@networkpro/blog 0.1.6 → 0.1.7

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1 @@
1
- <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link><atom:link href="https://blog.netwk.pro/feed_rss_created.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/blog</docs><language>en</language> <pubDate>Sat, 10 May 2025 18:55:46 -0000</pubDate> <lastBuildDate>Sat, 10 May 2025 18:55:46 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;h1&gt;We&#39;re Live&lt;/h1&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge&lt;/h2&gt;&lt;p&gt;In a digital world where threats are persistent and privacy is too often an afterthought, &lt;strong&gt;Network Pro Strategies&lt;/strong&gt; was founded on a belief that &lt;strong&gt;effective security doesn&#39;t require compromise&lt;/strong&gt;. We specialize in helping organizations and individuals &lt;strong&gt;navigate today’s cybersecurity challenges with confidence, clarity, and control&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today marks the launch of our official blog—your go-to destination for &lt;strong&gt;field-tested strategies, implementation insights, and transparent thought leadership&lt;/strong&gt; across cybersecurity, network defense, and privacy-aware infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Modern security isn’t just about technology—it’s about &lt;strong&gt;trust, autonomy, and informed choices&lt;/strong&gt;. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.&lt;/p&gt;</description><link>https://blog.netwk.pro/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://blog.netwk.pro/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;!-- eslint-disable --&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Originally published on 1/4/2015 by &lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&#34;&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small;&#34;&gt;📝 &lt;strong&gt;&lt;i&gt;NOTE:&lt;/i&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://blog.netwk.pro/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 Jan 2015 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://blog.netwk.pro/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
1
+ <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link><atom:link href="https://blog.netwk.pro/feed_rss_created.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/blog</docs><language>en</language> <pubDate>Sat, 10 May 2025 19:48:26 -0000</pubDate> <lastBuildDate>Sat, 10 May 2025 19:48:26 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;h1&gt;We&#39;re Live&lt;/h1&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge&lt;/h2&gt;&lt;p&gt;In a digital world where threats are persistent and privacy is too often an afterthought, &lt;strong&gt;Network Pro Strategies&lt;/strong&gt; was founded on a belief that &lt;strong&gt;effective security doesn&#39;t require compromise&lt;/strong&gt;. We specialize in helping organizations and individuals &lt;strong&gt;navigate today’s cybersecurity challenges with confidence, clarity, and control&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today marks the launch of our official blog—your go-to destination for &lt;strong&gt;field-tested strategies, implementation insights, and transparent thought leadership&lt;/strong&gt; across cybersecurity, network defense, and privacy-aware infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Modern security isn’t just about technology—it’s about &lt;strong&gt;trust, autonomy, and informed choices&lt;/strong&gt;. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.&lt;/p&gt;</description><link>https://blog.netwk.pro/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://blog.netwk.pro/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;!-- eslint-disable --&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Originally published on 1/4/2015 by &lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&#34;&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small;&#34;&gt;📝 &lt;strong&gt;&lt;i&gt;NOTE:&lt;/i&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://blog.netwk.pro/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 Jan 2015 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://blog.netwk.pro/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
@@ -1 +1 @@
1
- <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link><atom:link href="https://blog.netwk.pro/feed_rss_updated.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/blog</docs><language>en</language> <pubDate>Sat, 10 May 2025 18:55:46 -0000</pubDate> <lastBuildDate>Sat, 10 May 2025 18:55:46 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;h1&gt;We&#39;re Live&lt;/h1&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge&lt;/h2&gt;&lt;p&gt;In a digital world where threats are persistent and privacy is too often an afterthought, &lt;strong&gt;Network Pro Strategies&lt;/strong&gt; was founded on a belief that &lt;strong&gt;effective security doesn&#39;t require compromise&lt;/strong&gt;. We specialize in helping organizations and individuals &lt;strong&gt;navigate today’s cybersecurity challenges with confidence, clarity, and control&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today marks the launch of our official blog—your go-to destination for &lt;strong&gt;field-tested strategies, implementation insights, and transparent thought leadership&lt;/strong&gt; across cybersecurity, network defense, and privacy-aware infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Modern security isn’t just about technology—it’s about &lt;strong&gt;trust, autonomy, and informed choices&lt;/strong&gt;. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.&lt;/p&gt;</description><link>https://blog.netwk.pro/2025/04/30/our-blog-is-live/</link> <pubDate>Mon, 05 May 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://blog.netwk.pro/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;!-- eslint-disable --&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Originally published on 1/4/2015 by &lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&#34;&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small;&#34;&gt;📝 &lt;strong&gt;&lt;i&gt;NOTE:&lt;/i&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://blog.netwk.pro/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 May 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://blog.netwk.pro/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
1
+ <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link><atom:link href="https://blog.netwk.pro/feed_rss_updated.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/blog</docs><language>en</language> <pubDate>Sat, 10 May 2025 19:48:26 -0000</pubDate> <lastBuildDate>Sat, 10 May 2025 19:48:26 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;h1&gt;We&#39;re Live&lt;/h1&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge&lt;/h2&gt;&lt;p&gt;In a digital world where threats are persistent and privacy is too often an afterthought, &lt;strong&gt;Network Pro Strategies&lt;/strong&gt; was founded on a belief that &lt;strong&gt;effective security doesn&#39;t require compromise&lt;/strong&gt;. We specialize in helping organizations and individuals &lt;strong&gt;navigate today’s cybersecurity challenges with confidence, clarity, and control&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today marks the launch of our official blog—your go-to destination for &lt;strong&gt;field-tested strategies, implementation insights, and transparent thought leadership&lt;/strong&gt; across cybersecurity, network defense, and privacy-aware infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Modern security isn’t just about technology—it’s about &lt;strong&gt;trust, autonomy, and informed choices&lt;/strong&gt;. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.&lt;/p&gt;</description><link>https://blog.netwk.pro/2025/04/30/our-blog-is-live/</link> <pubDate>Mon, 05 May 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://blog.netwk.pro/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;!-- eslint-disable --&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Originally published on 1/4/2015 by &lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&#34;&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small;&#34;&gt;📝 &lt;strong&gt;&lt;i&gt;NOTE:&lt;/i&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://blog.netwk.pro/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 May 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://blog.netwk.pro/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
package/index.html CHANGED
@@ -12,7 +12,7 @@
12
12
 
