@networkpro/web 0.12.4 → 0.12.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/docs/blog/2015/01/04/secure-secure-shell/index.html +2 -2
- package/docs/blog/2025/04/30/our-blog-is-live/index.html +2 -2
- package/docs/conduct/index.html +1 -1
- package/docs/feed_rss_created.xml +1 -1
- package/docs/feed_rss_updated.xml +1 -1
- package/docs/index.html +1 -1
- package/docs/privacy/index.html +1 -1
- package/docs/terms-conditions/index.html +1 -1
- package/docs/terms-use/index.html +1 -1
- package/package.json +1 -1
|
@@ -1552,9 +1552,9 @@ I promise not to use <code>git push -f</code>.</p>
|
|
|
1552
1552
|
<hr />
|
|
1553
1553
|
<div style="font-size: 12px; text-align: center;">
|
|
1554
1554
|
|
|
1555
|
-
<p>Network Pro™, the shield logo, and the "Locking Down Networks™" slogan are <a href="../../../../../
|
|
1555
|
+
<p>Network Pro™, the shield logo, and the "Locking Down Networks™" slogan are <a href="../../../../../legal/#trademark" target="_self">trademarks</a> of Network Pro Strategies.</p>
|
|
1556
1556
|
|
|
1557
|
-
<p>Licensed under <a href="../../../../../
|
|
1557
|
+
<p>Licensed under <a href="../../../../../legal/#cc-by" target="_self"><strong>CC BY 4.0</strong></a> and the <a href="../../../../../legal/#gnu-gpl" target="_self"><strong>GNU GPL</strong></a>, as published by the <a rel="noopener noreferrer" href="https://fsf.org" target="_blank">Free Software Foundation</a>, either version 3 of the License, or (at your option) any later version.</p>
|
|
1558
1558
|
|
|
1559
1559
|
</div>
|
|
1560
1560
|
|
|
@@ -1223,9 +1223,9 @@
|
|
|
1223
1223
|
<hr />
|
|
1224
1224
|
<div style="font-size: 12px; text-align: center;">
|
|
1225
1225
|
|
|
1226
|
-
<p>Network Pro™, the shield logo, and the "Locking Down Networks™" slogan are <a href="../../../../../
|
|
1226
|
+
<p>Network Pro™, the shield logo, and the "Locking Down Networks™" slogan are <a href="../../../../../legal/#trademark" target="_self">trademarks</a> of Network Pro Strategies.</p>
|
|
1227
1227
|
|
|
1228
|
-
<p>Licensed under <a href="../../../../../
|
|
1228
|
+
<p>Licensed under <a href="../../../../../legal/#cc-by" target="_self"><strong>CC BY 4.0</strong></a> and the <a href="../../../../../legal/#gnu-gpl" target="_self"><strong>GNU GPL</strong></a>, as published by the <a rel="noopener noreferrer" href="https://fsf.org" target="_blank">Free Software Foundation</a>, either version 3 of the License, or (at your option) any later version.</p>
|
|
1229
1229
|
|
|
1230
1230
|
</div>
|
|
1231
1231
|
|
package/docs/conduct/index.html
CHANGED
|
@@ -1307,7 +1307,7 @@ version 1.4, available at
|
|
|
1307
1307
|
|
|
1308
1308
|
<p>Network Pro™, the shield logo, and the "Locking Down Networks™" slogan are <a href="../legal/#trademark" target="_self">trademarks</a> of Network Pro Strategies.</p>
|
|
1309
1309
|
|
|
1310
|
-
<p>Licensed under <a href="../legal/#
|
|
1310
|
+
<p>Licensed under <a href="../legal/#cc-by" target="_self"><strong>CC BY 4.0</strong></a> and the <a href="../legal/#gnu-gpl" target="_self"><strong>GNU GPL</strong></a>, as published by the <a rel="noopener noreferrer" href="https://fsf.org" target="_blank">Free Software Foundation</a>, either version 3 of the License, or (at your option) any later version.</p>
|
|
1311
1311
|
|
|
1312
1312
|
</div>
|
|
1313
1313
|
|
|
@@ -1 +1 @@
|
|
|
1
|
-
<?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_created.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>Wed, 30 Apr 2025 22:
|
|
1
|
+
<?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_created.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>Wed, 30 Apr 2025 22:22:36 -0000</pubDate> <lastBuildDate>Wed, 30 Apr 2025 22:22:36 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description><p><sup><a href="https://spdx.dev/learn/handling-license-info/">SPDX-License-Identifier</a>:<code>CC-BY-4.0 OR GPL-3.0-or-later</code></sup></p><h1>We're Live!</h1><!-- markdownlint-disable-file --><h2>🛡️ Welcome to the Network Pro&trade; Blog: Cybersecurity. Privacy. Open Knowledge.