@networkpro/web 0.12.5 → 0.13.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (51) hide show
  1. package/404.html +1 -1
  2. package/README.md +22 -12
  3. package/about.html +71 -53
  4. package/about.html.br +0 -0
  5. package/about.html.gz +0 -0
  6. package/bundle-report.html +39 -0
  7. package/css/default.css +1 -1
  8. package/docs/assets/external/img.shields.io/badge/GitHub_Package_Registry-white.ed8def48.svg +1 -0
  9. package/docs/assets/external/img.shields.io/badge/npmjs-white.681714c1.svg +1 -0
  10. package/docs/blog/2015/01/04/secure-secure-shell/index.html +51 -38
  11. package/docs/blog/2025/04/30/our-blog-is-live/index.html +25 -18
  12. package/docs/blog/archive/2015/index.html +16 -9
  13. package/docs/blog/archive/2025/index.html +7 -6
  14. package/docs/blog/category/security/index.html +16 -9
  15. package/docs/blog/index.html +27 -19
  16. package/docs/feed_json_created.json +1 -1
  17. package/docs/feed_json_updated.json +1 -1
  18. package/docs/feed_rss_created.xml +1 -1
  19. package/docs/feed_rss_updated.xml +1 -1
  20. package/docs/index.html +31 -23
  21. package/docs/search/search_index.json +1 -1
  22. package/docs/sitemap.xml +13 -13
  23. package/docs/sitemap.xml.gz +0 -0
  24. package/docs/tags/index.html +3 -3
  25. package/html/spotlight.html +10 -10
  26. package/html/spotlight.html.br +0 -0
  27. package/html/spotlight.html.gz +0 -0
  28. package/img/linkedin-banner-new.png +0 -0
  29. package/img/qr/pgp-contact.png +0 -0
  30. package/index.html +36 -24
  31. package/index.html.br +0 -0
  32. package/index.html.gz +0 -0
  33. package/legal.html +22 -22
  34. package/legal.html.br +0 -0
  35. package/legal.html.gz +0 -0
  36. package/package.json +16 -13
  37. package/privacy.html +17 -16
  38. package/privacy.html.br +0 -0
  39. package/privacy.html.gz +0 -0
  40. package/sitemap.xml +67 -7
  41. package/terms-and-conditions.html +19 -19
  42. package/terms-and-conditions.html.br +0 -0
  43. package/terms-and-conditions.html.gz +0 -0
  44. package/terms-of-use.html +17 -16
  45. package/terms-of-use.html.br +0 -0
  46. package/terms-of-use.html.gz +0 -0
  47. package/docs/assets/external/github.com/netwk-pro/netwk-pro.github.io/actions/workflows/upload.yml/badge.svg +0 -35
  48. package/docs/assets/external/github.com/netwk-pro/netwk-pro.github.io/actions/workflows/webpack.yml/badge.56403977.svg +0 -35
  49. package/docs/assets/external/img.shields.io/badge/Contributor Covenant-2.1-4baaaa.svg +0 -1
  50. package/docs/assets/external/img.shields.io/badge/code_style-prettier-ff69b4.3e3c11fa.svg +0 -1
  51. package/docs/assets/external/img.shields.io/npm/v/@networkpro/web.5485edf3.svg +0 -1
package/css/default.css CHANGED
@@ -1 +1 @@
1
- .full-width-section{background-position:50%;background-size:cover;margin:0 auto;max-width:1920px;width:100%}.container{margin:0 auto;max-width:1200px;padding:0 12px}footer,header{width:100%}footer .container,header .container{margin:0 auto;max-width:1200px;padding:20px 12px}.gh{border-collapse:collapse;border-spacing:0;margin:0 auto}.gh td,.gh th{border-collapse:collapse;font-family:Arial,Helvetica,sans-serif;overflow:hidden;padding:10px 5px;word-break:normal}.gh .gh-tcell{text-align:center;vertical-align:middle}@media screen and (width <= 767px){.gh,.gh col{width:auto!important}.gh-wrap{margin:auto 0;-webkit-overflow-scrolling:touch;overflow-x:auto}}.soc{border-collapse:collapse;border-spacing:0;margin:0 auto}.soc td,.soc th{border-collapse:collapse;font-family:Arial,Helvetica,sans-serif;overflow:hidden;padding:8px;word-break:normal}.soc .soc-fa{text-align:center;vertical-align:middle}@media screen and (width <= 767px){.soc,.soc col{width:auto!important}.soc-wrap{margin:auto 0;-webkit-overflow-scrolling:touch;overflow-x:auto}}.foss{border-collapse:collapse;border-spacing:0}.foss td,.foss th{border-collapse:collapse;font-family:Arial,Helvetica,sans-serif;overflow:hidden;padding:10px 5px;word-break:normal}.foss .foss-cell{text-align:center;vertical-align:middle}@media screen and (width <= 767px){.foss,.foss col{width:auto!important}.foss-wrap{-webkit-overflow-scrolling:touch;overflow-x:auto}}.bnav{border-collapse:collapse;border-spacing:0;margin:0 auto}.bnav td{font-weight:700}.bnav td,.bnav th{border-style:none;font-family:Arial,Helvetica,sans-serif;font-size:.875em;line-height:1.125em;overflow:hidden;padding:10px;word-break:normal}.bnav .bnav-cell{align-content:center;text-align:center;vertical-align:middle}@media screen and (width <= 767px){.bnav,.bnav col{width:auto!important}.bnav-wrap{margin:auto 0;-webkit-overflow-scrolling:touch;overflow-x:auto}}.bnav2{border-collapse:collapse;border-spacing:0;margin:0 auto}.bnav2 td{font-weight:700;padding:10px}.bnav2 td,.bnav2 th{border-style:none;font-family:Arial,Helvetica,sans-serif;font-size:.875em;line-height:1.125em;overflow:hidden;word-break:normal}.bnav2 th{padding:12px}.bnav2 .bnav2-cell{align-content:center;text-align:center;vertical-align:middle}@media screen and (width <= 767px){.bnav2,.bnav2 col{width:auto!important}.bnav2-wrap{margin:auto 0;-webkit-overflow-scrolling:touch;overflow-x:auto}}.pgp{border-collapse:collapse;border-spacing:0;margin:0 auto}.pgp td{border-style:none;font-family:Arial,Helvetica,sans-serif}.pgp td,.pgp th{font-size:.875em;line-height:1.125em;overflow:hidden;padding:10px;word-break:normal}.pgp th{border:1px solid #000;font-family:Arial,sans-serif}.pgp .pgp-col1{text-align:right;vertical-align:middle}.pgp .pgp-col2{text-align:left;vertical-align:middle}@media screen and (width <= 767px){.pgp,.pgp col{width:auto!important}.pgp-wrap{margin:auto 0;-webkit-overflow-scrolling:touch;overflow-x:auto}}.logo{display:block;margin-left:auto;margin-right:auto}.index-title1{font-style:italic;font-weight:700;text-align:center}.index-title2{font-size:1.25em;font-variant:small-caps;letter-spacing:-.015em;line-height:1.625em;text-align:center}.index1{font-style:italic;font-weight:700;line-height:2.125rem}.index1,.index2{letter-spacing:-.035em;text-align:center}.index2,.subhead{font-size:1.5em;font-variant:small-caps;line-height:1.75em}.subhead{letter-spacing:-.035em}.bolditalic{font-style:italic;font-weight:700}.bquote{border-left:3px solid #9e9e9e;font-style:italic;margin-left:30px;padding-left:10px}.small-text{font-size:.75em;line-height:1.125em}.join{font-weight:700;text-align:center}.prewrap{display:block;white-space:pre-wrap}.emphasis{font-style:italic;font-weight:700}.hr-styled{margin:auto;width:75%}.center-text,.copyright{text-align:center}.copyright{font-size:.75em;line-height:1.125em}.visited{color:#7f6227}.center-nav{font-size:.875em;padding:5px;text-align:center}.block,.center-nav{line-height:1.125em}.block{background:none;border:none;border-radius:0;font-size:.75em;outline:none;resize:none;width:100%}
1
