@networkpro/blog 1.0.3 → 1.0.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (152) hide show
  1. package/.browserslistrc +12 -0
  2. package/.editorconfig +60 -0
  3. package/.gitattributes +199 -0
  4. package/.github/workflows/auto-assign.yml +32 -0
  5. package/.github/workflows/build-and-deploy.yml +117 -0
  6. package/.github/workflows/dependency-review.yml +20 -0
  7. package/.github/workflows/publish.yml +143 -0
  8. package/.markdownlint.jsonc +19 -0
  9. package/.prettierignore +38 -0
  10. package/.prettierrc +20 -0
  11. package/.stylelintignore +34 -0
  12. package/.vscode/settings.json +81 -0
  13. package/CNAME +1 -0
  14. package/LICENSE.md +265 -0
  15. package/MKDOCS.md +20 -0
  16. package/assets/consulting-terms.pdf +0 -0
  17. package/assets/license/CC-BY-4.0-rdfa.xml +741 -0
  18. package/assets/license/CC-BY-4.0.xml +25 -0
  19. package/assets/license/COPYING-rdfa.xml +1187 -0
  20. package/assets/license/COPYING.odt +0 -0
  21. package/assets/linksheet.json +8 -0
  22. package/assets/pgp/contact.vcf +13 -0
  23. package/assets/pgp/contact@s.neteng.pro.aexpk +17 -0
  24. package/assets/pgp/contact@s.neteng.pro.asc +17 -0
  25. package/assets/pgp/github@sl.neteng.cc.aexpk +29 -0
  26. package/assets/pgp/github@sl.neteng.cc.asc +29 -0
  27. package/assets/pgp/support@neteng.pro.aexpk +47 -0
  28. package/assets/pgp/support@neteng.pro.asc +47 -0
  29. package/docs/LICENSE.md +296 -0
  30. package/docs/PRIVACY.md +212 -0
  31. package/docs/README.md +115 -0
  32. package/docs/TERMS-COND.md +277 -0
  33. package/docs/TERMS-USE.md +212 -0
  34. package/docs/license/CC-BY-4.0.html +1235 -0
  35. package/docs/license/CC-BY-4.0.md +367 -0
  36. package/docs/license/CC-BY-4.0.txt +156 -0
  37. package/docs/license/COPYING.html +1413 -0
  38. package/docs/license/COPYING.md +611 -0
  39. package/docs/license/COPYING.txt +232 -0
  40. package/docs_raw/.authors.yml +11 -0
  41. package/docs_raw/contributing.md +166 -0
  42. package/docs_raw/ext/__init__.py +0 -0
  43. package/docs_raw/icon-512x512-maskable.png +0 -0
  44. package/docs_raw/index.md +28 -0
  45. package/docs_raw/manifest.json +36 -0
  46. package/docs_raw/posts/betterweb.md +59 -0
  47. package/docs_raw/posts/drafts/.meta.yml +1 -0
  48. package/docs_raw/posts/live.md +83 -0
  49. package/docs_raw/posts/moved.md +74 -0
  50. package/docs_raw/posts/pwa.md +65 -0
  51. package/docs_raw/posts/secure-secure-shell.md +561 -0
  52. package/docs_raw/sitemap.xml +83 -0
  53. package/docs_raw/tags.md +12 -0
  54. package/eslint.config.mjs +80 -0
  55. package/mkdocs.yml +115 -0
  56. package/package.json +4 -4
  57. package/postcss.config.mjs +5 -0
  58. package/ref/README.md +56 -0
  59. package/ref/help.md +17 -0
  60. package/stylelint.config.js +109 -0
  61. package/2015/01/04/secure-secure-shell/index.html +0 -1552
  62. package/2025/04/30/our-blog-is-live/index.html +0 -1216
  63. package/2025/05/11/the-network-pro-blog-has-moved/index.html +0 -1193
  64. package/404.html +0 -970
  65. package/archive/2015/index.html +0 -1141
  66. package/archive/2025/index.html +0 -1185
  67. package/assets/external/avatars.githubusercontent.com/u/170266279.png +0 -0
  68. package/assets/external/unpkg.com/mermaid@11/dist/mermaid.min.js +0 -2607
  69. package/assets/images/favicon.png +0 -0
  70. package/assets/javascripts/bundle.13a4f30d.min.js +0 -16
  71. package/assets/javascripts/bundle.13a4f30d.min.js.map +0 -7
  72. package/assets/javascripts/lunr/min/lunr.ar.min.js +0 -1
  73. package/assets/javascripts/lunr/min/lunr.da.min.js +0 -18
  74. package/assets/javascripts/lunr/min/lunr.de.min.js +0 -18
  75. package/assets/javascripts/lunr/min/lunr.du.min.js +0 -18
  76. package/assets/javascripts/lunr/min/lunr.el.min.js +0 -1
  77. package/assets/javascripts/lunr/min/lunr.es.min.js +0 -18
  78. package/assets/javascripts/lunr/min/lunr.fi.min.js +0 -18
  79. package/assets/javascripts/lunr/min/lunr.fr.min.js +0 -18
  80. package/assets/javascripts/lunr/min/lunr.he.min.js +0 -1
  81. package/assets/javascripts/lunr/min/lunr.hi.min.js +0 -1
  82. package/assets/javascripts/lunr/min/lunr.hu.min.js +0 -18
