@networkpro/web 0.12.5 → 0.13.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (174) hide show
  1. package/package.json +16 -12
  2. package/404.html +0 -84
  3. package/CNAME +0 -1
  4. package/LICENSE.md +0 -296
  5. package/README.md +0 -105
  6. package/about.html +0 -316
  7. package/about.html.br +0 -0
  8. package/about.html.gz +0 -0
  9. package/css/default.css +0 -1
  10. package/css/normalize.css +0 -1
  11. package/css/style.css +0 -1
  12. package/docs/404.html +0 -1187
  13. package/docs/assets/external/avatars.githubusercontent.com/u/170266279.png +0 -0
  14. package/docs/assets/external/github.com/netwk-pro/netwk-pro.github.io/actions/workflows/upload.yml/badge.svg +0 -35
  15. package/docs/assets/external/github.com/netwk-pro/netwk-pro.github.io/actions/workflows/webpack.yml/badge.56403977.svg +0 -35
  16. package/docs/assets/external/img.shields.io/badge/Contributor Covenant-2.1-4baaaa.svg +0 -1
  17. package/docs/assets/external/img.shields.io/badge/code_style-prettier-ff69b4.3e3c11fa.svg +0 -1
  18. package/docs/assets/external/img.shields.io/npm/v/@networkpro/web.5485edf3.svg +0 -1
  19. package/docs/assets/external/mirrors.creativecommons.org/presskit/icons/by.svg +0 -20
  20. package/docs/assets/external/mirrors.creativecommons.org/presskit/icons/cc.svg +0 -27
  21. package/docs/assets/external/raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/assets/nsa-happy-dance.png +0 -0
  22. package/docs/assets/external/raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/img/qr/pgp-github.png +0 -0
  23. package/docs/assets/external/raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/img/qr/pgp-support.png +0 -0
  24. package/docs/assets/external/raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/img/qr/vcard.png +0 -0
  25. package/docs/assets/external/unpkg.com/mermaid@11/dist/mermaid.min.js +0 -2607
  26. package/docs/assets/images/favicon.png +0 -0
  27. package/docs/assets/javascripts/bundle.c8b220af.min.js +0 -16
  28. package/docs/assets/javascripts/bundle.c8b220af.min.js.map +0 -7
  29. package/docs/assets/javascripts/lunr/min/lunr.ar.min.js +0 -1
  30. package/docs/assets/javascripts/lunr/min/lunr.da.min.js +0 -18
  31. package/docs/assets/javascripts/lunr/min/lunr.de.min.js +0 -18
  32. package/docs/assets/javascripts/lunr/min/lunr.du.min.js +0 -18
  33. package/docs/assets/javascripts/lunr/min/lunr.el.min.js +0 -1
  34. package/docs/assets/javascripts/lunr/min/lunr.es.min.js +0 -18
  35. package/docs/assets/javascripts/lunr/min/lunr.fi.min.js +0 -18
  36. package/docs/assets/javascripts/lunr/min/lunr.fr.min.js +0 -18
  37. package/docs/assets/javascripts/lunr/min/lunr.he.min.js +0 -1
  38. package/docs/assets/javascripts/lunr/min/lunr.hi.min.js +0 -1
  39. package/docs/assets/javascripts/lunr/min/lunr.hu.min.js +0 -18
  40. package/docs/assets/javascripts/lunr/min/lunr.hy.min.js +0 -1
  41. package/docs/assets/javascripts/lunr/min/lunr.it.min.js +0 -18
  42. package/docs/assets/javascripts/lunr/min/lunr.ja.min.js +0 -1
  43. package/docs/assets/javascripts/lunr/min/lunr.jp.min.js +0 -1
  44. package/docs/assets/javascripts/lunr/min/lunr.kn.min.js +0 -1
  45. package/docs/assets/javascripts/lunr/min/lunr.ko.min.js +0 -1
  46. package/docs/assets/javascripts/lunr/min/lunr.multi.min.js +0 -1
  47. package/docs/assets/javascripts/lunr/min/lunr.nl.min.js +0 -18
  48. package/docs/assets/javascripts/lunr/min/lunr.no.min.js +0 -18
  49. package/docs/assets/javascripts/lunr/min/lunr.pt.min.js +0 -18
  50. package/docs/assets/javascripts/lunr/min/lunr.ro.min.js +0 -18
  51. package/docs/assets/javascripts/lunr/min/lunr.ru.min.js +0 -18
  52. package/docs/assets/javascripts/lunr/min/lunr.sa.min.js +0 -1
  53. package/docs/assets/javascripts/lunr/min/lunr.stemmer.support.min.js +0 -1
  54. package/docs/assets/javascripts/lunr/min/lunr.sv.min.js +0 -18
  55. package/docs/assets/javascripts/lunr/min/lunr.ta.min.js +0 -1
  56. package/docs/assets/javascripts/lunr/min/lunr.te.min.js +0 -1
  57. package/docs/assets/javascripts/lunr/min/lunr.th.min.js +0 -1
  58. package/docs/assets/javascripts/lunr/min/lunr.tr.min.js +0 -18
  59. package/docs/assets/javascripts/lunr/min/lunr.vi.min.js +0 -1
  60. package/docs/assets/javascripts/lunr/min/lunr.zh.min.js +0 -1
