@networkpro/blog 1.0.0 → 1.0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +115 -0
- package/feed_rss_created.xml +1 -1
- package/feed_rss_updated.xml +1 -1
- package/package.json +1 -1
package/README.md
ADDED
|
@@ -0,0 +1,115 @@
|
|
|
1
|
+
<!-- =========================================================================
|
|
2
|
+
README.md
|
|
3
|
+
|
|
4
|
+
SPDX-License-Identifier: CC-BY-4.0 OR GPL-3.0-or-later
|
|
5
|
+
This file is part of Network Pro.
|
|
6
|
+
========================================================================== -->
|
|
7
|
+
|
|
8
|
+
<!--
|
|
9
|
+
Copyright © 2025 Network Pro Strategies (Network Pro)
|
|
10
|
+
|
|
11
|
+
---
|
|
12
|
+
|
|
13
|
+
I. Creative Commons Attribution 4.0 International
|
|
14
|
+
|
|
15
|
+
Network Pro (the "Licensed Material") is licensed under Creative Commons Attribution 4.0 International ("CC BY 4.0"). To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/.
|
|
16
|
+
|
|
17
|
+
Per the terms of the License, you are free to distribute, remix, adapt, and build upon the Licensed Material for any purpose, even commercially. You must give appropriate credit, provide a link to the License, and indicate if changes were made.
|
|
18
|
+
|
|
19
|
+
The Licensor offers the Licensed Material as-is and as-available, and makes no representations or warranties of any kind concerning the Licensed Material, whether express, implied, statutory, or other. This includes, without limitation, warranties of title, merchantability, fitness for a particular purpose, non-infringement, absence of latent or other defects, accuracy, or the presence or absence of errors, whether or not known or discoverable.
|
|
20
|
+
|
|
21
|
+
Permissions beyond the scope of this License—or instead of those permitted by this License—may be available as further defined within this document.
|
|
22
|
+
|
|
23
|
+
SPDX Reference: https://spdx.org/licenses/CC-BY-4.0.html
|
|
24
|
+
Canonical URL: https://creativecommons.org/licenses/by/4.0/
|
|
25
|
+
|
|
26
|
+
---
|
|
27
|
+
|
|
28
|
+
II. GNU General Public License
|
|
29
|
+
|
|
30
|
+
Network Pro is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License ("GNU GPL") as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
|
|
31
|
+
|
|
32
|
+
This material is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
33
|
+
FITNESS FOR A PARTICULAR PURPOSE.
|
|
34
|
+
|
|
35
|
+
See the GNU General Public License for more details.
|
|
36
|
+
|
|
37
|
+
SPDX Reference: https://spdx.org/licenses/GPL-3.0-or-later.html
|
|
38
|
+
Canonical URL: https://www.gnu.org/licenses/gpl-3.0.html
|
|
39
|
+
|
|
40
|
+
---
|
|
41
|
+
|
|
42
|
+
Author: Scott Lopez
|
|
43
|
+
Email: <contact@neteng.pro>
|
|
44
|
+
Web: <https://bio.neteng.pro>
|
|
45
|
+
-->
|
|
46
|
+
|
|
47
|
+
<section id="top">
|
|
48
|
+
|
|
49
|
+
[SPDX-License-Identifier](https://spdx.dev/learn/handling-license-info/): `CC-BY-4.0 OR GPL-3.0-or-later`
|
|
50
|
+
|
|
51
|
+
# Network Pro Strategies
|
|
52
|
+
|
|
53
|
+
</section>
|
|
54
|
+
|
|
55
|
+
[](https://github.com/netwk-pro/blog/actions/workflows/build-and-deploy.yml) [](https://github.com/netwk-pro/blog/actions/workflows/publish.yml)
|
|
56
|
+
[](https://www.npmjs.com/package/@networkpro/blog) [](https://github.com/prettier/prettier) [](https://github.com/netwk-pro/netwk-pro.github.io/blob/master/CODE_OF_CONDUCT.md)
|
|
57
|
+
|
|
58
|
+
## Security That Respects You
|
|
59
|
+
|
|
60
|
+
At **Network Pro Strategies (Network Pro™)**, we deliver network security, cybersecurity, and digital privacy consulting with clarity, credibility, and care. We believe that real security doesn’t have to come at the cost of user autonomy, and that privacy-minded solutions can be both practical and powerful.
|
|
61
|
+
|
|
62
|
+
Our approach is built on a simple principle: **the best security is the one that fits.** That means we don’t push ideologies—we apply what works. We advocate for and implement **free and open source solutions** where they offer competitive functionality, control, and visibility. When proprietary platforms are better suited, we deploy them responsibly and securely—ensuring every recommendation is grounded in **technical merit**, **scalability**, and **client goals**.
