a
This commit is contained in:
24
.obsidian/community-plugins.json
vendored
24
.obsidian/community-plugins.json
vendored
@@ -1,23 +1 @@
|
||||
[
|
||||
"obsidian-git",
|
||||
"obsidian-mind-map",
|
||||
"table-editor-obsidian",
|
||||
"calendar",
|
||||
"obsidian-advanced-slides",
|
||||
"cm-editor-syntax-highlight-obsidian",
|
||||
"code-block-copy",
|
||||
"url-into-selection",
|
||||
"obsidian-dictionary-plugin",
|
||||
"obsidian-languagetool-plugin",
|
||||
"obsidian-image-toolkit",
|
||||
"quick-latex",
|
||||
"obsidian-excel-to-markdown-table",
|
||||
"obsidian-icons-plugin",
|
||||
"juggl",
|
||||
"obsidian-plugin-toc",
|
||||
"drawio-obsidian",
|
||||
"obsidian-completr",
|
||||
"execute-code",
|
||||
"nldates-obsidian",
|
||||
"obsidian-livesync"
|
||||
]
|
||||
["obsidian-git","obsidian-mind-map","table-editor-obsidian","calendar","obsidian-advanced-slides","cm-editor-syntax-highlight-obsidian","code-block-copy","url-into-selection","obsidian-dictionary-plugin","obsidian-languagetool-plugin","obsidian-image-toolkit","quick-latex","obsidian-excel-to-markdown-table","obsidian-icons-plugin","juggl","obsidian-plugin-toc","drawio-obsidian","obsidian-completr","execute-code","nldates-obsidian","obsidian-livesync","obsidian-dynamic-toc","obsidian-excalidraw-plugin","obsidian-wordnet-plugin"]
|
||||
23
.obsidian/graph.json
vendored
23
.obsidian/graph.json
vendored
@@ -1,22 +1 @@
|
||||
{
|
||||
"collapse-filter": true,
|
||||
"search": "",
|
||||
"showTags": false,
|
||||
"showAttachments": false,
|
||||
"hideUnresolved": false,
|
||||
"showOrphans": true,
|
||||
"collapse-color-groups": true,
|
||||
"colorGroups": [],
|
||||
"collapse-display": true,
|
||||
"showArrow": false,
|
||||
"textFadeMultiplier": 0,
|
||||
"nodeSizeMultiplier": 1,
|
||||
"lineSizeMultiplier": 1,
|
||||
"collapse-forces": true,
|
||||
"centerStrength": 0.518713248970312,
|
||||
"repelStrength": 10,
|
||||
"linkStrength": 1,
|
||||
"linkDistance": 250,
|
||||
"scale": 1,
|
||||
"close": false
|
||||
}
|
||||
{"collapse-filter":true,"search":"","showTags":false,"showAttachments":false,"hideUnresolved":false,"showOrphans":true,"collapse-color-groups":true,"colorGroups":[],"collapse-display":true,"showArrow":false,"textFadeMultiplier":0,"nodeSizeMultiplier":1,"lineSizeMultiplier":1,"collapse-forces":true,"centerStrength":0.518713248970312,"repelStrength":10,"linkStrength":1,"linkDistance":250,"scale":1,"close":false}
|
||||
29
.obsidian/hotkeys.json
vendored
29
.obsidian/hotkeys.json
vendored
@@ -1,28 +1 @@
|
||||
{
|
||||
"obsidian-git:commit": [
|
||||
{
|
||||
"modifiers": [
|
||||
"Alt"
|
||||
],
|
||||
"key": "C"
|
||||
}
|
||||
],
|
||||
"obsidian-git:push2": [
|
||||
{
|
||||
"modifiers": [
|
||||
"Alt"
|
||||
],
|
||||
"key": "P"
|
||||
}
|
||||
],
|
||||
"obsidian-excalidraw-plugin:excalidraw-autocreate-newtab": [
|
||||
{
|
||||
"modifiers": [
|
||||
"Alt",
|
||||
"Mod",
|
||||
"Shift"
|
||||
],
|
||||
"key": "E"
|
||||
}
|
||||
]
|
||||
}
|
||||
{"obsidian-git:commit":[{"modifiers":["Alt"],"key":"C"}],"obsidian-git:push2":[{"modifiers":["Alt"],"key":"P"}],"obsidian-excalidraw-plugin:excalidraw-autocreate-newtab":[{"modifiers":["Alt","Mod","Shift"],"key":"E"}]}
|
||||
@@ -1,10 +1 @@
|
||||
{
|
||||
"id": "better-pdf-plugin",
|
||||
"name": "Better PDF Plugin",
|
||||
"version": "1.4.0",
|
||||
"minAppVersion": "0.11.13",
|
||||
"description": "Goal of this Plugin in to implement a native PDF handling workflow",
|
||||
"author": "MSzturc",
|
||||
"authorUrl": "https://github.com/MSzturc",
|
||||
"isDesktopOnly": false
|
||||
}
|
||||
{"id":"better-pdf-plugin","name":"Better PDF Plugin","version":"1.4.0","minAppVersion":"0.11.13","description":"Goal of this Plugin in to implement a native PDF handling workflow","author":"MSzturc","authorUrl":"https://github.com/MSzturc","isDesktopOnly":false}
