diff --git a/src/app/page.tsx b/src/app/page.tsx
index ce15df6..87eec94 100644
--- a/src/app/page.tsx
+++ b/src/app/page.tsx
@@ -21,8 +21,7 @@ export default function HomePage() {
const footerColumns = [
{
- title: "Product",
- items: [
+ title: "Product", items: [
{ label: "Features", href: "#features" },
{ label: "Security", href: "#metrics" },
{ label: "Pricing", href: "#" },
@@ -30,8 +29,7 @@ export default function HomePage() {
],
},
{
- title: "Company",
- items: [
+ title: "Company", items: [
{ label: "About Us", href: "#" },
{ label: "Blog", href: "#" },
{ label: "Careers", href: "#" },
@@ -39,8 +37,7 @@ export default function HomePage() {
],
},
{
- title: "Resources",
- items: [
+ title: "Resources", items: [
{ label: "API Docs", href: "#" },
{ label: "Security Guide", href: "#" },
{ label: "FAQ", href: "#faq" },
@@ -48,8 +45,7 @@ export default function HomePage() {
],
},
{
- title: "Legal",
- items: [
+ title: "Legal", items: [
{ label: "Privacy Policy", href: "#" },
{ label: "Terms of Service", href: "#" },
{ label: "Cookie Policy", href: "#" },
@@ -65,7 +61,7 @@ export default function HomePage() {
borderRadius="rounded"
contentWidth="compact"
sizing="largeSmallSizeMediumTitles"
- background="noiseDiagonalGradient"
+ background="circleGradient"
cardStyle="gradient-radial"
primaryButtonStyle="gradient"
secondaryButtonStyle="radial-glow"
@@ -79,7 +75,7 @@ export default function HomePage() {
@@ -124,67 +110,43 @@ export default function HomePage() {
features={[
{
id: 1,
- title: "Bcrypt Password Hashing",
- description:
- "Industry-standard password hashing with automatic salt generation. Passwords are irreversibly encrypted, ensuring even if data is compromised, passwords remain secure.",
- phoneOne: {
+ title: "Bcrypt Password Hashing", description:
+ "Industry-standard password hashing with automatic salt generation. Passwords are irreversibly encrypted, ensuring even if data is compromised, passwords remain secure.", phoneOne: {
imageSrc:
- "http://img.b2bpic.net/free-vector/antibacterial-logo-template_23-2148502706.jpg?_wi=2",
- imageAlt: "Encryption security technology",
- },
+ "http://img.b2bpic.net/free-vector/antibacterial-logo-template_23-2148502706.jpg", imageAlt: "Encryption security technology"},
phoneTwo: {
imageSrc:
- "http://img.b2bpic.net/free-photo/top-view-keyboard-with-lock-metal-chain_23-2148578114.jpg?_wi=2",
- imageAlt: "Password hashing cryptographic security",
- },
+ "http://img.b2bpic.net/free-photo/top-view-keyboard-with-lock-metal-chain_23-2148578114.jpg", imageAlt: "Password hashing cryptographic security"},
},
{
id: 2,
- title: "Two-Factor Authentication",
- description:
- "Add an extra layer of security with OTP (One-Time Password) verification. Users receive unique codes via SMS or authenticator apps for account verification.",
- phoneOne: {
+ title: "Two-Factor Authentication", description:
+ "Add an extra layer of security with OTP (One-Time Password) verification. Users receive unique codes via SMS or authenticator apps for account verification.", phoneOne: {
imageSrc:
- "http://img.b2bpic.net/free-photo/register-sign-up-membership-concept_53876-121221.jpg?_wi=2",
- imageAlt: "Two-factor authentication phone verification",
- },
+ "http://img.b2bpic.net/free-photo/register-sign-up-membership-concept_53876-121221.jpg", imageAlt: "Two-factor authentication phone verification"},
phoneTwo: {
imageSrc:
- "http://img.b2bpic.net/free-photo/businesswoman-discussing-with-disabled-woman_482257-2402.jpg?_wi=2",
- imageAlt: "Session management user activity monitor",
- },
+ "http://img.b2bpic.net/free-photo/businesswoman-discussing-with-disabled-woman_482257-2402.jpg", imageAlt: "Session management user activity monitor"},
},
{
id: 3,
- title: "Session Management",
- description:
- "Track active sessions, manage device access, and revoke suspicious sessions in real-time. Monitor login attempts and geographic locations for enhanced security.",
- phoneOne: {
+ title: "Session Management", description:
+ "Track active sessions, manage device access, and revoke suspicious sessions in real-time. Monitor login attempts and geographic locations for enhanced security.", phoneOne: {
imageSrc:
- "http://img.b2bpic.net/free-photo/businesswoman-discussing-with-disabled-woman_482257-2402.jpg?_wi=3",
- imageAlt: "Session management user activity monitor",
- },
+ "http://img.b2bpic.net/free-photo/businesswoman-discussing-with-disabled-woman_482257-2402.jpg", imageAlt: "Session management user activity monitor"},
phoneTwo: {
imageSrc:
- "http://img.b2bpic.net/free-photo/software-developers-using-laptop-data-center-managing-server-virtualization_482257-122525.jpg?_wi=2",
- imageAlt: "Secure authentication dashboard interface",
- },
+ "http://img.b2bpic.net/free-photo/software-developers-using-laptop-data-center-managing-server-virtualization_482257-122525.jpg", imageAlt: "Secure authentication dashboard interface"},
},
{
id: 4,
- title: "SQL Injection Protection",
- description:
- "Parameterized queries and input validation prevent SQL injection attacks. All user inputs are sanitized and validated before database operations.",
- phoneOne: {
+ title: "SQL Injection Protection", description:
+ "Parameterized queries and input validation prevent SQL injection attacks. All user inputs are sanitized and validated before database operations.", phoneOne: {
imageSrc:
- "http://img.b2bpic.net/free-photo/software-developers-using-laptop-data-center-managing-server-virtualization_482257-122525.jpg?_wi=3",
- imageAlt: "Secure authentication dashboard interface",
- },
+ "http://img.b2bpic.net/free-photo/software-developers-using-laptop-data-center-managing-server-virtualization_482257-122525.jpg", imageAlt: "Secure authentication dashboard interface"},
phoneTwo: {
imageSrc:
- "http://img.b2bpic.net/free-vector/antibacterial-logo-template_23-2148502706.jpg?_wi=3",
- imageAlt: "Encryption security technology",
- },
+ "http://img.b2bpic.net/free-vector/antibacterial-logo-template_23-2148502706.jpg", imageAlt: "Encryption security technology"},
},
]}
showStepNumbers={true}
@@ -200,29 +162,17 @@ export default function HomePage() {
description="Proven security infrastructure trusted by enterprises and startups worldwide."