</h2><p>In an era where digital threats are escalating and data privacy is under constant siege, <strong>trust is built on transparency, integrity, and expertise</strong>. At <strong>Network Pro Strategies</strong>, we don’t just secure networks—we <strong>empower organizations and individuals to reclaim control over their digital environments</strong>.</p><p>Today, we proudly launch our official blog: your trusted source for <strong>cutting-edge insights, hands-on implementation strategies, and privacy-first technology advocacy</strong> in the world of cybersecurity and digital infrastructure.</p><hr><h3>📡 Why This Blog Exists</h3><p>Security today is about more than firewalls and passwords. It’s about <strong>making informed decisions</strong> that respect your data, your autonomy, and your mission. This blog is an extension of our commitment to:</p><ul><li>💼 <strong>SMBs and enterprises</strong> seeking scalable, resilient security architecture</li><li>🏛️ <strong>Government and regulated</strong> sectors navigating risk, compliance, and national security concerns</li><li>👨💻 <strong>Privacy-aware professionals and open-source communities</strong> looking for trusted, non-invasive software solutions</li></ul></description><link>https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description><h1>Secure Secure Shell</h1><!-- markdownlint-disable-file --><blockquote><p><div style="font-size: small;"><strong><em>Originally published on 1/4/2015 as "Secure Secure Shell" by <a href="https://github.com/stribika">stribika</a> at:<br>https://blog.stribik.technology/2015/01/04/secure-secure-shell.html</em></strong></p><p>Mirrored to preserve information. Minor changes have been made. This is noted where applicable. Also see:<br><a href="https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices">https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices</a></p><blockquote><p>📝 <strong><em>NOTE:</em></strong> Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.</div></p></blockquote></blockquote><ul><li><a href="#sshd">Skip to the good part.</a></li></ul><p>You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.</p><p>TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.</p></description><link>https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 Jan 2015 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
|
|
@@ -1 +1 @@
|
|
|
1
|
-
<?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_updated.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>Wed, 30 Apr 2025 22:
|
|
1
|
+
<?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_updated.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>Wed, 30 Apr 2025 22:22:36 -0000</pubDate> <lastBuildDate>Wed, 30 Apr 2025 22:22:36 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description><p><sup><a href="https://spdx.dev/learn/handling-license-info/">SPDX-License-Identifier</a>:<code>CC-BY-4.0 OR GPL-3.0-or-later</code></sup></p><h1>We're Live!</h1><!-- markdownlint-disable-file --><h2>🛡️ Welcome to the Network Pro&trade; Blog: Cybersecurity. Privacy. Open Knowledge.</h2><p>In an era where digital threats are escalating and data privacy is under constant siege, <strong>trust is built on transparency, integrity, and expertise</strong>. At <strong>Network Pro Strategies</strong>, we don’t just secure networks—we <strong>empower organizations and individuals to reclaim control over their digital environments</strong>.</p><p>Today, we proudly launch our official blog: your trusted source for <strong>cutting-edge insights, hands-on implementation strategies, and privacy-first technology advocacy</strong> in the world of cybersecurity and digital infrastructure.</p><hr><h3>📡 Why This Blog Exists</h3><p>Security today is about more than firewalls and passwords. It’s about <strong>making informed decisions</strong> that respect your data, your autonomy, and your mission. This blog is an extension of our commitment to:</p><ul><li>💼 <strong>SMBs and enterprises</strong> seeking scalable, resilient security architecture</li><li>🏛️ <strong>Government and regulated</strong> sectors navigating risk, compliance, and national security concerns</li><li>👨💻 <strong>Privacy-aware professionals and open-source communities</strong> looking for trusted, non-invasive software solutions</li></ul></description><link>https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 14:33:25 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description><h1>Secure Secure Shell</h1><!