|
||||
11
.obsidian/plugins/calendar/manifest.json
vendored
11
.obsidian/plugins/calendar/manifest.json
vendored
@@ -1,10 +1 @@
|
||||
{
|
||||
"id": "calendar",
|
||||
"name": "Calendar",
|
||||
"description": "Calendar view of your daily notes",
|
||||
"version": "1.5.10",
|
||||
"author": "Liam Cain",
|
||||
"authorUrl": "https://github.com/liamcain/",
|
||||
"isDesktopOnly": false,
|
||||
"minAppVersion": "0.9.11"
|
||||
}
|
||||
{"id":"calendar","name":"Calendar","description":"Calendar view of your daily notes","version":"1.5.10","author":"Liam Cain","authorUrl":"https://github.com/liamcain/","isDesktopOnly":false,"minAppVersion":"0.9.11"}
|
||||
@@ -1,10 +1 @@
|
||||
{
|
||||
"id": "cm-editor-syntax-highlight-obsidian",
|
||||
"name": "Editor Syntax Highlight",
|
||||
"author": "death_au",
|
||||
"authorUrl": "https://github.com/deathau",
|
||||
"description": "Show syntax highlighing in code blocks the editor",
|
||||
"isDesktopOnly": false,
|
||||
"version": "0.1.3",
|
||||
"minAppVersion": "0.10.0"
|
||||
}
|
||||
{"id":"cm-editor-syntax-highlight-obsidian","name":"Editor Syntax Highlight","author":"death_au","authorUrl":"https://github.com/deathau","description":"Show syntax highlighing in code blocks the editor","isDesktopOnly":false,"version":"0.1.3","minAppVersion":"0.10.0"}
|
||||
@@ -1,8 +1 @@
|
||||
{
|
||||
"id": "code-block-copy",
|
||||
"name": "Copy button for code blocks",
|
||||
"author": "Daniel Brandenburg",
|
||||
"description": "Copy button for code blocks",
|
||||
"isDesktopOnly": false,
|
||||
"version": "0.1.0"
|
||||
}
|
||||
{"id":"code-block-copy","name":"Copy button for code blocks","author":"Daniel Brandenburg","description":"Copy button for code blocks","isDesktopOnly":false,"version":"0.1.0"}
|
||||
11
.obsidian/plugins/drawio-obsidian/manifest.json
vendored
11
.obsidian/plugins/drawio-obsidian/manifest.json
vendored
@@ -1,10 +1 @@
|
||||
{
|
||||
"id": "drawio-obsidian",
|
||||
"name": "Diagrams",
|
||||
"version": "1.5.0",
|
||||
"minAppVersion": "0.9.12",
|
||||
"description": "Draw.io diagrams for Obsidian. This plugin introduces diagrams that can be included within notes or as stand-alone files. Diagrams are created as SVG files (although .drawio extensions are also supported).",
|
||||
"author": "Sam Greenhalgh",
|
||||
"authorUrl": "https://www.radicalresearch.co.uk/",
|
||||
"isDesktopOnly": true
|
||||
}
|
||||
{"id":"drawio-obsidian","name":"Diagrams","version":"1.5.0","minAppVersion":"0.9.12","description":"Draw.io diagrams for Obsidian. This plugin introduces diagrams that can be included within notes or as stand-alone files. Diagrams are created as SVG files (although .drawio extensions are also supported).","author":"Sam Greenhalgh","authorUrl":"https://www.radicalresearch.co.uk/","isDesktopOnly":true}
|
||||
11
.obsidian/plugins/execute-code/manifest.json
vendored
11
.obsidian/plugins/execute-code/manifest.json
vendored
@@ -1,10 +1 @@
|
||||
{
|
||||
"id": "execute-code",
|
||||
"name": "Execute Code",
|
||||
"version": "1.8.0",
|
||||
"minAppVersion": "0.12.0",
|
||||
"description": "Allows to execute code snippets within a note. Supported programming languages: C, CPP, Dart, Golang, Groovy, Kotlin, Java, JavaScript, TypeScript, Lean, Lua, CSharp, Prolog, Rust, Python, R, Ruby, Wolfram Mathematica, Haskell, Scala, Racket, F#, Batch, Shell & Powershell.",
|
||||
"author": "twibiral",
|
||||
"authorUrl": "https://www.github.com/twibiral",
|
||||
"isDesktopOnly": true
|
||||
}
|
||||
{"id":"execute-code","name":"Execute Code","version":"1.8.0","minAppVersion":"0.12.0","description":"Allows to execute code snippets within a note. Supported programming languages: C, CPP, Dart, Golang, Groovy, Kotlin, Java, JavaScript, TypeScript, Lean, Lua, CSharp, Prolog, Rust, Python, R, Ruby, Wolfram Mathematica, Haskell, Scala, Racket, F#, Batch, Shell & Powershell.","author":"twibiral","authorUrl":"https://www.github.com/twibiral","isDesktopOnly":true}
