@networkpro/blog 1.0.0 → 1.0.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -25,7 +25,7 @@
25
25
 
26
26
 
27
27
 
28
- <title>Code of Conduct - Network Pro Strategies</title>
28
+ <title>Code of Conduct - Network Pro Blog</title>
29
29
 
30
30
 
31
31
 
@@ -85,7 +85,7 @@
85
85
 
86
86
  <header class="md-header" data-md-component="header">
87
87
  <nav class="md-header__inner md-grid" aria-label="Header">
88
- <a href=".." title="Network Pro Strategies" class="md-header__button md-logo" aria-label="Network Pro Strategies" data-md-component="logo">
88
+ <a href=".." title="Network Pro Blog" class="md-header__button md-logo" aria-label="Network Pro Blog" data-md-component="logo">
89
89
 
90
90
  <img src="../img/logo.png" alt="logo">
91
91
 
@@ -98,7 +98,7 @@
98
98
  <div class="md-header__ellipsis">
99
99
  <div class="md-header__topic">
100
100
  <span class="md-ellipsis">
101
- Network Pro Strategies
101
+ Network Pro Blog
102
102
  </span>
103
103
  </div>
104
104
  <div class="md-header__topic" data-md-component="header-topic">
@@ -226,20 +226,17 @@
226
226
 
227
227
 
228
228
 
229
-
230
-
231
- <li class="md-tabs__item">
232
- <a href=".." class="md-tabs__link">
233
-
229
+ <li class="md-tabs__item">
230
+ <a href=".." class="md-tabs__link">
231
+
234
232
 
235
233
 
236
234
 
237
235
 
238
- Blog Home
236
+ Home
239
237
 
240
- </a>
241
- </li>
242
-
238
+ </a>
239
+ </li>
243
240
 
244
241
 
245
242
 
@@ -308,6 +305,50 @@
308
305
 
309
306
 
310
307
 
308
+
309
+
310
+
311
+
312
+
313
+
314
+
315
+ <li class="md-tabs__item">
316
+ <a href="../archive/2025/" class="md-tabs__link">
317
+
318
+
319
+
320
+
321
+
322
+ Archive
323
+
324
+ </a>
325
+ </li>
326
+
327
+
328
+
329
+
330
+
331
+
332
+
333
+
334
+
335
+
336
+
337
+ <li class="md-tabs__item">
338
+ <a href="../category/security/" class="md-tabs__link">
339
+
340
+
341
+
342
+
343
+
344
+ Categories
345
+
346
+ </a>
347
+ </li>
348
+
349
+
350
+
351
+
311
352
  </ul>
312
353
  </div>
313
354
  </nav>
@@ -330,12 +371,12 @@
330
371
 
331
372
  <nav class="md-nav md-nav--primary md-nav--lifted" aria-label="Navigation" data-md-level="0">
332
373
  <label class="md-nav__title" for="__drawer">
333
- <a href=".." title="Network Pro Strategies" class="md-nav__button md-logo" aria-label="Network Pro Strategies" data-md-component="logo">
374
+ <a href=".." title="Network Pro Blog" class="md-nav__button md-logo" aria-label="Network Pro Blog" data-md-component="logo">
334
375
 
335
376
  <img src="../img/logo.png" alt="logo">
336
377
 
337
378
  </a>
338
- Network Pro Strategies
379
+ Network Pro Blog
339
380
  </label>
340
381
 
