@networkpro/web 0.13.1 → 0.13.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -52,7 +52,7 @@ Web: <https://bio.neteng.pro>
52
52
 
53
53
  </section>
54
54
 
55
- [![Build/Test, Publish to Registries](https://github.com/netwk-pro/netwk-pro.github.io/actions/workflows/build.yml/badge.svg?branch=master)](https://github.com/netwk-pro/netwk-pro.github.io/actions/workflows/build.yml) [![Deploy to GitHub Pages](https://github.com/netwk-pro/netwk-pro.github.io/actions/workflows/upload.yml/badge.svg?branch=master)](https://github.com/netwk-pro/netwk-pro.github.io/actions/workflows/upload.yml)
55
+ [![Build/Test, Publish to Registries](https://github.com/netwk-pro/netwk-pro.github.io/actions/workflows/build.yml/badge.svg)](https://github.com/netwk-pro/netwk-pro.github.io/actions/workflows/build.yml) [![Deploy to GitHub Pages](https://github.com/netwk-pro/netwk-pro.github.io/actions/workflows/deploy.yml/badge.svg)](https://github.com/netwk-pro/netwk-pro.github.io/actions/workflows/deploy.yml)
56
56
  [![npm Version](https://img.shields.io/npm/v/%40networkpro%2Fweb?registry_uri=https%3A%2F%2Fregistry.npmjs.com&style=flat&logo=npm&logoSize=auto&labelColor=fffff&color=0c7ebe)](https://www.npmjs.com/package/@networkpro/web) [![Code Style: Prettier](https://img.shields.io/badge/code_style-prettier-ff69b4.svg?style=flat)](https://github.com/prettier/prettier) [![Contributor Covenant](https://img.shields.io/badge/Contributor%20Covenant-2.1-4baaaa.svg)](https://github.com/netwk-pro/netwk-pro.github.io/blob/master/CODE_OF_CONDUCT.md)
57
57
 
58
58
  ## Security That Respects You
package/about.html CHANGED
@@ -170,8 +170,8 @@
170
170
  <strong>&nbsp; / &nbsp;</strong>
171
171
  <a rel="noopener noreferrer" href="https://raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/assets/bin/support@neteng.pro.asc" type="application/pgp-keys" target="_blank"><strong>asc</strong></a>
172
172
  </p>
173
- <p>6590B992E2E3EFF12738<br>
174
- 7BCE2AF093E9DEC61BA0</p>
173
+ <p><strong>6590b992e2e3eff12738</strong><br>
174
+ <strong>7bce2af093e9dec61ba0</strong></p>
175
175
  </td></tr>
176
176
  <tr>
177
177
  <td class="pgp-col1">
@@ -182,8 +182,8 @@
182
182
  <strong>&nbsp; / &nbsp;</strong>
183
183
  <a rel="noopener noreferrer" href="https://raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/assets/bin/contact@s.neteng.pro.asc" type="application/pgp-keys" target="_blank"><strong>asc</strong></a></p>
184
184
  <p>
185
- DF118BAA6C2D9DCDEBDC<br>
186
- 2DDCF99373499495F957</p></td>
185
+ <strong>df118baa6c2d9dcdebdc</strong><br>
186
+ <strong>2ddcf99373499495f957</strong></p></td>
187
187
  <td class="pgp-col2">
188
188
  <img decoding="async" loading="lazy" src="https://raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/img/qr/pgp-contact.png" style="height: 125px; width: 125px" alt="PGP Key - contact@s.neteng.pro"></td>
189
189
  </tr>
package/about.html.br CHANGED
Binary file
package/about.html.gz CHANGED
Binary file
@@ -1 +1 @@
1
- <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_created.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>Tue, 06 May 2025 04:29:26 -0000</pubDate> <lastBuildDate>Tue, 06 May 2025 04:29:26 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;p&gt;&lt;sup&gt;&lt;a href=&#34;https://spdx.dev/learn/handling-license-info/&#34;&gt;SPDX-License-Identifier&lt;/a&gt;:&lt;code&gt;CC-BY-4.0 OR GPL-3.0-or-later&lt;/code&gt;&lt;/sup&gt;&lt;/p&gt;&lt;h1&gt;We&#39;re Live!&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge.&lt;/h2&gt;&lt;p&gt;In a digital world where threats are persistent and privacy is too often an afterthought, &lt;strong&gt;Network Pro Strategies&lt;/strong&gt; was founded on a belief that &lt;strong&gt;effective security doesn&#39;t require compromise&lt;/strong&gt;. We specialize in helping organizations and individuals &lt;strong&gt;navigate today’s cybersecurity challenges with confidence, clarity, and control&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today marks the launch of our official blog—your go-to destination for &lt;strong&gt;field-tested strategies, implementation insights, and transparent thought leadership&lt;/strong&gt; across cybersecurity, network defense, and privacy-aware infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Modern security isn’t just about technology—it’s about &lt;strong&gt;trust, autonomy, and informed choices&lt;/strong&gt;. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.