+ .full-width-section{background-position:50%;background-size:cover;margin:0 auto;max-width:1920px;width:100%}.container{margin:0 auto;max-width:1200px;padding:0 12px}footer,header{width:100%}footer .container,header .container{margin:0 auto;max-width:1200px;padding:20px 12px}.gh{border-collapse:collapse;border-spacing:0;margin:0 auto}.gh td,.gh th{border-collapse:collapse;font-family:Arial,Helvetica,sans-serif;overflow:hidden;padding:10px 5px;word-break:normal}.gh .gh-tcell{text-align:center;vertical-align:middle}@media screen and (width <= 767px){.gh,.gh col{width:auto!important}.gh-wrap{margin:auto 0;-webkit-overflow-scrolling:touch;overflow-x:auto}}.soc{border-collapse:collapse;border-spacing:0;margin:0 auto}.soc td,.soc th{border-collapse:collapse;font-family:Arial,Helvetica,sans-serif;overflow:hidden;padding:8px;word-break:normal}.soc .soc-fa{text-align:center;vertical-align:middle}@media screen and (width <= 767px){.soc,.soc col{width:auto!important}.soc-wrap{margin:auto 0;-webkit-overflow-scrolling:touch;overflow-x:auto}}.foss{border-collapse:collapse;border-spacing:0}.foss td,.foss th{border-collapse:collapse;font-family:Arial,Helvetica,sans-serif;overflow:hidden;padding:10px 5px;word-break:normal}.foss .foss-cell{text-align:center;vertical-align:middle}@media screen and (width <= 767px){.foss,.foss col{width:auto!important}.foss-wrap{-webkit-overflow-scrolling:touch;overflow-x:auto}}.bnav{border-collapse:collapse;border-spacing:0;margin:0 auto}.bnav td{font-weight:700}.bnav td,.bnav th{border-style:none;font-family:Arial,Helvetica,sans-serif;font-size:.875rem;line-height:1.125rem;overflow:hidden;padding:10px;word-break:normal}.bnav .bnav-cell{align-content:center;text-align:center;vertical-align:middle}@media screen and (width <= 767px){.bnav,.bnav col{width:auto!important}.bnav-wrap{margin:auto 0;-webkit-overflow-scrolling:touch;overflow-x:auto}}.bnav2{border-collapse:collapse;border-spacing:0;margin:0 auto}.bnav2 td{font-weight:700;padding:10px}.bnav2 td,.bnav2 th{border-style:none;font-family:Arial,Helvetica,sans-serif;font-size:.875rem;line-height:1.125rem;overflow:hidden;word-break:normal}.bnav2 th{padding:12px}.bnav2 .bnav2-cell{align-content:center;text-align:center;vertical-align:middle}@media screen and (width <= 767px){.bnav2,.bnav2 col{width:auto!important}.bnav2-wrap{margin:auto 0;-webkit-overflow-scrolling:touch;overflow-x:auto}}.pgp{border-collapse:collapse;border-spacing:0;margin:0 auto}.pgp td{border-style:none;font-family:Arial,Helvetica,sans-serif}.pgp td,.pgp th{font-size:.875rem;line-height:1.125rem;overflow:hidden;padding:10px;word-break:normal}.pgp th{border:1px solid #000;font-family:Arial,sans-serif}.pgp .pgp-col1{text-align:right;vertical-align:middle}.pgp .pgp-col2{text-align:left;vertical-align:middle}@media screen and (width <= 767px){.pgp,.pgp col{width:auto!important}.pgp-wrap{margin:auto 0;-webkit-overflow-scrolling:touch;overflow-x:auto}}.logo{display:block;margin-left:auto;margin-right:auto}.index-title1{font-style:italic;font-weight:700;text-align:center}.index-title2{font-size:1.25rem;font-variant:small-caps;letter-spacing:-.015em;line-height:1.625rem;text-align:center}.index1{font-style:italic;font-weight:700;line-height:2.125rem}.index1,.index2{letter-spacing:-.035em;text-align:center}.index2{font-size:1.5rem;font-variant:small-caps;line-height:1.75rem}.index3{text-align:center}.index3,.subhead{font-size:1.5rem;letter-spacing:-.035em;line-height:1.75rem}.subhead{font-variant:small-caps}.bolditalic{font-style:italic;font-weight:700}.bquote{border-left:3px solid #9e9e9e;font-style:italic;margin-left:30px;padding-left:10px}.large-text{font-size:1.25rem;line-height:1.75rem}.small-text{font-size:.75rem;line-height:1.125rem}.large-text-center{font-size:1.25rem;line-height:1.75rem;text-align:center}.join{font-weight:700;text-align:center}.prewrap{display:block;white-space:pre-wrap}.remphasis{font-style:italic;font-weight:700}.hr-styled{margin:auto;width:75%}.center-text,.copyright{text-align:center}.copyright{font-size:.75rem;line-height:1.125rem}.visited{color:#7f6227}.center-nav{font-size:.875rem;padding:5px;text-align:center}.block,.center-nav{line-height:1.125rem}.block{background:none;border:none;border-radius:0;font-size:.75rem;outline:none;resize:none;width:100%}
@@ -0,0 +1 @@
1
+ <svg xmlns="http://www.w3.org/2000/svg" width="171" height="20" role="img" aria-label="GitHub Package Registry"><title>GitHub Package Registry</title><a target="_blank" href="https://www.npmjs.com/package/@networkpro/web"><linearGradient id="s" x2="0" y2="100%"><stop offset="0" stop-color="#bbb" stop-opacity=".1"/><stop offset="1" stop-opacity=".1"/></linearGradient><clipPath id="r"><rect width="171" height="20" rx="3" fill="#fff"/></clipPath><g clip-path="url(#r)"><rect width="24" height="20" fill="white"/><rect x="24" width="147" height="20" fill="#555"/><rect width="171" height="20" fill="url(#s)"/></g><g fill="#fff" text-anchor="middle" font-family="Verdana,Geneva,DejaVu Sans,sans-serif" text-rendering="geometricPrecision" font-size="110"><image x="5" y="3" width="14" height="14" href="data:image/svg+xml;base64,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"/><text aria-hidden="true" x="965" y="150" fill="#010101" fill-opacity=".3" transform="scale(.1)" textLength="1370">GitHub Package Registry</text><text x="965" y="140" transform="scale(.1)" fill="#fff" textLength="1370">GitHub Package Registry</text></g></a></svg>
@@ -0,0 +1 @@
1
+ <svg xmlns="http://www.w3.org/2000/svg" width="69" height="20" role="img" aria-label="npmjs"><title>npmjs</title><a target="_blank" href="https://www.npmjs.com/package/@networkpro/web"><linearGradient id="s" x2="0" y2="100%"><stop offset="0" stop-color="#bbb" stop-opacity=".1"/><stop offset="1" stop-opacity=".1"/></linearGradient><clipPath id="r"><rect width="69" height="20" rx="3" fill="#fff"/></clipPath><g clip-path="url(#r)"><rect width="24" height="20" fill="white"/><rect x="24" width="45" height="20" fill="#555"/><rect width="69" height="20" fill="url(#s)"/></g><g fill="#fff" text-anchor="middle" font-family="Verdana,Geneva,DejaVu Sans,sans-serif" text-rendering="geometricPrecision" font-size="110"><image x="5" y="3" width="14" height="14" href="data:image/svg+xml;base64,PHN2ZyBmaWxsPSIjY2IzODM3IiByb2xlPSJpbWciIHZpZXdCb3g9IjAgMCAyNCAyNCIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIj48dGl0bGU+bnBtPC90aXRsZT48cGF0aCBkPSJNMS43NjMgMEMuNzg2IDAgMCAuNzg2IDAgMS43NjN2MjAuNDc0QzAgMjMuMjE0Ljc4NiAyNCAxLjc2MyAyNGgyMC40NzRjLjk3NyAwIDEuNzYzLS43ODYgMS43NjMtMS43NjNWMS43NjNDMjQgLjc4NiAyMy4yMTQgMCAyMi4yMzcgMHpNNS4xMyA1LjMyM2wxMy44MzcuMDE5LS4wMDkgMTMuODM2aC0zLjQ2NGwuMDEtMTAuMzgyaC0zLjQ1NkwxMi4wNCAxOS4xN0g1LjExM3oiLz48L3N2Zz4="/><text aria-hidden="true" x="455" y="150" fill="#010101" fill-opacity=".3" transform="scale(.1)" textLength="350">npmjs</text><text x="455" y="140" transform="scale(.1)" fill="#fff" textLength="350">npmjs</text></g></a></svg>
@@ -1075,7 +1075,7 @@
1075
1075
  <li class="md-nav__item">
1076
1076
  <div class="md-nav__link">
1077
1077
  <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path d="M15 13h1.5v2.82l2.44 1.41-.75 1.3L15 16.69zm4-5H5v11h4.67c-.43-.91-.67-1.93-.67-3a7 7 0 0 1 7-7c1.07 0 2.09.24 3 .67zM5 21a2 2 0 0 1-2-2V5c0-1.11.89-2 2-2h1V1h2v2h8V1h2v2h1a2 2 0 0 1 2 2v6.1c1.24 1.26 2 2.99 2 4.9a7 7 0 0 1-7 7c-1.91 0-3.64-.76-4.9-2zm11-9.85A4.85 4.85 0 0 0 11.15 16c0 2.68 2.17 4.85 4.85 4.85A4.85 4.85 0 0 0 20.85 16c0-2.68-2.17-4.85-4.85-4.85"/></svg>
1078
- <time datetime="2025-04-30 00:00:00+00:00" class="md-ellipsis">April 30, 2025</time>
1078
+ <time datetime="2025-05-04 00:00:00+00:00" class="md-ellipsis">May 4, 2025</time>
1079
1079
  </div>
1080
1080
  </li>
1081
1081
 