  83. package/assets/javascripts/lunr/min/lunr.hy.min.js +0 -1
  84. package/assets/javascripts/lunr/min/lunr.it.min.js +0 -18
  85. package/assets/javascripts/lunr/min/lunr.ja.min.js +0 -1
  86. package/assets/javascripts/lunr/min/lunr.jp.min.js +0 -1
  87. package/assets/javascripts/lunr/min/lunr.kn.min.js +0 -1
  88. package/assets/javascripts/lunr/min/lunr.ko.min.js +0 -1
  89. package/assets/javascripts/lunr/min/lunr.multi.min.js +0 -1
  90. package/assets/javascripts/lunr/min/lunr.nl.min.js +0 -18
  91. package/assets/javascripts/lunr/min/lunr.no.min.js +0 -18
  92. package/assets/javascripts/lunr/min/lunr.pt.min.js +0 -18
  93. package/assets/javascripts/lunr/min/lunr.ro.min.js +0 -18
  94. package/assets/javascripts/lunr/min/lunr.ru.min.js +0 -18
  95. package/assets/javascripts/lunr/min/lunr.sa.min.js +0 -1
  96. package/assets/javascripts/lunr/min/lunr.stemmer.support.min.js +0 -1
  97. package/assets/javascripts/lunr/min/lunr.sv.min.js +0 -18
  98. package/assets/javascripts/lunr/min/lunr.ta.min.js +0 -1
  99. package/assets/javascripts/lunr/min/lunr.te.min.js +0 -1
  100. package/assets/javascripts/lunr/min/lunr.th.min.js +0 -1
  101. package/assets/javascripts/lunr/min/lunr.tr.min.js +0 -18
  102. package/assets/javascripts/lunr/min/lunr.vi.min.js +0 -1
  103. package/assets/javascripts/lunr/min/lunr.zh.min.js +0 -1
  104. package/assets/javascripts/lunr/tinyseg.js +0 -206
  105. package/assets/javascripts/lunr/wordcut.js +0 -6708
  106. package/assets/javascripts/workers/search.d50fe291.min.js +0 -42
  107. package/assets/javascripts/workers/search.d50fe291.min.js.map +0 -7
  108. package/assets/stylesheets/main.342714a4.min.css +0 -1
  109. package/assets/stylesheets/main.342714a4.min.css.map +0 -1
  110. package/assets/stylesheets/palette.06af60db.min.css +0 -1
  111. package/assets/stylesheets/palette.06af60db.min.css.map +0 -1
  112. package/category/security/index.html +0 -1141
  113. package/contributing/index.html +0 -1306
  114. package/feed_json_created.json +0 -1
  115. package/feed_json_updated.json +0 -1
  116. package/feed_rss_created.xml +0 -1
  117. package/feed_rss_updated.xml +0 -1
  118. package/index.html +0 -1275
  119. package/search/search_index.json +0 -1
  120. package/site.webmanifest +0 -25
  121. package/sitemap.xml +0 -39
  122. package/sitemap.xml.gz +0 -0
  123. package/tags/index.html +0 -1303
  124. /package/{ext/__init__.py → assets/.gitkeep} +0 -0
  125. /package/assets/{external/raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/assets/nsa-happy-dance.png → nsa-happy-dance.png} +0 -0
  126. /package/{ext → docs_raw/ext}/slugs.py +0 -0
  127. /package/{favicon.ico → docs_raw/favicon.ico} +0 -0
  128. /package/{favicon.svg → docs_raw/favicon.svg} +0 -0
  129. /package/{fontawesome → docs_raw/fontawesome}/LICENSE.txt +0 -0
  130. /package/{fontawesome → docs_raw/fontawesome}/brands/facebook.svg +0 -0
  131. /package/{fontawesome → docs_raw/fontawesome}/brands/instagram.svg +0 -0
  132. /package/{fontawesome → docs_raw/fontawesome}/brands/linkedin.svg +0 -0
  133. /package/{fontawesome → docs_raw/fontawesome}/brands/mastodon.svg +0 -0
  134. /package/{fontawesome → docs_raw/fontawesome}/solid/at.svg +0 -0
  135. /package/{hooks → docs_raw/hooks}/socialmedia.py +0 -0
  136. /package/{favicon-180.png → docs_raw/icon-180x180.png} +0 -0
  137. /package/{favicon-192.png → docs_raw/icon-192x192.png} +0 -0
  138. /package/{favicon-512.png → docs_raw/icon-512x512.png} +0 -0
  139. /package/{favicon-splash.png → docs_raw/icon-splash.png} +0 -0
  140. /package/{img → docs_raw/img}/acode.png +0 -0
  141. /package/{img → docs_raw/img}/blog-move.png +0 -0
  142. /package/{img → docs_raw/img}/favicon.png +0 -0
  143. /package/{img → docs_raw/img}/linksheet.png +0 -0
  144. /package/{img → docs_raw/img}/logo.png +0 -0
  145. /package/{img → docs_raw/img}/pmx.png +0 -0
  146. /package/{img → docs_raw/img}/tosdr.png +0 -0
  147. /package/{img → docs_raw/img}/urlcheck.png +0 -0
  148. /package/{robots.txt → docs_raw/robots.txt} +0 -0
  149. /package/{styles → docs_raw/styles}/default.css +0 -0
  150. /package/{styles → docs_raw/styles}/global.css +0 -0
