@networkpro/web 0.12.3 → 0.12.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1 @@
1
- <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_created.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>Wed, 30 Apr 2025 22:00:43 -0000</pubDate> <lastBuildDate>Wed, 30 Apr 2025 22:00:43 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;p&gt;&lt;sup&gt;&lt;a href=&#34;https://spdx.dev/learn/handling-license-info/&#34;&gt;SPDX-License-Identifier&lt;/a&gt;:&lt;code&gt;CC-BY-4.0 OR GPL-3.0-or-later&lt;/code&gt;&lt;/sup&gt;&lt;/p&gt;&lt;h1&gt;We&#39;re Live!&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge.&lt;/h2&gt;&lt;p&gt;In an era where digital threats are escalating and data privacy is under constant siege, &lt;strong&gt;trust is built on transparency, integrity, and expertise&lt;/strong&gt;. At &lt;strong&gt;Network Pro Strategies&lt;/strong&gt;, we don’t just secure networks—we &lt;strong&gt;empower organizations and individuals to reclaim control over their digital environments&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today, we proudly launch our official blog: your trusted source for &lt;strong&gt;cutting-edge insights, hands-on implementation strategies, and privacy-first technology advocacy&lt;/strong&gt; in the world of cybersecurity and digital infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Security today is about more than firewalls and passwords. It’s about &lt;strong&gt;making informed decisions&lt;/strong&gt; that respect your data, your autonomy, and your mission. This blog is an extension of our commitment to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;💼 &lt;strong&gt;SMBs and enterprises&lt;/strong&gt; seeking scalable, resilient security architecture&lt;/li&gt;&lt;li&gt;🏛️ &lt;strong&gt;Government and regulated&lt;/strong&gt; sectors navigating risk, compliance, and national security concerns&lt;/li&gt;&lt;li&gt;👨‍💻 &lt;strong&gt;Privacy-aware professionals and open-source communities&lt;/strong&gt; looking for trusted, non-invasive software solutions&lt;/li&gt;&lt;/ul&gt;</description><link>https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;blockquote&gt;&lt;p&gt;&lt;div style=&#34;font-size: small;&#34;&gt;&lt;strong&gt;&lt;em&gt;Originally published on 1/4/2015 as &#34;Secure Secure Shell&#34; by &lt;a href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Mirrored to preserve information. Minor changes have been made. This is noted where applicable. Also see:&lt;br&gt;&lt;a href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;📝 &lt;strong&gt;&lt;em&gt;NOTE:&lt;/em&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/div&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 Jan 2015 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
1
+ <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_created.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>Wed, 30 Apr 2025 22:08:54 -0000</pubDate> <lastBuildDate>Wed, 30 Apr 2025 22:08:54 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;p&gt;&lt;sup&gt;&lt;a href=&#34;https://spdx.dev/learn/handling-license-info/&#34;&gt;SPDX-License-Identifier&lt;/a&gt;:&lt;code&gt;CC-BY-4.0 OR GPL-3.0-or-later&lt;/code&gt;&lt;/sup&gt;&lt;/p&gt;&lt;h1&gt;We&#39;re Live!&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge.&lt;/h2&gt;&lt;p&gt;In an era where digital threats are escalating and data privacy is under constant siege, &lt;strong&gt;trust is built on transparency, integrity, and expertise&lt;/strong&gt;. At &lt;strong&gt;Network Pro Strategies&lt;/strong&gt;, we don’t just secure networks—we &lt;strong&gt;empower organizations and individuals to reclaim control over their digital environments&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today, we proudly launch our official blog: your trusted source for &lt;strong&gt;cutting-edge insights, hands-on implementation strategies, and privacy-first technology advocacy&lt;/strong&gt; in the world of cybersecurity and digital infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Security today is about more than firewalls and passwords. It’s about &lt;strong&gt;making informed decisions&lt;/strong&gt; that