@@ -1143,15 +1143,22 @@
1143
1143
  <h1 id="secure-secure-shell">Secure Secure Shell</h1>
1144
1144
  <!-- markdownlint-disable-file -->
1145
1145
 
1146
- <blockquote>
1147
- <p><div style="font-size: small;"><strong><em>Originally published on 1/4/2015 as "Secure Secure Shell" by <a href="https://github.com/stribika">stribika</a> at:<br />
1148
- https://blog.stribik.technology/2015/01/04/secure-secure-shell.html</em></strong></p>
1149
- <p>Mirrored to preserve information. Minor changes have been made. This is noted where applicable. Also see:<br />
1150
- <a href="https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices">https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices</a></p>
1151
- <blockquote>
1152
- <p>📝 <strong><em>NOTE:</em></strong> Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.</div></p>
1153
- </blockquote>
1154
- </blockquote>
1146
+ <div style="font-size: small; font-style: italic;">
1147
+
1148
+ > **Originally published on 1/4/2015 by [stribika](https://github.com/stribika) at:
1149
+ > [https://blog.stribik.technology/2015/01/04/secure-secure-shell.html](https://blog.stribik.technology/2015/01/04/secure-secure-shell.html)**
1150
+ >
1151
+ > Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:
1152
+ > <https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices>
1153
+
1154
+ </div>
1155
+
1156
+ <div style="font-size: small;">
1157
+
1158
+ > > 📝 **_NOTE:_** Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.
1159
+
1160
+ </div>
1161
+
1155
1162
  <ul>
1156
1163
  <li><a href="#sshd">Skip to the good part.</a></li>
1157
1164
  </ul>
@@ -1201,22 +1208,22 @@ k = KDF(s) k = KDF(s)</code></pre></p>
1201
1208
  <hr />
1202
1209
  <h2 id="sshd-configuration"><a id="sshd">SSHD Configuration</a></h2>
1203
1210
  <blockquote>
1204
- <p>Emphasis added, it was not present in the originally published article.<br />
1205
- Key exchange <strong>1</strong> (curve25519-sha256) is ideal, <strong>8</strong> is also acceptable.</p>
1211
+ <p><strong><em>NOTE:</em></strong> Emphasis added, it was not present in the originally published article.<br />
1212
+ Key exchange <strong>1</strong> (curve25519-sha256) alone is ideal, <strong>8</strong> is also acceptable for interoperability.</p>
1206
1213
  </blockquote>
1207
1214
  <p>OpenSSH supports 11 key exchange protocols:</p>
1208
1215
  <ol>
1209
1216
  <li><strong><a href="https://git.libssh.org/projects/libssh.git/tree/doc/curve25519-sha256@libssh.org.txt">curve25519-sha256</a>: ECDH over <a href="https://cr.yp.to/ecdh.html">Curve25519</a> with SHA2</strong></li>
1210
- <li>~~<a href="https://www.ietf.org/rfc/rfc4253.txt">diffie-hellman-group1-sha1</a>: 1024 bit DH with SHA1~~</li>
1211
- <li>~~<a href="https://www.ietf.org/rfc/rfc4253.txt">diffie-hellman-group14-sha1</a>: 2048 bit DH with SHA1~~</li>
1217
+ <li><a href="https://www.ietf.org/rfc/rfc4253.txt">diffie-hellman-group1-sha1</a>: 1024 bit DH with SHA1</li>
1218
+ <li><a href="https://www.ietf.org/rfc/rfc4253.txt">diffie-hellman-group14-sha1</a>: 2048 bit DH with SHA1</li>
1212
1219
  <li><a href="https://tools.ietf.org/html/draft-ietf-curdle-ssh-modp-dh-sha2-09">diffie-hellman-group14-sha256</a>: 2048 bit DH with SHA2</li>
1213
1220
  <li><a href="https://tools.ietf.org/html/draft-ietf-curdle-ssh-modp-dh-sha2-09">diffie-hellman-group16-sha512</a>: 4096 bit DH with SHA2</li>
1214
1221
  <li><a href="https://tools.ietf.org/html/draft-ietf-curdle-ssh-modp-dh-sha2-09">diffie-hellman-group18-sha512</a>: 8192 bit DH with SHA2</li>
1215
- <li>~~<a href="https://www.ietf.org/rfc/rfc4419.txt">diffie-hellman-group-exchange-sha1</a>: Custom DH with SHA1~~</li>
1222
+ <li><a href="https://www.ietf.org/rfc/rfc4419.txt">diffie-hellman-group-exchange-sha1</a>: Custom DH with SHA1</li>
1216
1223
  <li><strong><em><a href="https://www.ietf.org/rfc/rfc4419.txt">diffie-hellman-group-exchange-sha256</a>: Custom DH with SHA2</em></strong></li>
1217
- <li>~~ecdh-sha2-nistp256: ECDH over NIST P-256 with SHA2~~</li>
1218
- <li>~~ecdh-sha2-nistp384: ECDH over NIST P-384 with SHA2~~</li>
1219
- <li>~~ecdh-sha2-nistp521: ECDH over NIST P-521 with SHA2~~</li>
1224
+ <li>ecdh-sha2-nistp256: ECDH over NIST P-256 with SHA2</li>
1225
+ <li>ecdh-sha2-nistp384: ECDH over NIST P-384 with SHA2</li>
1226
+ <li>ecdh-sha2-nistp521: ECDH over NIST P-521 with SHA2</li>
1220
1227
  </ol>
1221
1228
  <p>We have to look at 3 things here:</p>
1222
1229
  <ul>
@@ -1233,6 +1240,9 @@ Key exchange <strong>1</strong> (curve25519-sha256) is ideal, <strong>8</strong>
1233
1240
  </ul>
1234
1241
  <p>We are left with <strong>1</strong> and <strong>8</strong>, as well as <strong>4-6</strong> which were added in <a href="https://www.openssh.com/releasenotes.html#7.3">OpenSSH 7.3</a>.
1235
1242
  <strong>1</strong> is better and it's perfectly OK to only support that but for interoperability (with Eclipse, WinSCP), <strong>8</strong> can be included.</p>
1243
+ <blockquote>
1244
+ <p><strong><em>NOTE:</em></strong>: 8 should no longer be necessary in newer versions of WinSCP. If in doubt, test with only 1 first. Add 8 if it won't connect otherwise.</p>
1245
+ </blockquote>
1236
1246
  <p>Recommended <code>/etc/ssh/sshd_config</code> snippet:</p>
1237
1247
  <pre><code id="server-kex">KexAlgorithms curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256</code></pre>
1238
1248
 
@@ -1244,6 +1254,9 @@ Key exchange <strong>1</strong> (curve25519-sha256) is ideal, <strong>8</strong>
1244
1254
  Host *
1245
1255
  KexAlgorithms curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256</code></pre>
1246
1256
 
