Update src/app/page.tsx

This commit is contained in:
2026-03-07 08:15:53 +00:00
parent 3895f0b0a7
commit a8bbcfa25a

View File

@@ -90,23 +90,23 @@ export default function HomePage() {
buttonAnimation="blur-reveal"
mediaItems={[
{
imageSrc: "http://img.b2bpic.net/free-photo/software-developers-using-laptop-data-center-managing-server-virtualization_482257-122525.jpg",
imageSrc: "http://img.b2bpic.net/free-photo/software-developers-using-laptop-data-center-managing-server-virtualization_482257-122525.jpg?_wi=1",
imageAlt: "Secure authentication dashboard interface",
},
{
imageSrc: "http://img.b2bpic.net/free-vector/antibacterial-logo-template_23-2148502706.jpg",
imageSrc: "http://img.b2bpic.net/free-vector/antibacterial-logo-template_23-2148502706.jpg?_wi=1",
imageAlt: "Encryption security technology",
},
{
imageSrc: "http://img.b2bpic.net/free-photo/register-sign-up-membership-concept_53876-121221.jpg",
imageSrc: "http://img.b2bpic.net/free-photo/register-sign-up-membership-concept_53876-121221.jpg?_wi=1",
imageAlt: "Two-factor authentication verification",
},
{
imageSrc: "http://img.b2bpic.net/free-photo/businesswoman-discussing-with-disabled-woman_482257-2402.jpg",
imageSrc: "http://img.b2bpic.net/free-photo/businesswoman-discussing-with-disabled-woman_482257-2402.jpg?_wi=1",
imageAlt: "Session management dashboard",
},
{
imageSrc: "http://img.b2bpic.net/free-photo/top-view-keyboard-with-lock-metal-chain_23-2148578114.jpg",
imageSrc: "http://img.b2bpic.net/free-photo/top-view-keyboard-with-lock-metal-chain_23-2148578114.jpg?_wi=1",
imageAlt: "Password hashing cryptographic process",
},
]}
@@ -129,12 +129,12 @@ export default function HomePage() {
"Industry-standard password hashing with automatic salt generation. Passwords are irreversibly encrypted, ensuring even if data is compromised, passwords remain secure.",
phoneOne: {
imageSrc:
"http://img.b2bpic.net/free-vector/antibacterial-logo-template_23-2148502706.jpg",
"http://img.b2bpic.net/free-vector/antibacterial-logo-template_23-2148502706.jpg?_wi=2",
imageAlt: "Encryption security technology",
},
phoneTwo: {
imageSrc:
"http://img.b2bpic.net/free-photo/top-view-keyboard-with-lock-metal-chain_23-2148578114.jpg",
"http://img.b2bpic.net/free-photo/top-view-keyboard-with-lock-metal-chain_23-2148578114.jpg?_wi=2",
imageAlt: "Password hashing cryptographic security",
},
},
@@ -145,12 +145,12 @@ export default function HomePage() {
"Add an extra layer of security with OTP (One-Time Password) verification. Users receive unique codes via SMS or authenticator apps for account verification.",
phoneOne: {
imageSrc:
"http://img.b2bpic.net/free-photo/register-sign-up-membership-concept_53876-121221.jpg",
"http://img.b2bpic.net/free-photo/register-sign-up-membership-concept_53876-121221.jpg?_wi=2",
imageAlt: "Two-factor authentication phone verification",
},
phoneTwo: {
imageSrc:
"http://img.b2bpic.net/free-photo/businesswoman-discussing-with-disabled-woman_482257-2402.jpg",
"http://img.b2bpic.net/free-photo/businesswoman-discussing-with-disabled-woman_482257-2402.jpg?_wi=2",
imageAlt: "Session management user activity monitor",
},
},
@@ -161,12 +161,12 @@ export default function HomePage() {
"Track active sessions, manage device access, and revoke suspicious sessions in real-time. Monitor login attempts and geographic locations for enhanced security.",
phoneOne: {
imageSrc:
"http://img.b2bpic.net/free-photo/businesswoman-discussing-with-disabled-woman_482257-2402.jpg",
"http://img.b2bpic.net/free-photo/businesswoman-discussing-with-disabled-woman_482257-2402.jpg?_wi=3",
imageAlt: "Session management user activity monitor",
},
phoneTwo: {
imageSrc:
"http://img.b2bpic.net/free-photo/software-developers-using-laptop-data-center-managing-server-virtualization_482257-122525.jpg",
"http://img.b2bpic.net/free-photo/software-developers-using-laptop-data-center-managing-server-virtualization_482257-122525.jpg?_wi=2",
imageAlt: "Secure authentication dashboard interface",
},
},
@@ -177,12 +177,12 @@ export default function HomePage() {
"Parameterized queries and input validation prevent SQL injection attacks. All user inputs are sanitized and validated before database operations.",
phoneOne: {
imageSrc:
"http://img.b2bpic.net/free-photo/software-developers-using-laptop-data-center-managing-server-virtualization_482257-122525.jpg",
"http://img.b2bpic.net/free-photo/software-developers-using-laptop-data-center-managing-server-virtualization_482257-122525.jpg?_wi=3",
imageAlt: "Secure authentication dashboard interface",
},
phoneTwo: {
imageSrc:
"http://img.b2bpic.net/free-vector/antibacterial-logo-template_23-2148502706.jpg",
"http://img.b2bpic.net/free-vector/antibacterial-logo-template_23-2148502706.jpg?_wi=3",
imageAlt: "Encryption security technology",
},
},