@networkpro/web 0.12.5 → 0.13.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/404.html +1 -1
- package/README.md +22 -12
- package/about.html +71 -53
- package/about.html.br +0 -0
- package/about.html.gz +0 -0
- package/bundle-report.html +39 -0
- package/css/default.css +1 -1
- package/docs/assets/external/img.shields.io/badge/GitHub_Package_Registry-white.ed8def48.svg +1 -0
- package/docs/assets/external/img.shields.io/badge/npmjs-white.681714c1.svg +1 -0
- package/docs/blog/2015/01/04/secure-secure-shell/index.html +51 -38
- package/docs/blog/2025/04/30/our-blog-is-live/index.html +25 -18
- package/docs/blog/archive/2015/index.html +16 -9
- package/docs/blog/archive/2025/index.html +7 -6
- package/docs/blog/category/security/index.html +16 -9
- package/docs/blog/index.html +27 -19
- package/docs/feed_json_created.json +1 -1
- package/docs/feed_json_updated.json +1 -1
- package/docs/feed_rss_created.xml +1 -1
- package/docs/feed_rss_updated.xml +1 -1
- package/docs/index.html +31 -23
- package/docs/search/search_index.json +1 -1
- package/docs/sitemap.xml +13 -13
- package/docs/sitemap.xml.gz +0 -0
- package/docs/tags/index.html +3 -3
- package/html/spotlight.html +10 -10
- package/html/spotlight.html.br +0 -0
- package/html/spotlight.html.gz +0 -0
- package/img/linkedin-banner-new.png +0 -0
- package/img/qr/pgp-contact.png +0 -0
- package/index.html +36 -24
- package/index.html.br +0 -0
- package/index.html.gz +0 -0
- package/legal.html +22 -22
- package/legal.html.br +0 -0
- package/legal.html.gz +0 -0
- package/package.json +16 -13
- package/privacy.html +17 -16
- package/privacy.html.br +0 -0
- package/privacy.html.gz +0 -0
- package/sitemap.xml +67 -7
- package/terms-and-conditions.html +19 -19
- package/terms-and-conditions.html.br +0 -0
- package/terms-and-conditions.html.gz +0 -0
- package/terms-of-use.html +17 -16
- package/terms-of-use.html.br +0 -0
- package/terms-of-use.html.gz +0 -0
- package/docs/assets/external/github.com/netwk-pro/netwk-pro.github.io/actions/workflows/upload.yml/badge.svg +0 -35
- package/docs/assets/external/github.com/netwk-pro/netwk-pro.github.io/actions/workflows/webpack.yml/badge.56403977.svg +0 -35
- package/docs/assets/external/img.shields.io/badge/Contributor Covenant-2.1-4baaaa.svg +0 -1
- package/docs/assets/external/img.shields.io/badge/code_style-prettier-ff69b4.3e3c11fa.svg +0 -1
- package/docs/assets/external/img.shields.io/npm/v/@networkpro/web.5485edf3.svg +0 -1
|
@@ -1 +1 @@
|
|
|
1
|
-
<?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_created.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>
|
|
1
|
+
<?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_created.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>Tue, 06 May 2025 04:29:26 -0000</pubDate> <lastBuildDate>Tue, 06 May 2025 04:29:26 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description><p><sup><a href="https://spdx.dev/learn/handling-license-info/">SPDX-License-Identifier</a>:<code>CC-BY-4.0 OR GPL-3.0-or-later</code></sup></p><h1>We're Live!</h1><!-- markdownlint-disable-file --><h2>🛡️ Welcome to the Network Pro&trade; Blog: Cybersecurity. Privacy. Open Knowledge.</h2><p>In a digital world where threats are persistent and privacy is too often an afterthought, <strong>Network Pro Strategies</strong> was founded on a belief that <strong>effective security doesn't require compromise</strong>. We specialize in helping organizations and individuals <strong>navigate today’s cybersecurity challenges with confidence, clarity, and control</strong>.