1257
+ <blockquote>
1258
+ <p><strong><em>NOTE:</em></strong> GitHub should no longer need a separate setting, as they've transitioned away from SSH keys. They should not require an exception regardless.</p>
1259
+ </blockquote>
1247
1260
  <p>If you chose to enable <strong>8</strong>, open <code>/etc/ssh/moduli</code> if exists, and delete lines where the 5th column is less than 2000.</p>
1248
1261
  <pre><code id="server-moduli-filter">awk '$5 > 2000' /etc/ssh/moduli > "${HOME}/moduli"
1249
1262
  wc -l "${HOME}/moduli" # make sure there is something left
@@ -1330,25 +1343,25 @@ You can also use a <a href="https://www.cl.cam.ac.uk/~mgk25/otpw.html">printed l
1330
1343
  <hr />
1331
1344
  <h2 id="symmetric-ciphers">Symmetric ciphers</h2>
1332
1345
  <blockquote>
1333
- <p>Emphasis added.</p>
1346
+ <p><strong><em>NOTE:</em></strong> Emphasis added.</p>
1334
1347
  </blockquote>
1335
1348
  <p>Symmetric ciphers are used to encrypt the data after the initial key exchange and authentication is complete.</p>
1336
1349
  <p>Here we have quite a few algorithms (10-14 were removed in <a href="https://www.openssh.com/releasenotes.html#7.6">OpenSSH 7.6</a>):</p>
1337
1350
  <ol>
1338
- <li>~~3des-cbc~~</li>
1339
- <li>~~aes128-cbc~~</li>
1340
- <li>~~aes192-cbc~~</li>
1341
- <li>~~aes256-cbc~~</li>
1351
+ <li>3des-cbc</li>
1352
+ <li>aes128-cbc</li>
1353
+ <li>aes192-cbc</li>
1354
+ <li>aes256-cbc</li>
1342
1355
  <li>aes128-ctr</li>
1343
1356
  <li>aes192-ctr</li>
1344
1357
  <li>aes256-ctr</li>
1345
1358
  <li><strong><em><a href="&#109;&#97;&#105;&#108;&#116;&#111;&#58;&#97;&#101;&#115;&#49;&#50;&#56;&#45;&#103;&#99;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;">&#97;&#101;&#115;&#49;&#50;&#56;&#45;&#103;&#99;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;</a></em></strong></li>
1346
1359
  <li><strong><em><a href="&#109;&#97;&#105;&#108;&#116;&#111;&#58;&#97;&#101;&#115;&#50;&#53;&#54;&#45;&#103;&#99;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;">&#97;&#101;&#115;&#50;&#53;&#54;&#45;&#103;&#99;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;</a></em></strong></li>
1347
- <li>~~arcfour~~</li>
1348
- <li>~~arcfour128~~</li>
1349
- <li>~~arcfour256~~</li>
1350
- <li>~~blowfish-cbc~~</li>
1351
- <li>~~cast128-cbc~~</li>
1360
+ <li>arcfour</li>
1361
+ <li>arcfour128</li>
1362
+ <li>arcfour256</li>
1363
+ <li>blowfish-cbc</li>
1364
+ <li>cast128-cbc</li>
1352
1365
  <li><strong><a href="&#109;&#97;&#105;&#108;&#116;&#111;&#58;&#99;&#104;&#97;&#99;&#104;&#97;&#50;&#48;&#45;&#112;&#111;&#108;&#121;&#49;&#51;&#48;&#53;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;">&#99;&#104;&#97;&#99;&#104;&#97;&#50;&#48;&#45;&#112;&#111;&#108;&#121;&#49;&#51;&#48;&#53;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;</a></strong></li>
1353
1366
  </ol>
1354
1367
  <p>We have to consider the following:</p>
@@ -1404,21 +1417,21 @@ It's even worse because no one said that a MAC's output can't leak what its inpu
1404
1417
  SSH by default, uses this method.</p>
1405
1418
  <p>Here are the available MAC choices:</p>
1406
1419
  <ol>
1407
- <li>~~hmac-md5~~</li>
1408
- <li>~~hmac-md5-96~~</li>
1409
- <li>~~hmac-sha1~~</li>
1410
- <li>~~hmac-sha1-96~~</li>
1420
+ <li>hmac-md5</li>
1421
+ <li>hmac-md5-96</li>
1422
+ <li>hmac-sha1</li>
1423
+ <li>hmac-sha1-96</li>
1411
1424
  <li>hmac-sha2-256</li>
1412
1425
  <li>hmac-sha2-512</li>
1413
- <li>~~umac-64~~</li>
1426
+ <li>umac-64</li>
1414
1427
  <li>umac-128</li>
1415
- <li>~~<a href="&#109;&#97;&#105;&#108;&#116;&#111;&#58;&#104;&#109;&#97;&#99;&#45;&#109;&#100;&#53;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;">&#104;&#109;&#97;&#99;&#45;&#109;&#100;&#53;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;</a>~~</li>
1416
- <li>~~<a href="&#109;&#97;&#105;&#108;&#116;&#111;&#58;&#104;&#109;&#97;&#99;&#45;&#109;&#100;&#53;&#45;&#57;&#54;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;">&#104;&#109;&#97;&#99;&#45;&#109;&#100;&#53;&#45;&#57;&#54;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;</a>~~</li>
1417
- <li>~~<a href="&#109;&#97;&#105;&#108;&#116;&#111;&#58;&#104;&#109;&#97;&#99;&#45;&#115;&#104;&#97;&#49;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;">&#104;&#109;&#97;&#99;&#45;&#115;&#104;&#97;&#49;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;</a>~~</li>
1418
- <li>~~<a href="&#109;&#97;&#105;&#108;&#116;&#111;&#58;&#104;&#109;&#97;&#99;&#45;&#115;&#104;&#97;&#49;&#45;&#57;&#54;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;">&#104;&#109;&#97;&#99;&#45;&#115;&#104;&#97;&#49;&#45;&#57;&#54;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;</a>~~</li>
1428
+ <li><a href="&#109;&#97;&#105;&#108;&#116;&#111;&#58;&#104;&#109;&#97;&#99;&#45;&#109;&#100;&#53;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;">&#104;&#109;&#97;&#99;&#45;&#109;&#100;&#53;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;</a></li>
1429
+ <li><a href="&#109;&#97;&#105;&#108;&#116;&#111;&#58;&#104;&#109;&#97;&#99;&#45;&#109;&#100;&#53;&#45;&#57;&#54;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;">&#104;&#109;&#97;&#99;&#45;&#109;&#100;&#53;&#45;&#57;&#54;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;</a></li>
1430
+ <li><a href="&#109;&#97;&#105;&#108;&#116;&#111;&#58;&#104;&#109;&#97;&#99;&#45;&#115;&#104;&#97;&#49;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;">&#104;&#109;&#97;&#99;&#45;&#115;&#104;&#97;&#49;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;</a></li>
1431
+ <li><a href="&#109;&#97;&#105;&#108;&#116;&#111;&#58;&#104;&#109;&#97;&#99;&#45;&#115;&#104;&#97;&#49;&#45;&#57;&#54;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;">&#104;&#109;&#97;&#99;&#45;&#115;&#104;&#97;&#49;&#45;&#57;&#54;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;</a></li>
1419
1432
  <li><strong><a href="&#109;&#97;&#105;&#108;&#116;&#111;&#58;&#104;&#109;&#97;&#99;&#45;&#115;&#104;&#97;&#50;&#45;&#50;&#53;&#54;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;">&#104;&#109;&#97;&#99;&#45;&#115;&#104;&#97;&#50;&#45;&#50;&#53;&#54;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;</a></strong></li>
1420
1433
  <li><strong><a href="&#109;&#97;&#105;&#108;&#116;&#111;&#58;&#104;&#109;&#97;&#99;&#45;&#115;&#104;&#97;&#50;&#45;&#53;&#49;&#50;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;">&#104;&#109;&#97;&#99;&#45;&#115;&#104;&#97;&#50;&#45;&#53;&#49;&#50;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;</a></strong></li>
1421
- <li>~~<a href="&#109;&#97;&#105;&#108;&#116;&#111;&#58;&#117;&#109;&#97;&#99;&#45;&#54;&#52;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;">&#117;&#109;&#97;&#99;&#45;&#54;&#52;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;</a>~~</li>
1434
+ <li><a href="&#109;&#97;&#105;&#108;&#116;&#111;&#58;&#117;&#109;&#97;&#99;&#45;&#54;&#52;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;">&#117;&#109;&#97;&#99;&#45;&#54;&#52;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;</a></li>
1422
1435
  <li><a href="&#109;&#97;&#105;&#108;&#116;&#111;&#58;&#117;&#109;&#97;&#99;&#45;&#49;&#50;&#56;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;">&#117;&#109;&#97;&#99;&#45;&#49;&#50;&#56;&#45;&#101;&#116;&#109;&#64;&#111;&#112;&#101;&#110;&#115;&#115;&#104;&#46;&#99;&#111;&#109;</a></li>
1423
1436
  </ol>
1424
1437
  <p>The selection considerations:</p>
@@ -1131,6 +1131,13 @@
1131
1131
  </div>
1132
1132
  </li>
1133
1133
 