-- markdownlint-disable-file --><blockquote><p><div style="font-size: small;"><strong><em>Originally published on 1/4/2015 as "Secure Secure Shell" by <a href="https://github.com/stribika">stribika</a> at:<br>https://blog.stribik.technology/2015/01/04/secure-secure-shell.html</em></strong></p><p>Mirrored to preserve information. Minor changes have been made. This is noted where applicable. Also see:<br><a href="https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices">https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices</a></p><blockquote><p>📝 <strong><em>NOTE:</em></strong> Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.</div></p></blockquote></blockquote><ul><li><a href="#sshd">Skip to the good part.</a></li></ul><p>You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.</p><p>TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.</p></description><link>https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
|
package/docs/index.html
CHANGED
|
@@ -1185,7 +1185,7 @@
|
|
|
1185
1185
|
|
|
1186
1186
|
<p>Network Pro™, the shield logo, and the "Locking Down Networks™" slogan are <a href="./legal/#trademark" target="_self">trademarks</a> of Network Pro Strategies.</p>
|
|
1187
1187
|
|
|
1188
|
-
<p>Licensed under <a href="./legal/#
|
|
1188
|
+
<p>Licensed under <a href="./legal/#cc-by" target="_self"><strong>CC BY 4.0</strong></a> and the <a href="./legal/#gnu-gpl" target="_self"><strong>GNU GPL</strong></a>, as published by the <a rel="noopener noreferrer" href="https://fsf.org" target="_blank">Free Software Foundation</a>, either version 3 of the License, or (at your option) any later version.</p>
|
|
1189
1189
|
|
|
1190
1190
|
</div>
|
|
1191
1191
|
|
package/docs/privacy/index.html
CHANGED
|
@@ -1413,7 +1413,7 @@
|
|
|
1413
1413
|
|
|
1414
1414
|
<p>Network Pro™, the shield logo, and the "Locking Down Networks™" slogan are <a href="../legal/#trademark" target="_self">trademarks</a> of Network Pro Strategies.</p>
|
|
1415
1415
|
|
|
1416
|
-
<p>Licensed under <a href="../legal/#
|
|
1416
|
+
<p>Licensed under <a href="../legal/#cc-by" target="_self"><strong>CC BY 4.0</strong></a> and the <a href="../legal/#gnu-gpl" target="_self"><strong>GNU GPL</strong></a>, as published by the <a rel="noopener noreferrer" href="https://fsf.org" target="_blank">Free Software Foundation</a>, either version 3 of the License, or (at your option) any later version.</p>
|
|
1417
1417
|
|
|
1418
1418
|
</div>
|
|
1419
1419
|
|
|
@@ -1453,7 +1453,7 @@ periodically for updates.</p>
|
|
|
1453
1453
|
|
|
1454
1454
|
<p>Network Pro™, the shield logo, and the "Locking Down Networks™" slogan are <a href="../legal/#trademark" target="_self">trademarks</a> of Network Pro Strategies.</p>
|
|
1455
1455
|
|
|
1456
|
-
<p>Licensed under <a href="../legal/#
|
|
1456
|
+
<p>Licensed under <a href="../legal/#cc-by" target="_self"><strong>CC BY 4.0</strong></a> and the <a href="../legal/#gnu-gpl" target="_self"><strong>GNU GPL</strong></a>, as published by the <a rel="noopener noreferrer" href="https://fsf.org" target="_blank">Free Software Foundation</a>, either version 3 of the License, or (at your option) any later version.</p>
|
|
1457
1457
|
|
|
1458
1458
|
</div>
|
|
1459
1459
|
|
|
@@ -1382,7 +1382,7 @@
|
|
|
1382
1382
|
|
|
1383
1383
|
<p>Network Pro™, the shield logo, and the "Locking Down Networks™" slogan are <a href="../legal/#trademark" target="_self">trademarks</a> of Network Pro Strategies.</p>
|
|
1384
1384
|
|
|
1385
|
-
<p>Licensed under <a href="../legal/#
|
|
1385
|
+
<p>Licensed under <a href="../legal/#cc-by" target="_self"><strong>CC BY 4.0</strong></a> and the <a href="../legal/#gnu-gpl" target="_self"><strong>GNU GPL</strong></a>, as published by the <a rel="noopener noreferrer" href="https://fsf.org" target="_blank">Free Software Foundation</a>, either version 3 of the License, or (at your option) any later version.</p>
|
|
1386
1386
|
|
|
1387
1387
|
</div>
|
|
1388
1388
|
|
package/package.json
CHANGED