341
382
  <div class="md-nav__source">
@@ -355,150 +396,18 @@
355
396
 
356
397
 
357
398
 
358
-
359
-
360
-
361
-
362
-
363
-
364
-
365
-
366
-
367
-
368
-
369
-
370
-
371
-
372
-
373
-
374
-
375
-
376
-
377
-
378
-
379
- <li class="md-nav__item md-nav__item--nested">
380
-
381
-
382
-
383
- <input class="md-nav__toggle md-toggle " type="checkbox" id="__nav_1" >
384
-
385
-
386
- <div class="md-nav__link md-nav__container">
387
- <a href=".." class="md-nav__link ">
388
-
389
-
390
-
391
- <span class="md-ellipsis">
392
- Blog Home
393
-
394
- </span>
395
-
396
-
397
- </a>
398
-
399
-
400
- <label class="md-nav__link " for="__nav_1" id="__nav_1_label" tabindex="0">
401
- <span class="md-nav__icon md-icon"></span>
402
- </label>
403
-
404
- </div>
405
-
406
- <nav class="md-nav" data-md-level="1" aria-labelledby="__nav_1_label" aria-expanded="false">
407
- <label class="md-nav__title" for="__nav_1">
408
- <span class="md-nav__icon md-icon"></span>
409
- Blog Home
410
- </label>
411
- <ul class="md-nav__list" data-md-scrollfix>
412
-
413
-
414
-
415
-
416
-
417
-
418
-
419
-
420
-
421
-
422
-
423
-
424
-
425
-
426
-
427
-
428
-
429
-
430
-
431
-
432
-
433
-
434
-
435
- <li class="md-nav__item md-nav__item--nested">
436
-
437
-
438
-
439
- <input class="md-nav__toggle md-toggle " type="checkbox" id="__nav_1_2" >
440
-
441
-
442
- <label class="md-nav__link" for="__nav_1_2" id="__nav_1_2_label" tabindex="0">
443
-
444
-
445
-
446
- <span class="md-ellipsis">
447
- Archive
448
-
449
- </span>
450
-
451
-
452
- <span class="md-nav__icon md-icon"></span>
453
- </label>
454
-
455
- <nav class="md-nav" data-md-level="2" aria-labelledby="__nav_1_2_label" aria-expanded="false">
456
- <label class="md-nav__title" for="__nav_1_2">
457
- <span class="md-nav__icon md-icon"></span>
458
- Archive
459
- </label>
460
- <ul class="md-nav__list" data-md-scrollfix>
461
-
462
-
463
-
464
-
465
-
466
-
467
-
468
-
469
-
470
- <li class="md-nav__item">
471
- <a href="../archive/2025/" class="md-nav__link">
472
-
473
-
474
-
475
- <span class="md-ellipsis">
476
- April 2025
477
-
478
- </span>
479
-
480
-
481
- </a>
482
- </li>
483
-
484
-
485
-
486
-
487
-
488
-
489
-
490
399
 
491
400
 
492
401
 
493
402
 
494
403
 
495
404
  <li class="md-nav__item">
496
- <a href="../archive/2015/" class="md-nav__link">
405
+ <a href=".." class="md-nav__link">
497
406
 
498
407
 
499
408
 
500
409
  <span class="md-ellipsis">
501
- January 2015
410
+ Home
502
411
 
503
412
  </span>
504
413
 
@@ -507,100 +416,6 @@
507
416
  </li>
508
417
 
509
418
 
510
-
511
-
512
- </ul>
513
- </nav>
514
-
515
- </li>
516
-
517
-
518
-
519
-
520
-
521
-
522
-
523
-
524
-
525
-
526
-
527
-
528
-
529
-
530
-
531
-
532
-
533
-
534
-
535
-
536
-
537
-
538
- <li class="md-nav__item md-nav__item--nested">
539
-
540
-
541
-
542
- <input class="md-nav__toggle md-toggle " type="checkbox" id="__nav_1_3" >
543
-
544
-
545
- <label class="md-nav__link" for="__nav_1_3" id="__nav_1_3_label" tabindex="0">
546
-
547
-
548
-
549
- <span class="md-ellipsis">
550
- Categories
551
-
552
- </span>
553
-
554
-
555
- <span class="md-nav__icon md-icon"></span>
556
- </label>
557
-
558
- <nav class="md-nav" data-md-level="2" aria-labelledby="__nav_1_3_label" aria-expanded="false">
559
- <label class="md-nav__title" for="__nav_1_3">
560
- <span class="md-nav__icon md-icon"></span>
561
- Categories
562
- </label>
563
- <ul class="md-nav__list" data-md-scrollfix>
564
-
565
-
566
-
567
-
568
-
569
-
570
-
571
-
572
-
573
- <li class="md-nav__item">
574
- <a href="../category/security/" class="md-nav__link">
575
-
576
-
577
-
578
- <span class="md-ellipsis">
579
- Security
580
-
581
- </span>
582
-
583
-
584
- </a>
585
- </li>
586
-
587
-
588
-
589
-
590
- </ul>
591
- </nav>
592
-
593
- </li>
594
-
595
-
596
-
597
-
598
- </ul>
599
- </nav>
600
-
601
- </li>
602
-
603
-
604
419
 