1134
+ <li class="md-nav__item">
1135
+ <div class="md-nav__link">
1136
+ <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path d="M15 13h1.5v2.82l2.44 1.41-.75 1.3L15 16.69zm4-5H5v11h4.67c-.43-.91-.67-1.93-.67-3a7 7 0 0 1 7-7c1.07 0 2.09.24 3 .67zM5 21a2 2 0 0 1-2-2V5c0-1.11.89-2 2-2h1V1h2v2h8V1h2v2h1a2 2 0 0 1 2 2v6.1c1.24 1.26 2 2.99 2 4.9a7 7 0 0 1-7 7c-1.91 0-3.64-.76-4.9-2zm11-9.85A4.85 4.85 0 0 0 11.15 16c0 2.68 2.17 4.85 4.85 4.85A4.85 4.85 0 0 0 20.85 16c0-2.68-2.17-4.85-4.85-4.85"/></svg>
1137
+ <time datetime="2025-05-05 00:00:00+00:00" class="md-ellipsis">May 5, 2025</time>
1138
+ </div>
1139
+ </li>
1140
+
1134
1141
 
1135
1142
 
1136
1143
 
@@ -1188,38 +1195,38 @@
1188
1195
  <!-- markdownlint-disable-file -->
1189
1196
 
1190
1197
  <h2 id="welcome-to-the-network-protm-blog-cybersecurity-privacy-open-knowledge">🛡️ Welcome to the Network Pro&trade; Blog: Cybersecurity. Privacy. Open Knowledge.</h2>
1191
- <p>In an era where digital threats are escalating and data privacy is under constant siege, <strong>trust is built on transparency, integrity, and expertise</strong>. At <strong>Network Pro Strategies</strong>, we don’t just secure networks—we <strong>empower organizations and individuals to reclaim control over their digital environments</strong>.</p>
1192
- <p>Today, we proudly launch our official blog: your trusted source for <strong>cutting-edge insights, hands-on implementation strategies, and privacy-first technology advocacy</strong> in the world of cybersecurity and digital infrastructure.</p>
1198
+ <p>In a digital world where threats are persistent and privacy is too often an afterthought, <strong>Network Pro Strategies</strong> was founded on a belief that <strong>effective security doesn't require compromise</strong>. We specialize in helping organizations and individuals <strong>navigate today’s cybersecurity challenges with confidence, clarity, and control</strong>.</p>
1199
+ <p>Today marks the launch of our official blogyour go-to destination for <strong>field-tested strategies, implementation insights, and transparent thought leadership</strong> across cybersecurity, network defense, and privacy-aware infrastructure.</p>
1193
1200
  <hr />
1194
1201
  <h3 id="why-this-blog-exists">📡 Why This Blog Exists</h3>
1195
- <p>Security today is about more than firewalls and passwords. It’s about <strong>making informed decisions</strong> that respect your data, your autonomy, and your mission. This blog is an extension of our commitment to:</p>
1202
+ <p>Modern security isn’t just about technology—it’s about <strong>trust, autonomy, and informed choices</strong>. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.</p>
1203
+ <p>This blog represents our commitment to providing value through:</p>
1196
1204
  <ul>
1197
- <li>💼 <strong>SMBs and enterprises</strong> seeking scalable, resilient security architecture</li>
1198
- <li>🏛️ <strong>Government and regulated</strong> sectors navigating risk, compliance, and national security concerns</li>
1199
- <li>👨‍💻 <strong>Privacy-aware professionals and open-source communities</strong> looking for trusted, non-invasive software solutions</li>
1205
+ <li>💼 <strong>SMBs and enterprises</strong> needing tailored, scalable security that protects business continuity</li>
1206
+ <li>🏛️ <strong>Government and compliance-sensitive sectors</strong> where resilience and data integrity are mission-critical</li>
1207
+ <li>👨‍💻 <strong>Technologists and privacy-conscious communities</strong> seeking reliable strategies and tools that don’t trade transparency for control</li>
1200
1208
  </ul>
1201
1209
  <!-- more -->
1202
1210
 
1203
1211
  <hr />
1204
1212
  <h3 id="what-youll-find-here">📬 What You’ll Find Here</h3>
1205
- <p>This is more than just another tech blog. It’s a <strong>resource center designed to keep you protected and informed</strong>. Expect regular updates covering:</p>
1213
+ <p>You won’t find empty buzzwords or vendor lock-in here. This space is <strong>practical, accessible, and real</strong>. Expect content grounded in hands-on consulting experience, addressing real-world needs like:</p>
1206
1214
  <ul>
1207
- <li>🛠️ <strong>Cybersecurity consulting and implementation strategies</strong> for real-world problems</li>
1208
- <li>🔐 <strong>Guides on fortifying infrastructure</strong> with a focus on zero trust, secure design, and digital sovereignty</li>
1209
- <li>🌐 <strong>Educational spotlights on Free and Open Source Software (FOSS)</strong> that respect user freedom and privacy</li>
1210
- <li>📱 <strong>Privacy-respecting Android &amp; Linux tools and best practices</strong>, including device hardening, secure communications, FOSS apps, and de-Googled alternatives</li>
1211
- <li>🎯 <strong>How-to content</strong> to implement secure, open, and ethical technology stacks at scale</li>
1215
+ <li>🔐 <strong>Guides on securing infrastructure</strong> through Zero Trust principles, secure network design, segmentation, and data governance</li>
1216
+ <li>🌐 <strong>Exploration of free and open source tools</strong> that align with professional-grade expectations for security and usability</li>
1217
+ <li>📱 <strong>Best practices for mobile and endpoint hardening</strong>, including private-by-design communications and de-Googled Android stacks</li>
1218
+ <li>⚙️ <strong>Scalable implementation tips</strong> for building resilient, ethical, and vendor-neutral technology environments</li>
1212
1219
  </ul>
1213
- <p>Whether you're managing enterprise risk or simply seeking better tools for your team, you’ll get <strong>clear, actionable content—no gatekeeping, no jargon</strong>.</p>
1220
+ <p>We’ll also publish tutorials, deep dives, and threat-focused analyses to help you <strong>anticipate risk, strengthen defenses, and stay informed</strong>—no jargon, no gatekeeping.</p>
1214
1221
  <hr />
1215
1222
  <h3 id="our-vision-security-that-respects-you">✅ Our Vision: Security That Respects You</h3>
1216
- <p>At <strong>Network Pro&trade;</strong>, we don’t believe in security that comes at the cost of privacy. That's why we advocate for, deploy, and educate clients on <strong>privacy-centric, free and open source alternatives</strong> to proprietary platforms &mdash; when and where appropriate &mdash; that too often compromise transparency.</p>
1217
- <p>From hardened Android ROMs to Linux-powered secure infrastructure, we <strong>walk the talk</strong> when it comes to defending digital freedom while delivering enterprise-grade security.</p>
1223
+ <p>At <strong>Network Pro™</strong>, we believe security should be <strong>transparent, adaptable, and aligned with your goals</strong>. While we advocate for privacy-first solutions and actively support open technologies, we apply them with discretion—not dogma. Our priority is delivering <strong>reliable, resilient results</strong>, whether through open source tools or vetted proprietary platforms.</p>
1224
+ <p>We serve as trusted advisors for navigating today’s threat landscape—delivering infrastructure consulting, cloud and hybrid architecture support, and technical guidance rooted in industry experience. Our approach is <strong>practical, flexible, and future-focused</strong>, designed to protect what matters most without sacrificing visibility or control.</p>
1218
1225
  <hr />
1219
1226
  <h3 id="ready-to-build-a-safer-smarter-digital-future">🔐 Ready to Build a Safer, Smarter Digital Future?</h3>
1220
- <p>Cybersecurity is a journeyand were here to walk it with you. Whether you're upgrading your digital infrastructure or seeking alternatives to proprietary software, we offer <strong>consulting and implementation</strong> to help you build long-term resilience.</p>
1221
- <p>📩 <a href="https://contact.neteng.pro">Contact us</a> today to explore how we can help secure your systems—without sacrificing control or transparency.</p>
1222
- <p>&nbsp;</p>
1227
+ <p>Cybersecurity isn’t just a productits a process. Whether you're designing secure networks, navigating digital privacy concerns, or evaluating new tools, <strong>Network Pro&trade;</strong> is here to support your mission.</p>
1228
+ <p>Let’s build something secure, sustainable, and respectful of your values.</p>
1229
+ <p>📩 <a href="https://contact.neteng.pro">Contact us</a> today to get started.</p>
1223
1230
  <hr />
1224
1231
  <div style="font-size: 12px; text-align: center;">
1225
1232
 
@@ -1076,15 +1076,22 @@
1076
1076
  <h2 id="secure-secure-shell"><a class="toclink" href="../../2015/01/04/secure-secure-shell/">Secure Secure Shell</a></h2>
1077
1077
  <!-- markdownlint-disable-file -->
1078
1078
 
