@networkpro/web 0.12.3 → 0.12.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1552,9 +1552,9 @@ I promise not to use <code>git push -f</code>.</p>
1552
1552
  <hr />
1553
1553
  <div style="font-size: 12px; text-align: center;">
1554
1554
 
1555
- <p>Network Pro&trade;, the shield logo, and the "Locking Down Networks&trade;" slogan are <a href="../../../../../Legal/#trademark" target="_self">trademarks</a> of Network Pro Strategies.</p>
1555
+ <p>Network Pro&trade;, the shield logo, and the "Locking Down Networks&trade;" slogan are <a href="../../../../../legal/#trademark" target="_self">trademarks</a> of Network Pro Strategies.</p>
1556
1556
 
1557
- <p>Licensed under <a href="../../../../../Legal/#trademark" target="_self"><strong>CC BY 4.0</strong></a> and the <a href="../../../../../Legal/#trademark" target="_self"><strong>GNU GPL</strong></a>, as published by the <a rel="noopener noreferrer" href="https://fsf.org" target="_blank">Free Software Foundation</a>, either version 3 of the License, or (at your option) any later version.</p>
1557
+ <p>Licensed under <a href="../../../../../legal/#cc-by" target="_self"><strong>CC BY 4.0</strong></a> and the <a href="../../../../../legal/#gnu-gpl" target="_self"><strong>GNU GPL</strong></a>, as published by the <a rel="noopener noreferrer" href="https://fsf.org" target="_blank">Free Software Foundation</a>, either version 3 of the License, or (at your option) any later version.</p>
1558
1558
 
1559
1559
  </div>
1560
1560
 
@@ -1223,9 +1223,9 @@
1223
1223
  <hr />
1224
1224
  <div style="font-size: 12px; text-align: center;">
1225
1225
 
1226
- <p>Network Pro&trade;, the shield logo, and the "Locking Down Networks&trade;" slogan are <a href="../../../../../Legal/#trademark" target="_self">trademarks</a> of Network Pro Strategies.</p>
1226
+ <p>Network Pro&trade;, the shield logo, and the "Locking Down Networks&trade;" slogan are <a href="../../../../../legal/#trademark" target="_self">trademarks</a> of Network Pro Strategies.</p>
1227
1227
 
1228
- <p>Licensed under <a href="../../../../../Legal/#trademark" target="_self"><strong>CC BY 4.0</strong></a> and the <a href="../../../../../Legal/#trademark" target="_self"><strong>GNU GPL</strong></a>, as published by the <a rel="noopener noreferrer" href="https://fsf.org" target="_blank">Free Software Foundation</a>, either version 3 of the License, or (at your option) any later version.</p>
1228
+ <p>Licensed under <a href="../../../../../legal/#cc-by" target="_self"><strong>CC BY 4.0</strong></a> and the <a href="../../../../../legal/#gnu-gpl" target="_self"><strong>GNU GPL</strong></a>, as published by the <a rel="noopener noreferrer" href="https://fsf.org" target="_blank">Free Software Foundation</a>, either version 3 of the License, or (at your option) any later version.</p>
1229
1229
 
1230
1230
  </div>
1231
1231
 
@@ -1307,7 +1307,7 @@ version 1.4, available at
1307
1307
 
1308
1308
  <p>Network Pro&trade;, the shield logo, and the "Locking Down Networks&trade;" slogan are <a href="../legal/#trademark" target="_self">trademarks</a> of Network Pro Strategies.</p>
1309
1309
 
1310
- <p>Licensed under <a href="../legal/#trademark" target="_self"><strong>CC BY 4.0</strong></a> and the <a href="../legal/#trademark" target="_self"><strong>GNU GPL</strong></a>, as published by the <a rel="noopener noreferrer" href="https://fsf.org" target="_blank">Free Software Foundation</a>, either version 3 of the License, or (at your option) any later version.</p>
1310
+ <p>Licensed under <a href="../legal/#cc-by" target="_self"><strong>CC BY 4.0</strong></a> and the <a href="../legal/#gnu-gpl" target="_self"><strong>GNU GPL</strong></a>, as published by the <a rel="noopener noreferrer" href="https://fsf.org" target="_blank">Free Software Foundation</a>, either version 3 of the License, or (at your option) any later version.</p>
1311
1311
 
