@networkpro/blog 0.1.6 → 1.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1 @@
1
- <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link><atom:link href="https://blog.netwk.pro/feed_rss_created.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/blog</docs><language>en</language> <pubDate>Sat, 10 May 2025 18:55:46 -0000</pubDate> <lastBuildDate>Sat, 10 May 2025 18:55:46 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;h1&gt;We&#39;re Live&lt;/h1&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge&lt;/h2&gt;&lt;p&gt;In a digital world where threats are persistent and privacy is too often an afterthought, &lt;strong&gt;Network Pro Strategies&lt;/strong&gt; was founded on a belief that &lt;strong&gt;effective security doesn&#39;t require compromise&lt;/strong&gt;. We specialize in helping organizations and individuals &lt;strong&gt;navigate today’s cybersecurity challenges with confidence, clarity, and control&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today marks the launch of our official blog—your go-to destination for &lt;strong&gt;field-tested strategies, implementation insights, and transparent thought leadership&lt;/strong&gt; across cybersecurity, network defense, and privacy-aware infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Modern security isn’t just about technology—it’s about &lt;strong&gt;trust, autonomy, and informed choices&lt;/strong&gt;. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.&lt;/p&gt;</description><link>https://blog.netwk.pro/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://blog.netwk.pro/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;!-- eslint-disable --&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Originally published on 1/4/2015 by &lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&#34;&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small;&#34;&gt;📝 &lt;strong&gt;&lt;i&gt;NOTE:&lt;/i&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://blog.netwk.pro/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 Jan 2015 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://blog.netwk.pro/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
1
+ <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link><atom:link href="https://blog.netwk.pro/feed_rss_created.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro.github.io</docs><language>en</language> <pubDate>Sun, 11 May 2025 22:54:12 -0000</pubDate> <lastBuildDate>Sun, 11 May 2025 22:54:12 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;h1&gt;We&#39;re Live&lt;/h1&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge&lt;/h2&gt;&lt;p&gt;In a digital world where threats are persistent and privacy is too often an afterthought, &lt;strong&gt;Network Pro Strategies&lt;/strong&gt; was founded on a belief that &lt;strong&gt;effective security doesn&#39;t require compromise&lt;/strong&gt;. We specialize in helping organizations and individuals &lt;strong&gt;navigate today’s cybersecurity challenges with confidence, clarity, and control&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today marks the launch of our official blog—your go-to destination for &lt;strong&gt;field-tested strategies, implementation insights, and transparent thought leadership&lt;/strong&gt; across cybersecurity, network defense, and privacy-aware infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Modern security isn’t just about technology—it’s about &lt;strong&gt;trust, autonomy, and informed choices&lt;/strong&gt;. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.&lt;/p&gt;</description><link>https://blog.netwk.pro/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://blog.netwk.pro/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;!-- eslint-disable --&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Originally published on 1/4/2015 by &lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&#34;&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small;&#34;&gt;📝 &lt;strong&gt;&lt;i&gt;NOTE:&lt;/i&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://blog.netwk.pro/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 Jan 2015 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://blog.netwk.pro/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
@@ -1 +1 @@
1
- <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link><atom:link href="https://blog.netwk.pro/feed_rss_updated.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/blog</docs><language>en</language> <pubDate>Sat, 10 May 2025 18:55:46 -0000</pubDate> <lastBuildDate>Sat, 10 May 2025 18:55:46 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;h1&gt;We&#39;re Live&lt;/h1&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge&lt;/h2&gt;&lt;p&gt;In a digital world where threats are persistent and privacy is too often an afterthought, &lt;strong&gt;Network Pro Strategies&lt;/strong&gt; was founded on a belief that &lt;strong&gt;effective security doesn&#39;t require compromise&lt;/strong&gt;. We specialize in helping organizations and individuals &lt;strong&gt;navigate today’s cybersecurity challenges with confidence, clarity, and control&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today marks the launch of our official blog—your go-to destination for &lt;strong&gt;field-tested strategies, implementation insights, and transparent thought leadership&lt;/strong&gt; across cybersecurity, network defense, and privacy-aware infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Modern security isn’t just about technology—it’s about &lt;strong&gt;trust, autonomy, and informed choices&lt;/strong&gt;. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.&lt;/p&gt;</description><link>https://blog.netwk.pro/2025/04/30/our-blog-is-live/</link> <pubDate>Mon, 05 May 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://blog.netwk.pro/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;!-- eslint-disable --&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Originally published on 1/4/2015 by &lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&#34;&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small;&#34;&gt;📝 &lt;strong&gt;&lt;i&gt;NOTE:&lt;/i&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://blog.netwk.pro/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 May 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://blog.netwk.pro/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
1
+ <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link><atom:link href="https://blog.netwk.pro/feed_rss_updated.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro.github.io</docs><language>en</language> <pubDate>Sun, 11 May 2025 22:54:12 -0000</pubDate> <lastBuildDate>Sun, 11 May 2025 22:54:12 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;h1&gt;We&#39;re Live&lt;/h1&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge&lt;/h2&gt;&lt;p&gt;In a digital world where threats are persistent and privacy is too often an afterthought, &lt;strong&gt;Network Pro Strategies&lt;/strong&gt; was founded on a belief that &lt;strong&gt;effective security doesn&#39;t require compromise&lt;/strong&gt;. We specialize in helping organizations and individuals &lt;strong&gt;navigate today’s cybersecurity challenges with confidence, clarity, and control&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today marks the launch of our official blog—your go-to destination for &lt;strong&gt;field-tested strategies, implementation insights, and transparent thought leadership&lt;/strong&gt; across cybersecurity, network defense, and privacy-aware infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Modern security isn’t just about technology—it’s about &lt;strong&gt;trust, autonomy, and informed choices&lt;/strong&gt;. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.&lt;/p&gt;</description><link>https://blog.netwk.pro/2025/04/30/our-blog-is-live/</link> <pubDate>Mon, 05 May 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://blog.netwk.pro/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;!-- eslint-disable --&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Originally published on 1/4/2015 by &lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&#34;&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small;&#34;&gt;📝 &lt;strong&gt;&lt;i&gt;NOTE:&lt;/i&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://blog.netwk.pro/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 May 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://blog.netwk.pro/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
package/index.html CHANGED
@@ -12,7 +12,7 @@
12
12
 