|
|
63
|
+
|
|
64
|
+
### **What We Do**
|
|
65
|
+
|
|
66
|
+
As a remote-first consultancy, we support clients across industries and geographies with a focus on:
|
|
67
|
+
|
|
68
|
+
- **Network Hardening & Perimeter Defense**
|
|
69
|
+
- **Firewall Architecture & Policy Optimization**
|
|
70
|
+
- **Cloud Security & Zero Trust Implementation**
|
|
71
|
+
- **Secure Infrastructure Design & Implementation**
|
|
72
|
+
- **Risk Reduction & Security Posture Assessment**
|
|
73
|
+
|
|
74
|
+
Our consulting engagements range from tactical one-off solutions to strategic, long-term partnerships. Whether it’s helping a business segment its internal network, lock down its cloud footprint, or plan scalable defenses—we deliver clear value, with zero fluff.
|
|
75
|
+
|
|
76
|
+
We also believe education is a core pillar of real-world security. That’s why we invest in raising awareness—across both technical and general audiences—on best practices in digital privacy, secure design, and threat mitigation.
|
|
77
|
+
|
|
78
|
+
**Network Pro™ exists to bring strong, thoughtful security to organizations that value integrity—without sacrificing agility or trust.** We don’t just secure infrastructure. We secure confidence.
|
|
79
|
+
|
|
80
|
+
|
|
81
|
+
|
|
82
|
+
🔹 [Let’s connect](https://contact.neteng.pro) to discuss how we can help secure and strengthen your business today.
|
|
83
|
+
|
|
84
|
+
---
|
|
85
|
+
|
|
86
|
+
You can find our PGP keys and a vCard containing our contact information for your convenience below.
|
|
87
|
+
|
|
88
|
+
| <img decoding="async" loading="lazy" src="https://raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/img/qr/pgp-support.png" width="125px" height="125px" alt="PGP Key - support@neteng.pro"> | **[support@neteng.pro](https://keys.openpgp.org/search?q=support%40neteng.pro)**<br />**PGP Key (ed25519)**<br /> <br /><a href="https://raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/assets/bin/support@neteng.pro.aexpk" type="application/pgp-keys">**aexpk**</a> **/** <a href="https://raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/assets/bin/support@neteng.pro.asc" type="application/pgp-keys">**asc**</a><br /> <br />6590b992e2e3eff12738<br />7bce2af093e9dec61ba0 |
|
|
89
|
+
| ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------: | :----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
|
|
90
|
+
| **[contact@s.neteng.pro](https://keys.openpgp.org/search?q=contact%40s.neteng.pro)**<br />**PGP Key (ed25519)**<br /> <br /><a href="https://raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/assets/bin/contact@s.neteng.pro.aexpk" type="application/pgp-keys">**aexpk**</a> **/** <a href="https://raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/assets/bin/contact@s.neteng.pro.asc" type="application/pgp-keys">**asc**</a><br /> <br />**df118baa6c2d9dcdebdc**<br />**2ddcf99373499495f957** | <img decoding="async" loading="lazy" src="https://raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/img/qr/pgp-contact.png" width="125px" height="125px" alt="PGP Key - contact@s.neteng.pro"> |
|
|
91
|
+
| <img decoding="async" loading="lazy" src="https://raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/img/qr/vcard.png" width="125px" height="125px" alt="vCard"> | **vCard**<br /> <br /><a href="https://raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/assets/bin/contact.vcf">**vcf**</a> |
|
|
92
|
+
|
|
93
|
+
<sub>[Back to top](#top)</sub>
|
|
94
|
+
|
|
95
|
+
---
|
|
96
|
+
|
|
97
|
+
<div style="font-size: 12px; font-weight: bold; text-align: center;">
|
|
98
|
+
|
|
99
|
+
[Home](https://netwk.pro) | [Terms of Use](https://netwk.pro/terms-of-use.html)
|
|
100
|
+
[Privacy Policy](https://netwk.pro/privacy.html) | [Legal](https://netwk.pro/legal.html)
|
|
101
|
+
|
|
102
|
+
</div>
|
|
103
|
+
|
|
104
|
+
|
|
105
|
+
|
|
106
|
+
<span style="font-size: 12px; text-align: center;">
|
|
107
|
+
|
|
108
|
+
Copyright © 2025
|
|
109
|
+
**[Network Pro Strategies](https://netwk.pro/)** (Network Pro™)
|
|
110
|
+
|
|
111
|
+
Network Pro™, the shield logo, and the "Locking Down Networks™" slogan are [trademarks](https://netwk.pro/legal.html#trademark) of Network Pro Strategies.
|
|
112
|
+
|
|
113
|
+
Licensed under **[CC BY 4.0](https://creativecommons.org/licenses/by/4.0/)** and the **[GNU GPL](https://spdx.org/licenses/GPL-3.0-or-later.html)**, as published by the [Free Software Foundation](https://fsf.org), either version 3 of the License, or (at your option) any later version.