  151. /package/{styles → docs_raw/styles}/normalize.css +0 -0
  152. /package/{styles → docs_raw/styles}/style.css +0 -0
@@ -1 +0,0 @@
1
- {"version": "https://jsonfeed.org/version/1", "title": "Network Pro\u2122 Blog", "home_page_url": "https://blog.netwk.pro/", "feed_url": "https://blog.netwk.pro/feed_json_created.json", "description": null, "icon": null, "authors": [], "language": "en", "items": [{"id": "https://blog.netwk.pro/2025/05/11/the-network-pro-blog-has-moved/", "url": "https://blog.netwk.pro/2025/05/11/the-network-pro-blog-has-moved/", "title": "The Network Pro\u2122 Blog Has Moved", "content_html": "<h2>\ud83d\udd01 Evolving Securely: The Network Pro\u2122 Blog Has Moved</h2>\n<p><strong>Same Mission. Stronger Platform. More Accessible Knowledge.</strong></p>\n<p>Since launching the <strong>Network Pro\u2122 Blog</strong>, our purpose has been clear:\nDeliver uncompromising insight, grounded in technical experience and a commitment to <strong>privacy-respecting, resilient cybersecurity</strong>.</p>\n<p>Today, that mission continues\u2014on a new, streamlined domain:<br>\n<strong><a href=\"https://blog.netwk.pro\">https://blog.netwk.pro</a></strong></p>\n<p>This move isn\u2019t just cosmetic. It reflects our continued investment in accessibility, performance, and <strong>security-aware publishing infrastructure</strong>\u2014with all the same clarity and content integrity you\u2019ve come to expect.</p>", "image": null, "date_published": "2025-05-11T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}, {"id": "https://blog.netwk.pro/2025/04/30/our-blog-is-live/", "url": "https://blog.netwk.pro/2025/04/30/our-blog-is-live/", "title": "Our Blog is Live!", "content_html": "<h1>We're Live</h1>\n<h2>\ud83d\udee1\ufe0f Welcome to the Network Pro&trade; Blog: Cybersecurity. Privacy. Open Knowledge</h2>\n<p>In a digital world where threats are persistent and privacy is too often an afterthought, <strong>Network Pro Strategies</strong> was founded on a belief that <strong>effective security doesn't require compromise</strong>. We specialize in helping organizations and individuals <strong>navigate today\u2019s cybersecurity challenges with confidence, clarity, and control</strong>.</p>\n<p>Today marks the launch of our official blog\u2014your go-to destination for <strong>field-tested strategies, implementation insights, and transparent thought leadership</strong> across cybersecurity, network defense, and privacy-aware infrastructure.</p>\n<hr>\n<h3>\ud83d\udce1 Why This Blog Exists</h3>\n<p>Modern security isn\u2019t just about technology\u2014it\u2019s about <strong>trust, autonomy, and informed choices</strong>. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.</p>", "image": null, "date_published": "2025-04-30T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}, {"id": "https://blog.netwk.pro/2015/01/04/secure-secure-shell/", "url": "https://blog.netwk.pro/2015/01/04/secure-secure-shell/", "title": "Secure Secure Shell", "content_html": "<h1>Secure Secure Shell</h1>\n<!-- markdownlint-disable-file -->\n<!-- eslint-disable -->\n\n<blockquote style=\"font-size: small; font-style: italic; font-weight: bold;\">\nOriginally published on 1/4/2015 by <a rel=\"noopener noreferrer\" href=\"https://github.com/stribika\">stribika</a> at:<br />\n<a rel=\"noopener noreferrer\" href=\"https://blog.stribik.technology/2015/01/04/secure-secure-shell.html\">https://blog.stribik.technology/2015/01/04/secure-secure-shell.html</a>\n</blockquote>\n\n<blockquote style=\"font-size: small; font-style: italic; font-weight: bold;\">\nMirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:<br />\n<a rel=\"noopener noreferrer\" href=\"https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices\">https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices</a>\n</blockquote>\n\n<blockquote style=\"font-size: small;\">\n\ud83d\udcdd <strong><i>NOTE:</i></strong> Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.\n</blockquote>\n\n<ul>\n<li><a href=\"#sshd\">Skip to the good part.</a></li>\n</ul>\n<p>You may have heard that the NSA can decrypt SSH at least some of the time.\nIf you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.</p>\n<p>TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.</p>", "image": null, "date_published": "2015-01-04T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}]}
