@networkpro/web 0.12.5 → 0.13.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (51) hide show
  1. package/404.html +1 -1
  2. package/README.md +22 -12
  3. package/about.html +71 -53
  4. package/about.html.br +0 -0
  5. package/about.html.gz +0 -0
  6. package/bundle-report.html +39 -0
  7. package/css/default.css +1 -1
  8. package/docs/assets/external/img.shields.io/badge/GitHub_Package_Registry-white.ed8def48.svg +1 -0
  9. package/docs/assets/external/img.shields.io/badge/npmjs-white.681714c1.svg +1 -0
  10. package/docs/blog/2015/01/04/secure-secure-shell/index.html +51 -38
  11. package/docs/blog/2025/04/30/our-blog-is-live/index.html +25 -18
  12. package/docs/blog/archive/2015/index.html +16 -9
  13. package/docs/blog/archive/2025/index.html +7 -6
  14. package/docs/blog/category/security/index.html +16 -9
  15. package/docs/blog/index.html +27 -19
  16. package/docs/feed_json_created.json +1 -1
  17. package/docs/feed_json_updated.json +1 -1
  18. package/docs/feed_rss_created.xml +1 -1
  19. package/docs/feed_rss_updated.xml +1 -1
  20. package/docs/index.html +31 -23
  21. package/docs/search/search_index.json +1 -1
  22. package/docs/sitemap.xml +13 -13
  23. package/docs/sitemap.xml.gz +0 -0
  24. package/docs/tags/index.html +3 -3
  25. package/html/spotlight.html +10 -10
  26. package/html/spotlight.html.br +0 -0
  27. package/html/spotlight.html.gz +0 -0
  28. package/img/linkedin-banner-new.png +0 -0
  29. package/img/qr/pgp-contact.png +0 -0
  30. package/index.html +36 -24
  31. package/index.html.br +0 -0
  32. package/index.html.gz +0 -0
  33. package/legal.html +22 -22
  34. package/legal.html.br +0 -0
  35. package/legal.html.gz +0 -0
  36. package/package.json +16 -13
  37. package/privacy.html +17 -16
  38. package/privacy.html.br +0 -0
  39. package/privacy.html.gz +0 -0
  40. package/sitemap.xml +67 -7
  41. package/terms-and-conditions.html +19 -19
  42. package/terms-and-conditions.html.br +0 -0
  43. package/terms-and-conditions.html.gz +0 -0
  44. package/terms-of-use.html +17 -16
  45. package/terms-of-use.html.br +0 -0
  46. package/terms-of-use.html.gz +0 -0
  47. package/docs/assets/external/github.com/netwk-pro/netwk-pro.github.io/actions/workflows/upload.yml/badge.svg +0 -35
  48. package/docs/assets/external/github.com/netwk-pro/netwk-pro.github.io/actions/workflows/webpack.yml/badge.56403977.svg +0 -35
  49. package/docs/assets/external/img.shields.io/badge/Contributor Covenant-2.1-4baaaa.svg +0 -1
  50. package/docs/assets/external/img.shields.io/badge/code_style-prettier-ff69b4.3e3c11fa.svg +0 -1
  51. package/docs/assets/external/img.shields.io/npm/v/@networkpro/web.5485edf3.svg +0 -1
@@ -1 +1 @@
1
- <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_created.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>Wed, 30 Apr 2025 22:22:36 -0000</pubDate> <lastBuildDate>Wed, 30 Apr 2025 22:22:36 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;p&gt;&lt;sup&gt;&lt;a href=&#34;https://spdx.dev/learn/handling-license-info/&#34;&gt;SPDX-License-Identifier&lt;/a&gt;:&lt;code&gt;CC-BY-4.0 OR GPL-3.0-or-later&lt;/code&gt;&lt;/sup&gt;&lt;/p&gt;&lt;h1&gt;We&#39;re Live!&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge.&lt;/h2&gt;&lt;p&gt;In an era where digital threats are escalating and data privacy is under constant siege, &lt;strong&gt;trust is built on transparency, integrity, and expertise&lt;/strong&gt;. At &lt;strong&gt;Network Pro Strategies&lt;/strong&gt;, we don’t just secure networks—we &lt;strong&gt;empower organizations and individuals to reclaim control over their digital environments&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today, we proudly launch our official blog: your trusted source for &lt;strong&gt;cutting-edge insights, hands-on implementation strategies, and privacy-first technology advocacy&lt;/strong&gt; in the world of cybersecurity and digital infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Security today is about more than firewalls and passwords. It’s about &lt;strong&gt;making informed decisions&lt;/strong&gt; that respect your data, your autonomy, and your mission. This blog is an extension of our commitment to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;💼 &lt;strong&gt;SMBs and enterprises&lt;/strong&gt; seeking scalable, resilient security architecture&lt;/li&gt;&lt;li&gt;🏛️ &lt;strong&gt;Government and regulated&lt;/strong&gt; sectors navigating risk, compliance, and national security concerns&lt;/li&gt;&lt;li&gt;👨‍💻 &lt;strong&gt;Privacy-aware professionals and open-source communities&lt;/strong&gt; looking for trusted, non-invasive software solutions&lt;/li&gt;&lt;/ul&gt;</description><link>https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;blockquote&gt;&lt;p&gt;&lt;div style=&#34;font-size: small;&#34;&gt;&lt;strong&gt;&lt;em&gt;Originally published on 1/4/2015 as &#34;Secure Secure Shell&#34; by &lt;a href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Mirrored to preserve information. Minor changes have been made. This is noted where applicable. Also see:&lt;br&gt;&lt;a href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;📝 &lt;strong&gt;&lt;em&gt;NOTE:&lt;/em&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/div&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 Jan 2015 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
