Skip to content

Commit

Permalink
Merge pull request #35 from NishantGupt786/master
Browse files Browse the repository at this point in the history
loader
  • Loading branch information
aditansh authored Feb 26, 2024
2 parents 823c8a2 + 4cc4475 commit 32b84c2
Show file tree
Hide file tree
Showing 3 changed files with 69 additions and 32 deletions.
2 changes: 1 addition & 1 deletion devsoc24-landing/src/components/main.tsx
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ import Screen from "@/components/screen";
import { PowerGlitch } from "powerglitch";
import devsoc2k24 from "@/assets/images/DEVSOC24.svg";
import LearnMoreBtn from "./LearnMoreBtn";

import TypewriterEffect from "./terminal/typewriter";
import { useTransform, motion, useScroll } from "framer-motion";

function Main() {
Expand Down
57 changes: 48 additions & 9 deletions devsoc24-landing/src/pages/index.tsx
Original file line number Diff line number Diff line change
Expand Up @@ -3,20 +3,59 @@ import About from "@/components/about";
import ActionButton from "@/components/actionButton";
import Main from "@/components/main";
import SmoothScrolling from "@/components/smoothscrolling";
import TypewriterEffect from "@/components/terminal/typewriter";
import { useState } from "react";

const help = [
'<span class="">Initiating quantum decryption sequence...</span>',
'<span class="">Syncing neural network interfaces...</span>',
'<span class="">Overriding mainframe security protocols...</span>',
'<span class="">Hacking into the mainframe matrix...</span>',
'<span class="">Crunching binary data for analysis...</span>',
'<span class="">Escaping digital mazes through recursive algorithms...</span>',
'<span class="">Manipulating data streams with bitwise operations...</span>',
'<span class="">Generating cryptographic keys with prime number algorithms...</span>',
'<span class="">Unleashing virtual chaos through recursive function calls...</span>',
'<span class="">Navigating encrypted tunnels with pointer arithmetic...</span>',
'<span class="">Triggering backdoor access with exploit vectors...</span>',
'<span class="">Conducting remote exploits using buffer overflow techniques...</span>',
'<span class="">Compiling rogue scripts with embedded assembly code...</span>',
'<span class="">Disrupting network protocols with raw socket manipulation...</span>',
'<span class="">Executing stealth maneuvers with bitwise masking...</span>',
'<span class="">Initiating cybernetic transcendence through kernel-level exploits...</span>',
'<span class="">Unraveling encrypted matrices with custom decryption algorithms...</span>',
'<span class="">Cracking cryptographic puzzles using brute-force techniques...</span>',
'<span class="">Bypassing biometric authentication through spoofing techniques...</span>',
'<span class="">Unleashing algorithmic havoc with optimized sorting algorithms...</span>',
"<br>",
];

export default function Home() {
const [typingCompleted, setTypingCompleted] = useState(false);
const handleTypingComplete = () => {
setTypingCompleted(true);
};
return (
<>
<SmoothScrolling>
<section id="Main">
<Main />
</section>

<About />
<div className="fixed bottom-0 z-40 mb-10 flex w-full justify-center">
<ActionButton body="Kuch toh" link="/" />
{!typingCompleted ? (
<div className="pl-3 ">
<TypewriterEffect
textLines={help}
onTypingComplete={handleTypingComplete}
/>
</div>
</SmoothScrolling>
) : (
<SmoothScrolling>
<section id="Main">
<Main />
</section>

<About />
<div className="fixed bottom-0 z-40 mb-10 flex w-full justify-center">
<ActionButton body="Kuch toh" link="/" />
</div>
</SmoothScrolling>
)}
</>
);
}
42 changes: 20 additions & 22 deletions devsoc24-landing/src/pages/terminal.tsx
Original file line number Diff line number Diff line change
Expand Up @@ -15,28 +15,26 @@ import { IoMdClose } from "react-icons/io";


const help = [
'<span class="">WDWKJDCNWKJC</span>',
'<span class="">WUDC GWUDYGC WQUYDCG WQUODCG </span>',
'<span class="">WIDCHWCW</span>',
'<span class="">JQSCHNJ CIHQIE WQCNWIKCJNWKCWNDCKJW DN</span> ',
'<span class="">OKOEWKCWJDIOCJWI CWCJWQJDCJWC.........</span> ',
'<span class="">WDKNCWDKJ</span> ',
'<span class="">WDOCOWQCJQDWODC</span> ',
'<span class="">IBC QICUDH QINCQWIC UHDWCIUWDCHIWUDHCWDCJIWDCMWD W</span> ',
'<span class="">NJDJCDCNDJCND..................</span> ',
'<span class="">DCNQW CIQWC WQODC WDC Q</span>',
'<span class="">WDCQN WD QC</span> ',
'<span class="">WJDCN QWINCQJWCNQWCKJN DWCNWD CKNWDC.........</span> ',
'<span class="">QWIJNCI WDUHCIWDCN WIDCKJNW DICKJQWDDNCQW</span> ',
'<span class="">WQDCN WDKCNJWQLKDCJQWNDCKJLQWN CKLDNCQWKDC WJDCNQKLW DNCQWJK</span>',
'<span class="">WKDNCW KJDCNWKDNCWJKCWKDJCNWDLKJC</span> ',
'<span class="">WQDJCNIUWQHCUWHDCIUHWQUDCHUIWHDCW</span> ',
'<span class="">WDCIHWDCIUHWIUDCHIUWQHCQWHCU.........</span> ',
'<span class="">JWD N28DH 92NJK IWCJIJDWCNW</span> ',
'<span class="">WQINJC IUWCINWCD</span> ',
'<span class="">JIWEIUCIUWHCIU</span> ',
'<span class="">LOADING....................................</span> ',

'<span class="">Initiating quantum decryption sequence...</span>',
'<span class="">Syncing neural network interfaces...</span>',
'<span class="">Overriding mainframe security protocols...</span>',
'<span class="">Hacking into the mainframe matrix...</span>',
'<span class="">Crunching binary data for analysis...</span>',
'<span class="">Escaping digital mazes through recursive algorithms...</span>',
'<span class="">Manipulating data streams with bitwise operations...</span>',
'<span class="">Generating cryptographic keys with prime number algorithms...</span>',
'<span class="">Unleashing virtual chaos through recursive function calls...</span>',
'<span class="">Navigating encrypted tunnels with pointer arithmetic...</span>',
'<span class="">Triggering backdoor access with exploit vectors...</span>',
'<span class="">Conducting remote exploits using buffer overflow techniques...</span>',
'<span class="">Compiling rogue scripts with embedded assembly code...</span>',
'<span class="">Disrupting network protocols with raw socket manipulation...</span>',
'<span class="">Executing stealth maneuvers with bitwise masking...</span>',
'<span class="">Initiating cybernetic transcendence through kernel-level exploits...</span>',
'<span class="">Unraveling encrypted matrices with custom decryption algorithms...</span>',
'<span class="">Cracking cryptographic puzzles using brute-force techniques...</span>',
'<span class="">Bypassing biometric authentication through spoofing techniques...</span>',
'<span class="">Unleashing algorithmic havoc with optimized sorting algorithms...</span>',
"<br>",
];

Expand Down

0 comments on commit 32b84c2

Please sign in to comment.