1312
1312
  </div>
1313
1313
 
@@ -1 +1 @@
1
- <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_created.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>Wed, 30 Apr 2025 22:00:43 -0000</pubDate> <lastBuildDate>Wed, 30 Apr 2025 22:00:43 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;p&gt;&lt;sup&gt;&lt;a href=&#34;https://spdx.dev/learn/handling-license-info/&#34;&gt;SPDX-License-Identifier&lt;/a&gt;:&lt;code&gt;CC-BY-4.0 OR GPL-3.0-or-later&lt;/code&gt;&lt;/sup&gt;&lt;/p&gt;&lt;h1&gt;We&#39;re Live!&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge.&lt;/h2&gt;&lt;p&gt;In an era where digital threats are escalating and data privacy is under constant siege, &lt;strong&gt;trust is built on transparency, integrity, and expertise&lt;/strong&gt;. At &lt;strong&gt;Network Pro Strategies&lt;/strong&gt;, we don’t just secure networks—we &lt;strong&gt;empower organizations and individuals to reclaim control over their digital environments&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today, we proudly launch our official blog: your trusted source for &lt;strong&gt;cutting-edge insights, hands-on implementation strategies, and privacy-first technology advocacy&lt;/strong&gt; in the world of cybersecurity and digital infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Security today is about more than firewalls and passwords. It’s about &lt;strong&gt;making informed decisions&lt;/strong&gt; that respect your data, your autonomy, and your mission. This blog is an extension of our commitment to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;💼 &lt;strong&gt;SMBs and enterprises&lt;/strong&gt; seeking scalable, resilient security architecture&lt;/li&gt;&lt;li&gt;🏛️ &lt;strong&gt;Government and regulated&lt;/strong&gt; sectors navigating risk, compliance, and national security concerns&lt;/li&gt;&lt;li&gt;👨‍💻 &lt;strong&gt;Privacy-aware professionals and open-source communities&lt;/strong&gt; looking for trusted, non-invasive software solutions&lt;/li&gt;&lt;/ul&gt;</description><link>https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;blockquote&gt;&lt;p&gt;&lt;div style=&#34;font-size: small;&#34;&gt;&lt;strong&gt;&lt;em&gt;Originally published on 1/4/2015 as &#34;Secure Secure Shell&#34; by &lt;a href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Mirrored to preserve information. Minor changes have been made. This is noted where applicable. Also see:&lt;br&gt;&lt;a href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;📝 &lt;strong&gt;&lt;em&gt;NOTE:&lt;/em&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/div&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 Jan 2015 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
1
+ <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_created.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>Wed, 30 Apr 2025 22:22:36 -0000</pubDate> <lastBuildDate>Wed, 30 Apr 2025 22:22:36 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;p&gt;&lt;sup&gt;&lt;a href=&#34;https://spdx.dev/learn/handling-license-info/&#34;&gt;SPDX-License-Identifier&lt;/a&gt;:&lt;code&gt;CC-BY-4.0 OR GPL-3.0-or-later&lt;/code&gt;&lt;/sup&gt;&lt;/p&gt;&lt;h1&gt;We&#39;re Live!&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge.&lt;/h2&gt;&lt;p&gt;In an era where digital threats are escalating and data privacy is under constant siege, &lt;strong&gt;trust is built on transparency, integrity, and expertise&lt;/strong&gt;. At &lt;strong&gt;Network Pro Strategies&lt;/strong&gt;, we don’t just secure networks—we &lt;strong&gt;empower organizations and individuals to reclaim control over their digital environments&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today, we proudly launch our official blog: your trusted source for &lt;strong&gt;cutting-edge insights, hands-on implementation strategies, and privacy-first technology advocacy&lt;/strong&gt; in the world of cybersecurity and digital infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Security today is about more than firewalls and passwords. It’s about &lt;strong&gt;making informed decisions&lt;/strong&gt; that respect your data, your autonomy, and your mission. This blog is an extension of our commitment to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;💼 &lt;strong&gt;SMBs and enterprises&lt;/strong&gt; seeking scalable, resilient security architecture&lt;/li&gt;&lt;li&gt;🏛️ &lt;strong&gt;Government and regulated&lt;/strong&gt; sectors navigating risk, compliance, and national security concerns&lt;/li&gt;&lt;li&gt;👨‍💻 &lt;strong&gt;Privacy-aware professionals and open-source communities&lt;/strong&gt; looking for trusted, non-invasive software solutions&lt;/li&gt;&lt;/ul&gt;</description><link>https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;blockquote&gt;&lt;p&gt;&lt;div style=&#34;font-size: small;&#34;&gt;&lt;strong&gt;&lt;em&gt;Originally published on 1/4/2015 as &#34;Secure Secure Shell&#34; by &lt;a href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Mirrored to preserve information. Minor changes have been made. This is noted where applicable. Also see:&lt;br&gt;&lt;a href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;📝 &lt;strong&gt;&lt;em&gt;NOTE:&lt;/em&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/div&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 Jan 2015 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
@@ -1 +1 @@
1
- <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_updated.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>Wed, 30 Apr 2025 22:00:43 -0000</pubDate> <lastBuildDate>Wed, 30 Apr 2025 22:00:43 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;p&gt;&lt;sup&gt;&lt;a href=&#34;https://spdx.dev/learn/handling-license-info/&#34;&gt;SPDX-License-Identifier&lt;/a&gt;:&lt;code&gt;CC-BY-4.0 OR GPL-3.0-or-later&lt;/code&gt;&lt;/sup&gt;&lt;/p&gt;&lt;h1&gt;We&#39;re Live!&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge.&lt;/h2&gt;&lt;p&gt;In an era where digital threats are escalating and data privacy is under constant siege, &lt;strong&gt;trust is built on transparency, integrity, and expertise&lt;/strong&gt;. At &lt;strong&gt;Network Pro Strategies&lt;/strong&gt;, we don’t just secure networks—we &lt;strong&gt;empower organizations and individuals to reclaim control over their digital environments&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today, we proudly launch our official blog: your trusted source for &lt;strong&gt;cutting-edge insights, hands-on implementation strategies, and privacy-first technology advocacy&lt;/strong&gt; in the world of cybersecurity and digital infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Security today is about more than firewalls and passwords. It’s about &lt;strong&gt;making informed decisions&lt;/strong&gt; that respect your data, your autonomy, and your mission. This blog is an extension of our commitment to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;💼 &lt;strong&gt;SMBs and enterprises&lt;/strong&gt; seeking scalable, resilient security architecture&lt;/li&gt;&lt;li&gt;🏛️ &lt;strong&gt;Government and regulated&lt;/strong&gt; sectors navigating risk, compliance, and national security concerns&lt;/li&gt;&lt;li&gt;👨‍💻 &lt;strong&gt;Privacy-aware professionals