diff --git a/src/app/page.tsx b/src/app/page.tsx index a0a61b1..8742018 100644 --- a/src/app/page.tsx +++ b/src/app/page.tsx @@ -56,32 +56,32 @@ export default function LandingPage() { carouselItems={[ { id: "1", - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png", + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=1", imageAlt: "Dashboard View 1", }, { id: "2", - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png", + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=2", imageAlt: "Dashboard View 2", }, { id: "3", - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png", + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=3", imageAlt: "Dashboard View 3", }, { id: "4", - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png", + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=4", imageAlt: "Dashboard View 4", }, { id: "5", - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png", + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=5", imageAlt: "Dashboard View 5", }, { id: "6", - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png", + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=6", imageAlt: "Dashboard View 6", }, ]} @@ -114,10 +114,10 @@ export default function LandingPage() { title: "Penetration Testing", description: "Comprehensive tools for exploitation and assessment.", phoneOne: { - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/abstract-representation-of-penetration-t-1774589425109-876d12b1.png", + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/abstract-representation-of-penetration-t-1774589425109-876d12b1.png?_wi=1", }, phoneTwo: { - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/abstract-representation-of-penetration-t-1774589425109-876d12b1.png", + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/abstract-representation-of-penetration-t-1774589425109-876d12b1.png?_wi=2", }, }, { @@ -125,10 +125,10 @@ export default function LandingPage() { title: "Vulnerability Analysis", description: "Deep scanning and identification of infrastructure gaps.", phoneOne: { - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/advanced-firewall-and-vulnerability-scan-1774589424281-24f0b2dd.png", + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/advanced-firewall-and-vulnerability-scan-1774589424281-24f0b2dd.png?_wi=1", }, phoneTwo: { - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/advanced-firewall-and-vulnerability-scan-1774589424281-24f0b2dd.png", + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/advanced-firewall-and-vulnerability-scan-1774589424281-24f0b2dd.png?_wi=2", }, }, { @@ -136,10 +136,10 @@ export default function LandingPage() { title: "Digital Forensics", description: "Analyze and recover critical digital evidence efficiently.", phoneOne: { - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/deep-packet-inspection-technology-visual-1774589422682-ab7559d4.png", + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/deep-packet-inspection-technology-visual-1774589422682-ab7559d4.png?_wi=1", }, phoneTwo: { - imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/deep-packet-inspection-technology-visual-1774589422682-ab7559d4.png", + imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/deep-packet-inspection-technology-visual-1774589422682-ab7559d4.png?_wi=2", }, }, ]}