605
420
 
606
421
 
@@ -883,6 +698,187 @@
883
698
  </li>
884
699
 
885
700
 
701
+
702
+
703
+
704
+
705
+
706
+
707
+
708
+
709
+
710
+
711
+
712
+
713
+
714
+
715
+
716
+
717
+
718
+
719
+
720
+
721
+
722
+ <li class="md-nav__item md-nav__item--nested">
723
+
724
+
725
+
726
+ <input class="md-nav__toggle md-toggle " type="checkbox" id="__nav_5" >
727
+
728
+
729
+ <label class="md-nav__link" for="__nav_5" id="__nav_5_label" tabindex="0">
730
+
731
+
732
+
733
+ <span class="md-ellipsis">
734
+ Archive
735
+
736
+ </span>
737
+
738
+
739
+ <span class="md-nav__icon md-icon"></span>
740
+ </label>
741
+
742
+ <nav class="md-nav" data-md-level="1" aria-labelledby="__nav_5_label" aria-expanded="false">
743
+ <label class="md-nav__title" for="__nav_5">
744
+ <span class="md-nav__icon md-icon"></span>
745
+ Archive
746
+ </label>
747
+ <ul class="md-nav__list" data-md-scrollfix>
748
+
749
+
750
+
751
+
752
+
753
+
754
+
755
+
756
+
757
+ <li class="md-nav__item">
758
+ <a href="../archive/2025/" class="md-nav__link">
759
+
760
+
761
+
762
+ <span class="md-ellipsis">
763
+ May 2025
764
+
765
+ </span>
766
+
767
+
768
+ </a>
769
+ </li>
770
+
771
+
772
+
773
+
774
+
775
+
776
+
777
+
778
+
779
+
780
+
781
+
782
+ <li class="md-nav__item">
783
+ <a href="../archive/2015/" class="md-nav__link">
784
+
785
+
786
+
787
+ <span class="md-ellipsis">
788
+ January 2015
789
+
790
+ </span>
791
+
792
+
793
+ </a>
794
+ </li>
795
+
796
+
797
+
798
+
799
+ </ul>
800
+ </nav>
801
+
802
+ </li>
803
+
804
+
805
+
806
+
807
+
808
+
809
+
810
+
811
+
812
+
813
+
814
+
815
+
816
+
817
+
818
+
819
+
820
+
821
+
822
+
823
+
824
+ <li class="md-nav__item md-nav__item--nested">
825
+
826
+
827
+
828
+ <input class="md-nav__toggle md-toggle " type="checkbox" id="__nav_6" >
829
+
830
+
831
+ <label class="md-nav__link" for="__nav_6" id="__nav_6_label" tabindex="0">
832
+
833
+
834
+
835
+ <span class="md-ellipsis">
836
+ Categories
837
+
838
+ </span>
839
+
840
+
841
+ <span class="md-nav__icon md-icon"></span>
842
+ </label>
843
+
844
+ <nav class="md-nav" data-md-level="1" aria-labelledby="__nav_6_label" aria-expanded="false">
845
+ <label class="md-nav__title" for="__nav_6">
846
+ <span class="md-nav__icon md-icon"></span>
847
+ Categories
848
+ </label>
849
+ <ul class="md-nav__list" data-md-scrollfix>
850
+
851
+
852
+
853
+
854
+
855
+
856
+
857
+
858
+
859
+ <li class="md-nav__item">
860
+ <a href="../category/security/" class="md-nav__link">
861
+
862
+
863
+
864
+ <span class="md-ellipsis">
865
+ Security
866
+
867
+ </span>
868
+
869
+
870
+ </a>
871
+ </li>
872
+
873
+
874
+
875
+
876
+ </ul>
877
+ </nav>
878
+
879
+ </li>
880
+
881
+
886
882
 