13
13
 
14
14
 
15
- <link rel="next" href="CONDUCT/">
15
+ <link rel="next" href="category/security/">
16
16
 
17
17
 
18
18
  <link rel="alternate" type="application/rss+xml" title="RSS feed" href="feed_rss_created.xml">
@@ -226,17 +226,20 @@
226
226
 
227
227
 
228
228
 
229
- <li class="md-tabs__item md-tabs__item--active">
230
- <a href="." class="md-tabs__link">
231
-
229
+
230
+
231
+ <li class="md-tabs__item md-tabs__item--active">
232
+ <a href="." class="md-tabs__link">
233
+
232
234
 
233
235
 
234
236
 
235
237
 
236
238
  Blog Home
237
239
 
238
- </a>
239
- </li>
240
+ </a>
241
+ </li>
242
+
240
243
 
241
244
 
242
245
 
@@ -245,17 +248,20 @@
245
248
 
246
249
 
247
250
 
248
- <li class="md-tabs__item">
249
- <a href="CONDUCT/" class="md-tabs__link">
250
-
251
+
252
+
253
+ <li class="md-tabs__item">
254
+ <a href="contributing/" class="md-tabs__link">
255
+
251
256
 
252
257
 
253
258
 
254
259
 
255
260
  Contributing
256
261
 
257
- </a>
258
- </li>
262
+ </a>
263
+ </li>
264
+
259
265
 
260
266
 
261
267
 
@@ -271,7 +277,7 @@
271
277
 
272
278
 
273
279
 
274
- Tags
280
+ Tag Index
275
281
 
276
282
  </a>
277
283
  </li>
@@ -284,7 +290,7 @@
284
290
 
285
291
 
286
292
  <li class="md-tabs__item">
287
- <a href="https://netwk.pro/" class="md-tabs__link">
293
+ <a href="https://netwk.pro" class="md-tabs__link">
288
294
 