&lt;/p&gt;&lt;p&gt;This blog represents our commitment to providing value through:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;💼 &lt;strong&gt;SMBs and enterprises&lt;/strong&gt; needing tailored, scalable security that protects business continuity&lt;/li&gt;&lt;li&gt;🏛️ &lt;strong&gt;Government and compliance-sensitive sectors&lt;/strong&gt; where resilience and data integrity are mission-critical&lt;/li&gt;&lt;li&gt;👨‍💻 &lt;strong&gt;Technologists and privacy-conscious communities&lt;/strong&gt; seeking reliable strategies and tools that don’t trade transparency for control&lt;/li&gt;&lt;/ul&gt;</description><link>https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;div style=&#34;font-size: small; font-style: italic;&#34;&gt;&gt; **Originally published on 1/4/2015 by [stribika](https://github.com/stribika) at: &gt; [https://blog.stribik.technology/2015/01/04/secure-secure-shell.html](https://blog.stribik.technology/2015/01/04/secure-secure-shell.html)**&gt;&gt; Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see: &gt; &lt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&gt;&lt;/div&gt;&lt;div style=&#34;font-size: small;&#34;&gt;&gt; &gt; 📝 **_NOTE:_** Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 Jan 2015 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
1
+ <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_created.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>Tue, 06 May 2025 22:25:46 -0000</pubDate> <lastBuildDate>Tue, 06 May 2025 22:25:46 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;p&gt;&lt;sup&gt;&lt;a href=&#34;https://spdx.dev/learn/handling-license-info/&#34;&gt;SPDX-License-Identifier&lt;/a&gt;:&lt;code&gt;CC-BY-4.0 OR GPL-3.0-or-later&lt;/code&gt;&lt;/sup&gt;&lt;/p&gt;&lt;h1&gt;We&#39;re Live!&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge.&lt;/h2&gt;&lt;p&gt;In a digital world where threats are persistent and privacy is too often an afterthought, &lt;strong&gt;Network Pro Strategies&lt;/strong&gt; was founded on a belief that &lt;strong&gt;effective security doesn&#39;t require compromise&lt;/strong&gt;. We specialize in helping organizations and individuals &lt;strong&gt;navigate today’s cybersecurity challenges with confidence, clarity, and control&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today marks the launch of our official blog—your go-to destination for &lt;strong&gt;field-tested strategies, implementation insights, and transparent thought leadership&lt;/strong&gt; across cybersecurity, network defense, and privacy-aware infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Modern security isn’t just about technology—it’s about &lt;strong&gt;trust, autonomy, and informed choices&lt;/strong&gt;. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.&lt;/p&gt;&lt;p&gt;This blog represents our commitment to providing value through:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;💼 &lt;strong&gt;SMBs and enterprises&lt;/strong&gt; needing tailored, scalable security that protects business continuity&lt;/li&gt;&lt;li&gt;🏛️ &lt;strong&gt;Government and compliance-sensitive sectors&lt;/strong&gt; where resilience and data integrity are mission-critical&lt;/li&gt;&lt;li&gt;👨‍💻 &lt;strong&gt;Technologists and privacy-conscious communities&lt;/strong&gt; seeking reliable strategies and tools that don’t trade transparency for control&lt;/li&gt;&lt;/ul&gt;</description><link>https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</link> <pubDate>Wed, 30 Apr 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;div style=&#34;font-size: small; font-style: italic;&#34;&gt;&gt; **Originally published on 1/4/2015 by [stribika](https://github.com/stribika) at: &gt; [https://blog.stribik.technology/2015/01/04/secure-secure-shell.html](https://blog.stribik.technology/2015/01/04/secure-secure-shell.html)**&gt;&gt; Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see: &gt; &lt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&gt;&lt;/div&gt;&lt;div style=&#34;font-size: small;&#34;&gt;&gt; &gt; 📝 **_NOTE:_** Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 Jan 2015 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_created.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
@@ -1 +1 @@
1