1079
- <blockquote>
1080
- <p><div style="font-size: small;"><strong><em>Originally published on 1/4/2015 as "Secure Secure Shell" by <a href="https://github.com/stribika">stribika</a> at:<br />
1081
- https://blog.stribik.technology/2015/01/04/secure-secure-shell.html</em></strong></p>
1082
- <p>Mirrored to preserve information. Minor changes have been made. This is noted where applicable. Also see:<br />
1083
- <a href="https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices">https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices</a></p>
1084
- <blockquote>
1085
- <p>📝 <strong><em>NOTE:</em></strong> Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.</div></p>
1086
- </blockquote>
1087
- </blockquote>
1079
+ <div style="font-size: small; font-style: italic;">
1080
+
1081
+ > **Originally published on 1/4/2015 by [stribika](https://github.com/stribika) at:
1082
+ > [https://blog.stribik.technology/2015/01/04/secure-secure-shell.html](https://blog.stribik.technology/2015/01/04/secure-secure-shell.html)**
1083
+ >
1084
+ > Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:
1085
+ > <https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices>
1086
+
1087
+ </div>
1088
+
1089
+ <div style="font-size: small;">
1090
+
1091
+ > > 📝 **_NOTE:_** Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.
1092
+
1093
+ </div>
1094
+
1088
1095
  <ul>
1089
1096
  <li><a href="../../2015/01/04/secure-secure-shell/#sshd">Skip to the good part.</a></li>
1090
1097
  </ul>
@@ -1075,15 +1075,16 @@
1075
1075
  <!-- markdownlint-disable-file -->
1076
1076
 
1077
1077
  <h3 id="welcome-to-the-network-protm-blog-cybersecurity-privacy-open-knowledge"><a class="toclink" href="../../2025/04/30/our-blog-is-live/#welcome-to-the-network-protm-blog-cybersecurity-privacy-open-knowledge">🛡️ Welcome to the Network Pro&trade; Blog: Cybersecurity. Privacy. Open Knowledge.</a></h3>
1078
- <p>In an era where digital threats are escalating and data privacy is under constant siege, <strong>trust is built on transparency, integrity, and expertise</strong>. At <strong>Network Pro Strategies</strong>, we don’t just secure networks—we <strong>empower organizations and individuals to reclaim control over their digital environments</strong>.</p>
1079
- <p>Today, we proudly launch our official blog: your trusted source for <strong>cutting-edge insights, hands-on implementation strategies, and privacy-first technology advocacy</strong> in the world of cybersecurity and digital infrastructure.</p>
1078
+ <p>In a digital world where threats are persistent and privacy is too often an afterthought, <strong>Network Pro Strategies</strong> was founded on a belief that <strong>effective security doesn't require compromise</strong>. We specialize in helping organizations and individuals <strong>navigate today’s cybersecurity challenges with confidence, clarity, and control</strong>.</p>
1079
+ <p>Today marks the launch of our official blogyour go-to destination for <strong>field-tested strategies, implementation insights, and transparent thought leadership</strong> across cybersecurity, network defense, and privacy-aware infrastructure.</p>
1080
1080
  <hr />
1081
1081
  <h4 id="why-this-blog-exists"><a class="toclink" href="../../2025/04/30/our-blog-is-live/#why-this-blog-exists">📡 Why This Blog Exists</a></h4>
1082
- <p>Security today is about more than firewalls and passwords. It’s about <strong>making informed decisions</strong> that respect your data, your autonomy, and your mission. This blog is an extension of our commitment to:</p>
1082
+ <p>Modern security isn’t just about technology—it’s about <strong>trust, autonomy, and informed choices</strong>. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.</p>
1083
+ <p>This blog represents our commitment to providing value through:</p>
1083
1084
  <ul>
1084
- <li>💼 <strong>SMBs and enterprises</strong> seeking scalable, resilient security architecture</li>
1085
- <li>🏛️ <strong>Government and regulated</strong> sectors navigating risk, compliance, and national security concerns</li>
1086
- <li>👨‍💻 <strong>Privacy-aware professionals and open-source communities</strong> looking for trusted, non-invasive software solutions</li>
1085
+ <li>💼 <strong>SMBs and enterprises</strong> needing tailored, scalable security that protects business continuity</li>
1086
+ <li>🏛️ <strong>Government and compliance-sensitive sectors</strong> where resilience and data integrity are mission-critical</li>
1087
+ <li>👨‍💻 <strong>Technologists and privacy-conscious communities</strong> seeking reliable strategies and tools that don’t trade transparency for control</li>
1087
1088
  </ul>
1088
1089
 
1089
1090
 
@@ -1076,15 +1076,22 @@
1076
1076
  <h2 id="secure-secure-shell"><a class="toclink" href="../../2015/01/04/secure-secure-shell/">Secure Secure Shell</a></h2>
1077
1077
  <!-- markdownlint-disable-file -->
1078
1078
 
1079
- <blockquote>
1080
- <p><div style="font-size: small;"><strong><em>Originally published on 1/4/2015 as "Secure Secure Shell" by <a href="https://github.com/stribika">stribika</a> at:<br />
1081
- https://blog.stribik.technology/2015/01/04/secure-secure-shell.html</em></strong></p>
1082
- <p>Mirrored to preserve information. Minor changes have been made. This is noted where applicable. Also see:<br />
1083
- <a href="https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices">https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices</a></p>
1084
- <blockquote>
1085
- <p>📝 <strong><em>NOTE:</em></strong> Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.</div></p>
1086
- </blockquote>
1087
- </blockquote>
1079
+ <div style="font-size: small; font-style: italic;">
1080
+
1081
+ > **Originally published on 1/4/2015 by [stribika](https://github.com/stribika) at:
1082
+ > [https://blog.stribik.technology/2015/01/04/secure-secure-shell.html](https://blog.stribik.technology/2015/01/04/secure-secure-shell.html)**
1083
+ >
1084
+ > Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:
1085
+ > <https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices>
1086
+
1087
+ </div>
1088
+
1089
+ <div style="font-size: small;">
1090
+
1091
+ > > 📝 **_NOTE:_** Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.
1092
+
1093
+ </div>
1094
+
1088
1095
  <ul>
1089
1096
  <li><a href="../../2015/01/04/secure-secure-shell/#sshd">Skip to the good part.</a></li>
1090
1097
  </ul>
@@ -25,7 +25,7 @@
25
25
 
26
26
 
27
27
 
28
- <title>Blog - Index &mdash; Network Pro Strategies - Network Pro Strategies</title>
28
+ <title>Blog Home - Network Pro Strategies</title>
29
29
 
30
30
 
31
31
 
@@ -71,7 +71,7 @@
71
71
  <div data-md-component="skip">
72
72
 
73
73
 
74
- <a href="#index" class="md-skip">
74
+ <a href="#blog-home" class="md-skip">
75
75
  Skip to content
76
76
  </a>
77
77
 
@@ -104,7 +104,7 @@
104
104
  <div class="md-header__topic" data-md-component="header-topic">
105
105
  <span class="md-ellipsis">
106
106
 
107
- Blog - Index &mdash; Network Pro Strategies
107
+ Blog Home
108
108
 
109
109
  </span>
110
110
  </div>
@@ -1024,7 +1024,7 @@
1024
1024
  <header class="md-typeset">
1025
1025
  <p><sup><a href="https://spdx.dev/learn/handling-license-info/">SPDX-License-Identifier</a>:
1026
1026
  <code>CC-BY-4.0 OR GPL-3.0-or-later</code></sup></p>
1027
- <h1 id="index">Index</h1>
1027
+ <h1 id="blog-home">Blog Home</h1>
1028
1028
  <!-- markdownlint-disable-file -->
1029
1029
  </header>
1030
1030
 