respect your data, your autonomy, and your mission. This blog is an extension of our commitment to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;💼 &lt;strong&gt;SMBs and enterprises&lt;/strong&gt; seeking scalable, resilient security architecture&lt;/li&gt;&lt;li&gt;🏛️ &lt;strong&gt;Government and regulated&lt;/strong&gt; sectors navigating risk, compliance, and national security concerns&lt;/li&gt;&lt;li&gt;👨‍💻 &lt;strong&gt;Privacy-aware professionals and open-source communities&lt;/strong&gt; looking for trusted, non-invasive software solutions&lt;/li&gt;&lt;/ul&gt;</description><link>https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;blockquote&gt;&lt;p&gt;&lt;div style=&#34;font-size: small;&#34;&gt;&lt;strong&gt;&lt;em&gt;Originally published on 1/4/2015 as &#34;Secure Secure Shell&#34; by &lt;a href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Mirrored to preserve information. Minor changes have been made. This is noted where applicable. Also see:&lt;br&gt;&lt;a href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;📝 &lt;strong&gt;&lt;em&gt;NOTE:&lt;/em&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/div&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 Jan 2015 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
@@ -1 +1 @@
1
- <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_updated.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>Wed, 30 Apr 2025 22:00:43 -0000</pubDate> <lastBuildDate>Wed, 30 Apr 2025 22:00:43 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;p&gt;&lt;sup&gt;&lt;a href=&#34;https://spdx.dev/learn/handling-license-info/&#34;&gt;SPDX-License-Identifier&lt;/a&gt;:&lt;code&gt;CC-BY-4.0 OR GPL-3.0-or-later&lt;/code&gt;&lt;/sup&gt;&lt;/p&gt;&lt;h1&gt;We&#39;re Live!&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge.&lt;/h2&gt;&lt;p&gt;In an era where digital threats are escalating and data privacy is under constant siege, &lt;strong&gt;trust is built on transparency, integrity, and expertise&lt;/strong&gt;. At &lt;strong&gt;Network Pro Strategies&lt;/strong&gt;, we don’t just secure networks—we &lt;strong&gt;empower organizations and individuals to reclaim control over their digital environments&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today, we proudly launch our official blog: your trusted source for &lt;strong&gt;cutting-edge insights, hands-on implementation strategies, and privacy-first technology advocacy&lt;/strong&gt; in the world of cybersecurity and digital infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Security today is about more than firewalls and passwords. It’s about &lt;strong&gt;making informed decisions&lt;/strong&gt; that respect your data, your autonomy, and your mission. This blog is an extension of our commitment to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;💼 &lt;strong&gt;SMBs and enterprises&lt;/strong&gt; seeking scalable, resilient security architecture&lt;/li&gt;&lt;li&gt;🏛️ &lt;strong&gt;Government and regulated&lt;/strong&gt; sectors navigating risk, compliance, and national security concerns&lt;/li&gt;&lt;li&gt;👨‍💻 &lt;strong&gt;Privacy-aware professionals and open-source communities&lt;/strong&gt; looking for trusted, non-invasive software solutions&lt;/li&gt;&lt;/ul&gt;</description><link>https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 14:33:25 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;blockquote&gt;&lt;p&gt;&lt;div style=&#34;font-size: small;&#34;&gt;&lt;strong&gt;&lt;em&gt;Originally published on 1/4/2015 as &#34;Secure Secure Shell&#34; by &lt;a href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Mirrored to preserve information. Minor changes have been made. This is noted where applicable. Also see:&lt;br&gt;&lt;a href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;📝 &lt;strong&gt;&lt;em&gt;NOTE:&lt;/em&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/div&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
1