  61. package/docs/assets/javascripts/lunr/tinyseg.js +0 -206
  62. package/docs/assets/javascripts/lunr/wordcut.js +0 -6708
  63. package/docs/assets/javascripts/workers/search.f8cc74c7.min.js +0 -42
  64. package/docs/assets/javascripts/workers/search.f8cc74c7.min.js.map +0 -7
  65. package/docs/assets/stylesheets/main.2afb09e1.min.css +0 -1
  66. package/docs/assets/stylesheets/main.2afb09e1.min.css.map +0 -1
  67. package/docs/assets/stylesheets/palette.06af60db.min.css +0 -1
  68. package/docs/assets/stylesheets/palette.06af60db.min.css.map +0 -1
  69. package/docs/blog/2015/01/04/secure-secure-shell/index.html +0 -1758
  70. package/docs/blog/2025/04/30/our-blog-is-live/index.html +0 -1429
  71. package/docs/blog/archive/2015/index.html +0 -1296
  72. package/docs/blog/archive/2025/index.html +0 -1290
  73. package/docs/blog/category/security/index.html +0 -1296
  74. package/docs/blog/index.html +0 -1342
  75. package/docs/conduct/index.html +0 -1509
  76. package/docs/feed_json_created.json +0 -1
  77. package/docs/feed_json_updated.json +0 -1
  78. package/docs/feed_rss_created.xml +0 -1
  79. package/docs/feed_rss_updated.xml +0 -1
  80. package/docs/fontawesome/LICENSE.txt +0 -165
  81. package/docs/fontawesome/brands/facebook.svg +0 -1
  82. package/docs/fontawesome/brands/instagram.svg +0 -1
  83. package/docs/fontawesome/brands/linkedin.svg +0 -1
  84. package/docs/fontawesome/brands/mastodon.svg +0 -1
  85. package/docs/fontawesome/solid/at.svg +0 -1
  86. package/docs/img/favicon.png +0 -0
  87. package/docs/img/logo.png +0 -0
  88. package/docs/index.html +0 -1387
  89. package/docs/legal/index.html +0 -1740
  90. package/docs/privacy/index.html +0 -1615
  91. package/docs/search/search_index.json +0 -1
  92. package/docs/sitemap.xml +0 -55
  93. package/docs/sitemap.xml.gz +0 -0
  94. package/docs/tags/index.html +0 -2084
  95. package/docs/terms-conditions/index.html +0 -1655
  96. package/docs/terms-use/index.html +0 -1584
  97. package/favicon-180.png +0 -0
  98. package/favicon-192.png +0 -0
  99. package/favicon-512.png +0 -0
  100. package/favicon-splash.png +0 -0
  101. package/favicon.ico +0 -0
  102. package/favicon.svg +0 -550
  103. package/favicon.svg.br +0 -0
  104. package/favicon.svg.gz +0 -0
  105. package/html/spotlight.html +0 -435
  106. package/html/spotlight.html.br +0 -0
  107. package/html/spotlight.html.gz +0 -0
  108. package/img/badge_obtainium.png +0 -0
  109. package/img/banner-1280x640.png +0 -0
  110. package/img/banner-1440.png +0 -0
  111. package/img/banner-og-1200x630.png +0 -0
  112. package/img/favicon-template.png +0 -0
  113. package/img/fb-cover.png +0 -0
  114. package/img/fb-cover2.png +0 -0
  115. package/img/fsf-member.png +0 -0
  116. package/img/gh-logo.png +0 -0
  117. package/img/gpl3-small.png +0 -0
  118. package/img/gpl3.png +0 -0
  119. package/img/linkedin-banner.png +0 -0
  120. package/img/linkedin-banner2.png +0 -0
  121. package/img/logo-1024x1024.png +0 -0
  122. package/img/logo-alt.png +0 -0
  123. package/img/logo-elevated.png +0 -0
  124. package/img/logo-light-elevated.png +0 -0
  125. package/img/logo-light-slogan.png +0 -0
  126. package/img/logo-light.png +0 -0
  127. package/img/logo-slogan.png +0 -0
  128. package/img/logo-transparent-black-small.png +0 -0
  129. package/img/logo-transparent-black.png +0 -0
  130. package/img/logo-transparent-elevated.png +0 -0
  131. package/img/logo-transparent-slogan.png +0 -0
  132. package/img/logo-transparent.png +0 -0
  133. package/img/logo.png +0 -0
  134. package/img/mastodon-banner.png +0 -0
  135. package/img/netpro-logo-transparent.png +0 -0
  136. package/img/posts/acode.png +0 -0
  137. package/img/posts/linksheet.png +0 -0
  138. package/img/posts/tosdr.png +0 -0
  139. package/img/posts/urlcheck.png +0 -0
  140. package/img/qr/pgp-github.png +0 -0
  141. package/img/qr/pgp-support.png +0 -0
  142. package/img/qr/vcard.png +0 -0
  143. package/img/sd311.png +0 -0
  144. package/img/shield.png +0 -0
  145. package/img/shield.svg +0 -1
  146. package/img/shield.svg.br +0 -0
  147. package/img/shield.svg.gz +0 -0
  148. package/img/shield2.png +0 -0
  149. package/img/shield3-2000x2000.png +0 -0
  150. package/img/shield3-black-1024x1024.png +0 -0
  151. package/img/shield3-black.png +0 -0