metrics={[
{
- id: "1",
- icon: Lock,
- title: "256-Bit Encryption",
- value: "AES-256",
- },
+ id: "1", icon: Lock,
+ title: "256-Bit Encryption", value: "AES-256"},
{
- id: "2",
- icon: Shield,
- title: "Security Uptime",
- value: "99.99%",
- },
+ id: "2", icon: Shield,
+ title: "Security Uptime", value: "99.99%"},
{
- id: "3",
- icon: Zap,
- title: "Authentication Speed",
- value: "<100ms",
- },
+ id: "3", icon: Zap,
+ title: "Authentication Speed", value: "<100ms"},
{
- id: "4",
- icon: Users,
- title: "Active Users",
- value: "500K+",
- },
+ id: "4", icon: Users,
+ title: "Active Users", value: "500K+"},
]}
animationType="blur-reveal"
textboxLayout="default"
@@ -239,41 +189,23 @@ export default function HomePage() {
tagAnimation="slide-up"
faqs={[
{
- id: "1",
- title: "How secure is your authentication system?",
- content:
- "Our system uses military-grade AES-256 encryption, industry-standard bcrypt password hashing, and two-factor authentication. All data transmissions are encrypted via TLS/SSL protocols. We maintain SOC 2 Type II compliance and undergo regular security audits.",
- },
+ id: "1", title: "How secure is your authentication system?", content:
+ "Our system uses military-grade AES-256 encryption, industry-standard bcrypt password hashing, and two-factor authentication. All data transmissions are encrypted via TLS/SSL protocols. We maintain SOC 2 Type II compliance and undergo regular security audits."},
{
- id: "2",
- title: "What happens if I forget my password?",
- content:
- "You can use our secure password reset feature. We'll send a verification email with a time-limited reset link. For added security, you may need to verify your identity through two-factor authentication before creating a new password.",
- },
+ id: "2", title: "What happens if I forget my password?", content:
+ "You can use our secure password reset feature. We'll send a verification email with a time-limited reset link. For added security, you may need to verify your identity through two-factor authentication before creating a new password."},
{
- id: "3",
- title: "Can I use two-factor authentication on multiple devices?",
- content:
- "Yes! You can register multiple authenticator apps or phone numbers for 2FA. Each device receives OTP codes independently. This provides flexibility while maintaining security across all your devices.",
- },
+ id: "3", title: "Can I use two-factor authentication on multiple devices?", content:
+ "Yes! You can register multiple authenticator apps or phone numbers for 2FA. Each device receives OTP codes independently. This provides flexibility while maintaining security across all your devices."},
{
- id: "4",
- title: "How do I manage my active sessions?",
- content:
- "Access your dashboard's Session Management page to view all active sessions. You can see device type, location, and last activity. Revoke any suspicious sessions with a single click.",
- },
+ id: "4", title: "How do I manage my active sessions?", content:
+ "Access your dashboard's Session Management page to view all active sessions. You can see device type, location, and last activity. Revoke any suspicious sessions with a single click."},
{
- id: "5",
- title: "What is SQL injection protection?",
- content:
- "We use parameterized queries and input validation to prevent SQL injection attacks. All user inputs are sanitized before being processed, ensuring malicious code cannot access or manipulate the database.",
- },
+ id: "5", title: "What is SQL injection protection?", content:
+ "We use parameterized queries and input validation to prevent SQL injection attacks. All user inputs are sanitized before being processed, ensuring malicious code cannot access or manipulate the database."},
{
- id: "6",
- title: "How often is my password hashed?",
- content:
- "Your password is hashed immediately upon registration and during login. The hash is never stored in plain text. Each hash includes a unique salt generated using cryptographic random functions, making rainbow table attacks ineffective.",
- },
+ id: "6", title: "How often is my password hashed?", content:
+ "Your password is hashed immediately upon registration and during login. The hash is never stored in plain text. Each hash includes a unique salt generated using cryptographic random functions, making rainbow table attacks ineffective."},
]}
faqsAnimation="slide-up"
textboxLayout="default"
diff --git a/src/app/profile/page.tsx b/src/app/profile/page.tsx
index 0c8a7ee..cb4f79b 100644
--- a/src/app/profile/page.tsx
+++ b/src/app/profile/page.tsx
@@ -16,7 +16,7 @@ export default function ProfilePage() {
borderRadius="rounded"
contentWidth="compact"
sizing="largeSmallSizeMediumTitles"
- background="noiseDiagonalGradient"
+ background="circleGradient"
cardStyle="gradient-radial"
primaryButtonStyle="gradient"
secondaryButtonStyle="radial-glow"
@@ -39,7 +39,7 @@ export default function ProfilePage() {