887
883
  </ul>
888
884
  </nav>
@@ -1 +1 @@
1
- {"version": "https://jsonfeed.org/version/1", "title": "Network Pro Strategies", "home_page_url": "https://blog.netwk.pro/", "feed_url": "https://blog.netwk.pro/feed_json_created.json", "description": null, "icon": null, "authors": [], "language": "en", "items": [{"id": "https://blog.netwk.pro/2025/04/30/our-blog-is-live/", "url": "https://blog.netwk.pro/2025/04/30/our-blog-is-live/", "title": "Our Blog is Live!", "content_html": "<h1>We're Live</h1>\n<h2>\ud83d\udee1\ufe0f Welcome to the Network Pro&trade; Blog: Cybersecurity. Privacy. Open Knowledge</h2>\n<p>In a digital world where threats are persistent and privacy is too often an afterthought, <strong>Network Pro Strategies</strong> was founded on a belief that <strong>effective security doesn't require compromise</strong>. We specialize in helping organizations and individuals <strong>navigate today\u2019s cybersecurity challenges with confidence, clarity, and control</strong>.</p>\n<p>Today marks the launch of our official blog\u2014your go-to destination for <strong>field-tested strategies, implementation insights, and transparent thought leadership</strong> across cybersecurity, network defense, and privacy-aware infrastructure.</p>\n<hr>\n<h3>\ud83d\udce1 Why This Blog Exists</h3>\n<p>Modern security isn\u2019t just about technology\u2014it\u2019s about <strong>trust, autonomy, and informed choices</strong>. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.</p>", "image": null, "date_published": "2025-04-30T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}, {"id": "https://blog.netwk.pro/2015/01/04/secure-secure-shell/", "url": "https://blog.netwk.pro/2015/01/04/secure-secure-shell/", "title": "Secure Secure Shell", "content_html": "<h1>Secure Secure Shell</h1>\n<!-- markdownlint-disable-file -->\n<!-- eslint-disable -->\n\n<blockquote style=\"font-size: small; font-style: italic; font-weight: bold;\">\nOriginally published on 1/4/2015 by <a rel=\"noopener noreferrer\" href=\"https://github.com/stribika\">stribika</a> at:<br />\n<a rel=\"noopener noreferrer\" href=\"https://blog.stribik.technology/2015/01/04/secure-secure-shell.html\">https://blog.stribik.technology/2015/01/04/secure-secure-shell.html</a>\n</blockquote>\n\n<blockquote style=\"font-size: small; font-style: italic; font-weight: bold;\">\nMirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:<br />\n<a rel=\"noopener noreferrer\" href=\"https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices\">https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices</a>\n</blockquote>\n\n<blockquote style=\"font-size: small;\">\n\ud83d\udcdd <strong><i>NOTE:</i></strong> Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.\n</blockquote>\n\n<ul>\n<li><a href=\"#sshd\">Skip to the good part.</a></li>\n</ul>\n<p>You may have heard that the NSA can decrypt SSH at least some of the time.\nIf you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.</p>\n<p>TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.</p>", "image": null, "date_published": "2015-01-04T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}]}
1
+ {"version": "https://jsonfeed.org/version/1", "title": "Network Pro\u2122 Blog", "home_page_url": "https://blog.netwk.pro/", "feed_url": "https://blog.netwk.pro/feed_json_created.json", "description": null, "icon": null, "authors": [], "language": "en", "items": [{"id": "https://blog.netwk.pro/2025/05/11/the-network-pro-blog-has-moved/", "url": "https://blog.netwk.pro/2025/05/11/the-network-pro-blog-has-moved/", "title": "The Network Pro\u2122 Blog Has Moved", "content_html": "<h2>\ud83d\udd01 Evolving Securely: The Network Pro\u2122 Blog Has Moved</h2>\n<p><strong>Same Mission. Stronger Platform. More Accessible Knowledge.</strong></p>\n<p>Since launching the <strong>Network Pro\u2122 Blog</strong>, our purpose has been clear:\nDeliver uncompromising insight, grounded in technical experience and a commitment to <strong>privacy-respecting, resilient cybersecurity</strong>.</p>\n<p>Today, that mission continues\u2014on a new, streamlined domain:<br>\n<strong><a href=\"https://blog.netwk.pro\">https://blog.netwk.pro</a></strong></p>\n<p>This move isn\u2019t just cosmetic. It reflects our continued investment in accessibility, performance, and <strong>security-aware publishing infrastructure</strong>\u2014with all the same clarity and content integrity you\u2019ve come to expect.</p>", "image": null, "date_published": "2025-05-11T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}, {"id": "https://blog.netwk.pro/2025/04/30/our-blog-is-live/", "url": "https://blog.netwk.pro/2025/04/30/our-blog-is-live/", "title": "Our Blog is Live!", "content_html": "<h1>We're Live</h1>\n<h2>\ud83d\udee1\ufe0f Welcome to the Network Pro&trade; Blog: Cybersecurity. Privacy. Open Knowledge</h2>\n<p>In a digital world where threats are persistent and privacy is too often an afterthought, <strong>Network Pro Strategies</strong> was founded on a belief that <strong>effective security doesn't require compromise</strong>. We specialize in helping organizations and individuals <strong>navigate today\u2019s cybersecurity challenges with confidence, clarity, and control</strong>.