289
295
 
290
296
 
@@ -297,50 +303,6 @@
297
303
 
298
304
 
299
305
 
300
-
301
-
302
-
303
-
304
-
305
-
306
-
307
- <li class="md-tabs__item">
308
- <a href="archive/2025/" class="md-tabs__link">
309
-
310
-
311
-
312
-
313
-
314
- Archive
315
-
316
- </a>
317
- </li>
318
-
319
-
320
-
321
-
322
-
323
-
324
-
325
-
326
-
327
-
328
-
329
- <li class="md-tabs__item">
330
- <a href="category/security/" class="md-tabs__link">
331
-
332
-
333
-
334
-
335
-
336
- Categories
337
-
338
- </a>
339
- </li>
340
-
341
-
342
-
343
-
344
306
  </ul>
345
307
  </div>
346
308
  </nav>
@@ -392,21 +354,38 @@
392
354
 
393
355
 
394
356
 
357
+
395
358
 
396
-
397
359
 
398
-
399
-
400
- <li class="md-nav__item md-nav__item--active">
401
360
 
402
- <input class="md-nav__toggle md-toggle" type="checkbox" id="__toc">
361
+
362
+
363
+
403
364
 
365
+
404
366
 
405
367
 
406
368
 
369
+
370
+
371
+
407
372
 
408
- <a href="." class="md-nav__link md-nav__link--active">
409
373
 
374
+
375
+
376
+
377
+
378
+
379
+ <li class="md-nav__item md-nav__item--active md-nav__item--section md-nav__item--nested">
380
+
381
+
382
+
383
+ <input class="md-nav__toggle md-toggle " type="checkbox" id="__nav_1" checked>
384
+
385
+
386
+ <div class="md-nav__link md-nav__container">
387
+ <a href="." class="md-nav__link md-nav__link--active">
388
+
410
389
 
411
390
 
412
391
  <span class="md-ellipsis">
@@ -415,47 +394,86 @@
415
394
  </span>
416
395
 
417
396
 
418
- </a>
419
-
420
- </li>
421
-
422
-
423
-
424
-
425
-
397
+ </a>
398
+
399
+
400
+ <label class="md-nav__link md-nav__link--active" for="__nav_1" id="__nav_1_label" tabindex="">
401
+ <span class="md-nav__icon md-icon"></span>
402
+ </label>
403
+
404
+ </div>
405
+
406
+ <nav class="md-nav" data-md-level="1" aria-labelledby="__nav_1_label" aria-expanded="true">
407
+ <label class="md-nav__title" for="__nav_1">
408
+ <span class="md-nav__icon md-icon"></span>
409
+ Blog Home
410
+ </label>
411
+ <ul class="md-nav__list" data-md-scrollfix>
412
+
413
+
414
+
415
+
416
+
426
417
 
427
418
 
428
419
 
429
420
 
430
- <li class="md-nav__item">
431
- <a href="CONDUCT/" class="md-nav__link">
421
+
422
+
423
+
424
+
425
+
426
+
427
+
428
+
429
+
430
+
431
+
432
+
433
+
434
+
435
+ <li class="md-nav__item md-nav__item--nested">
436
+
437
+
432
438
 
439
+ <input class="md-nav__toggle md-toggle " type="checkbox" id="__nav_1_2" >
440
+
441
+
442
+ <label class="md-nav__link" for="__nav_1_2" id="__nav_1_2_label" tabindex="0">
443
+
433
444
 
434
445
 
435
446
  <span class="md-ellipsis">
436
- Contributing
447
+ Archive
437
448
 
438
449
  </span>
439
450
 
440
451
 
441
- </a>
442
- </li>
452
+ <span class="md-nav__icon md-icon"></span>
453
+ </label>
454
+
455
+ <nav class="md-nav" data-md-level="2" aria-labelledby="__nav_1_2_label" aria-expanded="false">
456
+ <label class="md-nav__title" for="__nav_1_2">
457
+ <span class="md-nav__icon md-icon"></span>
458
+ Archive
459
+ </label>
460
+ <ul class="md-nav__list" data-md-scrollfix>
461
+
462
+
463
+
443
464
 
444
-
445
-
446
-
447
-
448
465
 
449
466
 
467
+
450
468
 
451
469
 
452
470
  <li class="md-nav__item">
453
- <a href="tags/" class="md-nav__link">
471
+ <a href="archive/2025/" class="md-nav__link">
454
472
 
