diff --git a/src/app/page.tsx b/src/app/page.tsx index ce15df6..87eec94 100644 --- a/src/app/page.tsx +++ b/src/app/page.tsx @@ -21,8 +21,7 @@ export default function HomePage() { const footerColumns = [ { - title: "Product", - items: [ + title: "Product", items: [ { label: "Features", href: "#features" }, { label: "Security", href: "#metrics" }, { label: "Pricing", href: "#" }, @@ -30,8 +29,7 @@ export default function HomePage() { ], }, { - title: "Company", - items: [ + title: "Company", items: [ { label: "About Us", href: "#" }, { label: "Blog", href: "#" }, { label: "Careers", href: "#" }, @@ -39,8 +37,7 @@ export default function HomePage() { ], }, { - title: "Resources", - items: [ + title: "Resources", items: [ { label: "API Docs", href: "#" }, { label: "Security Guide", href: "#" }, { label: "FAQ", href: "#faq" }, @@ -48,8 +45,7 @@ export default function HomePage() { ], }, { - title: "Legal", - items: [ + title: "Legal", items: [ { label: "Privacy Policy", href: "#" }, { label: "Terms of Service", href: "#" }, { label: "Cookie Policy", href: "#" }, @@ -65,7 +61,7 @@ export default function HomePage() { borderRadius="rounded" contentWidth="compact" sizing="largeSmallSizeMediumTitles" - background="noiseDiagonalGradient" + background="circleGradient" cardStyle="gradient-radial" primaryButtonStyle="gradient" secondaryButtonStyle="radial-glow" @@ -79,7 +75,7 @@ export default function HomePage() { @@ -124,67 +110,43 @@ export default function HomePage() { features={[ { id: 1, - title: "Bcrypt Password Hashing", - description: - "Industry-standard password hashing with automatic salt generation. Passwords are irreversibly encrypted, ensuring even if data is compromised, passwords remain secure.", - phoneOne: { + title: "Bcrypt Password Hashing", description: + "Industry-standard password hashing with automatic salt generation. Passwords are irreversibly encrypted, ensuring even if data is compromised, passwords remain secure.", phoneOne: { imageSrc: - "http://img.b2bpic.net/free-vector/antibacterial-logo-template_23-2148502706.jpg?_wi=2", - imageAlt: "Encryption security technology", - }, + "http://img.b2bpic.net/free-vector/antibacterial-logo-template_23-2148502706.jpg", imageAlt: "Encryption security technology"}, phoneTwo: { imageSrc: - "http://img.b2bpic.net/free-photo/top-view-keyboard-with-lock-metal-chain_23-2148578114.jpg?_wi=2", - imageAlt: "Password hashing cryptographic security", - }, + "http://img.b2bpic.net/free-photo/top-view-keyboard-with-lock-metal-chain_23-2148578114.jpg", imageAlt: "Password hashing cryptographic security"}, }, { id: 2, - title: "Two-Factor Authentication", - description: - "Add an extra layer of security with OTP (One-Time Password) verification. Users receive unique codes via SMS or authenticator apps for account verification.", - phoneOne: { + title: "Two-Factor Authentication", description: + "Add an extra layer of security with OTP (One-Time Password) verification. Users receive unique codes via SMS or authenticator apps for account verification.", phoneOne: { imageSrc: - "http://img.b2bpic.net/free-photo/register-sign-up-membership-concept_53876-121221.jpg?_wi=2", - imageAlt: "Two-factor authentication phone verification", - }, + "http://img.b2bpic.net/free-photo/register-sign-up-membership-concept_53876-121221.jpg", imageAlt: "Two-factor authentication phone verification"}, phoneTwo: { imageSrc: - "http://img.b2bpic.net/free-photo/businesswoman-discussing-with-disabled-woman_482257-2402.jpg?_wi=2", - imageAlt: "Session management user activity monitor", - }, + "http://img.b2bpic.net/free-photo/businesswoman-discussing-with-disabled-woman_482257-2402.jpg", imageAlt: "Session management user activity monitor"}, }, { id: 3, - title: "Session Management", - description: - "Track active sessions, manage device access, and revoke suspicious sessions in real-time. Monitor login attempts and geographic locations for enhanced security.", - phoneOne: { + title: "Session Management", description: + "Track active sessions, manage device access, and revoke suspicious sessions in real-time. Monitor login attempts and geographic locations for enhanced security.", phoneOne: { imageSrc: - "http://img.b2bpic.net/free-photo/businesswoman-discussing-with-disabled-woman_482257-2402.jpg?_wi=3", - imageAlt: "Session management user activity monitor", - }, + "http://img.b2bpic.net/free-photo/businesswoman-discussing-with-disabled-woman_482257-2402.jpg", imageAlt: "Session management user activity monitor"}, phoneTwo: { imageSrc: - "http://img.b2bpic.net/free-photo/software-developers-using-laptop-data-center-managing-server-virtualization_482257-122525.jpg?_wi=2", - imageAlt: "Secure authentication dashboard interface", - }, + "http://img.b2bpic.net/free-photo/software-developers-using-laptop-data-center-managing-server-virtualization_482257-122525.jpg", imageAlt: "Secure authentication dashboard interface"}, }, { id: 4, - title: "SQL Injection Protection", - description: - "Parameterized queries and input validation prevent SQL injection attacks. All user inputs are sanitized and validated before database operations.", - phoneOne: { + title: "SQL Injection Protection", description: + "Parameterized queries and input validation prevent SQL injection attacks. All user inputs are sanitized and validated before database operations.", phoneOne: { imageSrc: - "http://img.b2bpic.net/free-photo/software-developers-using-laptop-data-center-managing-server-virtualization_482257-122525.jpg?