@@ -1064,15 +1064,16 @@
1064
1064
  <!-- markdownlint-disable-file -->
1065
1065
 
1066
1066
  <h3 id="welcome-to-the-network-protm-blog-cybersecurity-privacy-open-knowledge"><a class="toclink" href="2025/04/30/our-blog-is-live/#welcome-to-the-network-protm-blog-cybersecurity-privacy-open-knowledge">🛡️ Welcome to the Network Pro&trade; Blog: Cybersecurity. Privacy. Open Knowledge.</a></h3>
1067
- <p>In an era where digital threats are escalating and data privacy is under constant siege, <strong>trust is built on transparency, integrity, and expertise</strong>. At <strong>Network Pro Strategies</strong>, we don’t just secure networks—we <strong>empower organizations and individuals to reclaim control over their digital environments</strong>.</p>
1068
- <p>Today, we proudly launch our official blog: your trusted source for <strong>cutting-edge insights, hands-on implementation strategies, and privacy-first technology advocacy</strong> in the world of cybersecurity and digital infrastructure.</p>
1067
+ <p>In a digital world where threats are persistent and privacy is too often an afterthought, <strong>Network Pro Strategies</strong> was founded on a belief that <strong>effective security doesn't require compromise</strong>. We specialize in helping organizations and individuals <strong>navigate today’s cybersecurity challenges with confidence, clarity, and control</strong>.</p>
1068
+ <p>Today marks the launch of our official blogyour go-to destination for <strong>field-tested strategies, implementation insights, and transparent thought leadership</strong> across cybersecurity, network defense, and privacy-aware infrastructure.</p>
1069
1069
  <hr />
1070
1070
  <h4 id="why-this-blog-exists"><a class="toclink" href="2025/04/30/our-blog-is-live/#why-this-blog-exists">📡 Why This Blog Exists</a></h4>
1071
- <p>Security today is about more than firewalls and passwords. It’s about <strong>making informed decisions</strong> that respect your data, your autonomy, and your mission. This blog is an extension of our commitment to:</p>
1071
+ <p>Modern security isn’t just about technology—it’s about <strong>trust, autonomy, and informed choices</strong>. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.</p>
1072
+ <p>This blog represents our commitment to providing value through:</p>
1072
1073
  <ul>
1073
- <li>💼 <strong>SMBs and enterprises</strong> seeking scalable, resilient security architecture</li>
1074
- <li>🏛️ <strong>Government and regulated</strong> sectors navigating risk, compliance, and national security concerns</li>
1075
- <li>👨‍💻 <strong>Privacy-aware professionals and open-source communities</strong> looking for trusted, non-invasive software solutions</li>
1074
+ <li>💼 <strong>SMBs and enterprises</strong> needing tailored, scalable security that protects business continuity</li>
1075
+ <li>🏛️ <strong>Government and compliance-sensitive sectors</strong> where resilience and data integrity are mission-critical</li>
1076
+ <li>👨‍💻 <strong>Technologists and privacy-conscious communities</strong> seeking reliable strategies and tools that don’t trade transparency for control</li>
1076
1077
  </ul>
1077
1078
 
1078
1079
 
@@ -1122,15 +1123,22 @@
1122
1123
  <h2 id="secure-secure-shell"><a class="toclink" href="2015/01/04/secure-secure-shell/">Secure Secure Shell</a></h2>
1123
1124
  <!-- markdownlint-disable-file -->
1124
1125
 