13
13
 
14
14
 
15
- <link rel="next" href="CONDUCT/">
15
+ <link rel="next" href="category/security/">
16
16
 
17
17
 
18
18
  <link rel="alternate" type="application/rss+xml" title="RSS feed" href="feed_rss_created.xml">
@@ -194,7 +194,7 @@
194
194
 
195
195
 
196
196
  <div class="md-header__source">
197
- <a href="https://github.com/netwk-pro/blog" title="Go to repository" class="md-source" data-md-component="source">
197
+ <a href="https://github.com/netwk-pro/netwk-pro.github.io" title="Go to repository" class="md-source" data-md-component="source">
198
198
  <div class="md-source__icon md-icon">
199
199
 
200
200
  <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><!--! Font Awesome Free 6.7.2 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2024 Fonticons, Inc.--><path d="M439.55 236.05 244 40.45a28.87 28.87 0 0 0-40.81 0l-40.66 40.63 51.52 51.52c27.06-9.14 52.68 16.77 43.39 43.68l49.66 49.66c34.23-11.8 61.18 31 35.47 56.69-26.49 26.49-70.21-2.87-56-37.34L240.22 199v121.85c25.3 12.54 22.26 41.85 9.08 55a34.34 34.34 0 0 1-48.55 0c-17.57-17.6-11.07-46.91 11.25-56v-123c-20.8-8.51-24.6-30.74-18.64-45L142.57 101 8.45 235.14a28.86 28.86 0 0 0 0 40.81l195.61 195.6a28.86 28.86 0 0 0 40.8 0l194.69-194.69a28.86 28.86 0 0 0 0-40.81"/></svg>
@@ -226,37 +226,21 @@
226
226
 