</p>\n<p>Today marks the launch of our official blog\u2014your go-to destination for <strong>field-tested strategies, implementation insights, and transparent thought leadership</strong> across cybersecurity, network defense, and privacy-aware infrastructure.</p>\n<hr>\n<h3>\ud83d\udce1 Why This Blog Exists</h3>\n<p>Modern security isn\u2019t just about technology\u2014it\u2019s about <strong>trust, autonomy, and informed choices</strong>. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.</p>", "image": null, "date_published": "2025-04-30T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}, {"id": "https://blog.netwk.pro/2015/01/04/secure-secure-shell/", "url": "https://blog.netwk.pro/2015/01/04/secure-secure-shell/", "title": "Secure Secure Shell", "content_html": "<h1>Secure Secure Shell</h1>\n<!-- markdownlint-disable-file -->\n<!-- eslint-disable -->\n\n<blockquote style=\"font-size: small; font-style: italic; font-weight: bold;\">\nOriginally published on 1/4/2015 by <a rel=\"noopener noreferrer\" href=\"https://github.com/stribika\">stribika</a> at:<br />\n<a rel=\"noopener noreferrer\" href=\"https://blog.stribik.technology/2015/01/04/secure-secure-shell.html\">https://blog.stribik.technology/2015/01/04/secure-secure-shell.html</a>\n</blockquote>\n\n<blockquote style=\"font-size: small; font-style: italic; font-weight: bold;\">\nMirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:<br />\n<a rel=\"noopener noreferrer\" href=\"https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices\">https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices</a>\n</blockquote>\n\n<blockquote style=\"font-size: small;\">\n\ud83d\udcdd <strong><i>NOTE:</i></strong> Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.\n</blockquote>\n\n<ul>\n<li><a href=\"#sshd\">Skip to the good part.</a></li>\n</ul>\n<p>You may have heard that the NSA can decrypt SSH at least some of the time.\nIf you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.</p>\n<p>TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.</p>", "image": null, "date_published": "2015-01-04T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}]}
@@ -1 +1 @@
1
- {"version": "https://jsonfeed.org/version/1", "title": "Network Pro Strategies", "home_page_url": "https://blog.netwk.pro/", "feed_url": "https://blog.netwk.pro/feed_json_updated.json", "description": null, "icon": null, "authors": [], "language": "en", "items": [{"id": "https://blog.netwk.pro/2025/04/30/our-blog-is-live/", "url": "https://blog.netwk.pro/2025/04/30/our-blog-is-live/", "title": "Our Blog is Live!", "content_html": "<h1>We're Live</h1>\n<h2>\ud83d\udee1\ufe0f Welcome to the Network Pro&trade; Blog: Cybersecurity. Privacy. Open Knowledge</h2>\n<p>In a digital world where threats are persistent and privacy is too often an afterthought, <strong>Network Pro Strategies</strong> was founded on a belief that <strong>effective security doesn't require compromise</strong>. We specialize in helping organizations and individuals <strong>navigate today\u2019s cybersecurity challenges with confidence, clarity, and control</strong>.</p>\n<p>Today marks the launch of our official blog\u2014your go-to destination for <strong>field-tested strategies, implementation insights, and transparent thought leadership</strong> across cybersecurity, network defense, and privacy-aware infrastructure.</p>\n<hr>\n<h3>\ud83d\udce1 Why This Blog Exists</h3>\n<p>Modern security isn\u2019t just about technology\u2014it\u2019s about <strong>trust, autonomy, and informed choices</strong>. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.</p>", "image": null, "date_modified": "2025-05-05T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}, {"id": "https://blog.netwk.pro/2015/01/04/secure-secure-shell/", "url": "https://blog.netwk.pro/2015/01/04/secure-secure-shell/", "title": "Secure Secure Shell", "content_html": "<h1>Secure Secure Shell</h1>\n<!-- markdownlint-disable-file -->\n<!-- eslint-disable -->\n\n<blockquote style=\"font-size: small; font-style: italic; font-weight: bold;\">\nOriginally published on 1/4/2015 by <a rel=\"noopener noreferrer\" href=\"https://github.com/stribika\">stribika</a> at:<br />\n<a rel=\"noopener noreferrer\" href=\"https://blog.stribik.technology/2015/01/04/secure-secure-shell.html\">https://blog.stribik.technology/2015/01/04/secure-secure-shell.html</a>\n</blockquote>\n\n<blockquote style=\"font-size: small; font-style: italic; font-weight: bold;\">\nMirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:<br />\n<a rel=\"noopener noreferrer\" href=\"https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices\">https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices</a>\n</blockquote>\n\n<blockquote style=\"font-size: small;\">\n\ud83d\udcdd <strong><i>NOTE:</i></strong> Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.\n</blockquote>\n\n<ul>\n<li><a href=\"#sshd\">Skip to the good part.</a></li>\n</ul>\n<p>You may have heard that the NSA can decrypt SSH at least some of the time.\nIf you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.</p>\n<p>TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.</p>", "image": null, "date_modified": "2025-05-04T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}]}
1