+ <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_updated.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>Wed, 30 Apr 2025 22:08:54 -0000</pubDate> <lastBuildDate>Wed, 30 Apr 2025 22:08:54 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;p&gt;&lt;sup&gt;&lt;a href=&#34;https://spdx.dev/learn/handling-license-info/&#34;&gt;SPDX-License-Identifier&lt;/a&gt;:&lt;code&gt;CC-BY-4.0 OR GPL-3.0-or-later&lt;/code&gt;&lt;/sup&gt;&lt;/p&gt;&lt;h1&gt;We&#39;re Live!&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge.&lt;/h2&gt;&lt;p&gt;In an era where digital threats are escalating and data privacy is under constant siege, &lt;strong&gt;trust is built on transparency, integrity, and expertise&lt;/strong&gt;. At &lt;strong&gt;Network Pro Strategies&lt;/strong&gt;, we don’t just secure networks—we &lt;strong&gt;empower organizations and individuals to reclaim control over their digital environments&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today, we proudly launch our official blog: your trusted source for &lt;strong&gt;cutting-edge insights, hands-on implementation strategies, and privacy-first technology advocacy&lt;/strong&gt; in the world of cybersecurity and digital infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Security today is about more than firewalls and passwords. It’s about &lt;strong&gt;making informed decisions&lt;/strong&gt; that respect your data, your autonomy, and your mission. This blog is an extension of our commitment to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;💼 &lt;strong&gt;SMBs and enterprises&lt;/strong&gt; seeking scalable, resilient security architecture&lt;/li&gt;&lt;li&gt;🏛️ &lt;strong&gt;Government and regulated&lt;/strong&gt; sectors navigating risk, compliance, and national security concerns&lt;/li&gt;&lt;li&gt;👨‍💻 &lt;strong&gt;Privacy-aware professionals and open-source communities&lt;/strong&gt; looking for trusted, non-invasive software solutions&lt;/li&gt;&lt;/ul&gt;</description><link>https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 14:33:25 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;blockquote&gt;&lt;p&gt;&lt;div style=&#34;font-size: small;&#34;&gt;&lt;strong&gt;&lt;em&gt;Originally published on 1/4/2015 as &#34;Secure Secure Shell&#34; by &lt;a href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Mirrored to preserve information. Minor changes have been made. This is noted where applicable. Also see:&lt;br&gt;&lt;a href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;📝 &lt;strong&gt;&lt;em&gt;NOTE:&lt;/em&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/div&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
package/docs/index.html CHANGED
@@ -1183,9 +1183,9 @@
1183
1183
  <hr />
1184
1184
  <div style="font-size: 12px; text-align: center;">
1185
1185
 
1186
- <p>Network Pro&trade;, the shield logo, and the "Locking Down Networks&trade;" slogan are <a href="./Legal/#trademark" target="_self">trademarks</a> of Network Pro Strategies.</p>
1186
+ <p>Network Pro&trade;, the shield logo, and the "Locking Down Networks&trade;" slogan are <a href="./legal/#trademark" target="_self">trademarks</a> of Network Pro Strategies.</p>
1187
1187
 
1188
- <p>Licensed under <a href="./Legal/#trademark" target="_self"><strong>CC BY 4.0</strong></a> and the <a href="./Legal/#trademark" target="_self"><strong>GNU GPL</strong></a>, as published by the <a rel="noopener noreferrer" href="https://fsf.org" target="_blank">Free Software Foundation</a>, either version 3 of the License, or (at your option) any later version.</p>
1188
+ <p>Licensed under <a href="./legal/#trademark" target="_self"><strong>CC BY 4.0</strong></a> and the <a href="./legal/#trademark" target="_self"><strong>GNU GPL</strong></a>, as published by the <a rel="noopener noreferrer" href="https://fsf.org" target="_blank">Free Software Foundation</a>, either version 3 of the License, or (at your option) any later version.</p>
1189
1189
 
1190
1190
  </div>
1191
1191
 
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@networkpro/web",
3
3
  "sideEffects": false,
4
- "version": "0.12.3",
4
+ "version": "0.12.4",
5
5
  "private": false,
6
6
  "description": "Locking Down Networks, Unlocking Confidence | Security, Networking, Privacy — Network Pro Strategies",
7
7
  "keywords": [