Merge version_1 into main #1

Merged
bender merged 1 commits from version_1 into main 2026-03-27 05:30:37 +00:00

View File

@@ -56,32 +56,32 @@ export default function LandingPage() {
carouselItems={[
{
id: "1",
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png",
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=1",
imageAlt: "Dashboard View 1",
},
{
id: "2",
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png",
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=2",
imageAlt: "Dashboard View 2",
},
{
id: "3",
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png",
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=3",
imageAlt: "Dashboard View 3",
},
{
id: "4",
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png",
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=4",
imageAlt: "Dashboard View 4",
},
{
id: "5",
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png",
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=5",
imageAlt: "Dashboard View 5",
},
{
id: "6",
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png",
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/a-futuristic-dark-themed-hacking-dashboa-1774589422704-07b77179.png?_wi=6",
imageAlt: "Dashboard View 6",
},
]}
@@ -114,10 +114,10 @@ export default function LandingPage() {
title: "Penetration Testing",
description: "Comprehensive tools for exploitation and assessment.",
phoneOne: {
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/abstract-representation-of-penetration-t-1774589425109-876d12b1.png",
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/abstract-representation-of-penetration-t-1774589425109-876d12b1.png?_wi=1",
},
phoneTwo: {
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/abstract-representation-of-penetration-t-1774589425109-876d12b1.png",
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/abstract-representation-of-penetration-t-1774589425109-876d12b1.png?_wi=2",
},
},
{
@@ -125,10 +125,10 @@ export default function LandingPage() {
title: "Vulnerability Analysis",
description: "Deep scanning and identification of infrastructure gaps.",
phoneOne: {
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/advanced-firewall-and-vulnerability-scan-1774589424281-24f0b2dd.png",
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/advanced-firewall-and-vulnerability-scan-1774589424281-24f0b2dd.png?_wi=1",
},
phoneTwo: {
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/advanced-firewall-and-vulnerability-scan-1774589424281-24f0b2dd.png",
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/advanced-firewall-and-vulnerability-scan-1774589424281-24f0b2dd.png?_wi=2",
},
},
{
@@ -136,10 +136,10 @@ export default function LandingPage() {
title: "Digital Forensics",
description: "Analyze and recover critical digital evidence efficiently.",
phoneOne: {
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/deep-packet-inspection-technology-visual-1774589422682-ab7559d4.png",
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/deep-packet-inspection-technology-visual-1774589422682-ab7559d4.png?_wi=1",
},
phoneTwo: {
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/deep-packet-inspection-technology-visual-1774589422682-ab7559d4.png",
imageSrc: "https://webuild-dev.s3.eu-north-1.amazonaws.com/users/user_3BVzxs9I60ZFmWTGCQAsFaIH1O0/deep-packet-inspection-technology-visual-1774589422682-ab7559d4.png?_wi=2",
},
},
]}