- <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_updated.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>Tue, 06 May 2025 04:29:26 -0000</pubDate> <lastBuildDate>Tue, 06 May 2025 04:29:26 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;p&gt;&lt;sup&gt;&lt;a href=&#34;https://spdx.dev/learn/handling-license-info/&#34;&gt;SPDX-License-Identifier&lt;/a&gt;:&lt;code&gt;CC-BY-4.0 OR GPL-3.0-or-later&lt;/code&gt;&lt;/sup&gt;&lt;/p&gt;&lt;h1&gt;We&#39;re Live!&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge.&lt;/h2&gt;&lt;p&gt;In a digital world where threats are persistent and privacy is too often an afterthought, &lt;strong&gt;Network Pro Strategies&lt;/strong&gt; was founded on a belief that &lt;strong&gt;effective security doesn&#39;t require compromise&lt;/strong&gt;. We specialize in helping organizations and individuals &lt;strong&gt;navigate today’s cybersecurity challenges with confidence, clarity, and control&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today marks the launch of our official blog—your go-to destination for &lt;strong&gt;field-tested strategies, implementation insights, and transparent thought leadership&lt;/strong&gt; across cybersecurity, network defense, and privacy-aware infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Modern security isn’t just about technology—it’s about &lt;strong&gt;trust, autonomy, and informed choices&lt;/strong&gt;. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.&lt;/p&gt;&lt;p&gt;This blog represents our commitment to providing value through:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;💼 &lt;strong&gt;SMBs and enterprises&lt;/strong&gt; needing tailored, scalable security that protects business continuity&lt;/li&gt;&lt;li&gt;🏛️ &lt;strong&gt;Government and compliance-sensitive sectors&lt;/strong&gt; where resilience and data integrity are mission-critical&lt;/li&gt;&lt;li&gt;👨‍💻 &lt;strong&gt;Technologists and privacy-conscious communities&lt;/strong&gt; seeking reliable strategies and tools that don’t trade transparency for control&lt;/li&gt;&lt;/ul&gt;</description><link>https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</link> <pubDate>Mon, 05 May 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;div style=&#34;font-size: small; font-style: italic;&#34;&gt;&gt; **Originally published on 1/4/2015 by [stribika](https://github.com/stribika) at: &gt; [https://blog.stribik.technology/2015/01/04/secure-secure-shell.html](https://blog.stribik.technology/2015/01/04/secure-secure-shell.html)**&gt;&gt; Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see: &gt; &lt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&gt;&lt;/div&gt;&lt;div style=&#34;font-size: small;&#34;&gt;&gt; &gt; 📝 **_NOTE:_** Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 May 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
1
+ <?xml version="1.0" encoding="UTF-8" ?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/"> <channel><title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link><atom:link href="https://netwk.pro/docs/feed_rss_updated.xml" rel="self" type="application/rss+xml" /><docs>https://github.com/netwk-pro/netwk-pro-blog</docs><language>en</language> <pubDate>Tue, 06 May 2025 22:25:46 -0000</pubDate> <lastBuildDate>Tue, 06 May 2025 22:25:46 -0000</lastBuildDate> <ttl>1440</ttl> <generator>MkDocs RSS plugin - v1.17.1</generator> <image> <url>None</url> <title>Network Pro Strategies</title><link>https://netwk.pro/docs/</link> </image> <item> <title>Our Blog is Live!</title> <author>Network Pro</author> <description>&lt;p&gt;&lt;sup&gt;&lt;a href=&#34;https://spdx.dev/learn/handling-license-info/&#34;&gt;SPDX-License-Identifier&lt;/a&gt;:&lt;code&gt;CC-BY-4.0 OR GPL-3.0-or-later&lt;/code&gt;&lt;/sup&gt;&lt;/p&gt;&lt;h1&gt;We&#39;re Live!&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;h2&gt;🛡️ Welcome to the Network Pro&amp;trade; Blog: Cybersecurity. Privacy. Open Knowledge.&lt;/h2&gt;&lt;p&gt;In a digital world where threats are persistent and privacy is too often an afterthought, &lt;strong&gt;Network Pro Strategies&lt;/strong&gt; was founded on a belief that &lt;strong&gt;effective security doesn&#39;t require compromise&lt;/strong&gt;. We specialize in helping organizations and individuals &lt;strong&gt;navigate today’s cybersecurity challenges with confidence, clarity, and control&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Today marks the launch of our official blog—your go-to destination for &lt;strong&gt;field-tested strategies, implementation insights, and transparent thought leadership&lt;/strong&gt; across cybersecurity, network defense, and privacy-aware infrastructure.