455
473
 
456
474
 
457
475
  <span class="md-ellipsis">
458
- Tags
476
+ April 2025
459
477
 
460
478
  </span>
461
479
 
@@ -464,20 +482,23 @@
464
482
  </li>
465
483
 
466
484
 
467
-
468
-
469
-
485
+
486
+
487
+
488
+
489
+
470
490
 
471
491
 
492
+
472
493
 
473
494
 
474
495
  <li class="md-nav__item">
475
- <a href="https://netwk.pro/" class="md-nav__link">
496
+ <a href="archive/2015/" class="md-nav__link">
476
497
 
477
498
 
478
499
 
479
500
  <span class="md-ellipsis">
480
- Website
501
+ January 2015
481
502
 
482
503
  </span>
483
504
 
@@ -486,9 +507,18 @@
486
507
  </li>
487
508
 
488
509
 
489
-
490
-
510
+
511
+
512
+ </ul>
513
+ </nav>
491
514
 
515
+ </li>
516
+
517
+
518
+
519
+
520
+
521
+
492
522
 
493
523
 
494
524
 
@@ -498,8 +528,6 @@
498
528
 
499
529
 
500
530
 
501
-
502
-
503
531
 
504
532
 
505
533
 
@@ -511,15 +539,15 @@
511
539
 
512
540
 
513
541
 
514
- <input class="md-nav__toggle md-toggle " type="checkbox" id="__nav_5" >
542
+ <input class="md-nav__toggle md-toggle " type="checkbox" id="__nav_1_3" >
515
543
 
516
544
 
517
- <label class="md-nav__link" for="__nav_5" id="__nav_5_label" tabindex="0">
545
+ <label class="md-nav__link" for="__nav_1_3" id="__nav_1_3_label" tabindex="0">
518
546
 
519
547
 
520
548
 
521
549
  <span class="md-ellipsis">
522
- Archive
550
+ Categories
523
551
 
524
552
  </span>
525
553
 
@@ -527,10 +555,10 @@
527
555
  <span class="md-nav__icon md-icon"></span>
528
556
  </label>
529
557
 
530
- <nav class="md-nav" data-md-level="1" aria-labelledby="__nav_5_label" aria-expanded="false">
531
- <label class="md-nav__title" for="__nav_5">
558
+ <nav class="md-nav" data-md-level="2" aria-labelledby="__nav_1_3_label" aria-expanded="false">
559
+ <label class="md-nav__title" for="__nav_1_3">
532
560
  <span class="md-nav__icon md-icon"></span>
533
- Archive
561
+ Categories
534
562
  </label>
535
563
  <ul class="md-nav__list" data-md-scrollfix>
536
564
 
@@ -543,12 +571,12 @@
543
571
 
544
572
 
545
573
  <li class="md-nav__item">
546
- <a href="archive/2025/" class="md-nav__link">
574
+ <a href="category/security/" class="md-nav__link">
547
575
 
548
576
 
549
577
 
550
578
  <span class="md-ellipsis">
551
- April 2025
579
+ Security
552
580
 
553
581
  </span>
554
582
 
@@ -559,26 +587,9 @@
559
587
 
560
588
 
561
589
 
562
-
563
-
564
-
565
-
566
-
567
-
568
-
569
-
570
- <li class="md-nav__item">
571
- <a href="archive/2015/" class="md-nav__link">
572
-
573
-
574
-
575
- <span class="md-ellipsis">
576
- January 2015
577
-
578
- </span>
579
-
580
-
581
- </a>
590
+ </ul>
591
+ </nav>
592
+
582
593
  </li>
583
594
 
584
595
 
@@ -613,15 +624,15 @@
613
624
 
614
625
 
615
626
 
616
- <input class="md-nav__toggle md-toggle " type="checkbox" id="__nav_6" >
627
+ <input class="md-nav__toggle md-toggle " type="checkbox" id="__nav_2" >
617
628
 
618
629
 
619
- <label class="md-nav__link" for="__nav_6" id="__nav_6_label" tabindex="0">
630
+ <label class="md-nav__link" for="__nav_2" id="__nav_2_label" tabindex="0">
620
631
 