</p><p>Today marks the launch of our official blog—your go-to destination for <strong>field-tested strategies, implementation insights, and transparent thought leadership</strong> across cybersecurity, network defense, and privacy-aware infrastructure.</p><hr><h3>📡 Why This Blog Exists</h3><p>Modern security isn’t just about technology—it’s about <strong>trust, autonomy, and informed choices</strong>. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.</p><p>This blog represents our commitment to providing value through:</p><ul><li>💼 <strong>SMBs and enterprises</strong> needing tailored, scalable security that protects business continuity</li><li>🏛️ <strong>Government and compliance-sensitive sectors</strong> where resilience and data integrity are mission-critical</li><li>👨💻 <strong>Technologists and privacy-conscious communities</strong> seeking reliable strategies and tools that don’t trade transparency for control</li></ul></description><link>https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description><h1>Secure Secure Shell</h1><!-- markdownlint-disable-file --><div style="font-size: small; font-style: italic;">> **Originally published on 1/4/2015 by [stribika](https://github.com/stribika) at: > [https://blog.stribik.technology/2015/01/04/secure-secure-shell.html](https://blog.stribik.technology/2015/01/04/secure-secure-shell.html)**>> Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see: > <https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices></div><div style="font-size: small;">> > 📝 **_NOTE:_** Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.</div><ul><li><a href="#sshd">Skip to the good part.</a></li></ul><p>You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.</p><p>TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.</p></description><link>https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 Jan 2015 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
|
|
@@ -1 +1 @@
|
|
|
1
|
-
<?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_updated.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>
|
|
1
|
+
<?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_updated.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>Tue, 06 May 2025 04:29:26 -0000</pubDate> <lastBuildDate>Tue, 06 May 2025 04:29:26 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description><p><sup><a href="https://spdx.dev/learn/handling-license-info/">SPDX-License-Identifier</a>:<code>CC-BY-4.0 OR GPL-3.0-or-later</code></sup></p><h1>We're Live!</h1><!-- markdownlint-disable-file --><h2>🛡️ Welcome to the Network Pro&trade; Blog: Cybersecurity. Privacy. Open Knowledge.</h2><p>In a digital world where threats are persistent and privacy is too often an afterthought, <strong>Network Pro Strategies</strong> was founded on a belief that <strong>effective security doesn't require compromise</strong>. We specialize in helping organizations and individuals <strong>navigate today’s cybersecurity challenges with confidence, clarity, and control</strong>.</p><p>Today marks the launch of our official blog—your go-to destination for <strong>field-tested strategies, implementation insights, and transparent thought leadership</strong> across cybersecurity, network defense, and privacy-aware infrastructure.</p><hr><h3>📡 Why This Blog Exists</h3><p>Modern security isn’t just about technology—it’s about <strong>trust, autonomy, and informed choices</strong>. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.