1
+ <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_created.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>Tue, 06 May 2025 04:29:26 -0000</pubDate> <lastBuildDate>Tue, 06 May 2025 04:29:26 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;p&gt;&lt;sup&gt;&lt;a href=&#34;https://spdx.dev/learn/handling-license-info/&#34;&gt;SPDX-License-Identifier&lt;/a&gt;:&lt;code&gt;CC-BY-4.0 OR GPL-3.0-or-later&lt;/code&gt;&lt;/sup&gt;&lt;/p&gt;&lt;h1&gt;We&#39;re Live!&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge.&lt;/h2&gt;&lt;p&gt;In a digital world where threats are persistent and privacy is too often an afterthought, &lt;strong&gt;Network Pro Strategies&lt;/strong&gt; was founded on a belief that &lt;strong&gt;effective security doesn&#39;t require compromise&lt;/strong&gt;. We specialize in helping organizations and individuals &lt;strong&gt;navigate today’s cybersecurity challenges with confidence, clarity, and control&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today marks the launch of our official blogyour go-to destination for &lt;strong&gt;field-tested strategies, implementation insights, and transparent thought leadership&lt;/strong&gt; across cybersecurity, network defense, and privacy-aware infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Modern security isn’t just about technology—it’s about &lt;strong&gt;trust, autonomy, and informed choices&lt;/strong&gt;. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.&lt;/p&gt;&lt;p&gt;This blog represents our commitment to providing value through:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;💼 &lt;strong&gt;SMBs and enterprises&lt;/strong&gt; needing tailored, scalable security that protects business continuity&lt;/li&gt;&lt;li&gt;🏛️ &lt;strong&gt;Government and compliance-sensitive sectors&lt;/strong&gt; where resilience and data integrity are mission-critical&lt;/li&gt;&lt;li&gt;👨‍💻 &lt;strong&gt;Technologists and privacy-conscious communities&lt;/strong&gt; seeking reliable strategies and tools that don’t trade transparency for control&lt;/li&gt;&lt;/ul&gt;</description><link>https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;div style=&#34;font-size: small; font-style: italic;&#34;&gt;&gt; **Originally published on 1/4/2015 by [stribika](https://github.com/stribika) at: &gt; [https://blog.stribik.technology/2015/01/04/secure-secure-shell.html](https://blog.stribik.technology/2015/01/04/secure-secure-shell.html)**&gt;&gt; Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see: &gt; &lt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&gt;&lt;/div&gt;&lt;div style=&#34;font-size: small;&#34;&gt;&gt; &gt; 📝 **_NOTE:_** Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 Jan 2015 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
@@ -1 +1 @@
1
- <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_updated.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>Wed, 30 Apr 2025 22:22:36 -0000</pubDate> <lastBuildDate>Wed, 30 Apr 2025 22:22:36 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;p&gt;&lt;sup&gt;&lt;a href=&#34;https://spdx.dev/learn/handling-license-info/&#34;&gt;SPDX-License-Identifier&lt;/a&gt;:&lt;code&gt;CC-BY-4.0 OR GPL-3.0-or-later&lt;/code&gt;&lt;/sup&gt;&lt;/p&gt;&lt;h1&gt;We&#39;re Live!&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge.&lt;/h2&gt;&lt;p&gt;In an era where digital threats are escalating and data privacy is under constant siege, &lt;strong&gt;trust is built on transparency, integrity, and expertise&lt;/strong&gt;. At &lt;strong&gt;Network Pro Strategies&lt;/strong&gt;, we don’t just secure networks—we &lt;strong&gt;empower organizations and individuals to reclaim control over their digital environments&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today, we proudly launch our official blog: your trusted source for &lt;strong&gt;cutting-edge insights, hands-on implementation strategies, and privacy-first technology advocacy&lt;/strong&gt; in the world of cybersecurity and digital infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Security today is about more than firewalls and passwords. It’s about &lt;strong&gt;making informed decisions&lt;/strong&gt; that respect your data, your autonomy, and your mission. This blog is an extension of our commitment to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;💼 &lt;strong&gt;SMBs and enterprises&lt;/strong&gt; seeking scalable, resilient security architecture&lt;/li&gt;&lt;li&gt;🏛️ &lt;strong&gt;Government and regulated&lt;/strong&gt; sectors navigating risk, compliance, and national security concerns&lt;/li&gt;&lt;li&gt;👨‍💻 &lt;strong&gt;Privacy-aware professionals and open-source communities&lt;/strong&gt; looking for trusted, non-invasive software solutions&lt;/li&gt;&lt;/ul&gt;</description><link>https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 14:33:25 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;blockquote&gt;&lt;p&gt;&lt;div style=&#34;font-size: small;&#34;&gt;&lt;strong&gt;&lt;em&gt;Originally published on 1/4/2015 as &#34;Secure Secure Shell&#34; by &lt;a href=&#34;https://github.com/stribika&#34;&gt;stribika&lt;/a&gt; at:&lt;br&gt;https://blog.stribik.technology/2015/01/04/secure-secure-shell.html&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Mirrored to preserve information. Minor changes have been made. This is noted where applicable. Also see:&lt;br&gt;&lt;a href=&#34;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&#34;&gt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&lt;/a&gt;&lt;/p&gt;&lt;blockquote&gt;&lt;p&gt;📝 &lt;strong&gt;&lt;em&gt;NOTE:&lt;/em&gt;&lt;/strong&gt; Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/div&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
1
+ <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_updated.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>Tue, 06 May 2025 04:29:26 -0000</pubDate> <lastBuildDate>Tue, 06 May 2025 04:29:26 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;p&gt;&lt;sup&gt;&lt;a href=&#34;https://spdx.dev/learn/handling-license-info/&#34;&gt;SPDX-License-Identifier&lt;/a&gt;:&lt;code&gt;CC-BY-4.0 OR GPL-3.0-or-later&lt;/code&gt;&lt;/sup&gt;&lt;/p&gt;&lt;h1&gt;We&#39;re Live!&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge.&lt;/h2&gt;&lt;p&gt;In a digital world where threats are persistent and privacy is too often an afterthought, &lt;strong&gt;Network Pro Strategies&lt;/strong&gt; was founded on a belief that &lt;strong&gt;effective security doesn&#39;t require compromise&lt;/strong&gt;. We specialize in helping organizations and individuals &lt;strong&gt;navigate today’s cybersecurity challenges with confidence, clarity, and control&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today marks the launch of our official blogyour go-to destination for &lt;strong&gt;field-tested strategies, implementation insights, and transparent thought leadership&lt;/strong&gt; across cybersecurity, network defense, and privacy-aware infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Modern security isn’t just about technology—it’s about &lt;strong&gt;trust, autonomy, and informed choices&lt;/strong&gt;. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.&lt;/p&gt;&lt;p&gt;This blog represents our commitment to providing value through:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;💼 &lt;strong&gt;SMBs and enterprises&lt;/strong&gt; needing tailored, scalable security that protects business continuity&lt;/li&gt;&lt;li&gt;🏛️ &lt;strong&gt;Government and compliance-sensitive sectors&lt;/strong&gt; where resilience and data integrity are mission-critical&lt;/li&gt;&lt;li&gt;👨‍💻 &lt;strong&gt;Technologists and privacy-conscious communities&lt;/strong&gt; seeking reliable strategies and tools that don’t trade transparency for control&lt;/li&gt;&lt;/ul&gt;</description><link>https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</link> <pubDate>Mon, 05 May 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;div style=&#34;font-size: small; font-style: italic;&#34;&gt;&gt; **Originally published on 1/4/2015 by [stribika](https://github.com/stribika) at: &gt; [https://blog.stribik.technology/2015/01/04/secure-secure-shell.html](https://blog.stribik.technology/2015/01/04/secure-secure-shell.html)**&gt;&gt; Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see: &gt; &lt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&gt;&lt;/div&gt;&lt;div style=&#34;font-size: small;&#34;&gt;&gt; &gt; 📝 **_NOTE:_** Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 May 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
package/docs/index.html CHANGED
@@ -23,7 +23,7 @@
23
23
 