and open-source communities&lt;/strong&gt; looking for trusted, non-invasive software solutions&lt;/li&gt;&lt;/ul&gt;</description><link>https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 14:33:25 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;blockquote&gt;&lt;p&gt;&lt;div style=&#34;font-size: small;&#34;&gt;&lt;strong&gt;&lt;em&gt;Originally published on 1/4/2015 as &#34;Secure Secure Shell&#34; by &lt;a href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Mirrored to preserve information. Minor changes have been made. This is noted where applicable. Also see:&lt;br&gt;&lt;a href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;📝 &lt;strong&gt;&lt;em&gt;NOTE:&lt;/em&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/div&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
1
+ <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_updated.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>Wed, 30 Apr 2025 22:22:36 -0000</pubDate> <lastBuildDate>Wed, 30 Apr 2025 22:22:36 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;p&gt;&lt;sup&gt;&lt;a href=&#34;https://spdx.dev/learn/handling-license-info/&#34;&gt;SPDX-License-Identifier&lt;/a&gt;:&lt;code&gt;CC-BY-4.0 OR GPL-3.0-or-later&lt;/code&gt;&lt;/sup&gt;&lt;/p&gt;&lt;h1&gt;We&#39;re Live!&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge.&lt;/h2&gt;&lt;p&gt;In an era where digital threats are escalating and data privacy is under constant siege, &lt;strong&gt;trust is built on transparency, integrity, and expertise&lt;/strong&gt;. At &lt;strong&gt;Network Pro Strategies&lt;/strong&gt;, we don’t just secure networks—we &lt;strong&gt;empower organizations and individuals to reclaim control over their digital environments&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today, we proudly launch our official blog: your trusted source for &lt;strong&gt;cutting-edge insights, hands-on implementation strategies, and privacy-first technology advocacy&lt;/strong&gt; in the world of cybersecurity and digital infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Security today is about more than firewalls and passwords. It’s about &lt;strong&gt;making informed decisions&lt;/strong&gt; that respect your data, your autonomy, and your mission. This blog is an extension of our commitment to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;💼 &lt;strong&gt;SMBs and enterprises&lt;/strong&gt; seeking scalable, resilient security architecture&lt;/li&gt;&lt;li&gt;🏛️ &lt;strong&gt;Government and regulated&lt;/strong&gt; sectors navigating risk, compliance, and national security concerns&lt;/li&gt;&lt;li&gt;👨‍💻 &lt;strong&gt;Privacy-aware professionals and open-source communities&lt;/strong&gt; looking for trusted, non-invasive software solutions&lt;/li&gt;&lt;/ul&gt;</description><link>https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 14:33:25 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;blockquote&gt;&lt;p&gt;&lt;div style=&#34;font-size: small;&#34;&gt;&lt;strong&gt;&lt;em&gt;Originally published on 1/4/2015 as &#34;Secure Secure Shell&#34; by &lt;a href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Mirrored to preserve information. Minor changes have been made. This is noted where applicable. Also see:&lt;br&gt;&lt;a href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;📝 &lt;strong&gt;&lt;em&gt;NOTE:&lt;/em&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/div&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
package/docs/index.html CHANGED
@@ -1183,9 +1183,9 @@
1183
1183
  <hr />
1184
1184
  <div style="font-size: 12px; text-align: center;">
1185
1185
 