&lt;/p&gt;&lt;hr&gt;&lt;h3&gt;📡 Why This Blog Exists&lt;/h3&gt;&lt;p&gt;Modern security isn’t just about technology—it’s about &lt;strong&gt;trust, autonomy, and informed choices&lt;/strong&gt;. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.&lt;/p&gt;&lt;p&gt;This blog represents our commitment to providing value through:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;💼 &lt;strong&gt;SMBs and enterprises&lt;/strong&gt; needing tailored, scalable security that protects business continuity&lt;/li&gt;&lt;li&gt;🏛️ &lt;strong&gt;Government and compliance-sensitive sectors&lt;/strong&gt; where resilience and data integrity are mission-critical&lt;/li&gt;&lt;li&gt;👨‍💻 &lt;strong&gt;Technologists and privacy-conscious communities&lt;/strong&gt; seeking reliable strategies and tools that don’t trade transparency for control&lt;/li&gt;&lt;/ul&gt;</description><link>https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</link> <pubDate>Mon, 05 May 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/</guid> </item> <item> <title>Secure Secure Shell</title> <author>Network Pro</author> <description>&lt;h1&gt;Secure Secure Shell&lt;/h1&gt;&lt;!-- markdownlint-disable-file --&gt;&lt;div style=&#34;font-size: small; font-style: italic;&#34;&gt;&gt; **Originally published on 1/4/2015 by [stribika](https://github.com/stribika) at: &gt; [https://blog.stribik.technology/2015/01/04/secure-secure-shell.html](https://blog.stribik.technology/2015/01/04/secure-secure-shell.html)**&gt;&gt; Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see: &gt; &lt;https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices&gt;&lt;/div&gt;&lt;div style=&#34;font-size: small;&#34;&gt;&gt; &gt; 📝 **_NOTE:_** Despite this article&#39;s age, we&#39;ve yet to come across a better source of information with regard to SSH configuration.&lt;/div&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&#34;#sshd&#34;&gt;Skip to the good part.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You may have heard that the NSA can decrypt SSH at least some of the time.If you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.&lt;/p&gt;&lt;p&gt;TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.&lt;/p&gt;</description><link>https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</link> <pubDate>Sun, 04 May 2025 00:00:00 +0000</pubDate><source url="https://netwk.pro/docs/feed_rss_updated.xml">Network Pro Strategies</source><guid isPermaLink="true">https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/</guid> </item> </channel></rss>
package/docs/index.html CHANGED
@@ -1149,7 +1149,7 @@
1149
1149
  <!-- markdownlint-disable-file -->
1150
1150
 
1151
1151
  </section>
1152
- <p><img alt="npmjs" src="assets/external/img.shields.io/badge/npmjs-white.681714c1.svg"> &nbsp; <img alt="GitHub Package Registry" src="assets/external/img.shields.io/badge/GitHub_Package_Registry-white.ed8def48.svg"></p>
1152
+ <p><a href="https://www.npmjs.com/package/@networkpro/web"><img alt="npmjs" src="assets/external/img.shields.io/badge/npmjs-white.681714c1.svg"></a> &nbsp; <a href="https://github.com/netwk-pro/netwk-pro.github.io/pkgs/npm/web"><img alt="GitHub Package Registry" src="assets/external/img.shields.io/badge/GitHub_Package_Registry-white.ed8def48.svg"></a></p>
1153
1153
  <h2 id="security-that-respects-you">Security That Respects You</h2>
1154
1154
  <p>At <strong>Network Pro Strategies (Network Pro&trade;)</strong>, we deliver network security, cybersecurity, and digital privacy consulting with clarity, credibility, and care. We believe that real security doesn’t have to come at the cost of user autonomy, and that privacy-minded solutions can be both practical and powerful.</p>
1155
1155
  <p>Our approach is built on a simple principle: <strong>the best security is the one that fits.</strong> That means we don’t push ideologies—we apply what works. We advocate for and implement <strong>free and open source solutions</strong> where they offer competitive functionality, control, and visibility. When proprietary platforms are better suited, we deploy them responsibly and securely—ensuring every recommendation is grounded in <strong>technical merit</strong>, <strong>scalability</strong>, and <strong>client goals</strong>.</p>
@@ -1172,17 +1172,17 @@
1172
1172
  <table>
1173
1173
  <thead>
1174