24
24
 
25
25
 
26
- <title>About Us - Network Pro Strategies</title>
26
+ <title>About Network Pro&trade; - Network Pro Strategies</title>
27
27
 
28
28
 
29
29
 
@@ -69,7 +69,7 @@
69
69
  <div data-md-component="skip">
70
70
 
71
71
 
72
- <a href="#network-pro-strategies" class="md-skip">
72
+ <a href="#about-network-protm" class="md-skip">
73
73
  Skip to content
74
74
  </a>
75
75
 
@@ -102,7 +102,7 @@
102
102
  <div class="md-header__topic" data-md-component="header-topic">
103
103
  <span class="md-ellipsis">
104
104
 
105
- About Us
105
+ About Network Pro&trade;
106
106
 
107
107
  </span>
108
108
  </div>
@@ -448,19 +448,19 @@
448
448
  <ul class="md-nav__list" data-md-component="toc" data-md-scrollfix>
449
449
 
450
450
  <li class="md-nav__item">
451
- <a href="#securing-your-business-with-expertise-innovation" class="md-nav__link">
451
+ <a href="#security-that-respects-you" class="md-nav__link">
452
452
  <span class="md-ellipsis">
453
- Securing Your Business with Expertise &amp; Innovation
453
+ Security That Respects You
454
454
  </span>
455
455
  </a>
456
456
 
457
- <nav class="md-nav" aria-label="Securing Your Business with Expertise &amp; Innovation">
457
+ <nav class="md-nav" aria-label="Security That Respects You">
458
458
  <ul class="md-nav__list">
459
459
 