+ {"version": "https://jsonfeed.org/version/1", "title": "Network Pro\u2122 Blog", "home_page_url": "https://blog.netwk.pro/", "feed_url": "https://blog.netwk.pro/feed_json_updated.json", "description": null, "icon": null, "authors": [], "language": "en", "items": [{"id": "https://blog.netwk.pro/2025/05/11/the-network-pro-blog-has-moved/", "url": "https://blog.netwk.pro/2025/05/11/the-network-pro-blog-has-moved/", "title": "The Network Pro\u2122 Blog Has Moved", "content_html": "<h2>\ud83d\udd01 Evolving Securely: The Network Pro\u2122 Blog Has Moved</h2>\n<p><strong>Same Mission. Stronger Platform. More Accessible Knowledge.</strong></p>\n<p>Since launching the <strong>Network Pro\u2122 Blog</strong>, our purpose has been clear:\nDeliver uncompromising insight, grounded in technical experience and a commitment to <strong>privacy-respecting, resilient cybersecurity</strong>.</p>\n<p>Today, that mission continues\u2014on a new, streamlined domain:<br>\n<strong><a href=\"https://blog.netwk.pro\">https://blog.netwk.pro</a></strong></p>\n<p>This move isn\u2019t just cosmetic. It reflects our continued investment in accessibility, performance, and <strong>security-aware publishing infrastructure</strong>\u2014with all the same clarity and content integrity you\u2019ve come to expect.</p>", "image": null, "date_modified": "2025-05-12T01:53:20+00:00", "authors": [{"name": "Network Pro"}], "tags": null}, {"id": "https://blog.netwk.pro/2015/01/04/secure-secure-shell/", "url": "https://blog.netwk.pro/2015/01/04/secure-secure-shell/", "title": "Secure Secure Shell", "content_html": "<h1>Secure Secure Shell</h1>\n<!-- markdownlint-disable-file -->\n<!-- eslint-disable -->\n\n<blockquote style=\"font-size: small; font-style: italic; font-weight: bold;\">\nOriginally published on 1/4/2015 by <a rel=\"noopener noreferrer\" href=\"https://github.com/stribika\">stribika</a> at:<br />\n<a rel=\"noopener noreferrer\" href=\"https://blog.stribik.technology/2015/01/04/secure-secure-shell.html\">https://blog.stribik.technology/2015/01/04/secure-secure-shell.html</a>\n</blockquote>\n\n<blockquote style=\"font-size: small; font-style: italic; font-weight: bold;\">\nMirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:<br />\n<a rel=\"noopener noreferrer\" href=\"https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices\">https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices</a>\n</blockquote>\n\n<blockquote style=\"font-size: small;\">\n\ud83d\udcdd <strong><i>NOTE:</i></strong> Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.\n</blockquote>\n\n<ul>\n<li><a href=\"#sshd\">Skip to the good part.</a></li>\n</ul>\n<p>You may have heard that the NSA can decrypt SSH at least some of the time.\nIf you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.</p>\n<p>TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.</p>", "image": null, "date_modified": "2025-05-11T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}, {"id": "https://blog.netwk.pro/2025/04/30/our-blog-is-live/", "url": "https://blog.netwk.pro/2025/04/30/our-blog-is-live/", "title": "Our Blog is Live!", "content_html": "<h1>We're Live</h1>\n<h2>\ud83d\udee1\ufe0f Welcome to the Network Pro&trade; Blog: Cybersecurity. Privacy. Open Knowledge</h2>\n<p>In a digital world where threats are persistent and privacy is too often an afterthought, <strong>Network Pro Strategies</strong> was founded on a belief that <strong>effective security doesn't require compromise</strong>. We specialize in helping organizations and individuals <strong>navigate today\u2019s cybersecurity challenges with confidence, clarity, and control</strong>.</p>\n<p>Today marks the launch of our official blog\u2014your go-to destination for <strong>field-tested strategies, implementation insights, and transparent thought leadership</strong> across cybersecurity, network defense, and privacy-aware infrastructure.</p>\n<hr>\n<h3>\ud83d\udce1 Why This Blog Exists</h3>\n<p>Modern security isn\u2019t just about technology\u2014it\u2019s about <strong>trust, autonomy, and informed choices</strong>. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.</p>", "image": null, "date_modified": "2025-05-05T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}]}
@@ -1 +1 @@
1
- <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link><atom:link href="https://blog.netwk.pro/feed_rss_created.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro.github.io</docs><language>en</language> <pubDate>Sun, 11 May 2025 22:54:12 -0000</pubDate> <lastBuildDate>Sun, 11 May 2025 22:54:12 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;h1&gt;We&#39;re Live&lt;/h1&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge&lt;/h2&gt;&lt;p&gt;In a digital world where threats are persistent and privacy is too often an afterthought, &lt;strong&gt;Network Pro Strategies&lt;/strong&gt; was founded on a belief that &lt;strong&gt;effective security doesn&#39;t require compromise&lt;/strong&gt;. We specialize in helping organizations and individuals &lt;strong&gt;navigate today’s cybersecurity challenges with confidence, clarity, and control&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today marks the launch of our official blog—your go-to destination for &lt;strong&gt;field-tested strategies, implementation insights, and transparent thought leadership&lt;/strong&gt; across cybersecurity, network defense, and privacy-aware infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Modern security isn’t just about technology—it’s about &lt;strong&gt;trust, autonomy, and informed choices&lt;/strong&gt;. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.&lt;/p&gt;</description><link>https://blog.netwk.pro/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://blog.netwk.pro/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;!-- eslint-disable --&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Originally published on 1/4/2015 by &lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&#34;&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small;&#34;&gt;📝 &lt;strong&gt;&lt;i&gt;NOTE:&lt;/i&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://blog.netwk.pro/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 Jan 2015 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://blog.netwk.pro/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
1
+ <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Blog</title><link>https://blog.netwk.pro/</link><atom:link href="https://blog.netwk.pro/feed_rss_created.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro.github.io</docs><language>en</language> <pubDate>Mon, 12 May 2025 01:58:41 -0000</pubDate> <lastBuildDate>Mon, 12 May 2025 01:58:41 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Blog</title><link>https://blog.netwk.pro/</link> </image> <item> <title>The Network Pro™ Blog Has Moved</title> <author>Network Pro</author> <description>&lt;h2&gt;🔁 Evolving Securely: The Network Pro™ Blog Has Moved&lt;/h2&gt;&lt;p&gt;&lt;strong&gt;Same Mission. Stronger Platform. More Accessible Knowledge.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Since launching the &lt;strong&gt;Network Pro™ Blog&lt;/strong&gt;, our purpose has been clear:Deliver uncompromising insight, grounded in technical experience and a commitment to &lt;strong&gt;privacy-respecting, resilient cybersecurity&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today, that mission continues—on a new, streamlined domain:&lt;br&gt;&lt;strong&gt;&lt;a href=&#34;https://blog.netwk.pro&#34;&gt;https://blog.netwk.pro&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;This move isn’t just cosmetic. It reflects our continued investment in accessibility, performance, and &lt;strong&gt;security-aware publishing infrastructure&lt;/strong&gt;—with all the same clarity and content integrity you’ve come to expect.&lt;/p&gt;</description><link>https://blog.netwk.pro/2025/05/11/the-network-pro-blog-has-moved/</link> <pubDate>Sun, 11 May 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_created.xml">Network Pro™ Blog</source><guid isPermaLink="true">https://blog.netwk.pro/2025/05/11/the-network-pro-blog-has-moved/</guid> </item> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;h1&gt;We&#39;re Live&lt;/h1&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge&lt;/h2&gt;&lt;p&gt;In a digital world where threats are persistent and privacy is too often an afterthought, &lt;strong&gt;Network Pro Strategies&lt;/strong&gt; was founded on a belief that &lt;strong&gt;effective security doesn&#39;t require compromise&lt;/strong&gt;. We specialize in helping organizations and individuals &lt;strong&gt;navigate today’s cybersecurity challenges with confidence, clarity, and control&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today marks the launch of our official blog—your go-to destination for &lt;strong&gt;field-tested strategies, implementation insights, and transparent thought leadership&lt;/strong&gt; across cybersecurity, network defense, and privacy-aware infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Modern security isn’t just about technology—it’s about &lt;strong&gt;trust, autonomy, and informed choices&lt;/strong&gt;. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.&lt;/p&gt;</description><link>https://blog.netwk.pro/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_created.xml">Network Pro Blog</source><guid isPermaLink="true">https://blog.netwk.pro/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;!-- eslint-disable --&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Originally published on 1/4/2015 by &lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&#34;&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small;&#34;&gt;📝 &lt;strong&gt;&lt;i&gt;NOTE:&lt;/i&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://blog.netwk.pro/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 Jan 2015 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_created.xml">Network Pro Blog</source><guid isPermaLink="true">https://blog.netwk.pro/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
@@ -1 +1 @@
1