  152. package/img/shield3-white.png +0 -0
  153. package/img/trademark.jpg +0 -0
  154. package/index.html +0 -256
  155. package/index.html.br +0 -0
  156. package/index.html.gz +0 -0
  157. package/js/app.d544156ea2ba85a7d486.mjs +0 -1
  158. package/js/runtime.52b1ac291305b90de3df.mjs +0 -1
  159. package/js/vendor/.gitkeep +0 -0
  160. package/legal.html +0 -535
  161. package/legal.html.br +0 -0
  162. package/legal.html.gz +0 -0
  163. package/privacy.html +0 -403
  164. package/privacy.html.br +0 -0
  165. package/privacy.html.gz +0 -0
  166. package/robots.txt +0 -14
  167. package/site.webmanifest +0 -25
  168. package/sitemap.xml +0 -117
  169. package/terms-and-conditions.html +0 -409
  170. package/terms-and-conditions.html.br +0 -0
  171. package/terms-and-conditions.html.gz +0 -0
  172. package/terms-of-use.html +0 -379
  173. package/terms-of-use.html.br +0 -0
  174. package/terms-of-use.html.gz +0 -0
@@ -1 +0,0 @@
1
- {"version": "https://jsonfeed.org/version/1", "title": "Network Pro Strategies", "home_page_url": "https://netwk.pro/docs/", "feed_url": "https://netwk.pro/docs/feed_json_created.json", "description": null, "icon": null, "authors": [], "language": "en", "items": [{"id": "https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/", "url": "https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/", "title": "Our Blog is Live!", "content_html": "<p><sup><a href=\"https://spdx.dev/learn/handling-license-info/\">SPDX-License-Identifier</a>:\n<code>CC-BY-4.0 OR GPL-3.0-or-later</code></sup></p>\n<h1>We're Live!</h1>\n<!-- markdownlint-disable-file -->\n\n<h2>\ud83d\udee1\ufe0f Welcome to the Network Pro&trade; Blog: Cybersecurity. Privacy. Open Knowledge.</h2>\n<p>In an era where digital threats are escalating and data privacy is under constant siege, <strong>trust is built on transparency, integrity, and expertise</strong>. At <strong>Network Pro Strategies</strong>, we don\u2019t just secure networks\u2014we <strong>empower organizations and individuals to reclaim control over their digital environments</strong>.</p>\n<p>Today, we proudly launch our official blog: your trusted source for <strong>cutting-edge insights, hands-on implementation strategies, and privacy-first technology advocacy</strong> in the world of cybersecurity and digital infrastructure.</p>\n<hr>\n<h3>\ud83d\udce1 Why This Blog Exists</h3>\n<p>Security today is about more than firewalls and passwords. It\u2019s about <strong>making informed decisions</strong> that respect your data, your autonomy, and your mission. This blog is an extension of our commitment to:</p>\n<ul>\n<li>\ud83d\udcbc <strong>SMBs and enterprises</strong> seeking scalable, resilient security architecture</li>\n<li>\ud83c\udfdb\ufe0f <strong>Government and regulated</strong> sectors navigating risk, compliance, and national security concerns</li>\n<li>\ud83d\udc68\u200d\ud83d\udcbb <strong>Privacy-aware professionals and open-source communities</strong> looking for trusted, non-invasive software solutions</li>\n</ul>", "image": null, "date_published": "2025-04-30T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}, {"id": "https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/", "url": "https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/", "title": "Secure Secure Shell", "content_html": "<h1>Secure Secure Shell</h1>\n<!-- markdownlint-disable-file -->\n\n<blockquote>\n<p><div style=\"font-size: small;\"><strong><em>Originally published on 1/4/2015 as \"Secure Secure Shell\" by <a href=\"https://github.com/stribika\">stribika</a> at:<br>\nhttps://blog.stribik.technology/2015/01/04/secure-secure-shell.html</em></strong></p>\n<p>Mirrored to preserve information. Minor changes have been made. This is noted where applicable. Also see:<br>\n<a href=\"https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices\">https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices</a></p>\n<blockquote>\n<p>\ud83d\udcdd <strong><em>NOTE:</em></strong> Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.</div></p>\n</blockquote>\n</blockquote>\n<ul>\n<li><a href=\"#sshd\">Skip to the good part.</a></li>\n</ul>\n<p>You may have heard that the NSA can decrypt SSH at least some of the time.\nIf you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.</p>\n<p>TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.</p>", "image": null, "date_published": "2015-01-04T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}]}