1125
- <blockquote>
1126
- <p><div style="font-size: small;"><strong><em>Originally published on 1/4/2015 as "Secure Secure Shell" by <a href="https://github.com/stribika">stribika</a> at:<br />
1127
- https://blog.stribik.technology/2015/01/04/secure-secure-shell.html</em></strong></p>
1128
- <p>Mirrored to preserve information. Minor changes have been made. This is noted where applicable. Also see:<br />
1129
- <a href="https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices">https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices</a></p>
1130
- <blockquote>
1131
- <p>📝 <strong><em>NOTE:</em></strong> Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.</div></p>
1132
- </blockquote>
1133
- </blockquote>
1126
+ <div style="font-size: small; font-style: italic;">
1127
+
1128
+ > **Originally published on 1/4/2015 by [stribika](https://github.com/stribika) at:
1129
+ > [https://blog.stribik.technology/2015/01/04/secure-secure-shell.html](https://blog.stribik.technology/2015/01/04/secure-secure-shell.html)**
1130
+ >
1131
+ > Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:
1132
+ > <https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices>
1133
+
1134
+ </div>
1135
+
1136
+ <div style="font-size: small;">
1137
+
1138
+ > > 📝 **_NOTE:_** Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.
1139
+
1140
+ </div>
1141
+
1134
1142
  <ul>
1135
1143
  <li><a href="2015/01/04/secure-secure-shell/#sshd">Skip to the good part.</a></li>
1136
1144
  </ul>
@@ -1 +1 @@
1
- {"version": "https://jsonfeed.org/version/1", "title": "Network Pro Strategies", "home_page_url": "https://netwk.pro/docs/", "feed_url": "https://netwk.pro/docs/feed_json_created.json", "description": null, "icon": null, "authors": [], "language": "en", "items": [{"id": "https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/", "url": "https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/", "title": "Our Blog is Live!", "content_html": "<p><sup><a href=\"https://spdx.dev/learn/handling-license-info/\">SPDX-License-Identifier</a>:\n<code>CC-BY-4.0 OR GPL-3.0-or-later</code></sup></p>\n<h1>We're Live!</h1>\n<!-- markdownlint-disable-file -->\n\n<h2>\ud83d\udee1\ufe0f Welcome to the Network Pro&trade; Blog: Cybersecurity. Privacy. Open Knowledge.</h2>\n<p>In an era where digital threats are escalating and data privacy is under constant siege, <strong>trust is built on transparency, integrity, and expertise</strong>. At <strong>Network Pro Strategies</strong>, we don\u2019t just secure networks\u2014we <strong>empower organizations and individuals to reclaim control over their digital environments</strong>.</p>\n<p>Today, we proudly launch our official blog: your trusted source for <strong>cutting-edge insights, hands-on implementation strategies, and privacy-first technology advocacy</strong> in the world of cybersecurity and digital infrastructure.</p>\n<hr>\n<h3>\ud83d\udce1 Why This Blog Exists</h3>\n<p>Security today is about more than firewalls and passwords. It\u2019s about <strong>making informed decisions</strong> that respect your data, your autonomy, and your mission. This blog is an extension of our commitment to:</p>\n<ul>\n<li>\ud83d\udcbc <strong>SMBs and enterprises</strong> seeking scalable, resilient security architecture</li>\n<li>\ud83c\udfdb\ufe0f <strong>Government and regulated</strong> sectors navigating risk, compliance, and national security concerns</li>\n<li>\ud83d\udc68\u200d\ud83d\udcbb <strong>Privacy-aware professionals and open-source communities</strong> looking for trusted, non-invasive software solutions</li>\n</ul>", "image": null, "date_published": "2025-04-30T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}, {"id": "https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/", "url": "https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/", "title": "Secure Secure Shell", "content_html": "<h1>Secure Secure Shell</h1>\n<!-- markdownlint-disable-file -->\n\n<blockquote>\n<p><div style=\"font-size: small;\"><strong><em>Originally published on 1/4/2015 as \"Secure Secure Shell\" by <a href=\"https://github.com/stribika\">stribika</a> at:<br>\nhttps://blog.stribik.technology/2015/01/04/secure-secure-shell.html</em></strong></p>\n<p>Mirrored to preserve information. Minor changes have been made. This is noted where applicable. Also see:<br>\n<a href=\"https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices\">https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices</a></p>\n<blockquote>\n<p>\ud83d\udcdd <strong><em>NOTE:</em></strong> Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.</div></p>\n</blockquote>\n</blockquote>\n<ul>\n<li><a href=\"#sshd\">Skip to the good part.</a></li>\n</ul>\n<p>You may have heard that the NSA can decrypt SSH at least some of the time.\nIf you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.</p>\n<p>TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.</p>", "image": null, "date_published": "2015-01-04T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}]}
1
+ {"version": "https://jsonfeed.org/version/1", "title": "Network Pro Strategies", "home_page_url": "https://netwk.pro/docs/", "feed_url": "https://netwk.pro/docs/feed_json_created.json", "description": null, "icon": null, "authors": [], "language": "en", "items": [{"id": "https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/", "url": "https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/", "title": "Our Blog is Live!", "content_html": "<p><sup><a href=\"https://spdx.dev/learn/handling-license-info/\">SPDX-License-Identifier</a>:\n<code>CC-BY-4.0 OR GPL-3.0-or-later</code></sup></p>\n<h1>We're Live!</h1>\n<!-- markdownlint-disable-file -->\n\n<h2>\ud83d\udee1\ufe0f Welcome to the Network Pro&trade; Blog: Cybersecurity. Privacy. Open Knowledge.</h2>\n<p>In a digital world where threats are persistent and privacy is too often an afterthought, <strong>Network Pro Strategies</strong> was founded on a belief that <strong>effective security doesn't require compromise</strong>. We specialize in helping organizations and individuals <strong>navigate today\u2019s cybersecurity challenges with confidence, clarity, and control</strong>.</p>\n<p>Today marks the launch of our official blog\u2014your go-to destination for <strong>field-tested strategies, implementation insights, and transparent thought leadership</strong> across cybersecurity, network defense, and privacy-aware infrastructure.</p>\n<hr>\n<h3>\ud83d\udce1 Why This Blog Exists</h3>\n<p>Modern security isn\u2019t just about technology\u2014it\u2019s about <strong>trust, autonomy, and informed choices</strong>. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.</p>\n<p>This blog represents our commitment to providing value through:</p>\n<ul>\n<li>\ud83d\udcbc <strong>SMBs and enterprises</strong> needing tailored, scalable security that protects business continuity</li>\n<li>\ud83c\udfdb\ufe0f <strong>Government and compliance-sensitive sectors</strong> where resilience and data integrity are mission-critical</li>\n<li>\ud83d\udc68\u200d\ud83d\udcbb <strong>Technologists and privacy-conscious communities</strong> seeking reliable strategies and tools that don\u2019t trade transparency for control</li>\n</ul>", "image": null, "date_published": "2025-04-30T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}, {"id": "https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/", "url": "https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/", "title": "Secure Secure Shell", "content_html": "<h1>Secure Secure Shell</h1>\n<!-- markdownlint-disable-file -->\n\n<div style=\"font-size: small; font-style: italic;\">\n\n> **Originally published on 1/4/2015 by [stribika](https://github.com/stribika) at: \n> [https://blog.stribik.technology/2015/01/04/secure-secure-shell.html](https://blog.stribik.technology/2015/01/04/secure-secure-shell.html)**\n>\n> Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see: \n> <https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices>\n\n</div>\n\n<div style=\"font-size: small;\">\n\n> > \ud83d\udcdd **_NOTE:_** Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.\n\n</div>\n\n<ul>\n<li><a href=\"#sshd\">Skip to the good part.</a></li>\n</ul>\n<p>You may have heard that the NSA can decrypt SSH at least some of the time.\nIf you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.</p>\n<p>TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.</p>", "image": null, "date_published": "2015-01-04T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}]}
@@ -1 +1 @@
1
- {"version": "https://jsonfeed.org/version/1", "title": "Network Pro Strategies", "home_page_url": "https://netwk.pro/docs/", "feed_url": "https://netwk.pro/docs/feed_json_updated.json", "description": null, "icon": null, "authors": [], "language": "en", "items": [{"id": "https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/", "url": "https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/", "title": "Our Blog is Live!", "content_html": "<p><sup><a href=\"https://spdx.dev/learn/handling-license-info/\">SPDX-License-Identifier</a>:\n<code>CC-BY-4.0 OR GPL-3.0-or-later</code></sup></p>\n<h1>We're Live!</h1>\n<!-- markdownlint-disable-file -->\n\n<h2>\ud83d\udee1\ufe0f Welcome to the Network Pro&trade; Blog: Cybersecurity. Privacy. Open Knowledge.</h2>\n<p>In an era where digital threats are escalating and data privacy is under constant siege, <strong>trust is built on transparency, integrity, and expertise</strong>. At <strong>Network Pro Strategies</strong>, we don\u2019t just secure networks\u2014we <strong>empower organizations and individuals to reclaim control over their digital environments</strong>.</p>\n<p>Today, we proudly launch our official blog: your trusted source for <strong>cutting-edge insights, hands-on implementation strategies, and privacy-first technology advocacy</strong> in the world of cybersecurity and digital infrastructure.</p>\n<hr>\n<h3>\ud83d\udce1 Why This Blog Exists</h3>\n<p>Security today is about more than firewalls and passwords. It\u2019s about <strong>making informed decisions</strong> that respect your data, your autonomy, and your mission. This blog is an extension of our commitment to:</p>\n<ul>\n<li>\ud83d\udcbc <strong>SMBs and enterprises</strong> seeking scalable, resilient security architecture</li>\n<li>\ud83c\udfdb\ufe0f <strong>Government and regulated</strong> sectors navigating risk, compliance, and national security concerns</li>\n<li>\ud83d\udc68\u200d\ud83d\udcbb <strong>Privacy-aware professionals and open-source communities</strong> looking for trusted, non-invasive software solutions</li>\n</ul>", "image": null, "date_modified": "2025-04-30T14:33:25+00:00", "authors": [{"name": "Network Pro"}], "tags": null}, {"id": "https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/", "url": "https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/", "title": "Secure Secure Shell", "content_html": "<h1>Secure Secure Shell</h1>\n<!-- markdownlint-disable-file -->\n\n<blockquote>\n<p><div style=\"font-size: small;\"><strong><em>Originally published on 1/4/2015 as \"Secure Secure Shell\" by <a href=\"https://github.com/stribika\">stribika</a> at:<br>\nhttps://blog.stribik.technology/2015/01/04/secure-secure-shell.html</em></strong></p>\n<p>Mirrored to preserve information. Minor changes have been made. This is noted where applicable. Also see:<br>\n<a href=\"https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices\">https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices</a></p>\n<blockquote>\n<p>\ud83d\udcdd <strong><em>NOTE:</em></strong> Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.</div></p>\n</blockquote>\n</blockquote>\n<ul>\n<li><a href=\"#sshd\">Skip to the good part.</a></li>\n</ul>\n<p>You may have heard that the NSA can decrypt SSH at least some of the time.\nIf you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.</p>\n<p>TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.</p>", "image": null, "date_modified": "2025-04-30T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}]}
1
+ {"version": "https://jsonfeed.org/version/1", "title": "Network Pro Strategies", "home_page_url": "https://netwk.pro/docs/", "feed_url": "https://netwk.pro/docs/feed_json_updated.json", "description": null, "icon": null, "authors": [], "language": "en", "items": [{"id": "https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/", "url": "https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/", "title": "Our Blog is Live!", "content_html": "<p><sup><a href=\"https://spdx.dev/learn/handling-license-info/\">SPDX-License-Identifier</a>:\n<code>CC-BY-4.0 OR GPL-3.0-or-later</code></sup></p>\n<h1>We're Live!</h1>\n<!-- markdownlint-disable-file -->\n\n<h2>\ud83d\udee1\ufe0f Welcome to the Network Pro&trade; Blog: Cybersecurity. Privacy. Open Knowledge.</h2>\n<p>In a digital world where threats are persistent and privacy is too often an afterthought, <strong>Network Pro Strategies</strong> was founded on a belief that <strong>effective security doesn't require compromise</strong>. We specialize in helping organizations and individuals <strong>navigate today\u2019s cybersecurity challenges with confidence, clarity, and control</strong>.</p>\n<p>Today marks the launch of our official blog\u2014your go-to destination for <strong>field-tested strategies, implementation insights, and transparent thought leadership</strong> across cybersecurity, network defense, and privacy-aware infrastructure.</p>\n<hr>\n<h3>\ud83d\udce1 Why This Blog Exists</h3>\n<p>Modern security isn\u2019t just about technology\u2014it\u2019s about <strong>trust, autonomy, and informed choices</strong>. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.</p>\n<p>This blog represents our commitment to providing value through:</p>\n<ul>\n<li>\ud83d\udcbc <strong>SMBs and enterprises</strong> needing tailored, scalable security that protects business continuity</li>\n<li>\ud83c\udfdb\ufe0f <strong>Government and compliance-sensitive sectors</strong> where resilience and data integrity are mission-critical</li>\n<li>\ud83d\udc68\u200d\ud83d\udcbb <strong>Technologists and privacy-conscious communities</strong> seeking reliable strategies and tools that don\u2019t trade transparency for control</li>\n</ul>", "image": null, "date_modified": "2025-05-05T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}, {"id": "https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/", "url": "https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/", "title": "Secure Secure Shell", "content_html": "<h1>Secure Secure Shell</h1>\n<!-- markdownlint-disable-file -->\n\n<div style=\"font-size: small; font-style: italic;\">\n\n> **Originally published on 1/4/2015 by [stribika](https://github.com/stribika) at: \n> [https://blog.stribik.technology/2015/01/04/secure-secure-shell.html](https://blog.stribik.technology/2015/01/04/secure-secure-shell.html)**\n>\n> Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see: \n> <https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices>\n\n</div>\n\n<div style=\"font-size: small;\">\n\n> > \ud83d\udcdd **_NOTE:_** Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.\n\n</div>\n\n<ul>\n<li><a href=\"#sshd\">Skip to the good part.</a></li>\n</ul>\n<p>You may have heard that the NSA can decrypt SSH at least some of the time.\nIf you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.</p>\n<p>TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.</p>", "image": null, "date_modified": "2025-05-04T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}]}