From a507fc8eec12521895b454aba7775fa4318cdb31 Mon Sep 17 00:00:00 2001 From: bender Date: Sat, 4 Apr 2026 21:57:43 +0000 Subject: [PATCH] Update src/app/page.tsx --- src/app/page.tsx | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/src/app/page.tsx b/src/app/page.tsx index ead761a..670081c 100644 --- a/src/app/page.tsx +++ b/src/app/page.tsx @@ -64,7 +64,7 @@ export default function LandingPage() { handle: "@cybersec", testimonial: "The insights into social engineering vectors were absolutely eye-opening for our team.", rating: 5, - imageSrc: "http://img.b2bpic.net/free-photo/programmer-seeing-error-popup-computer-display-data-center_482257-118032.jpg", + imageSrc: "http://img.b2bpic.net/free-photo/programmer-seeing-error-popup-computer-display-data-center_482257-118032.jpg?_wi=1", imageAlt: "cybersecurity dashboard tech background", }, { @@ -72,7 +72,7 @@ export default function LandingPage() { handle: "@netsec", testimonial: "Finally, a source that explains complex attack patterns in simple, actionable terms.", rating: 5, - imageSrc: "http://img.b2bpic.net/free-photo/good-password-3d-render-secure-data-protection_107791-16569.jpg", + imageSrc: "http://img.b2bpic.net/free-photo/good-password-3d-render-secure-data-protection_107791-16569.jpg?_wi=1", imageAlt: "phishing protection cyber security icon", }, { @@ -80,7 +80,7 @@ export default function LandingPage() { handle: "@infosec", testimonial: "An essential hub for anyone serious about understanding modern exploitation techniques.", rating: 5, - imageSrc: "http://img.b2bpic.net/free-photo/cybersecurity-professional-securing-digital-data-laptop_23-2152029066.jpg", + imageSrc: "http://img.b2bpic.net/free-photo/cybersecurity-professional-securing-digital-data-laptop_23-2152029066.jpg?_wi=1", imageAlt: "encrypted server network architecture", }, { @@ -88,7 +88,7 @@ export default function LandingPage() { handle: "@ethicalhack", testimonial: "The methodologies covered here are standard industry knowledge now.", rating: 5, - imageSrc: "http://img.b2bpic.net/free-photo/cyber-intelligence-secure-operations-center-with-usa-flag-big-screen_482257-105777.jpg", + imageSrc: "http://img.b2bpic.net/free-photo/cyber-intelligence-secure-operations-center-with-usa-flag-big-screen_482257-105777.jpg?_wi=1", imageAlt: "penetration testing code analysis", }, { @@ -96,11 +96,11 @@ export default function LandingPage() { handle: "@itsecure", testimonial: "Excellent documentation of current cyber threats and defense strategies.", rating: 5, - imageSrc: "http://img.b2bpic.net/free-photo/ai-llm-chatbot-software-interface-pc-home-office-showing-virtual-assistant_482257-113943.jpg", + imageSrc: "http://img.b2bpic.net/free-photo/ai-llm-chatbot-software-interface-pc-home-office-showing-virtual-assistant_482257-113943.jpg?_wi=1", imageAlt: "modern office dark laptop screen", }, ]} - imageSrc="http://img.b2bpic.net/free-photo/programmer-seeing-error-popup-computer-display-data-center_482257-118032.jpg" + imageSrc="http://img.b2bpic.net/free-photo/programmer-seeing-error-popup-computer-display-data-center_482257-118032.jpg?_wi=2" imageAlt="Security dashboard interface" mediaAnimation="blur-reveal" avatars={[ @@ -173,19 +173,19 @@ export default function LandingPage() { { title: "Phishing & Social Engineering", description: "Manipulating individuals to disclose sensitive information through deceptive messaging tactics.", - imageSrc: "http://img.b2bpic.net/free-photo/good-password-3d-render-secure-data-protection_107791-16569.jpg", + imageSrc: "http://img.b2bpic.net/free-photo/good-password-3d-render-secure-data-protection_107791-16569.jpg?_wi=2", imageAlt: "Phishing protection", }, { title: "Encryption Exploitation", description: "Analyzing vulnerabilities in outdated cryptographic protocols to intercept secure data.", - imageSrc: "http://img.b2bpic.net/free-photo/cybersecurity-professional-securing-digital-data-laptop_23-2152029066.jpg", + imageSrc: "http://img.b2bpic.net/free-photo/cybersecurity-professional-securing-digital-data-laptop_23-2152029066.jpg?_wi=2", imageAlt: "Encrypted servers", }, { title: "Automated Scanning", description: "Systematic vulnerability analysis of network perimeters to discover exposed endpoints.", - imageSrc: "http://img.b2bpic.net/free-photo/cyber-intelligence-secure-operations-center-with-usa-flag-big-screen_482257-105777.jpg", + imageSrc: "http://img.b2bpic.net/free-photo/cyber-intelligence-secure-operations-center-with-usa-flag-big-screen_482257-105777.jpg?_wi=2", imageAlt: "Source code scan", }, ]} @@ -260,7 +260,7 @@ export default function LandingPage() { tag="Stay Updated" title="Get Our Security Newsletter" description="Join thousands of security professionals receiving the latest research on hacker methodologies." - imageSrc="http://img.b2bpic.net/free-photo/ai-llm-chatbot-software-interface-pc-home-office-showing-virtual-assistant_482257-113943.jpg" + imageSrc="http://img.b2bpic.net/free-photo/ai-llm-chatbot-software-interface-pc-home-office-showing-virtual-assistant_482257-113943.jpg?_wi=2" imageAlt="Security workstation" mediaAnimation="slide-up" /> @@ -268,7 +268,7 @@ export default function LandingPage() {