460
460
  <li class="md-nav__item">
461
- <a href="#why-network-protm" class="md-nav__link">
461
+ <a href="#what-we-do" class="md-nav__link">
462
462
  <span class="md-ellipsis">
463
- Why Network Pro&trade;?
463
+ What We Do
464
464
  </span>
465
465
  </a>
466
466
 
@@ -1078,19 +1078,19 @@
1078
1078
  <ul class="md-nav__list" data-md-component="toc" data-md-scrollfix>
1079
1079
 
1080
1080
  <li class="md-nav__item">
1081
- <a href="#securing-your-business-with-expertise-innovation" class="md-nav__link">
1081
+ <a href="#security-that-respects-you" class="md-nav__link">
1082
1082
  <span class="md-ellipsis">
1083
- Securing Your Business with Expertise &amp; Innovation
1083
+ Security That Respects You
1084
1084
  </span>
1085
1085
  </a>
1086
1086
 
1087
- <nav class="md-nav" aria-label="Securing Your Business with Expertise &amp; Innovation">
1087
+ <nav class="md-nav" aria-label="Security That Respects You">
1088
1088
  <ul class="md-nav__list">
1089
1089
 
1090
1090
  <li class="md-nav__item">
1091
- <a href="#why-network-protm" class="md-nav__link">
1091
+ <a href="#what-we-do" class="md-nav__link">
1092
1092
  <span class="md-ellipsis">
1093
- Why Network Pro&trade;?
1093
+ What We Do
1094
1094
  </span>
1095
1095
  </a>
1096
1096
 
@@ -1145,19 +1145,27 @@
1145
1145
  <p><sup><a href="https://spdx.dev/learn/handling-license-info/">SPDX-License-Identifier</a>:
1146
1146
  <code>CC-BY-4.0 OR GPL-3.0-or-later</code></sup></p>
1147
1147
  <p><a name="top"></a></p>
1148
- <h1 id="network-pro-strategies">Network Pro Strategies</h1>
1148
+ <h1 id="about-network-protm">About Network Pro&trade;</h1>
1149
1149
  <!-- markdownlint-disable-file -->
1150
1150
 
