a
This commit is contained in:
75
.obsidian/workspace.json
vendored
75
.obsidian/workspace.json
vendored
@@ -9,18 +9,43 @@
|
||||
"dimension": 62.59025270758123,
|
||||
"children": [
|
||||
{
|
||||
"id": "e2194e3299515374",
|
||||
"id": "829ecd06322baed5",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "markdown",
|
||||
"state": {
|
||||
"file": "CCN/VL01.md",
|
||||
"file": "Informationssicherheit/Ueb3/Ueb3.md",
|
||||
"mode": "source",
|
||||
"source": false
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "4b8ad56e1fd78890",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "markdown",
|
||||
"state": {
|
||||
"file": "Informationssicherheit/Ueb3/Ueb3.md",
|
||||
"mode": "source",
|
||||
"source": false
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "54e804bb6061872b",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "markdown",
|
||||
"state": {
|
||||
"file": "conflict-files-obsidian-git.md",
|
||||
"mode": "source",
|
||||
"source": false
|
||||
}
|
||||
}
|
||||
}
|
||||
]
|
||||
],
|
||||
"currentTab": 2
|
||||
},
|
||||
{
|
||||
"id": "47553fa673bb1eb6",
|
||||
@@ -28,12 +53,12 @@
|
||||
"dimension": 37.40974729241877,
|
||||
"children": [
|
||||
{
|
||||
"id": "20668ba691cd80b3",
|
||||
"id": "b2fab346c5df81de",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "pdf",
|
||||
"state": {
|
||||
"file": "Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf"
|
||||
"file": "Informationssicherheit/Ueb3/03-ueb_uebungsblatt.pdf"
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -103,7 +128,7 @@
|
||||
"state": {
|
||||
"type": "backlink",
|
||||
"state": {
|
||||
"file": "CCN/VL01.md",
|
||||
"file": "conflict-files-obsidian-git.md",
|
||||
"collapseAll": false,
|
||||
"extraContext": false,
|
||||
"sortOrder": "alphabetical",
|
||||
@@ -120,7 +145,7 @@
|
||||
"state": {
|
||||
"type": "outgoing-link",
|
||||
"state": {
|
||||
"file": "CCN/VL01.md",
|
||||
"file": "conflict-files-obsidian-git.md",
|
||||
"linksCollapsed": false,
|
||||
"unlinkedCollapsed": true
|
||||
}
|
||||
@@ -143,7 +168,7 @@
|
||||
"state": {
|
||||
"type": "outline",
|
||||
"state": {
|
||||
"file": "CCN/VL01.md"
|
||||
"file": "conflict-files-obsidian-git.md"
|
||||
}
|
||||
}
|
||||
},
|
||||
@@ -202,26 +227,39 @@
|
||||
"juggl:Juggl global graph": false
|
||||
}
|
||||
},
|
||||
"active": "b8336cb3c3d06be9",
|
||||
"active": "54e804bb6061872b",
|
||||
"lastOpenFiles": [
|
||||
"CCN/Ex01/ccn1-exercise1.pdf",
|
||||
"CCN/Ex01",
|
||||
"Informationssicherheit/Ueb3/Ueb3.md",
|
||||
"conflict-files-obsidian-git.md",
|
||||
"unterwäsche_austausch_nein.jpg.md",
|
||||
"Informationssicherheit/Ueb3/03-ueb_uebungsblatt.pdf",
|
||||
"Informationssicherheit/VL/03-ueb_uebungsblatt.pdf",
|
||||
"Informationssicherheit/Ueb2/Ueb2.md",
|
||||
"Informationssicherheit/Ueb2/Ueb2.pdf",
|
||||
"Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf",
|
||||
"Informationssicherheit/Ueb3",
|
||||
"Informationssicherheit/VL/04-recht-standards-handout.pdf",
|
||||
"CCN/VL01.md",
|
||||
"Mathe/KW16/UEB.md",
|
||||
"Mathe/KW16/KW16-EWuuEV_vor.pdf",
|
||||
"Mathe/KW16/KW16-EWuuEV.pdf",
|
||||
"Mathe/KW16",
|
||||
"Mathe",
|
||||
"CCN/Ex01/Exercise 1.md",
|
||||
"CCN/Ex01/CCN-1 - introduction.pdf",
|
||||
"CCN/Ex01/2023-04-18_11-08.png",
|
||||
"CCN/Ex01/1.3 Alpha 2 Playtesting Guide (DO NOT SHARE).pdf",
|
||||
"Algorithmen und Datenstrukturen/UEB03/UEB03.md",
|
||||
"Algorithmen und Datenstrukturen/UEB01/UEB01.md",
|
||||
"Informationssicherheit/Ueb2/2023-04-17_15-55.png",
|
||||
"Informationssicherheit/Ueb2/2023-04-17_14-16.png",
|
||||
"Untitled 1.md",
|
||||
"Untitled.md",
|
||||
"Excalidraw/Drawing 2023-04-17 08.21.36.excalidraw.md",
|
||||
"Excalidraw/Drawing 2023-04-17 08.21.00.excalidraw.md",
|
||||
"Excalidraw",
|
||||
"FH/Informationssicherheit/Ueb2/Ueb2.md",
|
||||
"README.md",
|
||||
"FH/Informationssicherheit/Ueb2/test.md",
|
||||
"Informationssicherheit/Ueb2/test2.md",
|
||||
"Informationssicherheit/Ueb2/Untitled.md",
|
||||
"Informationssicherheit/Ueb1/01-ueb_uebungsblatt.pdf",
|
||||
"Informationssicherheit/Ueb1/20230330_19h30m31s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230330_19h34m13s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230331_07h21m13s_grim.png",
|
||||
@@ -229,16 +267,9 @@
|
||||
"Informationssicherheit/Ueb1/20230331_10h28m43s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230331_14h12m43s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230331_16h17m48s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230331_16h21m51s_grim.png",
|
||||
"Informationssicherheit/Ueb1/Ueb01.md",
|
||||
"Informationssicherheit/Ueb1/Ueb01.pdf",
|
||||
"Informationssicherheit/VL/01-orga-motivation-handout.pdf",
|
||||
"Informationssicherheit/VL/02-terminologie-handout.pdf",
|
||||
"Informationssicherheit/VL/03-fm-orga-handout.pdf",
|
||||
"CCN/VL01.md",
|
||||
"Algorithmen und Datenstrukturen/UEB01.md",
|
||||
"2023-04-16.md",
|
||||
"Informationssicherheit/Ueb1",
|
||||
"FH/2023-04-16.md",
|
||||
"FH/Informationssicherheit/Ueb1/Ueb01.md",
|
||||
"FH/Informationssicherheit/Ueb01.md",
|
||||
|
||||
Reference in New Issue
Block a user