1174
  <tr>
1175
- <th style="text-align: right;"><img decoding="async" loading="lazy" src="assets/external/raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/img/qr/pgp-support.png" width="150px" height="150px" alt="PGP Key - support@neteng.pro"></th>
1176
- <th style="text-align: left;"><strong><a href="https://keys.openpgp.org/search?q=support%40neteng.pro">support@neteng.pro</a></strong><br /><strong>PGP Key (ed25519)</strong><br />&nbsp;<br /><a href="https://raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/assets/bin/support@neteng.pro.aexpk" type="application/pgp-keys"><strong>aexpk</strong></a>&nbsp; <strong>&#47;</strong> &nbsp;<a href="https://raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/assets/bin/support@neteng.pro.asc" type="application/pgp-keys"><strong>asc</strong></a><br />&nbsp;<br />6590b992e2e3eff12738<br />7bce2af093e9dec61ba0</th>
1175
+ <th style="text-align: right;"><img decoding="async" loading="lazy" src="assets/external/raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/img/qr/pgp-support.png" height="125px" width="125px" alt="PGP Key - support@neteng.pro"></th>
1176
+ <th style="text-align: left;"><strong><a href="https://keys.openpgp.org/search?q=support%40neteng.pro">support@neteng.pro</a></strong><br /><strong>PGP Key (ed25519)</strong><br />&nbsp;<br /><a href="https://raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/assets/bin/support@neteng.pro.aexpk" type="application/pgp-keys"><strong>aexpk</strong></a>&nbsp; <strong>&#47;</strong> &nbsp;<a href="https://raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/assets/bin/support@neteng.pro.asc" type="application/pgp-keys"><strong>asc</strong></a><br />&nbsp;<br /><strong>6590b992e2e3eff12738</strong><br /><strong>7bce2af093e9dec61ba0</strong></th>
1177
1177
  </tr>
1178
1178
  </thead>
1179
1179
  <tbody>
1180
1180
  <tr>
1181
- <td style="text-align: right;"><strong><a href="https://keys.openpgp.org/search?q=github%40sl.neteng.cc">github@sl.neteng.cc</a></strong><br /><strong>PGP Key (ed25519)</strong><br />&nbsp;<br /><a href="https://raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/assets/bin/github@sl.neteng.cc.aexpk" type="application/pgp-keys"><strong>aexpk</strong></a>&nbsp; <strong>&#47;</strong> &nbsp;<a href="https://raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/assets/bin/github@sl.neteng.cc.asc" type="application/pgp-keys"><strong>asc</strong></a><br />&nbsp;<br /><strong>e8b4f1193b21601207b0</strong><br /><strong>80bbaebbb8f6d4bb723b</strong></td>
1182
- <td style="text-align: left;"><img decoding="async" loading="lazy" src="assets/external/raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/img/qr/pgp-github.png" width="150px" height="150px" alt="PGP Key - github@sl.neteng.cc"></td>
1181
+ <td style="text-align: right;"><strong><a href="https://keys.openpgp.org/search?q=contact%40s.neteng.pro">contact@s.neteng.pro</a></strong><br /><strong>PGP Key (ed25519)</strong><br />&nbsp;<br /><a href="https://raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/assets/bin/contact@s.neteng.pro.aexpk" type="application/pgp-keys"><strong>aexpk</strong></a>&nbsp; <strong>&#47;</strong> &nbsp;<a href="https://raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/assets/bin/contact@s.neteng.pro.asc" type="application/pgp-keys"><strong>asc</strong></a><br />&nbsp;<br /><strong>e8b4f1193b21601207b0</strong><br /><strong>80bbaebbb8f6d4bb723b</strong></td>
1182
+ <td style="text-align: left;"><img decoding="async" loading="lazy" src="assets/external/raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/img/qr/pgp-contact.png" height="125px" width="125px" alt="PGP Key - contact@s.neteng.pro"></td>
1183
1183
  </tr>
1184
1184
  <tr>
1185
- <td style="text-align: right;"><img decoding="async" loading="lazy" src="assets/external/raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/img/qr/vcard.png" width="150px" height="150px" alt="vCard"></td>
1185
+ <td style="text-align: right;"><img decoding="async" loading="lazy" src="assets/external/raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/img/qr/vcard.png" height="125px" width="125px" alt="vCard"></td>
1186
1186
  <td style="text-align: left;"><strong>vCard</strong><br />&nbsp;<br /><a href="https://raw.githubusercontent.com/netwk-pro/netwk-pro.github.io/refs/heads/master/assets/bin/contact.vcf"><strong>vcf</strong></a></td>
1187
1187
  </tr>
1188
1188
  </tbody>