1151
1151
  </section>
1152
- <p><a href="https://github.com/netwk-pro/netwk-pro.github.io/actions/workflows/webpack.yml"><img alt="Build Webpack, Publish to Registries" src="assets/external/github.com/netwk-pro/netwk-pro.github.io/actions/workflows/webpack.yml/badge.56403977.svg"></a> <a href="https://github.com/netwk-pro/netwk-pro.github.io/actions/workflows/upload.yml"><img alt="Deploy to GitHub Pages" src="assets/external/github.com/netwk-pro/netwk-pro.github.io/actions/workflows/upload.yml/badge.svg"></a><br />
1153
- <a href="https://www.npmjs.com/package/@networkpro/web"><img alt="npm Version" src="assets/external/img.shields.io/npm/v/@networkpro/web.5485edf3.svg"></a> <a href="https://github.com/prettier/prettier"><img alt="Code Style: Prettier" src="assets/external/img.shields.io/badge/code_style-prettier-ff69b4.3e3c11fa.svg"></a> <a href="https://github.com/netwk-pro/netwk-pro.github.io/blob/master/CODE_OF_CONDUCT.md"><img alt="Contributor Covenant" src="assets/external/img.shields.io/badge/Contributor Covenant-2.1-4baaaa.svg"></a></p>
1154
- <h2 id="securing-your-business-with-expertise-innovation"><strong>Securing Your Business with Expertise &amp; Innovation</strong></h2>
1155
- <p>At Network Pro&trade;, we bring <strong>over a decade of expertise</strong> in networking, cybersecurity, information security, and IT to help businesses stay secure, compliant, and resilient. We specialize in <strong>network security, cybersecurity, and privacy consulting</strong>, offering both <strong>strategic advisory services and hands-on implementation</strong> to protect critical infrastructure and minimize risk.</p>
1156
- <h3 id="why-network-protm"><strong>Why Network Pro&trade;?</strong></h3>
1157
- <p>✔ <strong>Security with a Business Focus</strong> Our approach goes beyond just protection. We integrate cutting-edge security solutions with your business objectives, ensuring optimized operations and long-term resilience.</p>
1158
- <p>✔ <strong>Expert-Led Consulting &amp; Implementation</strong> – Whether you need strategic guidance or real-world deployment, we tailor solutions to fit your unique security challenges.</p>
1159
- <p>✔ <strong>Advocacy &amp; Education</strong> – We’re committed to empowering businesses, policymakers, and the public with the knowledge and tools needed to navigate today’s complex digital landscape.</p>
1160
- <p>Our <strong>blend of deep technical expertise and business insight</strong> ensures that security is not just a safeguard&mdash;it’s a <strong>strategic advantage</strong> that enhances efficiency, customer trust, and operational excellence.</p>
1152
+ <p><img alt="npmjs" src="assets/external/img.shields.io/badge/npmjs-white.681714c1.svg"> &nbsp; <img alt="GitHub Package Registry" src="assets/external/img.shields.io/badge/GitHub_Package_Registry-white.ed8def48.svg"></p>
1153
+ <h2 id="security-that-respects-you">Security That Respects You</h2>
1154
+ <p>At <strong>Network Pro Strategies (Network Pro&trade;)</strong>, we deliver network security, cybersecurity, and digital privacy consulting with clarity, credibility, and care. We believe that real security doesn’t have to come at the cost of user autonomy, and that privacy-minded solutions can be both practical and powerful.</p>
1155
+ <p>Our approach is built on a simple principle: <strong>the best security is the one that fits.</strong> That means we don’t push ideologies—we apply what works. We advocate for and implement <strong>free and open source solutions</strong> where they offer competitive functionality, control, and visibility. When proprietary platforms are better suited, we deploy them responsibly and securely—ensuring every recommendation is grounded in <strong>technical merit</strong>, <strong>scalability</strong>, and <strong>client goals</strong>.</p>
1156
+ <h3 id="what-we-do"><strong>What We Do</strong></h3>
1157
+ <p>As a remote-first consultancy, we support clients across industries and geographies with a focus on:</p>
1158
+ <ul>
1159
+ <li><strong>Network Hardening &amp; Perimeter Defense</strong></li>
1160
+ <li><strong>Firewall Architecture &amp; Policy Optimization</strong></li>
1161
+ <li><strong>Cloud Security &amp; Zero Trust Implementation</strong></li>
1162
+ <li><strong>Secure Infrastructure Design &amp; Implementation</strong></li>
1163
+ <li><strong>Risk Reduction &amp; Security Posture Assessment</strong></li>
1164
+ </ul>
1165
+ <p>Our consulting engagements range from tactical one-off solutions to strategic, long-term partnerships. Whether it’s helping a business segment its internal network, lock down its cloud footprint, or plan scalable defenses—we deliver clear value, with zero fluff.</p>
1166
+ <p>We also believe education is a core pillar of real-world security. That’s why we invest in raising awareness—across both technical and general audiences—on best practices in digital privacy, secure design, and threat mitigation.</p>
1167
+ <p><strong>Network Pro&trade; exists to bring strong, thoughtful security to organizations that value integrity—without sacrificing agility or trust.</strong> We don’t just secure infrastructure. We secure confidence.</p>
1168
+ <p>&nbsp;</p>
1161
1169
  <p>🔹 <a href="https://contact.neteng.pro">Let’s connect</a> to discuss how we can help secure and strengthen your business today.</p>
1162
1170
  <hr />
1163
1171
  <p>You can find our PGP keys and a vCard containing our contact information for your convenience below.</p>