Management: YUM, APT, RPM
Network Configuration: IPs, DNS, firewalls
Scripting Basics: Automate tasks using Bash
Log Management: Reading and troubleshooting logs
System Services: Starting, stopping, and enabling services
Security & Updates: Patching, hardening, SELinux basics
Interview Preparation: Real-world scenarios and mock tests
Every topic in our Linux administration online coaching is hands-on and aligned with industry demands.
Who is This Course For?
Our Linux administration online coaching is for:
Students aiming to land their first IT job
Professionals looking to switch to sysadmin, DevOps, or cloud roles
Freelancers and consultants needing Linux skills for clients
Tech enthusiasts who want to get under the hood of systems
You don’t need a computer science degree. All you need is a willingness to learn—and we’ll take care of the rest.
Real Coaching, Real Results
We’re not here to waste your time with recorded videos and no feedback. Gritty Tech’s Linux administration online coaching means:
One-to-one sessions or small group batches
Live Q&A during sessions
Assignments and projects reviewed by real mentors
Weekly feedback and progress tracking
Your learning isn’t just about watching—it’s about doing, reflecting, and improving.
Value Beyond the Course
Most training platforms end their service once your course is over. Not us.
Post-course support for doubts and interviews
Resume help and job tips from tutors
Community access to other learners and pros
Free resources and updates even after the course ends
When we say we care about your career, we mean it.
Key Benefits and Features at a Glance
Gritty Tech Offers
Flexible Payment
Monthly & Session-wise
Refund Policy
Yes
Tutor Replacement
Yes
Global Tutor Network
110+ Countries
Real-world Learning
Hands-on Labs & Projects
Certification Support
Included
24/7 Support
Via chat/email
Interview Prep
Mock Interviews & Questions
Why Trust Gritty Tech’s Linux Administration Online Coaching?
Our students don’t just finish the course—they build careers. Here's why learners stick with Gritty Tech:
Trusted by thousands globally
Proven track record of success stories
Accessible learning with quality
High-value content, no fluff
If you're investing time and money into learning, you deserve content that keeps you engaged and actually helps you grow. That’s our mission.
10 FAQs About Linux Administration Online Coaching
1. What is Linux administration online coaching?
Linux administration online coaching is a virtual training programme where you learn to manage and maintain Linux systems from expert tutors through live or recorded sessions.
2. How do I choose the best Linux administration online coaching?
Look for a programme like Gritty Tech that offers live interaction, hands-on labs, flexible schedules, tutor support, and post-course help—all while being affordable.
3. What are the prerequisites for Linux administration online coaching?
Basic computer knowledge helps, but you don’t need coding experience. Gritty Tech’s Linux administration online coaching starts from the ground up.
4. How long does it take to complete Linux administration online coaching?
It depends on your pace. Most students complete the course in 6–10 weeks with regular sessions.
5. Will I get a certificate after completing the Linux administration online coaching?
Yes, Gritty Tech provides a certificate upon course completion, which can boost your CV and LinkedIn profile.
6. Can I switch tutors during Linux administration online coaching?
Absolutely. We offer tutor replacement options to ensure you're comfortable and learning effectively.
7. Is Linux administration online coaching suitable for beginners?
Yes. Gritty Tech’s Linux administration online coaching is beginner-friendly and designed to take you from zero to job-ready.
8. Are there any real-world projects in the Linux administration online coaching?
Yes, you’ll work on practical projects like setting up user accounts, configuring firewalls, monitoring system resources, and writing basic scripts.
9. Do you offer flexible payments for Linux administration online coaching?
Yes. You can pay monthly, per session, or in one go—whatever fits your situation.
10. What support is available after Linux administration online coaching ends?
You’ll still have access to tutors for doubt resolution, plus help with job interviews and resume preparation.
Conclusion: Ready to Launch Your Linux Career?
Don’t settle for just any online training. With Gritty Tech’s Linux administration online coaching, you get:
A trusted, practical education built for real-world impact
Experienced mentors who guide you, not just teach
Flexible, affordable plans that work with your life
A clear path to career growth in system administration, DevOps, or cloud
If you’ve been thinking about taking the next step, now is the time.