@@ -1 +0,0 @@
1
- {"version": "https://jsonfeed.org/version/1", "title": "Network Pro Strategies", "home_page_url": "https://netwk.pro/docs/", "feed_url": "https://netwk.pro/docs/feed_json_updated.json", "description": null, "icon": null, "authors": [], "language": "en", "items": [{"id": "https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/", "url": "https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/", "title": "Our Blog is Live!", "content_html": "<p><sup><a href=\"https://spdx.dev/learn/handling-license-info/\">SPDX-License-Identifier</a>:\n<code>CC-BY-4.0 OR GPL-3.0-or-later</code></sup></p>\n<h1>We're Live!</h1>\n<!-- markdownlint-disable-file -->\n\n<h2>\ud83d\udee1\ufe0f Welcome to the Network Pro&trade; Blog: Cybersecurity. Privacy. Open Knowledge.</h2>\n<p>In an era where digital threats are escalating and data privacy is under constant siege, <strong>trust is built on transparency, integrity, and expertise</strong>. At <strong>Network Pro Strategies</strong>, we don\u2019t just secure networks\u2014we <strong>empower organizations and individuals to reclaim control over their digital environments</strong>.</p>\n<p>Today, we proudly launch our official blog: your trusted source for <strong>cutting-edge insights, hands-on implementation strategies, and privacy-first technology advocacy</strong> in the world of cybersecurity and digital infrastructure.</p>\n<hr>\n<h3>\ud83d\udce1 Why This Blog Exists</h3>\n<p>Security today is about more than firewalls and passwords. It\u2019s about <strong>making informed decisions</strong> that respect your data, your autonomy, and your mission. This blog is an extension of our commitment to:</p>\n<ul>\n<li>\ud83d\udcbc <strong>SMBs and enterprises</strong> seeking scalable, resilient security architecture</li>\n<li>\ud83c\udfdb\ufe0f <strong>Government and regulated</strong> sectors navigating risk, compliance, and national security concerns</li>\n<li>\ud83d\udc68\u200d\ud83d\udcbb <strong>Privacy-aware professionals and open-source communities</strong> looking for trusted, non-invasive software solutions</li>\n</ul>", "image": null, "date_modified": "2025-04-30T14:33:25+00:00", "authors": [{"name": "Network Pro"}], "tags": null}, {"id": "https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/", "url": "https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/", "title": "Secure Secure Shell", "content_html": "<h1>Secure Secure Shell</h1>\n<!-- markdownlint-disable-file -->\n\n<blockquote>\n<p><div style=\"font-size: small;\"><strong><em>Originally published on 1/4/2015 as \"Secure Secure Shell\" by <a href=\"https://github.com/stribika\">stribika</a> at:<br>\nhttps://blog.stribik.technology/2015/01/04/secure-secure-shell.html</em></strong></p>\n<p>Mirrored to preserve information. Minor changes have been made. This is noted where applicable. Also see:<br>\n<a href=\"https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices\">https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices</a></p>\n<blockquote>\n<p>\ud83d\udcdd <strong><em>NOTE:</em></strong> Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.</div></p>\n</blockquote>\n</blockquote>\n<ul>\n<li><a href=\"#sshd\">Skip to the good part.</a></li>\n</ul>\n<p>You may have heard that the NSA can decrypt SSH at least some of the time.\nIf you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.</p>\n<p>TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.</p>", "image": null, "date_modified": "2025-04-30T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}]}
@@ -1 +0,0 @@
1