1186
- <p>Network Pro&trade;, the shield logo, and the "Locking Down Networks&trade;" slogan are <a href="./Legal/#trademark" target="_self">trademarks</a> of Network Pro Strategies.</p>
1186
+ <p>Network Pro&trade;, the shield logo, and the "Locking Down Networks&trade;" slogan are <a href="./legal/#trademark" target="_self">trademarks</a> of Network Pro Strategies.</p>
1187
1187
 
1188
- <p>Licensed under <a href="./Legal/#trademark" target="_self"><strong>CC BY 4.0</strong></a> and the <a href="./Legal/#trademark" target="_self"><strong>GNU GPL</strong></a>, as published by the <a rel="noopener noreferrer" href="https://fsf.org" target="_blank">Free Software Foundation</a>, either version 3 of the License, or (at your option) any later version.</p>
1188
+ <p>Licensed under <a href="./legal/#cc-by" target="_self"><strong>CC BY 4.0</strong></a> and the <a href="./legal/#gnu-gpl" target="_self"><strong>GNU GPL</strong></a>, as published by the <a rel="noopener noreferrer" href="https://fsf.org" target="_blank">Free Software Foundation</a>, either version 3 of the License, or (at your option) any later version.</p>
1189
1189
 
1190
1190
  </div>
1191
1191
 
@@ -1413,7 +1413,7 @@
1413
1413
 
1414
1414
  <p>Network Pro&trade;, the shield logo, and the "Locking Down Networks&trade;" slogan are <a href="../legal/#trademark" target="_self">trademarks</a> of Network Pro Strategies.</p>
1415
1415
 
1416
- <p>Licensed under <a href="../legal/#trademark" target="_self"><strong>CC BY 4.0</strong></a> and the <a href="../legal/#trademark" target="_self"><strong>GNU GPL</strong></a>, as published by the <a rel="noopener noreferrer" href="https://fsf.org" target="_blank">Free Software Foundation</a>, either version 3 of the License, or (at your option) any later version.</p>
1416
+ <p>Licensed under <a href="../legal/#cc-by" target="_self"><strong>CC BY 4.0</strong></a> and the <a href="../legal/#gnu-gpl" target="_self"><strong>GNU GPL</strong></a>, as published by the <a rel="noopener noreferrer" href="https://fsf.org" target="_blank">Free Software Foundation</a>, either version 3 of the License, or (at your option) any later version.</p>
1417
1417
 
1418
1418
  </div>
1419
1419
 
@@ -1453,7 +1453,7 @@ periodically for updates.</p>
1453
1453
 
1454
1454
  <p>Network Pro&trade;, the shield logo, and the "Locking Down Networks&trade;" slogan are <a href="../legal/#trademark" target="_self">trademarks</a> of Network Pro Strategies.</p>
1455
1455
 
1456
- <p>Licensed under <a href="../legal/#trademark" target="_self"><strong>CC BY 4.0</strong></a> and the <a href="../legal/#trademark" target="_self"><strong>GNU GPL</strong></a>, as published by the <a rel="noopener noreferrer" href="https://fsf.org" target="_blank">Free Software Foundation</a>, either version 3 of the License, or (at your option) any later version.</p>
1456
+ <p>Licensed under <a href="../legal/#cc-by" target="_self"><strong>CC BY 4.0</strong></a> and the <a href="../legal/#gnu-gpl" target="_self"><strong>GNU GPL</strong></a>, as published by the <a rel="noopener noreferrer" href="https://fsf.org" target="_blank">Free Software Foundation</a>, either version 3 of the License, or (at your option) any later version.</p>
1457
1457
 
1458
1458
  </div>
1459
1459
 
@@ -1382,7 +1382,7 @@
1382
1382
 
1383
1383
  <p>Network Pro&trade;, the shield logo, and the "Locking Down Networks&trade;" slogan are <a href="../legal/#trademark" target="_self">trademarks</a> of Network Pro Strategies.</p>
1384
1384
 
1385
- <p>Licensed under <a href="../legal/#trademark" target="_self"><strong>CC BY 4.0</strong></a> and the <a href="../legal/#trademark" target="_self"><strong>GNU GPL</strong></a>, as published by the <a rel="noopener noreferrer" href="https://fsf.org" target="_blank">Free Software Foundation</a>, either version 3 of the License, or (at your option) any later version.</p>
1385
+ <p>Licensed under <a href="../legal/#cc-by" target="_self"><strong>CC BY 4.0</strong></a> and the <a href="../legal/#gnu-gpl" target="_self"><strong>GNU GPL</strong></a>, as published by the <a rel="noopener noreferrer" href="https://fsf.org" target="_blank">Free Software Foundation</a>, either version 3 of the License, or (at your option) any later version.</p>
1386
1386
 
1387
1387
  </div>
1388
1388
 
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@networkpro/web",
3
3
  "sideEffects": false,
4
- "version": "0.12.3",
4
+ "version": "0.12.5",
5
5
  "private": false,
6
6
  "description": "Locking Down Networks, Unlocking Confidence | Security, Networking, Privacy — Network Pro Strategies",
7
7
  "keywords": [