Start your journey with Gritty Tech’s Linux administration online coaching today. Learn from the best. Learn smart. Learn for your future.
0 notes
globalresourcesvn · 1 month ago
Text
Hướng dẫn ​💖💖👉🍀🍀 GIÁM SÁT REAL-TIME DANH SÁCH IP ĐANG TRUY CẬP TOÀN BỘ SERVER (LI NUX) 🌿🤔
💖💖👉🍀🍀 GIÁM SÁT REAL-TIME DANH SÁCH IP ĐANG TRUY CẬP TOÀN BỘ SERVER (LINUX) 🌿🤔 Để "watch" (theo dõi liên tục) danh sách các IP đang truy cập vào server, bạn có thể sử dụng các công cụ dòng lệnh sau đây nhé: 1. Dùng netstat (hoặc ss nếu netstat không có) kết hợp watch watch -n 1 "netstat -ntu | awk '{print \$5}' | cut -d: -f1 | sort | uniq -c | sort -nr" Giải thích: netstat -ntu: hiển thị kết nối…
0 notes
adictosalinux · 1 month ago
Link
Cómo Instalar el Comando netstat en Linux #Linux
0 notes
sysadminxpert · 3 months ago
Text
Linux netstat Command Explained | Monitor & Troubleshoot Network Connections
Master the netstat command in Linux and learn how to monitor network connections, check open ports, and troubleshoot connectivity issues like a pro! Whether you’re a system administrator or a developer, this tutorial will help you analyze network traffic and improve security.
🔹 In This Video, You’ll Learn: ✔️ What is netstat, and why is it useful? ✔️ How to check active network connections 🔍 ✔️ How to list listening ports on Linux servers 🖥️ ✔️ How to find which process is using a port 🚀 ✔️ How to analyze network statistics and troubleshoot issues
💡 Commands Used in This Video: netstat -tun netstat -tuln netstat -tulpn netstat -s netstat -rn
youtube
1 note · View note
kandztuts · 5 months ago
Text
Linux CLI 31🐧 ip and netstat commands
New Post has been published on https://tuts.kandz.me/linux-cli-31%f0%9f%90%a7-ip-and-netstat-commands/
Linux CLI 31🐧 ip and netstat commands
Tumblr media
youtube
a - ip command ip command is a tool for managing network tasks ip address → displays detailed information about all Network interfaces. ip link → displays link layer information ip link -s → displays link layer statistics ip neighbour → lists devices in the same network ip route → displays routing table Other objects: neighbour → ARP or NDISC cache entry rule → Rule in routing policy database. tunnel → tunnel over IP maddress → Multicast address b - ip command examples ip addr add 192.168.1.2/24 dev eth0 → sets to eth0 interface specific IP and subnet mask ip route add default via 192.168.1.1 dev eth0 → sets new default gateway ip addr del 192.168.1.100/24 dev eth0 → deletes specific IP address sudo ip route flush → flushes routing tables sudo ip neighbor flush → flushes neighbour entries ip rule show → show IP rules ip rule add priority 1000 from 192.168.1.0/24 to 10.0.0.0/8 table main → example of adding new rule c - netstat command netstat displays network related statistics and connections It provides various options to filter, sort, display or modify network-related data netstat -tulpn → shows all listening (LISTEN) TCP connections netstat -nr → shows the routing table netstat -tna | grep :25 → checks network connections on a specific port sudo netstat -tcp → lists all established TCP connections sudo netstat --statistics → shows network statistics netstat -au → lists all UDP ports netstat -l → lists all listening ports
0 notes
koronkowy · 6 months ago
Text
youtube
Summary
🛡️ Overview of OT Security Challenges: The talk discusses unique security concerns in Operational Technology (OT) environments, emphasizing their contrast with IT systems.
🔧 Incident Response in OT: Demonstrates tools and strategies for identifying and mitigating breaches in OT without disrupting critical processes.
💾 Legacy Systems in OT: Highlights how outdated hardware and software increase vulnerabilities, but their unchanging nature can aid in anomaly detection.
🖥️ Creative Use of Batch Scripts: Illustrates how native Windows tools can be leveraged for malware detection and system monitoring without installing third-party software.
