-
+ {!typingCompleted ? (
+
+
-
+ ) : (
+
+
+
+
+
+
+ )}
>
);
}
diff --git a/devsoc24-landing/src/pages/terminal.tsx b/devsoc24-landing/src/pages/terminal.tsx
index 38e64fe..4757eee 100644
--- a/devsoc24-landing/src/pages/terminal.tsx
+++ b/devsoc24-landing/src/pages/terminal.tsx
@@ -15,28 +15,26 @@ import { IoMdClose } from "react-icons/io";
const help = [
- '
WDWKJDCNWKJC',
- '
WUDC GWUDYGC WQUYDCG WQUODCG ',
- '
WIDCHWCW',
- '
JQSCHNJ CIHQIE WQCNWIKCJNWKCWNDCKJW DN ',
- '
OKOEWKCWJDIOCJWI CWCJWQJDCJWC......... ',
- '
WDKNCWDKJ ',
- '
WDOCOWQCJQDWODC ',
- '
IBC QICUDH QINCQWIC UHDWCIUWDCHIWUDHCWDCJIWDCMWD W ',
- '
NJDJCDCNDJCND.................. ',
- '
DCNQW CIQWC WQODC WDC Q',
- '
WDCQN WD QC ',
- '
WJDCN QWINCQJWCNQWCKJN DWCNWD CKNWDC......... ',
- '
QWIJNCI WDUHCIWDCN WIDCKJNW DICKJQWDDNCQW ',
- '
WQDCN WDKCNJWQLKDCJQWNDCKJLQWN CKLDNCQWKDC WJDCNQKLW DNCQWJK',
- '
WKDNCW KJDCNWKDNCWJKCWKDJCNWDLKJC ',
- '
WQDJCNIUWQHCUWHDCIUHWQUDCHUIWHDCW ',
- '
WDCIHWDCIUHWIUDCHIUWQHCQWHCU......... ',
- '
JWD N28DH 92NJK IWCJIJDWCNW ',
- '
WQINJC IUWCINWCD ',
- '
JIWEIUCIUWHCIU ',
- '
LOADING.................................... ',
-
+ '
Initiating quantum decryption sequence...',
+ '
Syncing neural network interfaces...',
+ '
Overriding mainframe security protocols...',
+ '
Hacking into the mainframe matrix...',
+ '
Crunching binary data for analysis...',
+ '
Escaping digital mazes through recursive algorithms...',
+ '
Manipulating data streams with bitwise operations...',
+ '
Generating cryptographic keys with prime number algorithms...',
+ '
Unleashing virtual chaos through recursive function calls...',
+ '
Navigating encrypted tunnels with pointer arithmetic...',
+ '
Triggering backdoor access with exploit vectors...',
+ '
Conducting remote exploits using buffer overflow techniques...',
+ '
Compiling rogue scripts with embedded assembly code...',
+ '
Disrupting network protocols with raw socket manipulation...',
+ '
Executing stealth maneuvers with bitwise masking...',
+ '
Initiating cybernetic transcendence through kernel-level exploits...',
+ '
Unraveling encrypted matrices with custom decryption algorithms...',
+ '
Cracking cryptographic puzzles using brute-force techniques...',
+ '
Bypassing biometric authentication through spoofing techniques...',
+ '
Unleashing algorithmic havoc with optimized sorting algorithms...',
"
",
];