227
227
 
228
228
 
229
- <li class="md-tabs__item md-tabs__item--active">
230
- <a href="." class="md-tabs__link">
231
-
229
+
230
+
231
+ <li class="md-tabs__item md-tabs__item--active">
232
+ <a href="." class="md-tabs__link">
233
+
232
234
 
233
235
 
234
236
 
235
237
 
236
238
  Blog Home
237
239
 
238
- </a>
239
- </li>
240
-
241
-
242
-
243
-
244
-
245
-
246
-
247
-
248
- <li class="md-tabs__item">
249
- <a href="CONDUCT/" class="md-tabs__link">
250
-
251
-
252
-
240
+ </a>
241
+ </li>
253
242
 
254
243
 
255
- Contributing
256
-
257
- </a>
258
- </li>
259
-
260
244
 
261
245
 
262
246
 
@@ -264,36 +248,20 @@
264
248
 
265
249
 
266
250
 
267
- <li class="md-tabs__item">
268
- <a href="tags/" class="md-tabs__link">
269
-
270
-
271
-
272
251
 
273
-
274
- Tags
275
-
276
- </a>
277
- </li>
278
-
279
-
280
-
281
-
282
-
283
-
284
-
285
-
286
- <li class="md-tabs__item">
287
- <a href="https://netwk.pro/" class="md-tabs__link">
288
-
252
+
253
+ <li class="md-tabs__item">
254
+ <a href="contributing/" class="md-tabs__link">
255
+
289
256
 
290
257
 
291
258
 
292
259
 
293
- Website
260
+ Contributing
294
261
 
295
- </a>
296
- </li>
262
+ </a>
263
+ </li>
264
+
297
265
 
298
266
 
299
267
 
@@ -305,13 +273,13 @@
305
273
 
306
274
 
307
275
  <li class="md-tabs__item">
308
- <a href="archive/2025/" class="md-tabs__link">
276
+ <a href="tags/" class="md-tabs__link">
309
277
 
310
278
 
311
279
 
312
280
 
313
281
 
314
- Archive
282
+ Tags
315
283
 
316
284
  </a>
317
285
  </li>
@@ -324,20 +292,17 @@
324
292
 
325
293
 
326
294
 
327
-
328
-
329
- <li class="md-tabs__item">
330
- <a href="category/security/" class="md-tabs__link">
331
-
295
+ <li class="md-tabs__item">
296
+ <a href="https://netwk.pro" class="md-tabs__link">
297
+
332
298
 
333
299
 
334
300
 
335
301
 
336
- Categories
302
+ Website
337
303
 
338
- </a>
339
- </li>
340
-
304
+ </a>
305
+ </li>
341
306
 
342
307
 
343
308
 
@@ -372,7 +337,7 @@
372
337
  </label>
373
338
 
374
339
  <div class="md-nav__source">
375
- <a href="https://github.com/netwk-pro/blog" title="Go to repository" class="md-source" data-md-component="source">
340
+ <a href="https://github.com/netwk-pro/netwk-pro.github.io" title="Go to repository" class="md-source" data-md-component="source">
376
341
  <div class="md-source__icon md-icon">
377
342
 
378
343
  <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><!--! Font Awesome Free 6.7.2 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2024 Fonticons, Inc.--><path d="M439.55 236.05 244 40.45a28.87 28.87 0 0 0-40.81 0l-40.66 40.63 51.52 51.52c27.06-9.14 52.68 16.77 43.39 43.68l49.66 49.66c34.23-11.8 61.18 31 35.47 56.69-26.49 26.49-70.21-2.87-56-37.34L240.22 199v121.85c25.3 12.54 22.26 41.85 9.08 55a34.34 34.34 0 0 1-48.55 0c-17.57-17.6-11.07-46.91 11.25-56v-123c-20.8-8.51-24.6-30.74-18.64-45L142.57 101 8.45 235.14a28.86 28.86 0 0 0 0 40.81l195.61 195.6a28.86 28.86 0 0 0 40.8 0l194.69-194.69a28.86 28.86 0 0 0 0-40.81"/></svg>
@@ -392,21 +357,38 @@
392
357
 