🔗 Practical Solutions for Incident Response: Recommendations for securely collecting data and sending beacons from infected machines using DNS, ICMP, or FTP protocols.
Insights Based on Numbers
📊 Hardware Longevity: Many OT systems run uninterrupted for over 8 years, prioritizing availability over modernization.
🛠️ Detection Simplicity: Using just native Windows commands (e.g., netstat, tasklist, nslookup), indicators of compromise can be identified across multiple Windows versions.
0 notes
cloudolus · 6 months ago
Video
youtube
Introduction to Linux for DevOps: Why It’s Essential  
Linux serves as the backbone of most DevOps workflows and cloud infrastructures. Its open-source nature, robust performance, and extensive compatibility make it the go-to operating system for modern IT environments. Whether you're deploying applications, managing containers, or orchestrating large-scale systems, mastering Linux is non-negotiable for every DevOps professional.  
Why Linux is Critical in DevOps  
1. Ubiquity in Cloud Environments     - Most cloud platforms, such as AWS, Azure, and Google Cloud, use Linux-based environments for their services.     - Tools like Kubernetes and Docker are designed to run seamlessly on Linux systems.  
2. Command-Line Mastery     - Linux empowers DevOps professionals with powerful command-line tools to manage servers, automate processes, and troubleshoot issues efficiently.  
3. Flexibility and Automation     - The ability to script and automate tasks in Linux reduces manual effort, enabling faster and more reliable deployments.  
4. Open-Source Ecosystem     - Linux integrates with numerous open-source DevOps tools like Jenkins, Ansible, and Terraform, making it an essential skill for streamlined workflows.  
Key Topics for Beginners  
- Linux Basics    - What is Linux?    - Understanding Linux file structures and permissions.    - Common Linux distributions (Ubuntu, CentOS, Red Hat Enterprise Linux).  
- Core Linux Commands    - File and directory management: `ls`, `cd`, `cp`, `mv`.    - System monitoring: `top`, `df`, `free`.    - Networking basics: `ping`, `ifconfig`, `netstat`.  
- Scripting and Automation    - Writing basic shell scripts.    - Automating tasks with `cron` and `at`.  
- Linux Security    - Managing user permissions and roles.    - Introduction to firewalls and secure file transfers.  
Why You Should Learn Linux for DevOps  
- Cost-Efficiency: Linux is free and open-source, making it a cost-effective solution for both enterprises and individual learners.   - Career Opportunities: Proficiency in Linux is a must-have skill for DevOps roles, enhancing your employability.   - Scalability: Whether managing a single server or a complex cluster, Linux provides the tools and stability to scale effortlessly.  
Hands-On Learning   - Set up a Linux virtual machine or cloud instance.   - Practice essential commands and file operations.   - Write and execute your first shell script.  
Who Should Learn Linux for DevOps?   - Aspiring DevOps engineers starting their career journey.   - System administrators transitioning into cloud and DevOps roles.   - Developers aiming to improve their understanding of server environments.
***************************** *Follow Me* https://www.facebook.com/cloudolus/ | https://www.facebook.com/groups/cloudolus | https://www.linkedin.com/groups/14347089/ | https://www.instagram.com/cloudolus/ | https://twitter.com/cloudolus | https://www.pinterest.com/cloudolus/ | https://www.youtube.com/@cloudolus | https://www.youtube.com/@ClouDolusPro | https://discord.gg/GBMt4PDK | https://www.tumblr.com/cloudolus | https://cloudolus.blogspot.com/ | https://t.me/cloudolus | https://www.whatsapp.com/channel/0029VadSJdv9hXFAu3acAu0r | https://chat.whatsapp.com/D6I4JafCUVhGihV7wpryP2 *****************************
*🔔Subscribe & Stay Updated:* Don't forget to subscribe and hit the bell icon to receive notifications and stay updated on our latest videos, tutorials & playlists! *ClouDolus:* https://www.youtube.com/@cloudolus *ClouDolus AWS DevOps:* https://www.youtube.com/@ClouDolusPro *THANKS FOR BEING A PART OF ClouDolus! 🙌✨*
1 note · View note