Merge version_1 into main #3
@@ -58,11 +58,11 @@ export default function LandingPage() {
|
||||
buttonAnimation="slide-up"
|
||||
carouselItems={[
|
||||
{ id: "1", imageSrc: "http://img.b2bpic.net/free-photo/portrait-woman-with-laptop-working_23-2148937746.jpg", imageAlt: "senior adult using tablet safely online" },
|
||||
{ id: "2", imageSrc: "http://img.b2bpic.net/free-vector/steal-data-concept-illustrated_23-2148542545.jpg", imageAlt: "email phishing scam warning message" },
|
||||
{ id: "3", imageSrc: "http://img.b2bpic.net/free-photo/closeup-businessman-using-mobile-phone-video-call-from-office_637285-10972.jpg", imageAlt: "phone scam fraud call warning" },
|
||||
{ id: "4", imageSrc: "http://img.b2bpic.net/free-photo/senior-man-looking-through-his-laptop-his-wife_23-2148404356.jpg", imageAlt: "online banking security elderly" },
|
||||
{ id: "5", imageSrc: "http://img.b2bpic.net/free-photo/extreme-close-up-shot-man-working-notebook-data-center_482257-89921.jpg", imageAlt: "strong password creation security" },
|
||||
{ id: "6", imageSrc: "http://img.b2bpic.net/free-vector/isometric-hacker-activity-template-with-computer-servers-atm-hacking-cyber-thief-online-money-steal-biometric-authorization-security_1284-35296.jpg", imageAlt: "device security software elderly" }
|
||||
{ id: "2", imageSrc: "http://img.b2bpic.net/free-vector/steal-data-concept-illustrated_23-2148542545.jpg?_wi=1", imageAlt: "email phishing scam warning message" },
|
||||
{ id: "3", imageSrc: "http://img.b2bpic.net/free-photo/closeup-businessman-using-mobile-phone-video-call-from-office_637285-10972.jpg?_wi=1", imageAlt: "phone scam fraud call warning" },
|
||||
{ id: "4", imageSrc: "http://img.b2bpic.net/free-photo/senior-man-looking-through-his-laptop-his-wife_23-2148404356.jpg?_wi=1", imageAlt: "online banking security elderly" },
|
||||
{ id: "5", imageSrc: "http://img.b2bpic.net/free-photo/extreme-close-up-shot-man-working-notebook-data-center_482257-89921.jpg?_wi=1", imageAlt: "strong password creation security" },
|
||||
{ id: "6", imageSrc: "http://img.b2bpic.net/free-vector/isometric-hacker-activity-template-with-computer-servers-atm-hacking-cyber-thief-online-money-steal-biometric-authorization-security_1284-35296.jpg?_wi=1", imageAlt: "device security software elderly" }
|
||||
]}
|
||||
autoPlay={true}
|
||||
autoPlayInterval={5000}
|
||||
@@ -84,14 +84,14 @@ export default function LandingPage() {
|
||||
tagIcon={BookOpen}
|
||||
tagAnimation="slide-up"
|
||||
products={[
|
||||
{ id: "1", name: "Email Scams", price: "Learn", imageSrc: "http://img.b2bpic.net/free-vector/steal-data-concept-illustrated_23-2148542545.jpg", imageAlt: "Email scams warning" },
|
||||
{ id: "2", name: "Phone Scams", price: "Learn", imageSrc: "http://img.b2bpic.net/free-photo/closeup-businessman-using-mobile-phone-video-call-from-office_637285-10972.jpg", imageAlt: "Phone scams alert" },
|
||||
{ id: "1", name: "Email Scams", price: "Learn", imageSrc: "http://img.b2bpic.net/free-vector/steal-data-concept-illustrated_23-2148542545.jpg?_wi=2", imageAlt: "Email scams warning" },
|
||||
{ id: "2", name: "Phone Scams", price: "Learn", imageSrc: "http://img.b2bpic.net/free-photo/closeup-businessman-using-mobile-phone-video-call-from-office_637285-10972.jpg?_wi=2", imageAlt: "Phone scams alert" },
|
||||
{ id: "3", name: "Social Media Safety", price: "Learn", imageSrc: "http://img.b2bpic.net/free-photo/modern-senior-woman-with-laptop-coffee_23-2148001785.jpg", imageAlt: "Social media security" },
|
||||
{ id: "4", name: "Banking & Financial Fraud", price: "Learn", imageSrc: "http://img.b2bpic.net/free-photo/senior-man-looking-through-his-laptop-his-wife_23-2148404356.jpg", imageAlt: "Banking security" },
|
||||