@@ -1 +0,0 @@
1
- {"version": "https://jsonfeed.org/version/1", "title": "Network Pro\u2122 Blog", "home_page_url": "https://blog.netwk.pro/", "feed_url": "https://blog.netwk.pro/feed_json_updated.json", "description": null, "icon": null, "authors": [], "language": "en", "items": [{"id": "https://blog.netwk.pro/2025/05/11/the-network-pro-blog-has-moved/", "url": "https://blog.netwk.pro/2025/05/11/the-network-pro-blog-has-moved/", "title": "The Network Pro\u2122 Blog Has Moved", "content_html": "<h2>\ud83d\udd01 Evolving Securely: The Network Pro\u2122 Blog Has Moved</h2>\n<p><strong>Same Mission. Stronger Platform. More Accessible Knowledge.</strong></p>\n<p>Since launching the <strong>Network Pro\u2122 Blog</strong>, our purpose has been clear:\nDeliver uncompromising insight, grounded in technical experience and a commitment to <strong>privacy-respecting, resilient cybersecurity</strong>.</p>\n<p>Today, that mission continues\u2014on a new, streamlined domain:<br>\n<strong><a href=\"https://blog.netwk.pro\">https://blog.netwk.pro</a></strong></p>\n<p>This move isn\u2019t just cosmetic. It reflects our continued investment in accessibility, performance, and <strong>security-aware publishing infrastructure</strong>\u2014with all the same clarity and content integrity you\u2019ve come to expect.</p>", "image": null, "date_modified": "2025-05-12T01:53:20+00:00", "authors": [{"name": "Network Pro"}], "tags": null}, {"id": "https://blog.netwk.pro/2015/01/04/secure-secure-shell/", "url": "https://blog.netwk.pro/2015/01/04/secure-secure-shell/", "title": "Secure Secure Shell", "content_html": "<h1>Secure Secure Shell</h1>\n<!-- markdownlint-disable-file -->\n<!-- eslint-disable -->\n\n<blockquote style=\"font-size: small; font-style: italic; font-weight: bold;\">\nOriginally published on 1/4/2015 by <a rel=\"noopener noreferrer\" href=\"https://github.com/stribika\">stribika</a> at:<br />\n<a rel=\"noopener noreferrer\" href=\"https://blog.stribik.technology/2015/01/04/secure-secure-shell.html\">https://blog.stribik.technology/2015/01/04/secure-secure-shell.html</a>\n</blockquote>\n\n<blockquote style=\"font-size: small; font-style: italic; font-weight: bold;\">\nMirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:<br />\n<a rel=\"noopener noreferrer\" href=\"https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices\">https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices</a>\n</blockquote>\n\n<blockquote style=\"font-size: small;\">\n\ud83d\udcdd <strong><i>NOTE:</i></strong> Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.\n</blockquote>\n\n<ul>\n<li><a href=\"#sshd\">Skip to the good part.</a></li>\n</ul>\n<p>You may have heard that the NSA can decrypt SSH at least some of the time.\nIf you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.</p>\n<p>TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.</p>", "image": null, "date_modified": "2025-05-11T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}, {"id": "https://blog.netwk.pro/2025/04/30/our-blog-is-live/", "url": "https://blog.netwk.pro/2025/04/30/our-blog-is-live/", "title": "Our Blog is Live!", "content_html": "<h1>We're Live</h1>\n<h2>\ud83d\udee1\ufe0f Welcome to the Network Pro&trade; Blog: Cybersecurity. Privacy. Open Knowledge</h2>\n<p>In a digital world where threats are persistent and privacy is too often an afterthought, <strong>Network Pro Strategies</strong> was founded on a belief that <strong>effective security doesn't require compromise</strong>. We specialize in helping organizations and individuals <strong>navigate today\u2019s cybersecurity challenges with confidence, clarity, and control</strong>.</p>\n<p>Today marks the launch of our official blog\u2014your go-to destination for <strong>field-tested strategies, implementation insights, and transparent thought leadership</strong> across cybersecurity, network defense, and privacy-aware infrastructure.</p>\n<hr>\n<h3>\ud83d\udce1 Why This Blog Exists</h3>\n<p>Modern security isn\u2019t just about technology\u2014it\u2019s about <strong>trust, autonomy, and informed choices</strong>. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.</p>", "image": null, "date_modified": "2025-05-05T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}]}