- <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_created.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>Wed, 30 Apr 2025 22:22:36 -0000</pubDate> <lastBuildDate>Wed, 30 Apr 2025 22:22:36 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;p&gt;&lt;sup&gt;&lt;a href=&#34;https://spdx.dev/learn/handling-license-info/&#34;&gt;SPDX-License-Identifier&lt;/a&gt;:&lt;code&gt;CC-BY-4.0 OR GPL-3.0-or-later&lt;/code&gt;&lt;/sup&gt;&lt;/p&gt;&lt;h1&gt;We&#39;re Live!&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge.&lt;/h2&gt;&lt;p&gt;In an era where digital threats are escalating and data privacy is under constant siege, &lt;strong&gt;trust is built on transparency, integrity, and expertise&lt;/strong&gt;. At &lt;strong&gt;Network Pro Strategies&lt;/strong&gt;, we don’t just secure networks—we &lt;strong&gt;empower organizations and individuals to reclaim control over their digital environments&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today, we proudly launch our official blog: your trusted source for &lt;strong&gt;cutting-edge insights, hands-on implementation strategies, and privacy-first technology advocacy&lt;/strong&gt; in the world of cybersecurity and digital infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Security today is about more than firewalls and passwords. It’s about &lt;strong&gt;making informed decisions&lt;/strong&gt; that respect your data, your autonomy, and your mission. This blog is an extension of our commitment to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;💼 &lt;strong&gt;SMBs and enterprises&lt;/strong&gt; seeking scalable, resilient security architecture&lt;/li&gt;&lt;li&gt;🏛️ &lt;strong&gt;Government and regulated&lt;/strong&gt; sectors navigating risk, compliance, and national security concerns&lt;/li&gt;&lt;li&gt;👨‍💻 &lt;strong&gt;Privacy-aware professionals and open-source communities&lt;/strong&gt; looking for trusted, non-invasive software solutions&lt;/li&gt;&lt;/ul&gt;</description><link>https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;blockquote&gt;&lt;p&gt;&lt;div style=&#34;font-size: small;&#34;&gt;&lt;strong&gt;&lt;em&gt;Originally published on 1/4/2015 as &#34;Secure Secure Shell&#34; by &lt;a href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Mirrored to preserve information. Minor changes have been made. This is noted where applicable. Also see:&lt;br&gt;&lt;a href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;📝 &lt;strong&gt;&lt;em&gt;NOTE:&lt;/em&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/div&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 Jan 2015 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
@@ -1 +0,0 @@
1
- <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_updated.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>Wed, 30 Apr 2025 22:22:36 -0000</pubDate> <lastBuildDate>Wed, 30 Apr 2025 22:22:36 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;p&gt;&lt;sup&gt;&lt;a href=&#34;https://spdx.dev/learn/handling-license-info/&#34;&gt;SPDX-License-Identifier&lt;/a&gt;:&lt;code&gt;CC-BY-4.0 OR GPL-3.0-or-later&lt;/code&gt;&lt;/sup&gt;&lt;/p&gt;&lt;h1&gt;We&#39;re Live!&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge.&lt;/h2&gt;&lt;p&gt;In an era where digital threats are escalating and data privacy is under constant siege, &lt;strong&gt;trust is built on transparency, integrity, and expertise&lt;/strong&gt;. At &lt;strong&gt;Network Pro Strategies&lt;/strong&gt;, we don’t just secure networks—we &lt;strong&gt;empower organizations and individuals to reclaim control over their digital environments&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today, we proudly launch our official blog: your trusted source for &lt;strong&gt;cutting-edge insights, hands-on implementation strategies, and privacy-first technology advocacy&lt;/strong&gt; in the world of cybersecurity and digital infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Security today is about more than firewalls and passwords. It’s about &lt;strong&gt;making informed decisions&lt;/strong&gt; that respect your data, your autonomy, and your mission. This blog is an extension of our commitment to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;💼 &lt;strong&gt;SMBs and enterprises&lt;/strong&gt; seeking scalable, resilient security architecture&lt;/li&gt;&lt;li&gt;🏛️ &lt;strong&gt;Government and regulated&lt;/strong&gt; sectors navigating risk, compliance, and national security concerns&lt;/li&gt;&lt;li&gt;👨‍💻 &lt;strong&gt;Privacy-aware professionals and open-source communities&lt;/strong&gt; looking for trusted, non-invasive software solutions&lt;/li&gt;&lt;/ul&gt;</description><link>https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 14:33:25 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;blockquote&gt;&lt;p&gt;&lt;div style=&#34;font-size: small;&#34;&gt;&lt;strong&gt;&lt;em&gt;Originally published on 1/4/2015 as &#34;Secure Secure Shell&#34; by &lt;a href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Mirrored to preserve information. Minor changes have been made. This is noted where applicable. Also see:&lt;br&gt;&lt;a href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;📝 &lt;strong&gt;&lt;em&gt;NOTE:&lt;/em&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/div&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