{ id: "5", name: "Password & Account Security", price: "Learn", imageSrc: "http://img.b2bpic.net/free-photo/extreme-close-up-shot-man-working-notebook-data-center_482257-89921.jpg", imageAlt: "Password strength" },
|
||||
{ id: "6", name: "Privacy Protection", price: "Learn", imageSrc: "http://img.b2bpic.net/free-photo/african-american-man-using-ai-develop-software-system-with-chroma-key-pc_482257-118525.jpg", imageAlt: "Privacy settings" },
|
||||
{ id: "7", name: "Safe Browsing & Downloads", price: "Learn", imageSrc: "http://img.b2bpic.net/free-vector/flat-background-safer-internet-day_23-2151121216.jpg", imageAlt: "Safe website browsing" },
|
||||
{ id: "8", name: "Device Security", price: "Learn", imageSrc: "http://img.b2bpic.net/free-vector/isometric-hacker-activity-template-with-computer-servers-atm-hacking-cyber-thief-online-money-steal-biometric-authorization-security_1284-35296.jpg", imageAlt: "Device protection" }
|
||||
{ id: "4", name: "Banking & Financial Fraud", price: "Learn", imageSrc: "http://img.b2bpic.net/free-photo/senior-man-looking-through-his-laptop-his-wife_23-2148404356.jpg?_wi=2", imageAlt: "Banking security" },
|
||||
{ id: "5", name: "Password & Account Security", price: "Learn", imageSrc: "http://img.b2bpic.net/free-photo/extreme-close-up-shot-man-working-notebook-data-center_482257-89921.jpg?_wi=2", imageAlt: "Password strength" },
|
||||
{ id: "6", name: "Privacy Protection", price: "Learn", imageSrc: "http://img.b2bpic.net/free-photo/african-american-man-using-ai-develop-software-system-with-chroma-key-pc_482257-118525.jpg?_wi=1", imageAlt: "Privacy settings" },
|
||||
{ id: "7", name: "Safe Browsing & Downloads", price: "Learn", imageSrc: "http://img.b2bpic.net/free-vector/flat-background-safer-internet-day_23-2151121216.jpg?_wi=1", imageAlt: "Safe website browsing" },
|
||||
{ id: "8", name: "Device Security", price: "Learn", imageSrc: "http://img.b2bpic.net/free-vector/isometric-hacker-activity-template-with-computer-servers-atm-hacking-cyber-thief-online-money-steal-biometric-authorization-security_1284-35296.jpg?_wi=2", imageAlt: "Device protection" }
|
||||
]}
|
||||
gridVariant="uniform-all-items-equal"
|
||||
animationType="slide-up"
|
||||
@@ -111,18 +111,18 @@ export default function LandingPage() {
|
||||
features={[
|
||||
{
|
||||
id: 1,
|
||||
title: "Firewalls: Your Digital Fortress", description: "A firewall acts like a security guard for your computer. It blocks unwanted visitors from accessing your personal information while you browse safely. Think of it as a protective barrier between you and the internet.", phoneOne: { imageSrc: "http://img.b2bpic.net/free-vector/isometric-hacker-activity-template-with-computer-servers-atm-hacking-cyber-thief-online-money-steal-biometric-authorization-security_1284-35296.jpg", imageAlt: "Device security" },
|
||||
phoneTwo: { imageSrc: "http://img.b2bpic.net/free-vector/computer-background-with-safety-items_1284-1089.jpg", imageAlt: "Network security" }
|
||||
title: "Firewalls: Your Digital Fortress", description: "A firewall acts like a security guard for your computer. It blocks unwanted visitors from accessing your personal information while you browse safely. Think of it as a protective barrier between you and the internet.", phoneOne: { imageSrc: "http://img.b2bpic.net/free-vector/isometric-hacker-activity-template-with-computer-servers-atm-hacking-cyber-thief-online-money-steal-biometric-authorization-security_1284-35296.jpg?_wi=3", imageAlt: "Device security" },
|
||||
phoneTwo: { imageSrc: "http://img.b2bpic.net/free-vector/computer-background-with-safety-items_1284-1089.jpg?_wi=1", imageAlt: "Network security" }
|
||||
},
|
||||
{
|
||||
id: 2,
|
||||
