diff --git a/devsoc24-landing/src/components/main.tsx b/devsoc24-landing/src/components/main.tsx index 28532ee..f64551d 100644 --- a/devsoc24-landing/src/components/main.tsx +++ b/devsoc24-landing/src/components/main.tsx @@ -18,7 +18,7 @@ import Screen from "@/components/screen"; import { PowerGlitch } from "powerglitch"; import devsoc2k24 from "@/assets/images/DEVSOC24.svg"; import LearnMoreBtn from "./LearnMoreBtn"; - +import TypewriterEffect from "./terminal/typewriter"; import { useTransform, motion, useScroll } from "framer-motion"; function Main() { diff --git a/devsoc24-landing/src/pages/index.tsx b/devsoc24-landing/src/pages/index.tsx index 4d4a26f..8912152 100644 --- a/devsoc24-landing/src/pages/index.tsx +++ b/devsoc24-landing/src/pages/index.tsx @@ -3,20 +3,59 @@ import About from "@/components/about"; import ActionButton from "@/components/actionButton"; import Main from "@/components/main"; import SmoothScrolling from "@/components/smoothscrolling"; +import TypewriterEffect from "@/components/terminal/typewriter"; +import { useState } from "react"; + +const help = [ + 'Initiating quantum decryption sequence...', + 'Syncing neural network interfaces...', + 'Overriding mainframe security protocols...', + 'Hacking into the mainframe matrix...', + 'Crunching binary data for analysis...', + 'Escaping digital mazes through recursive algorithms...', + 'Manipulating data streams with bitwise operations...', + 'Generating cryptographic keys with prime number algorithms...', + 'Unleashing virtual chaos through recursive function calls...', + 'Navigating encrypted tunnels with pointer arithmetic...', + 'Triggering backdoor access with exploit vectors...', + 'Conducting remote exploits using buffer overflow techniques...', + 'Compiling rogue scripts with embedded assembly code...', + 'Disrupting network protocols with raw socket manipulation...', + 'Executing stealth maneuvers with bitwise masking...', + 'Initiating cybernetic transcendence through kernel-level exploits...', + 'Unraveling encrypted matrices with custom decryption algorithms...', + 'Cracking cryptographic puzzles using brute-force techniques...', + 'Bypassing biometric authentication through spoofing techniques...', + 'Unleashing algorithmic havoc with optimized sorting algorithms...', + "
", +]; export default function Home() { + const [typingCompleted, setTypingCompleted] = useState(false); + const handleTypingComplete = () => { + setTypingCompleted(true); + }; return ( <> - -
-
-
- - -
- + {!typingCompleted ? ( +
+
- + ) : ( + +
+
+
+ + +
+ +
+
+ )} ); } diff --git a/devsoc24-landing/src/pages/terminal.tsx b/devsoc24-landing/src/pages/terminal.tsx index 38e64fe..4757eee 100644 --- a/devsoc24-landing/src/pages/terminal.tsx +++ b/devsoc24-landing/src/pages/terminal.tsx @@ -15,28 +15,26 @@ import { IoMdClose } from "react-icons/io"; const help = [ - 'WDWKJDCNWKJC', - 'WUDC GWUDYGC WQUYDCG WQUODCG ', - 'WIDCHWCW', - 'JQSCHNJ CIHQIE WQCNWIKCJNWKCWNDCKJW DN ', - 'OKOEWKCWJDIOCJWI CWCJWQJDCJWC......... ', - 'WDKNCWDKJ ', - 'WDOCOWQCJQDWODC ', - 'IBC QICUDH QINCQWIC UHDWCIUWDCHIWUDHCWDCJIWDCMWD W ', - 'NJDJCDCNDJCND.................. ', - 'DCNQW CIQWC WQODC WDC Q', - 'WDCQN WD QC ', - 'WJDCN QWINCQJWCNQWCKJN DWCNWD CKNWDC......... ', - 'QWIJNCI WDUHCIWDCN WIDCKJNW DICKJQWDDNCQW ', - 'WQDCN WDKCNJWQLKDCJQWNDCKJLQWN CKLDNCQWKDC WJDCNQKLW DNCQWJK', - 'WKDNCW KJDCNWKDNCWJKCWKDJCNWDLKJC ', - 'WQDJCNIUWQHCUWHDCIUHWQUDCHUIWHDCW ', - 'WDCIHWDCIUHWIUDCHIUWQHCQWHCU......... ', - 'JWD N28DH 92NJK IWCJIJDWCNW ', - 'WQINJC IUWCINWCD ', - 'JIWEIUCIUWHCIU ', - 'LOADING.................................... ', - + 'Initiating quantum decryption sequence...', + 'Syncing neural network interfaces...', + 'Overriding mainframe security protocols...', + 'Hacking into the mainframe matrix...', + 'Crunching binary data for analysis...', + 'Escaping digital mazes through recursive algorithms...', + 'Manipulating data streams with bitwise operations...', + 'Generating cryptographic keys with prime number algorithms...', + 'Unleashing virtual chaos through recursive function calls...', + 'Navigating encrypted tunnels with pointer arithmetic...', + 'Triggering backdoor access with exploit vectors...', + 'Conducting remote exploits using buffer overflow techniques...', + 'Compiling rogue scripts with embedded assembly code...', + 'Disrupting network protocols with raw socket manipulation...', + 'Executing stealth maneuvers with bitwise masking...', + 'Initiating cybernetic transcendence through kernel-level exploits...', + 'Unraveling encrypted matrices with custom decryption algorithms...', + 'Cracking cryptographic puzzles using brute-force techniques...', + 'Bypassing biometric authentication through spoofing techniques...', + 'Unleashing algorithmic havoc with optimized sorting algorithms...', "
", ];