@@ -1 +0,0 @@
1
- <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro™ Blog</title><link>https://blog.netwk.pro/</link><atom:link href="https://blog.netwk.pro/feed_rss_created.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro.github.io</docs><language>en</language> <pubDate>Mon, 12 May 2025 01:58:41 -0000</pubDate> <lastBuildDate>Mon, 12 May 2025 01:58:41 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro™ Blog</title><link>https://blog.netwk.pro/</link> </image> <item> <title>The Network Pro™ Blog Has Moved</title> <author>Network Pro</author> <description>&lt;h2&gt;🔁 Evolving Securely: The Network Pro™ Blog Has Moved&lt;/h2&gt;&lt;p&gt;&lt;strong&gt;Same Mission. Stronger Platform. More Accessible Knowledge.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Since launching the &lt;strong&gt;Network Pro™ Blog&lt;/strong&gt;, our purpose has been clear:Deliver uncompromising insight, grounded in technical experience and a commitment to &lt;strong&gt;privacy-respecting, resilient cybersecurity&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today, that mission continues—on a new, streamlined domain:&lt;br&gt;&lt;strong&gt;&lt;a href=&#34;https://blog.netwk.pro&#34;&gt;https://blog.netwk.pro&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;This move isn’t just cosmetic. It reflects our continued investment in accessibility, performance, and &lt;strong&gt;security-aware publishing infrastructure&lt;/strong&gt;—with all the same clarity and content integrity you’ve come to expect.&lt;/p&gt;</description><link>https://blog.netwk.pro/2025/05/11/the-network-pro-blog-has-moved/</link> <pubDate>Sun, 11 May 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_created.xml">Network Pro™ Blog</source><guid isPermaLink="true">https://blog.netwk.pro/2025/05/11/the-network-pro-blog-has-moved/</guid> </item> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;h1&gt;We&#39;re Live&lt;/h1&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge&lt;/h2&gt;&lt;p&gt;In a digital world where threats are persistent and privacy is too often an afterthought, &lt;strong&gt;Network Pro Strategies&lt;/strong&gt; was founded on a belief that &lt;strong&gt;effective security doesn&#39;t require compromise&lt;/strong&gt;. We specialize in helping organizations and individuals &lt;strong&gt;navigate today’s cybersecurity challenges with confidence, clarity, and control&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today marks the launch of our official blog—your go-to destination for &lt;strong&gt;field-tested strategies, implementation insights, and transparent thought leadership&lt;/strong&gt; across cybersecurity, network defense, and privacy-aware infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Modern security isn’t just about technology—it’s about &lt;strong&gt;trust, autonomy, and informed choices&lt;/strong&gt;. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.&lt;/p&gt;</description><link>https://blog.netwk.pro/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_created.xml">Network Pro™ Blog</source><guid isPermaLink="true">https://blog.netwk.pro/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;!-- eslint-disable --&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Originally published on 1/4/2015 by &lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&#34;&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small;&#34;&gt;📝 &lt;strong&gt;&lt;i&gt;NOTE:&lt;/i&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://blog.netwk.pro/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 Jan 2015 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_created.xml">Network Pro™ Blog</source><guid isPermaLink="true">https://blog.netwk.pro/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
@@ -1 +0,0 @@
1