|
|
114
|
+
|
|
115
|
+
</span>
|
package/feed_rss_created.xml
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
<?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link><atom:link href="https://blog.netwk.pro/feed_rss_created.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro.github.io</docs><language>en</language> <pubDate>Sun, 11 May 2025
|
|
1
|
+
<?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link><atom:link href="https://blog.netwk.pro/feed_rss_created.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro.github.io</docs><language>en</language> <pubDate>Sun, 11 May 2025 23:06:41 -0000</pubDate> <lastBuildDate>Sun, 11 May 2025 23:06:41 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description><h1>We're Live</h1><h2>🛡️ Welcome to the Network Pro&trade; Blog: Cybersecurity. Privacy. Open Knowledge</h2><p>In a digital world where threats are persistent and privacy is too often an afterthought, <strong>Network Pro Strategies</strong> was founded on a belief that <strong>effective security doesn't require compromise</strong>. We specialize in helping organizations and individuals <strong>navigate today’s cybersecurity challenges with confidence, clarity, and control</strong>.</p><p>Today marks the launch of our official blog—your go-to destination for <strong>field-tested strategies, implementation insights, and transparent thought leadership</strong> across cybersecurity, network defense, and privacy-aware infrastructure.</p><hr><h3>📡 Why This Blog Exists</h3><p>Modern security isn’t just about technology—it’s about <strong>trust, autonomy, and informed choices</strong>. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.</p></description><link>https://blog.netwk.pro/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://blog.netwk.pro/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description><h1>Secure Secure Shell</h1><!-- markdownlint-disable-file --><!-- eslint-disable --><blockquote style="font-size: small; font-style: italic; font-weight: bold;">Originally published on 1/4/2015 by <a rel="noopener noreferrer" href="https://github.com/stribika">stribika</a> at:<br /><a rel="noopener noreferrer" href="https://blog.stribik.technology/2015/01/04/secure-secure-shell.html">https://blog.stribik.technology/2015/01/04/secure-secure-shell.html</a></blockquote><blockquote style="font-size: small; font-style: italic; font-weight: bold;">Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:<br /><a rel="noopener noreferrer" href="https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices">https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices</a></blockquote><blockquote style="font-size: small;">📝 <strong><i>NOTE:</i></strong> Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.</blockquote><ul><li><a href="#sshd">Skip to the good part.</a></li></ul><p>You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.</p><p>TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.</p></description><link>https://blog.netwk.pro/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 Jan 2015 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://blog.netwk.pro/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
|
package/feed_rss_updated.xml
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
<?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link><atom:link href="https://blog.netwk.pro/feed_rss_updated.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro.github.io</docs><language>en</language> <pubDate>Sun, 11 May 2025
|
|
1
|
+
<?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link><atom:link href="https://blog.netwk.pro/feed_rss_updated.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro.github.io</docs><language>en</language> <pubDate>Sun, 11 May 2025 23:06:41 -0000</pubDate> <lastBuildDate>Sun, 11 May 2025 23:06:41 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description><h1>We're Live</h1><h2>🛡️ Welcome to the Network Pro&trade; Blog: Cybersecurity. Privacy. Open Knowledge</h2><p>In a digital world where threats are persistent and privacy is too often an afterthought, <strong>Network Pro Strategies</strong> was founded on a belief that <strong>effective security doesn't require compromise</strong>. We specialize in helping organizations and individuals <strong>navigate today’s cybersecurity challenges with confidence, clarity, and control</strong>.</p><p>Today marks the launch of our official blog—your go-to destination for <strong>field-tested strategies, implementation insights, and transparent thought leadership</strong> across cybersecurity, network defense, and privacy-aware infrastructure.</p><hr><h3>📡 Why This Blog Exists</h3><p>Modern security isn’t just about technology—it’s about <strong>trust, autonomy, and informed choices</strong>. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.</p></description><link>https://blog.netwk.pro/2025/04/30/our-blog-is-live/</link> <pubDate>Mon, 05 May 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://blog.netwk.pro/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description><h1>Secure Secure Shell</h1><!-- markdownlint-disable-file --><!-- eslint-disable --><blockquote style="font-size: small; font-style: italic; font-weight: bold;">Originally published on 1/4/2015 by <a rel="noopener noreferrer" href="https://github.com/stribika">stribika</a> at:<br /><a rel="noopener noreferrer" href="https://blog.stribik.technology/2015/01/04/secure-secure-shell.html">https://blog.stribik.technology/2015/01/04/secure-secure-shell.html</a></blockquote><blockquote style="font-size: small; font-style: italic; font-weight: bold;">Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:<br /><a rel="noopener noreferrer" href="https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices">https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices</a></blockquote><blockquote style="font-size: small;">📝 <strong><i>NOTE:</i></strong> Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.</blockquote><ul><li><a href="#sshd">Skip to the good part.</a></li></ul><p>You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.</p><p>TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.</p></description><link>https://blog.netwk.pro/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 May 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://blog.netwk.pro/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
|