</p><p>This blog represents our commitment to providing value through:</p><ul><li>💼 <strong>SMBs and enterprises</strong> needing tailored, scalable security that protects business continuity</li><li>🏛️ <strong>Government and compliance-sensitive sectors</strong> where resilience and data integrity are mission-critical</li><li>👨💻 <strong>Technologists and privacy-conscious communities</strong> seeking reliable strategies and tools that don’t trade transparency for control</li></ul></description><link>https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</link> <pubDate>Mon, 05 May 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description><h1>Secure Secure Shell</h1><!-- markdownlint-disable-file --><div style="font-size: small; font-style: italic;">> **Originally published on 1/4/2015 by [stribika](https://github.com/stribika) at: > [https://blog.stribik.technology/2015/01/04/secure-secure-shell.html](https://blog.stribik.technology/2015/01/04/secure-secure-shell.html)**>> Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see: > <https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices></div><div style="font-size: small;">> > 📝 **_NOTE:_** Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.</div><ul><li><a href="#sshd">Skip to the good part.</a></li></ul><p>You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.</p><p>TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.</p></description><link>https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 May 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
|
package/docs/index.html
CHANGED
|
@@ -23,7 +23,7 @@
|
|
|
23
23
|
|
|
24
24
|
|
|
25
25
|
|
|
26
|
-
<title>About
|
|
26
|
+
<title>About Network Pro™ - Network Pro Strategies</title>
|
|
27
27
|
|
|
28
28
|
|
|
29
29
|
|
|
@@ -69,7 +69,7 @@
|
|
|
69
69
|
<div data-md-component="skip">
|
|
70
70
|
|
|
71
71
|
|
|
72
|
-
<a href="#network-
|
|
72
|
+
<a href="#about-network-protm" class="md-skip">
|
|
73
73
|
Skip to content
|
|
74
74
|
</a>
|
|
75
75
|
|
|
@@ -102,7 +102,7 @@
|
|
|
102
102
|
<div class="md-header__topic" data-md-component="header-topic">
|
|
103
103
|
<span class="md-ellipsis">
|
|
104
104
|
|
|
105
|
-
About
|
|
105
|
+
About Network Pro™
|
|
106
106
|
|
|
107
107
|
</span>
|
|
108
108
|
</div>
|
|
@@ -448,19 +448,19 @@
|
|
|
448
448
|
<ul class="md-nav__list" data-md-component="toc" data-md-scrollfix>
|
|
449
449
|
|
|
450
450
|
<li class="md-nav__item">
|
|
451
|
-
<a href="#
|
|
451
|
+
<a href="#security-that-respects-you" class="md-nav__link">
|
|
452
452
|
<span class="md-ellipsis">
|
|
453
|
-
|
|
453
|
+
Security That Respects You
|
|
454
454
|
</span>
|
|
455
455
|
</a>
|
|
456
456
|
|
|
457
|
-
<nav class="md-nav" aria-label="
|
|
457
|
+
<nav class="md-nav" aria-label="Security That Respects You">
|
|
458
458
|
<ul class="md-nav__list">
|
|
459
459
|
|
|
460
460
|
<li class="md-nav__item">
|
|
461
|
-
<a href="#
|
|
461
|
+
<a href="#what-we-do" class="md-nav__link">
|
|
462
462
|
<span class="md-ellipsis">
|
|
463
|
-
|
|
463
|
+
What We Do
|
|
464
464
|
</span>
|
|
465
465
|
</a>
|
|
466
466
|
|
|
@@ -1078,19 +1078,19 @@
|
|
|
1078
1078
|
<ul class="md-nav__list" data-md-component="toc" data-md-scrollfix>
|
|
1079
1079
|
|
|
1080
1080
|
<li class="md-nav__item">
|
|
1081
|
-
<a href="#
|
|
1081
|
+
<a href="#security-that-respects-you" class="md-nav__link">
|
|
1082
1082
|
<span class="md-ellipsis">
|
|
1083
|
-
|
|
1083
|
+
Security That Respects You
|
|
1084
1084
|
</span>
|
|
1085
1085
|
</a>
|
|
1086
1086
|
|
|
1087
|
-
<nav class="md-nav" aria-label="
|
|
1087
|
+
<nav class="md-nav" aria-label="Security That Respects You">
|
|
1088
1088
|
<ul class="md-nav__list">
|
|
1089
1089
|
|
|
1090
1090
|
<li class="md-nav__item">
|
|
1091
|
-
<a href="#
|
|
1091
|
+
<a href="#what-we-do" class="md-nav__link">
|
|
1092
1092
|