_wi=3", - imageAlt: "Secure authentication dashboard interface", - }, + "http://img.b2bpic.net/free-photo/software-developers-using-laptop-data-center-managing-server-virtualization_482257-122525.jpg", imageAlt: "Secure authentication dashboard interface"}, phoneTwo: { imageSrc: - "http://img.b2bpic.net/free-vector/antibacterial-logo-template_23-2148502706.jpg?_wi=3", - imageAlt: "Encryption security technology", - }, + "http://img.b2bpic.net/free-vector/antibacterial-logo-template_23-2148502706.jpg", imageAlt: "Encryption security technology"}, }, ]} showStepNumbers={true} @@ -200,29 +162,17 @@ export default function HomePage() { description="Proven security infrastructure trusted by enterprises and startups worldwide." metrics={[ { - id: "1", - icon: Lock, - title: "256-Bit Encryption", - value: "AES-256", - }, + id: "1", icon: Lock, + title: "256-Bit Encryption", value: "AES-256"}, { - id: "2", - icon: Shield, - title: "Security Uptime", - value: "99.99%", - }, + id: "2", icon: Shield, + title: "Security Uptime", value: "99.99%"}, { - id: "3", - icon: Zap, - title: "Authentication Speed", - value: "<100ms", - }, + id: "3", icon: Zap, + title: "Authentication Speed", value: "<100ms"}, { - id: "4", - icon: Users, - title: "Active Users", - value: "500K+", - }, + id: "4", icon: Users, + title: "Active Users", value: "500K+"}, ]} animationType="blur-reveal" textboxLayout="default" @@ -239,41 +189,23 @@ export default function HomePage() { tagAnimation="slide-up" faqs={[ { - id: "1", - title: "How secure is your authentication system?", - content: - "Our system uses military-grade AES-256 encryption, industry-standard bcrypt password hashing, and two-factor authentication. All data transmissions are encrypted via TLS/SSL protocols. We maintain SOC 2 Type II compliance and undergo regular security audits.", - }, + id: "1", title: "How secure is your authentication system?", content: + "Our system uses military-grade AES-256 encryption, industry-standard bcrypt password hashing, and two-factor authentication. All data transmissions are encrypted via TLS/SSL protocols. We maintain SOC 2 Type II compliance and undergo regular security audits."}, { - id: "2", - title: "What happens if I forget my password?", - content: - "You can use our secure password reset feature. We'll send a verification email with a time-limited reset link. For added security, you may need to verify your identity through two-factor authentication before creating a new password.", - }, + id: "2", title: "What happens if I forget my password?", content: + "You can use our secure password reset feature. We'll send a verification email with a time-limited reset link. For added security, you may need to verify your identity through two-factor authentication before creating a new password."}, { - id: "3", - title: "Can I use two-factor authentication on multiple devices?", - content: - "Yes! You can register multiple authenticator apps or phone numbers for 2FA. Each device receives OTP codes independently. This provides flexibility while maintaining security across all your devices.", - }, + id: "3", title: "Can I use two-factor authentication on multiple devices?", content: + "Yes! You can register multiple authenticator apps or phone numbers for 2FA. Each device receives OTP codes independently. This provides flexibility while maintaining security across all your devices."}, { - id: "4", - title: "How do I manage my active sessions?", - content: - "Access your dashboard's Session Management page to view all active sessions. You can see device type, location, and last activity. Revoke any suspicious sessions with a single click.", - }, + id: "4", title: "How do I manage my active sessions?", content: + "Access your dashboard's Session Management page to view all active sessions. You can see device type, location, and last activity. Revoke any suspicious sessions with a single click."}, { - id: "5", - title: "What is SQL injection protection?", - content: - "We use parameterized queries and input validation to prevent SQL injection attacks. All user inputs are sanitized before being processed, ensuring malicious code cannot access or manipulate the database.", - }, + id: "5", title: "What is SQL injection protection?", content: + "We use parameterized queries and input validation to prevent SQL injection attacks. All user inputs are sanitized before being processed, ensuring malicious code cannot access or manipulate the database."}, { - id: "6", - title: "How often is my password hashed?", - content: - "Your password is hashed immediately upon registration and during login. The hash is never stored in plain text. Each hash includes a unique salt generated using cryptographic random functions, making rainbow table attacks ineffective.", - }, + id: "6", title: "How often is my password hashed?", content: + "Your password is hashed immediately upon registration and during login. The hash is never stored in plain text. Each hash includes a unique salt generated using cryptographic random functions, making rainbow table attacks ineffective."}, ]} faqsAnimation="slide-up" textboxLayout="default" diff --git a/src/app/profile/page.tsx b/src/app/profile/page.tsx index 0c8a7ee..cb4f79b 100644 --- a/src/app/profile/page.tsx +++ b/src/app/profile/page.tsx @@ -16,7 +16,7 @@ export default function ProfilePage() { borderRadius="rounded" contentWidth="compact" sizing="largeSmallSizeMediumTitles" - background="noiseDiagonalGradient" + background="circleGradient" cardStyle="gradient-radial" primaryButtonStyle="gradient" secondaryButtonStyle="radial-glow" @@ -39,7 +39,7 @@ export default function ProfilePage() {