Recently, there has been a rise in cyber security breaches
Companies are turning to physical security strategies involving biometric and digital keys to secure their clients' accounts.
Line 11: | Line 11: | ||
} | } | ||
− | + | <style> | |
− | + | @import url(https://fonts.googleapis.com/css?family=Lato:300,400,300italic,400italic); | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | /* Base Styles | |
− | + | ===================================*/ | |
− | + | body { | |
− | + | color: #183532; | |
− | + | font-family: 'Lato', sans-serif; | |
− | + | font-weight: 400; | |
− | + | line-height: 1.8; | |
− | + | background-color: #fff; | |
− | + | width: auto; | |
− | + | position:absolute; | |
− | + | } | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | } | + | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | /* Layout Styles | |
− | + | ===================================*/ | |
− | + | section:not(:first-of-type), | |
− | + | section:not(:nth-of-type(n2)) { | |
− | + | margin-top: 80px; | |
− | + | } | |
− | + | .section-two, | |
− | } | + | .section-three, |
+ | footer { | ||
+ | margin-top: 80px; | ||
+ | } | ||
− | |||
− | |||
− | |||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | . | + | /* Cover / Jumbotron Styles |
− | + | ===================================*/ | |
− | + | section .cover { | |
− | } | + | padding-top: 70px; |
+ | |||
+ | background-repeat: no-repeat; | ||
+ | background-size: cover; | ||
+ | height: 100vh; | ||
+ | width: 100vw; | ||
+ | |||
+ | display: -ms-flexbox; | ||
+ | display: flex; | ||
+ | |||
+ | } | ||
− | |||
− | |||
− | |||
− | |||
− | |||
+ | /* Section One Styles | ||
+ | ===================================*/ | ||
+ | .section-one-content { | ||
+ | padding: 40px 20px; | ||
+ | color: #ffffff; | ||
+ | font-weight: 300; | ||
+ | } | ||
+ | .section-one-content h1 { | ||
+ | margin: 0 0 20px; | ||
+ | } | ||
+ | #section-one-left { | ||
+ | background: #183532; | ||
+ | } | ||
+ | #section-one-middle { | ||
+ | background: #244F4A; | ||
+ | } | ||
+ | #section-one-right { | ||
+ | background: #2A5C56; | ||
+ | } | ||
− | + | .section-two, | |
− | + | .section-three { | |
− | } | + | background: #fff; |
+ | } | ||
− | + | /* CSS Image Styles | |
− | + | ====================================================*/ | |
− | + | .css-img-wrapper { | |
− | + | display: -webkit-box; | |
− | + | display: -ms-flexbox; | |
− | + | display: flex; | |
− | + | -webkit-box-orient: vertical; | |
− | + | -webkit-box-direction: normal; | |
− | + | -ms-flex-direction: column; | |
− | + | flex-direction: column; | |
− | + | -ms-flex-wrap: nowrap; | |
− | + | flex-wrap: nowrap; | |
− | + | -webkit-box-pack: center; | |
− | + | -ms-flex-pack: center; | |
− | + | justify-content: center; | |
− | + | -ms-flex-line-pack: center; | |
− | + | align-content: center; | |
− | + | -webkit-box-align: center; | |
− | + | -ms-flex-align: center; | |
− | + | align-items: center; | |
− | + | } | |
− | + | .img-designers, | |
− | + | .img-developers { | |
− | + | height: 400px; | |
− | + | width: 400px; | |
− | + | background-position: center center; | |
− | + | background-size: cover; | |
− | + | } | |
− | + | .img-designers { | |
− | + | background: #183532; | |
− | + | } | |
− | + | .img-developers { | |
− | + | background: #2A5C56; | |
− | + | } | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | } | + | |
− | . | + | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | } | + | |
− | + | ||
− | + | ||
− | } | + | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | } | + | |
+ | /* Media Styles | ||
+ | ===================================*/ | ||
+ | @media (min-width: 480px) { | ||
+ | body { | ||
+ | font-size: 16px; | ||
+ | |||
+ | |||
+ | } | ||
+ | } | ||
+ | @media (min-width: 768px) { | ||
+ | .section-one-content { | ||
+ | padding: 40px 40px; | ||
+ | } | ||
+ | } | ||
+ | @media (min-width: 992px) { | ||
+ | .section-one-content { | ||
+ | padding: 40px 20px; | ||
+ | } | ||
+ | } | ||
+ | @media (min-width: 1200px) { | ||
+ | .section-one-content { | ||
+ | padding: 40px 40px; | ||
+ | } | ||
+ | } | ||
+ | @media only screen and (max-width: 500px) { | ||
+ | .section.cover { | ||
+ | max-width:100%; | ||
+ | } | ||
+ | .cover { | ||
+ | max-width:100%; | ||
+ | } | ||
− | |||
− | |||
− | |||
− | |||
} | } | ||
− | + | h1 { | |
− | position: | + | font-size: 300px; |
− | + | ||
+ | } | ||
+ | .maintext { | ||
+ | position: absolute; | ||
+ | left: 33%%; | ||
+ | top: 10%; | ||
} | } | ||
− | . | + | .maintext2 { |
− | + | position: absolute; | |
− | + | left: 33%; | |
+ | top: 40%; | ||
} | } | ||
− | . | + | .mainimage{ |
− | + | max-width: 100%; | |
− | + | height: auto; | |
} | } | ||
− | |||
− | |||
− | |||
− | |||
</style> | </style> | ||
</head> | </head> |
Recently, there has been a rise in cyber security breaches
Companies are turning to physical security strategies involving biometric and digital keys to secure their clients' accounts.
A randomly assorted biometric which utilises CRISPRi to synthesise a random fluorescent key in E. coli. Our security system is called Key. coli .