393
358
 
394
359
 
360
+
395
361
 
396
-
397
362
 
398
-
399
-
400
- <li class="md-nav__item md-nav__item--active">
401
363
 
402
- <input class="md-nav__toggle md-toggle" type="checkbox" id="__toc">
364
+
365
+
366
+
367
+
368
+
403
369
 
370
+
371
+
372
+
373
+
374
+
404
375
 
405
376
 
377
+
378
+
406
379
 
380
+
381
+
382
+ <li class="md-nav__item md-nav__item--active md-nav__item--section md-nav__item--nested">
407
383
 
408
- <a href="." class="md-nav__link md-nav__link--active">
409
384
 
385
+
386
+ <input class="md-nav__toggle md-toggle " type="checkbox" id="__nav_1" checked>
387
+
388
+
389
+ <div class="md-nav__link md-nav__container">
390
+ <a href="." class="md-nav__link md-nav__link--active">
391
+
410
392
 
411
393
 
412
394
  <span class="md-ellipsis">
@@ -415,47 +397,86 @@
415
397
  </span>
416
398
 
417
399
 
418
- </a>
419
-
420
- </li>
421
-
422
-
423
-
424
-
425
-
400
+ </a>
401
+
402
+
403
+ <label class="md-nav__link md-nav__link--active" for="__nav_1" id="__nav_1_label" tabindex="">
404
+ <span class="md-nav__icon md-icon"></span>
405
+ </label>
406
+
407
+ </div>
408
+
409
+ <nav class="md-nav" data-md-level="1" aria-labelledby="__nav_1_label" aria-expanded="true">
410
+ <label class="md-nav__title" for="__nav_1">
411
+ <span class="md-nav__icon md-icon"></span>
412
+ Blog Home
413
+ </label>
414
+ <ul class="md-nav__list" data-md-scrollfix>
415
+
416
+
417
+
418
+
419
+
426
420
 
427
421
 
428
422
 
429
423
 
430
- <li class="md-nav__item">
431
- <a href="CONDUCT/" class="md-nav__link">
424
+
425
+
426
+
427
+
428
+
432
429
 
430
+
431
+
432
+
433
+
434
+
435
+
436
+
437
+
438
+ <li class="md-nav__item md-nav__item--nested">
439
+
440
+
441
+
442
+ <input class="md-nav__toggle md-toggle " type="checkbox" id="__nav_1_2" >
443
+
444
+
445
+ <label class="md-nav__link" for="__nav_1_2" id="__nav_1_2_label" tabindex="0">
446
+
433
447
 
434
448
 
435
449
  <span class="md-ellipsis">
436
- Contributing
450
+ Archive
437
451
 
438
452
  </span>
439
453
 
440
454
 
441
- </a>
442
- </li>
455
+ <span class="md-nav__icon md-icon"></span>
456
+ </label>
457
+
458
+ <nav class="md-nav" data-md-level="2" aria-labelledby="__nav_1_2_label" aria-expanded="false">
459
+ <label class="md-nav__title" for="__nav_1_2">
460
+ <span class="md-nav__icon md-icon"></span>
461
+ Archive
462
+ </label>
463
+ <ul class="md-nav__list" data-md-scrollfix>
464
+
465
+
466
+
443
467
 
444
-
445
-
446
-
447
-
448
468
 
449
469
 
470
+
450
471
 
451
472
 
452
473
  <li class="md-nav__item">
453
- <a href="tags/" class="md-nav__link">
474
+ <a href="archive/2025/" class="md-nav__link">
454
475
 