- <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link><atom:link href="https://blog.netwk.pro/feed_rss_updated.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro.github.io</docs><language>en</language> <pubDate>Sun, 11 May 2025 22:54:12 -0000</pubDate> <lastBuildDate>Sun, 11 May 2025 22:54:12 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://blog.netwk.pro/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;h1&gt;We&#39;re Live&lt;/h1&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge&lt;/h2&gt;&lt;p&gt;In a digital world where threats are persistent and privacy is too often an afterthought, &lt;strong&gt;Network Pro Strategies&lt;/strong&gt; was founded on a belief that &lt;strong&gt;effective security doesn&#39;t require compromise&lt;/strong&gt;. We specialize in helping organizations and individuals &lt;strong&gt;navigate today’s cybersecurity challenges with confidence, clarity, and control&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today marks the launch of our official blogyour go-to destination for &lt;strong&gt;field-tested strategies, implementation insights, and transparent thought leadership&lt;/strong&gt; across cybersecurity, network defense, and privacy-aware infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Modern security isn’t just about technology—it’s about &lt;strong&gt;trust, autonomy, and informed choices&lt;/strong&gt;. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.&lt;/p&gt;</description><link>https://blog.netwk.pro/2025/04/30/our-blog-is-live/</link> <pubDate>Mon, 05 May 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://blog.netwk.pro/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;!-- eslint-disable --&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Originally published on 1/4/2015 by &lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&#34;&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small;&#34;&gt;📝 &lt;strong&gt;&lt;i&gt;NOTE:&lt;/i&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://blog.netwk.pro/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 May 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://blog.netwk.pro/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
1
+ <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Blog</title><link>https://blog.netwk.pro/</link><atom:link href="https://blog.netwk.pro/feed_rss_updated.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro.github.io</docs><language>en</language> <pubDate>Mon, 12 May 2025 01:58:41 -0000</pubDate> <lastBuildDate>Mon, 12 May 2025 01:58:41 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Blog</title><link>https://blog.netwk.pro/</link> </image> <item> <title>The Network Pro™ Blog Has Moved</title> <author>Network Pro</author> <description>&lt;h2&gt;🔁 Evolving Securely: The Network Pro™ Blog Has Moved&lt;/h2&gt;&lt;p&gt;&lt;strong&gt;Same Mission. Stronger Platform. More Accessible Knowledge.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Since launching the &lt;strong&gt;Network Pro Blog&lt;/strong&gt;, our purpose has been clear:Deliver uncompromising insight, grounded in technical experience and a commitment to &lt;strong&gt;privacy-respecting, resilient cybersecurity&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today, that mission continueson a new, streamlined domain:&lt;br&gt;&lt;strong&gt;&lt;a href=&#34;https://blog.netwk.pro&#34;&gt;https://blog.netwk.pro&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;This move isn’t just cosmetic. It reflects our continued investment in accessibility, performance, and &lt;strong&gt;security-aware publishing infrastructure&lt;/strong&gt;—with all the same clarity and content integrity you’ve come to expect.&lt;/p&gt;</description><link>https://blog.netwk.pro/2025/05/11/the-network-pro-blog-has-moved/</link> <pubDate>Mon, 12 May 2025 01:53:20 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_updated.xml">Network Pro Blog</source><guid isPermaLink="true">https://blog.netwk.pro/2025/05/11/the-network-pro-blog-has-moved/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;!-- eslint-disable --&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Originally published on 1/4/2015 by &lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&#34;&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small;&#34;&gt;📝 &lt;strong&gt;&lt;i&gt;NOTE:&lt;/i&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://blog.netwk.pro/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 11 May 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_updated.xml">Network Pro Blog</source><guid isPermaLink="true">https://blog.netwk.pro/2015/01/04/secure-secure-shell/</guid> </item> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;h1&gt;We&#39;re Live&lt;/h1&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge&lt;/h2&gt;&lt;p&gt;In a digital world where threats are persistent and privacy is too often an afterthought, &lt;strong&gt;Network Pro Strategies&lt;/strong&gt; was founded on a belief that &lt;strong&gt;effective security doesn&#39;t require compromise&lt;/strong&gt;. We specialize in helping organizations and individuals &lt;strong&gt;navigate today’s cybersecurity challenges with confidence, clarity, and control&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today marks the launch of our official blog—your go-to destination for &lt;strong&gt;field-tested strategies, implementation insights, and transparent thought leadership&lt;/strong&gt; across cybersecurity, network defense, and privacy-aware infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Modern security isn’t just about technology—it’s about &lt;strong&gt;trust, autonomy, and informed choices&lt;/strong&gt;. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.&lt;/p&gt;</description><link>https://blog.netwk.pro/2025/04/30/our-blog-is-live/</link> <pubDate>Mon, 05 May 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_updated.xml">Network Pro™ Blog</source><guid isPermaLink="true">https://blog.netwk.pro/2025/04/30/our-blog-is-live/</guid> </item> </channel></rss>