@@ -1,165 +0,0 @@
1
- Fonticons, Inc. (https://fontawesome.com)
2
-
3
- --------------------------------------------------------------------------------
4
-
5
- Font Awesome Free License
6
-
7
- Font Awesome Free is free, open source, and GPL friendly. You can use it for
8
- commercial projects, open source projects, or really almost whatever you want.
9
- Full Font Awesome Free license: https://fontawesome.com/license/free.
10
-
11
- --------------------------------------------------------------------------------
12
-
13
- # Icons: CC BY 4.0 License (https://creativecommons.org/licenses/by/4.0/)
14
-
15
- The Font Awesome Free download is licensed under a Creative Commons
16
- Attribution 4.0 International License and applies to all icons packaged
17
- as SVG and JS file types.
18
-
19
- --------------------------------------------------------------------------------
20
-
21
- # Fonts: SIL OFL 1.1 License
22
-
23
- In the Font Awesome Free download, the SIL OFL license applies to all icons
24
- packaged as web and desktop font files.
25
-
26
- Copyright (c) 2024 Fonticons, Inc. (https://fontawesome.com)
27
- with Reserved Font Name: "Font Awesome".
28
-
29
- This Font Software is licensed under the SIL Open Font License, Version 1.1.
30
- This license is copied below, and is also available with a FAQ at:
31
- http://scripts.sil.org/OFL
32
-
33
- SIL OPEN FONT LICENSE
34
- Version 1.1 - 26 February 2007
35
-
36
- PREAMBLE
37
- The goals of the Open Font License (OFL) are to stimulate worldwide
38
- development of collaborative font projects, to support the font creation
39
- efforts of academic and linguistic communities, and to provide a free and
40
- open framework in which fonts may be shared and improved in partnership
41
- with others.
42
-
43
- The OFL allows the licensed fonts to be used, studied, modified and
44
- redistributed freely as long as they are not sold by themselves. The
45
- fonts, including any derivative works, can be bundled, embedded,
46
- redistributed and/or sold with any software provided that any reserved
47
- names are not used by derivative works. The fonts and derivatives,
48
- however, cannot be released under any other type of license. The
49
- requirement for fonts to remain under this license does not apply
50
- to any document created using the fonts or their derivatives.
51
-
52
- DEFINITIONS
53
- "Font Software" refers to the set of files released by the Copyright
54
- Holder(s) under this license and clearly marked as such. This may
55
- include source files, build scripts and documentation.
56
-
57
- "Reserved Font Name" refers to any names specified as such after the
58
- copyright statement(s).
59
-
60
- "Original Version" refers to the collection of Font Software components as
61
- distributed by the Copyright Holder(s).
62
-
63
- "Modified Version" refers to any derivative made by adding to, deleting,
64
- or substituting — in part or in whole — any of the components of the
65
- Original Version, by changing formats or by porting the Font Software to a
66
- new environment.
67
-
68
- "Author" refers to any designer, engineer, programmer, technical
69
- writer or other person who contributed to the Font Software.
70
-
71
- PERMISSION & CONDITIONS
72
- Permission is hereby granted, free of charge, to any person obtaining
73
- a copy of the Font Software, to use, study, copy, merge, embed, modify,
74
- redistribute, and sell modified and unmodified copies of the Font
75
- Software, subject to the following conditions:
76
-
77
- 1) Neither the Font Software nor any of its individual components,
78
- in Original or Modified Versions, may be sold by itself.