title: "VPNs: Private Tunnels for Your Data", description: "A VPN creates a secure, private tunnel for your internet activity. Your data travels safely through this tunnel, hidden from outsiders. Companies like Cisco use this technology to keep business information safe—now you can use it too.", phoneOne: { imageSrc: "http://img.b2bpic.net/free-photo/african-american-man-using-ai-develop-software-system-with-chroma-key-pc_482257-118525.jpg", imageAlt: "Privacy protection" },
|
||||
phoneTwo: { imageSrc: "http://img.b2bpic.net/free-vector/flat-background-safer-internet-day_23-2151121216.jpg", imageAlt: "Safe browsing" }
|
||||
title: "VPNs: Private Tunnels for Your Data", description: "A VPN creates a secure, private tunnel for your internet activity. Your data travels safely through this tunnel, hidden from outsiders. Companies like Cisco use this technology to keep business information safe—now you can use it too.", phoneOne: { imageSrc: "http://img.b2bpic.net/free-photo/african-american-man-using-ai-develop-software-system-with-chroma-key-pc_482257-118525.jpg?_wi=2", imageAlt: "Privacy protection" },
|
||||
phoneTwo: { imageSrc: "http://img.b2bpic.net/free-vector/flat-background-safer-internet-day_23-2151121216.jpg?_wi=2", imageAlt: "Safe browsing" }
|
||||
},
|
||||
{
|
||||
id: 3,
|
||||
title: "Network Security: Enterprise-Grade Protection", description: "Enterprise security tools protect networks the way a bank protects its vault. These tools monitor for threats, stop attackers, and keep your personal devices safe. Cisco's technology helps millions stay secure—and it's now accessible to you.", phoneOne: { imageSrc: "http://img.b2bpic.net/free-vector/computer-background-with-safety-items_1284-1089.jpg", imageAlt: "Network security" },
|
||||
phoneTwo: { imageSrc: "http://img.b2bpic.net/free-vector/isometric-hacker-activity-template-with-computer-servers-atm-hacking-cyber-thief-online-money-steal-biometric-authorization-security_1284-35296.jpg", imageAlt: "Device security" }
|
||||
title: "Network Security: Enterprise-Grade Protection", description: "Enterprise security tools protect networks the way a bank protects its vault. These tools monitor for threats, stop attackers, and keep your personal devices safe. Cisco's technology helps millions stay secure—and it's now accessible to you.", phoneOne: { imageSrc: "http://img.b2bpic.net/free-vector/computer-background-with-safety-items_1284-1089.jpg?_wi=2", imageAlt: "Network security" },
|
||||
phoneTwo: { imageSrc: "http://img.b2bpic.net/free-vector/isometric-hacker-activity-template-with-computer-servers-atm-hacking-cyber-thief-online-money-steal-biometric-authorization-security_1284-35296.jpg?_wi=4", imageAlt: "Device security" }
|
||||
}
|
||||
]}
|
||||
showStepNumbers={true}
|
||||
@@ -260,7 +260,7 @@ export default function LandingPage() {
|
||||
tagAnimation="slide-up"
|
||||
background={{ variant: "plain" }}
|
||||
useInvertedBackground={false}
|
||||
imageSrc="http://img.b2bpic.net/free-vector/blue-white-business-card-template_23-2147741401.jpg"
|
||||
imageSrc="http://img.b2bpic.net/free-vector/blue-white-business-card-template_23-2147741401.jpg?_wi=1"
|
||||
mediaAnimation="slide-up"
|
||||
mediaPosition="right"
|
||||
inputPlaceholder="Not used - external links only"
|
||||
@@ -320,7 +320,7 @@ export default function LandingPage() {
|
||||
description="Margaret, retired teacher"
|
||||
subdescription="Using our printable card saved me when I was confused about a call"
|
||||
icon={Heart}
|
||||
imageSrc="http://img.b2bpic.net/free-vector/blue-white-business-card-template_23-2147741401.jpg"
|
||||
imageSrc="http://img.b2bpic.net/free-vector/blue-white-business-card-template_23-2147741401.jpg?_wi=2"
|
||||
imageAlt="Printable emergency contact card"
|
||||
mediaAnimation="slide-up"
|
||||
useInvertedBackground={false}
|
||||
|
||||
Reference in New Issue
Block a user