455
476
 
456
477
 
457
478
  <span class="md-ellipsis">
458
- Tags
479
+ April 2025
459
480
 
460
481
  </span>
461
482
 
@@ -464,20 +485,23 @@
464
485
  </li>
465
486
 
466
487
 
467
-
468
-
469
-
488
+
489
+
490
+
491
+
492
+
470
493
 
471
494
 
495
+
472
496
 
473
497
 
474
498
  <li class="md-nav__item">
475
- <a href="https://netwk.pro/" class="md-nav__link">
499
+ <a href="archive/2015/" class="md-nav__link">
476
500
 
477
501
 
478
502
 
479
503
  <span class="md-ellipsis">
480
- Website
504
+ January 2015
481
505
 
482
506
  </span>
483
507
 
@@ -486,9 +510,18 @@
486
510
  </li>
487
511
 
488
512
 
489
-
490
-
513
+
514
+
515
+ </ul>
516
+ </nav>
491
517
 
518
+ </li>
519
+
520
+
521
+
522
+
523
+
524
+
492
525
 
493
526
 
494
527
 
@@ -498,8 +531,6 @@
498
531
 
499
532
 
500
533
 
501
-
502
-
503
534
 
504
535
 
505
536
 
@@ -511,15 +542,15 @@
511
542
 
512
543
 
513
544
 
514
- <input class="md-nav__toggle md-toggle " type="checkbox" id="__nav_5" >
545
+ <input class="md-nav__toggle md-toggle " type="checkbox" id="__nav_1_3" >
515
546
 
516
547
 
517
- <label class="md-nav__link" for="__nav_5" id="__nav_5_label" tabindex="0">
548
+ <label class="md-nav__link" for="__nav_1_3" id="__nav_1_3_label" tabindex="0">
518
549
 
519
550
 
520
551
 
521
552
  <span class="md-ellipsis">
522
- Archive
553
+ Categories
523
554
 
524
555
  </span>
525
556
 
@@ -527,10 +558,10 @@
527
558
  <span class="md-nav__icon md-icon"></span>
528
559
  </label>
529
560
 
530
- <nav class="md-nav" data-md-level="1" aria-labelledby="__nav_5_label" aria-expanded="false">
531
- <label class="md-nav__title" for="__nav_5">
561
+ <nav class="md-nav" data-md-level="2" aria-labelledby="__nav_1_3_label" aria-expanded="false">
562
+ <label class="md-nav__title" for="__nav_1_3">
532
563
  <span class="md-nav__icon md-icon"></span>
533
- Archive
564
+ Categories
534
565
  </label>
535
566
  <ul class="md-nav__list" data-md-scrollfix>
536
567
 
@@ -543,12 +574,12 @@
543
574
 
544
575
 
545
576
  <li class="md-nav__item">
546
- <a href="archive/2025/" class="md-nav__link">
577
+ <a href="category/security/" class="md-nav__link">
547
578
 
548
579
 
549
580
 
550
581
  <span class="md-ellipsis">
551
- April 2025
582
+ Security
552
583
 
553
584
  </span>
554
585
 
@@ -559,21 +590,79 @@
559
590
 
560
591
 
561
592
 
593
+ </ul>
594
+ </nav>
595
+
596
+ </li>
597
+
598
+
562
599
 
563
-
600
+
601
+ </ul>
602
+ </nav>
603
+
604
+ </li>
564
605
 
606
+
607
+
608
+
609
+
565
610
 
566
611
 
612
+
613
+
614
+
615
+
616
+
617
+
618
+
619
+
567
620
 
621
+
622
+
623
+
624
+
625
+
626
+ <li class="md-nav__item md-nav__item--nested">
627
+
628
+
629
+
630
+ <input class="md-nav__toggle md-toggle " type="checkbox" id="__nav_2" >
631
+
632
+
633
+ <label class="md-nav__link" for="__nav_2" id="__nav_2_label" tabindex="0">
634
+
635
+
636
+
637
+ <span class="md-ellipsis">
638
+ Contributing
639
+
640
+ </span>
641
+
642
+
643
+ <span class="md-nav__icon md-icon"></span>
644
+ </label>
645
+
646
+ <nav class="md-nav" data-md-level="1" aria-labelledby="__nav_2_label" aria-expanded="false">
647
+ <label class="md-nav__title" for="__nav_2">
648
+ <span class="md-nav__icon md-icon"></span>
649
+ Contributing
650
+ </label>
651
+ <ul class="md-nav__list" data-md-scrollfix>
652
+
653
+
654
+
655
+
656
+
568
657
 