79
-
80
- 2) Original or Modified Versions of the Font Software may be bundled,
81
- redistributed and/or sold with any software, provided that each copy
82
- contains the above copyright notice and this license. These can be
83
- included either as stand-alone text files, human-readable headers or
84
- in the appropriate machine-readable metadata fields within text or
85
- binary files as long as those fields can be easily viewed by the user.
86
-
87
- 3) No Modified Version of the Font Software may use the Reserved Font
88
- Name(s) unless explicit written permission is granted by the corresponding
89
- Copyright Holder. This restriction only applies to the primary font name as
90
- presented to the users.
91
-
92
- 4) The name(s) of the Copyright Holder(s) or the Author(s) of the Font
93
- Software shall not be used to promote, endorse or advertise any
94
- Modified Version, except to acknowledge the contribution(s) of the
95
- Copyright Holder(s) and the Author(s) or with their explicit written
96
- permission.
97
-
98
- 5) The Font Software, modified or unmodified, in part or in whole,
99
- must be distributed entirely under this license, and must not be
100
- distributed under any other license. The requirement for fonts to
101
- remain under this license does not apply to any document created
102
- using the Font Software.
103
-
104
- TERMINATION
105
- This license becomes null and void if any of the above conditions are
106
- not met.
107
-
108
- DISCLAIMER
109
- THE FONT SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
110
- EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTIES OF
111
- MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT
112
- OF COPYRIGHT, PATENT, TRADEMARK, OR OTHER RIGHT. IN NO EVENT SHALL THE
113
- COPYRIGHT HOLDER BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
114
- INCLUDING ANY GENERAL, SPECIAL, INDIRECT, INCIDENTAL, OR CONSEQUENTIAL
115
- DAMAGES, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
116
- FROM, OUT OF THE USE OR INABILITY TO USE THE FONT SOFTWARE OR FROM
117
- OTHER DEALINGS IN THE FONT SOFTWARE.
118
-
119
- --------------------------------------------------------------------------------
120
-
121
- # Code: MIT License (https://opensource.org/licenses/MIT)
122
-
123
- In the Font Awesome Free download, the MIT license applies to all non-font and
124
- non-icon files.
125
-
126
- Copyright 2024 Fonticons, Inc.
127
-
128
- Permission is hereby granted, free of charge, to any person obtaining a copy of
129
- this software and associated documentation files (the "Software"), to deal in the
130
- Software without restriction, including without limitation the rights to use, copy,
131
- modify, merge, publish, distribute, sublicense, and/or sell copies of the Software,
132
- and to permit persons to whom the Software is furnished to do so, subject to the
133
- following conditions:
134
-
135
- The above copyright notice and this permission notice shall be included in all
136
- copies or substantial portions of the Software.
137
-
138
- THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
139
- INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
140
- PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT
141
- HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
142
- OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
143
- SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
144
-
145
- --------------------------------------------------------------------------------
146
-
147
- # Attribution
148
-
149
- Attribution is required by MIT, SIL OFL, and CC BY licenses. Downloaded Font
150
- Awesome Free files already contain embedded comments with sufficient
151
- attribution, so you shouldn't need to do anything additional when using these
152
- files normally.
153
-
154
- We've kept attribution comments terse, so we ask that you do not actively work
155
- to remove them from files, especially code. They're a great way for folks to
156
- learn about Font Awesome.