<span class="md-ellipsis">
|
|
1093
|
-
|
|
1093
|
+
What We Do
|
|
1094
1094
|
</span>
|
|
1095
1095
|
</a>
|
|
1096
1096
|
|
|
@@ -1145,19 +1145,27 @@
|
|
|
1145
1145
|
<p><sup><a href="https://spdx.dev/learn/handling-license-info/">SPDX-License-Identifier</a>:
|
|
1146
1146
|
<code>CC-BY-4.0 OR GPL-3.0-or-later</code></sup></p>
|
|
1147
1147
|
<p><a name="top"></a></p>
|
|
1148
|
-
<h1 id="network-
|
|
1148
|
+
<h1 id="about-network-protm">About Network Pro™</h1>
|
|
1149
1149
|
<!-- markdownlint-disable-file -->
|
|
1150
1150
|
|
|
1151
1151
|
</section>
|
|
1152
|
-
<p><
|
|
1153
|
-
<
|
|
1154
|
-
<
|
|
1155
|
-
<p>
|
|
1156
|
-
<h3 id="
|
|
1157
|
-
<p
|
|
1158
|
-
<
|
|
1159
|
-
<
|
|
1160
|
-
<
|
|
1152
|
+
<p><img alt="npmjs" src="assets/external/img.shields.io/badge/npmjs-white.681714c1.svg"> <img alt="GitHub Package Registry" src="assets/external/img.shields.io/badge/GitHub_Package_Registry-white.ed8def48.svg"></p>
|
|
1153
|
+
<h2 id="security-that-respects-you">Security That Respects You</h2>
|
|
1154
|
+
<p>At <strong>Network Pro Strategies (Network Pro™)</strong>, we deliver network security, cybersecurity, and digital privacy consulting with clarity, credibility, and care. We believe that real security doesn’t have to come at the cost of user autonomy, and that privacy-minded solutions can be both practical and powerful.</p>
|
|
1155
|
+
<p>Our approach is built on a simple principle: <strong>the best security is the one that fits.</strong> That means we don’t push ideologies—we apply what works. We advocate for and implement <strong>free and open source solutions</strong> where they offer competitive functionality, control, and visibility. When proprietary platforms are better suited, we deploy them responsibly and securely—ensuring every recommendation is grounded in <strong>technical merit</strong>, <strong>scalability</strong>, and <strong>client goals</strong>.</p>
|
|
1156
|
+
<h3 id="what-we-do"><strong>What We Do</strong></h3>
|
|
1157
|
+
<p>As a remote-first consultancy, we support clients across industries and geographies with a focus on:</p>
|
|
1158
|
+
<ul>
|
|
1159
|
+
<li><strong>Network Hardening & Perimeter Defense</strong></li>
|
|
1160
|
+
<li><strong>Firewall Architecture & Policy Optimization</strong></li>
|
|
1161
|
+
<li><strong>Cloud Security & Zero Trust Implementation</strong></li>
|
|
1162
|
+
<li><strong>Secure Infrastructure Design & Implementation</strong></li>
|
|
1163
|
+
<li><strong>Risk Reduction & Security Posture Assessment</strong></li>
|
|
1164
|
+
</ul>
|
|
1165
|
+
<p>Our consulting engagements range from tactical one-off solutions to strategic, long-term partnerships. Whether it’s helping a business segment its internal network, lock down its cloud footprint, or plan scalable defenses—we deliver clear value, with zero fluff.</p>
|
|
1166
|
+
<p>We also believe education is a core pillar of real-world security. That’s why we invest in raising awareness—across both technical and general audiences—on best practices in digital privacy, secure design, and threat mitigation.</p>
|
|
1167
|
+
<p><strong>Network Pro™ exists to bring strong, thoughtful security to organizations that value integrity—without sacrificing agility or trust.</strong> We don’t just secure infrastructure. We secure confidence.</p>
|
|
1168
|
+
<p> </p>
|
|
1161
1169
|
<p>🔹 <a href="https://contact.neteng.pro">Let’s connect</a> to discuss how we can help secure and strengthen your business today.</p>
|
|
1162
1170
|
<hr />
|
|
1163
1171
|
<p>You can find our PGP keys and a vCard containing our contact information for your convenience below.</p>
|