- <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro™ Blog</title><link>https://blog.netwk.pro/</link><atom:link href="https://blog.netwk.pro/feed_rss_updated.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro.github.io</docs><language>en</language> <pubDate>Mon, 12 May 2025 01:58:41 -0000</pubDate> <lastBuildDate>Mon, 12 May 2025 01:58:41 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro™ Blog</title><link>https://blog.netwk.pro/</link> </image> <item> <title>The Network Pro™ Blog Has Moved</title> <author>Network Pro</author> <description>&lt;h2&gt;🔁 Evolving Securely: The Network Pro™ Blog Has Moved&lt;/h2&gt;&lt;p&gt;&lt;strong&gt;Same Mission. Stronger Platform. More Accessible Knowledge.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Since launching the &lt;strong&gt;Network Pro™ Blog&lt;/strong&gt;, our purpose has been clear:Deliver uncompromising insight, grounded in technical experience and a commitment to &lt;strong&gt;privacy-respecting, resilient cybersecurity&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today, that mission continues—on a new, streamlined domain:&lt;br&gt;&lt;strong&gt;&lt;a href=&#34;https://blog.netwk.pro&#34;&gt;https://blog.netwk.pro&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;This move isn’t just cosmetic. It reflects our continued investment in accessibility, performance, and &lt;strong&gt;security-aware publishing infrastructure&lt;/strong&gt;—with all the same clarity and content integrity you’ve come to expect.&lt;/p&gt;</description><link>https://blog.netwk.pro/2025/05/11/the-network-pro-blog-has-moved/</link> <pubDate>Mon, 12 May 2025 01:53:20 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_updated.xml">Network Pro™ Blog</source><guid isPermaLink="true">https://blog.netwk.pro/2025/05/11/the-network-pro-blog-has-moved/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;!-- eslint-disable --&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Originally published on 1/4/2015 by &lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&#34;&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small; font-style: italic; font-weight: bold;&#34;&gt;Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:&lt;br /&gt;&lt;a rel=&#34;noopener noreferrer&#34; href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/blockquote&gt;&lt;blockquote style=&#34;font-size: small;&#34;&gt;📝 &lt;strong&gt;&lt;i&gt;NOTE:&lt;/i&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://blog.netwk.pro/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 11 May 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_updated.xml">Network Pro™ Blog</source><guid isPermaLink="true">https://blog.netwk.pro/2015/01/04/secure-secure-shell/</guid> </item> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;h1&gt;We&#39;re Live&lt;/h1&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge&lt;/h2&gt;&lt;p&gt;In a digital world where threats are persistent and privacy is too often an afterthought, &lt;strong&gt;Network Pro Strategies&lt;/strong&gt; was founded on a belief that &lt;strong&gt;effective security doesn&#39;t require compromise&lt;/strong&gt;. We specialize in helping organizations and individuals &lt;strong&gt;navigate today’s cybersecurity challenges with confidence, clarity, and control&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today marks the launch of our official blog—your go-to destination for &lt;strong&gt;field-tested strategies, implementation insights, and transparent thought leadership&lt;/strong&gt; across cybersecurity, network defense, and privacy-aware infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Modern security isn’t just about technology—it’s about &lt;strong&gt;trust, autonomy, and informed choices&lt;/strong&gt;. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.&lt;/p&gt;</description><link>https://blog.netwk.pro/2025/04/30/our-blog-is-live/</link> <pubDate>Mon, 05 May 2025 00:00:00 +0000</pubDate><source url="https://blog.netwk.pro/feed_rss_updated.xml">Network Pro™ Blog</source><guid isPermaLink="true">https://blog.netwk.pro/2025/04/30/our-blog-is-live/</guid> </item> </channel></rss>