569
658
 
570
659
  <li class="md-nav__item">
571
- <a href="archive/2015/" class="md-nav__link">
660
+ <a href="contributing/" class="md-nav__link">
572
661
 
573
662
 
574
663
 
575
664
  <span class="md-ellipsis">
576
- January 2015
665
+ Code of Conduct
577
666
 
578
667
  </span>
579
668
 
@@ -613,15 +702,15 @@
613
702
 
614
703
 
615
704
 
616
- <input class="md-nav__toggle md-toggle " type="checkbox" id="__nav_6" >
705
+ <input class="md-nav__toggle md-toggle " type="checkbox" id="__nav_3" >
617
706
 
618
707
 
619
- <label class="md-nav__link" for="__nav_6" id="__nav_6_label" tabindex="0">
708
+ <label class="md-nav__link" for="__nav_3" id="__nav_3_label" tabindex="0">
620
709
 
621
710
 
622
711
 
623
712
  <span class="md-ellipsis">
624
- Categories
713
+ Tags
625
714
 
626
715
  </span>
627
716
 
@@ -629,10 +718,10 @@
629
718
  <span class="md-nav__icon md-icon"></span>
630
719
  </label>
631
720
 
632
- <nav class="md-nav" data-md-level="1" aria-labelledby="__nav_6_label" aria-expanded="false">
633
- <label class="md-nav__title" for="__nav_6">
721
+ <nav class="md-nav" data-md-level="1" aria-labelledby="__nav_3_label" aria-expanded="false">
722
+ <label class="md-nav__title" for="__nav_3">
634
723
  <span class="md-nav__icon md-icon"></span>
635
- Categories
724
+ Tags
636
725
  </label>
637
726
  <ul class="md-nav__list" data-md-scrollfix>
638
727
 
@@ -641,16 +730,14 @@
641
730
 
642
731
 
643
732
 
644
-
645
-
646
733
 
647
734
  <li class="md-nav__item">
648
- <a href="category/security/" class="md-nav__link">
735
+ <a href="tags/" class="md-nav__link">
649
736
 
650
737
 
651
738
 
652
739
  <span class="md-ellipsis">
653
- Security
740
+ Tag Index
654
741
 
655
742
  </span>
656
743
 
@@ -668,6 +755,28 @@
668
755
 
669
756
 
670
757
 
758
+
759
+
760
+
761
+
762
+
763
+
764
+ <li class="md-nav__item">
765
+ <a href="https://netwk.pro" class="md-nav__link">
766
+
767
+
768
+
769
+ <span class="md-ellipsis">
770
+ Website
771
+
772
+ </span>
773
+
774
+
775
+ </a>
776
+ </li>
777
+
778
+
779
+
671
780
  </ul>
672
781
  </nav>
673
782
  </div>
@@ -688,6 +797,32 @@
688
797
 
689
798
 
690
799
 
800
+ <label class="md-nav__title" for="__toc">
801
+ <span class="md-nav__icon md-icon"></span>
802
+ Table of contents
803
+ </label>
804
+ <ul class="md-nav__list" data-md-component="toc" data-md-scrollfix>
805
+
806
+ <li class="md-nav__item">
807
+ <a href="#were-live" class="md-nav__link">
808
+ <span class="md-ellipsis">
809
+ We're Live
810
+ </span>
811
+ </a>
812
+
813
+ </li>
814
+
815
+ <li class="md-nav__item">
816
+ <a href="#secure-secure-shell" class="md-nav__link">
817
+ <span class="md-ellipsis">
818
+ Secure Secure Shell
819
+ </span>
820
+ </a>
821
+
822
+ </li>
823
+
824
+ </ul>
825
+
691
826
  </nav>
692
827
  </div>
693
828
  </div>