157
-
158
- --------------------------------------------------------------------------------
159
-
160
- # Brand Icons
161
-
162
- All brand icons are trademarks of their respective owners. The use of these
163
- trademarks does not indicate endorsement of the trademark holder by Font
164
- Awesome, nor vice versa. **Please do not use brand logos for any purpose except
165
- to represent the company, product, or service to which they refer.**
@@ -1 +0,0 @@
1
- <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><!--! Font Awesome Free 6.7.2 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2024 Fonticons, Inc. --><path d="M512 256C512 114.6 397.4 0 256 0S0 114.6 0 256C0 376 82.7 476.8 194.2 504.5V334.2H141.4V256h52.8V222.3c0-87.1 39.4-127.5 125-127.5c16.2 0 44.2 3.2 55.7 6.4V172c-6-.6-16.5-1-29.6-1c-42 0-58.2 15.9-58.2 57.2V256h83.6l-14.4 78.2H287V510.1C413.8 494.8 512 386.9 512 256h0z"/></svg>
@@ -1 +0,0 @@
1
- <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><!--! Font Awesome Free 6.7.2 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2024 Fonticons, Inc. --><path d="M224.1 141c-63.6 0-114.9 51.3-114.9 114.9s51.3 114.9 114.9 114.9S339 319.5 339 255.9 287.7 141 224.1 141zm0 189.6c-41.1 0-74.7-33.5-74.7-74.7s33.5-74.7 74.7-74.7 74.7 33.5 74.7 74.7-33.6 74.7-74.7 74.7zm146.4-194.3c0 14.9-12 26.8-26.8 26.8-14.9 0-26.8-12-26.8-26.8s12-26.8 26.8-26.8 26.8 12 26.8 26.8zm76.1 27.2c-1.7-35.9-9.9-67.7-36.2-93.9-26.2-26.2-58-34.4-93.9-36.2-37-2.1-147.9-2.1-184.9 0-35.8 1.7-67.6 9.9-93.9 36.1s-34.4 58-36.2 93.9c-2.1 37-2.1 147.9 0 184.9 1.7 35.9 9.9 67.7 36.2 93.9s58 34.4 93.9 36.2c37 2.1 147.9 2.1 184.9 0 35.9-1.7 67.7-9.9 93.9-36.2 26.2-26.2 34.4-58 36.2-93.9 2.1-37 2.1-147.8 0-184.8zM398.8 388c-7.8 19.6-22.9 34.7-42.6 42.6-29.5 11.7-99.5 9-132.1 9s-102.7 2.6-132.1-9c-19.6-7.8-34.7-22.9-42.6-42.6-11.7-29.5-9-99.5-9-132.1s-2.6-102.7 9-132.1c7.8-19.6 22.9-34.7 42.6-42.6 29.5-11.7 99.5-9 132.1-9s102.7-2.6 132.1 9c19.6 7.8 34.7 22.9 42.6 42.6 11.7 29.5 9 99.5 9 132.1s2.7 102.7-9 132.1z"/></svg>
@@ -1 +0,0 @@
1
- <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><!--! Font Awesome Free 6.7.2 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2024 Fonticons, Inc. --><path d="M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z"/></svg>
@@ -1 +0,0 @@
1
- <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><!--! Font Awesome Free 6.7.2 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2024 Fonticons, Inc. --><path d="M433 179.11c0-97.2-63.71-125.7-63.71-125.7-62.52-28.7-228.56-28.4-290.48 0 0 0-63.72 28.5-63.72 125.7 0 115.7-6.6 259.4 105.63 289.1 40.51 10.7 75.32 13 103.33 11.4 50.81-2.8 79.32-18.1 79.32-18.1l-1.7-36.9s-36.31 11.4-77.12 10.1c-40.41-1.4-83-4.4-89.63-54a102.54 102.54 0 0 1-.9-13.9c85.63 20.9 158.65 9.1 178.75 6.7 56.12-6.7 105-41.3 111.23-72.9 9.8-49.8 9-121.5 9-121.5zm-75.12 125.2h-46.63v-114.2c0-49.7-64-51.6-64 6.9v62.5h-46.33V197c0-58.5-64-56.6-64-6.9v114.2H90.19c0-122.1-5.2-147.9 18.41-175 25.9-28.9 79.82-30.8 103.83 6.1l11.6 19.5 11.6-19.5c24.11-37.1 78.12-34.8 103.83-6.1 23.71 27.3 18.4 53 18.4 175z"/></svg>
@@ -1 +0,0 @@
1
- <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><!--! Font Awesome Free 6.7.2 by @fontawesome - https://fontawesome.com License - https://fontawesome.com/license/free (Icons: CC BY 4.0, Fonts: SIL OFL 1.1, Code: MIT License) Copyright 2024 Fonticons, Inc. --><path d="M256 64C150 64 64 150 64 256s86 192 192 192c17.7 0 32 14.3 32 32s-14.3 32-32 32C114.6 512 0 397.4 0 256S114.6 0 256 0S512 114.6 512 256l0 32c0 53-43 96-96 96c-29.3 0-55.6-13.2-73.2-33.9C320 371.1 289.5 384 256 384c-70.7 0-128-57.3-128-128s57.3-128 128-128c27.9 0 53.7 8.9 74.7 24.1c5.7-5 13.1-8.1 21.3-8.1c17.7 0 32 14.3 32 32l0 80 0 32c0 17.7 14.3 32 32 32s32-14.3 32-32l0-32c0-106-86-192-192-192zm64 192a64 64 0 1 0 -128 0 64 64 0 1 0 128 0z"/></svg>
Binary file
package/docs/img/logo.png DELETED
Binary file