621
632
 
622
633
 
623
634
  <span class="md-ellipsis">
624
- Categories
635
+ Contributing
625
636
 
626
637
  </span>
627
638
 
@@ -629,10 +640,10 @@
629
640
  <span class="md-nav__icon md-icon"></span>
630
641
  </label>
631
642
 
632
- <nav class="md-nav" data-md-level="1" aria-labelledby="__nav_6_label" aria-expanded="false">
633
- <label class="md-nav__title" for="__nav_6">
643
+ <nav class="md-nav" data-md-level="1" aria-labelledby="__nav_2_label" aria-expanded="false">
644
+ <label class="md-nav__title" for="__nav_2">
634
645
  <span class="md-nav__icon md-icon"></span>
635
- Categories
646
+ Contributing
636
647
  </label>
637
648
  <ul class="md-nav__list" data-md-scrollfix>
638
649
 
@@ -641,16 +652,14 @@
641
652
 
642
653
 
643
654
 
644
-
645
-
646
655
 
647
656
  <li class="md-nav__item">
648
- <a href="category/security/" class="md-nav__link">
657
+ <a href="contributing/" class="md-nav__link">
649
658
 
650
659
 
651
660
 
652
661
  <span class="md-ellipsis">
653
- Security
662
+ Code of Conduct
654
663
 
655
664
  </span>
656
665
 
@@ -668,6 +677,50 @@
668
677
 
669
678
 
670
679
 
680
+
681
+
682
+
683
+
684
+
685
+
686
+ <li class="md-nav__item">
687
+ <a href="tags/" class="md-nav__link">
688
+
689
+
690
+
691
+ <span class="md-ellipsis">
692
+ Tag Index
693
+
694
+ </span>
695
+
696
+
697
+ </a>
698
+ </li>
699
+
700
+
701
+
702
+
703
+
704
+
705
+
706
+
707
+
708
+ <li class="md-nav__item">
709
+ <a href="https://netwk.pro" class="md-nav__link">
710
+
711
+
712
+
713
+ <span class="md-ellipsis">
714
+ Website
715
+
716
+ </span>
717
+
718
+
719
+ </a>
720
+ </li>
721
+
722
+
723
+
671
724
  </ul>
672
725
  </nav>
673
726
  </div>
@@ -688,6 +741,32 @@
688
741
 
689
742
 
690
743
 
744
+ <label class="md-nav__title" for="__toc">
745
+ <span class="md-nav__icon md-icon"></span>
746
+ Table of contents
747
+ </label>
748
+ <ul class="md-nav__list" data-md-component="toc" data-md-scrollfix>
749
+
750
+ <li class="md-nav__item">
751
+ <a href="#were-live" class="md-nav__link">
752
+ <span class="md-ellipsis">
753
+ We're Live
754
+ </span>
755
+ </a>
756
+
757
+ </li>
758
+
759
+ <li class="md-nav__item">
760
+ <a href="#secure-secure-shell" class="md-nav__link">
761
+ <span class="md-ellipsis">
762
+ Secure Secure Shell
763
+ </span>
764
+ </a>
765
+
766
+ </li>
767
+
768
+ </ul>
769
+
691
770
  </nav>
692
771
  </div>
693
772
  </div>
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@networkpro/blog",
3
- "version": "0.1.6",
3
+ "version": "0.1.7",
4
4
  "description": "The official blog of Network Pro Strategies (Network Pro).",
5
5
  "keywords": [
6
6
  "security",
@@ -40,7 +40,7 @@
40
40
  "format:fix": "prettier --write .",
41
41
  "lint": "eslint --ext .mjs,.js,.json,.jsonc --config eslint.config.mjs .",
42
42
  "lint:fix": "eslint --ext .mjs,.js,.json,.jsonc --config eslint.config.mjs . --fix",
43
- "lint:md": "npx markdownlint-cli2 \"**/*.{md,markdown}\" \"#node_modules/**\" \"#public/**\"",
43
+ "lint:md": "npx markdownlint-cli2 \"**/*.{md,markdown}\" \"#node_modules/**\" \"#build/**\"",
44
44
  "lint:css": "stylelint '**/*.{css}' --ignore-path .stylelintignore",
45
45
  "lint:all": "npm run lint && npm run lint:md && npm run lint:css && npm run format",
46
46
  "checkout": "npm run test && npm run lint:all"