export default {
  home: 'Home',
  welcome: 'Welcome to X-target!',
  systemInfo:
    'X-target is a web application based on React+MidwayJS+MySQL that is vulnerable. Its main goal is to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and to aid both students & teachers to learn about web application security in a controlled class room environment.',
  goal: 'The aim of X-target is to practice some of the most common web vulnerabilities, with various levels of difficultly, with a simple straightforward interface.',
  generalInstructionsTitle: 'General Instructions',
  generalInstructions:
    'It is up to the user how they approach X-target. Either by working through every module at a fixed level, or selecting any module and working up to reach the highest level they can before moving onto the next one. There is not a fixed object to complete a module; however users should feel that they have successfully exploited the system as best as they possible could by using that particular vulnerability.',
  generalInstructionsNote:
    'Please note, there are both documented and undocumented vulnerability with this software. This is intentional. You are encouraged to try and discover as many issues as possible.',
  instructionsWarning: 'WARNING!',
  instructionsWarningContent:
    'X-target is vulnerable! Do not upload it to your hosting provider public html folder or any Internet facing servers, as they will be compromised. It is recommend using a virtual machine (such as VirtualBox or VMware), which is set to NAT networking mode.',
  disclaimer: 'Disclaimer',
  disclaimerContent:
    'We do not take responsibility for the way in which any one uses this application (X-target). We have made the purposes of the application clear and it should not be used maliciously. We have given warnings and taken measures to prevent users from installing X-target on to live web servers. If your web server is compromised via an installation of X-target it is not our responsibility it is the responsibility of the person/s who uploaded and installed it.',
  helpfulMessageTitle: 'Helpful Message',
  helpfulMessage:
    'X-target is based on the mainstream front and back-end separation architecture development, different from the previous front and back-end non-separation architecture, bringing a new mainstream understanding to help network security/developers to understand these security risks in depth and to prevent them. The system will explain the vulnerabilities in common business scenarios, so have fun hacking.',
  helpfulRemember: 'Remember: Less is more, slower is faster',
  technologyStack: 'Technology Stack',
};