|
||||
11
.obsidian/plugins/juggl/manifest.json
vendored
11
.obsidian/plugins/juggl/manifest.json
vendored
@@ -1,10 +1 @@
|
||||
{
|
||||
"id": "juggl",
|
||||
"name": "Juggl",
|
||||
"version": "1.4.0",
|
||||
"minAppVersion": "0.11.5",
|
||||
"description": "Adds a completely interactive, stylable and expandable graph view to Obsidian.",
|
||||
"author": "Emile",
|
||||
"authorUrl": "https://twitter.com/emilevankrieken",
|
||||
"isDesktopOnly": false
|
||||
}
|
||||
{"id":"juggl","name":"Juggl","version":"1.4.0","minAppVersion":"0.11.5","description":"Adds a completely interactive, stylable and expandable graph view to Obsidian.","author":"Emile","authorUrl":"https://twitter.com/emilevankrieken","isDesktopOnly":false}
|
||||
11
.obsidian/plugins/nldates-obsidian/manifest.json
vendored
11
.obsidian/plugins/nldates-obsidian/manifest.json
vendored
@@ -1,10 +1 @@
|
||||
{
|
||||
"id": "nldates-obsidian",
|
||||
"name": "Natural Language Dates",
|
||||
"description": "Create date-links based on natural language",
|
||||
"version": "0.6.1",
|
||||
"author": "Argentina Ortega Sainz",
|
||||
"authorUrl": "https://argentinaos.com/",
|
||||
"isDesktopOnly": false,
|
||||
"minAppVersion": "0.13.0"
|
||||
}
|
||||
{"id":"nldates-obsidian","name":"Natural Language Dates","description":"Create date-links based on natural language","version":"0.6.1","author":"Argentina Ortega Sainz","authorUrl":"https://argentinaos.com/","isDesktopOnly":false,"minAppVersion":"0.13.0"}
|
||||
@@ -1,21 +1 @@
|
||||
{
|
||||
"port": "3000",
|
||||
"autoReload": true,
|
||||
"exportDirectory": "/export",
|
||||
"enableChalkboard": false,
|
||||
"enableOverview": false,
|
||||
"enableMenu": false,
|
||||
"enablePointer": false,
|
||||
"enableTimeBar": false,
|
||||
"theme": "black",
|
||||
"highlightTheme": "zenburn",
|
||||
"transition": "slide",
|
||||
"transitionSpeed": "default",
|
||||
"controls": true,
|
||||
"progress": true,
|
||||
"slideNumber": false,
|
||||
"showGrid": false,
|
||||
"autoComplete": "inPreview",
|
||||
"paneMode": "split",
|
||||
"motm": "2023-04-16T08:56:11.065Z"
|
||||
}
|
||||
{"port":"3000","autoReload":true,"exportDirectory":"/export","enableChalkboard":false,"enableOverview":false,"enableMenu":false,"enablePointer":false,"enableTimeBar":false,"theme":"black","highlightTheme":"zenburn","transition":"slide","transitionSpeed":"default","controls":true,"progress":true,"slideNumber":false,"showGrid":false,"autoComplete":"inPreview","paneMode":"split","motm":"2023-04-16T08:56:11.065Z"}
|
||||
@@ -1,3 +1 @@
|
||||
{
|
||||
"version": "1.20.0"
|
||||
}
|
||||
{"version":"1.20.0"}
|
||||
@@ -1,10 +1 @@
|
||||
{
|
||||
"id": "obsidian-advanced-slides",
|
||||
"name": "Advanced Slides",
|
||||
"version": "1.20.0",
|
||||
"minAppVersion": "0.12.0",
|
||||
"description": "Create markdown-based presentations in Obsidian",
|
||||
"author": "Matthäus Szturc",
|
||||
"authorUrl": "https://github.com/MSzturc",
|
||||
"isDesktopOnly": true
|
||||
}
|
||||
{"id":"obsidian-advanced-slides","name":"Advanced Slides","version":"1.20.0","minAppVersion":"0.12.0","description":"Create markdown-based presentations in Obsidian","author":"Matthäus Szturc","authorUrl":"https://github.com/MSzturc","isDesktopOnly":true}
|
||||
@@ -1,10 +1 @@
|
||||
{
|
||||
"name": "reveal.js-menu",
|
||||
"version": "2.1.0",
|
||||
"homepage": "https://denehyg.github.io/reveal.js-menu",
|
||||
"authors": ["Greg Denehy"],
|
||||
"description": "A slideout menu for navigating reveal.js presentations",
|
||||
"keywords": ["reveal", "menu"],
|
||||
"license": "MIT, Copyright (C) 2020 Greg Denehy",
|
||||
"ignore": ["**/.*", "node_modules", "bower_components", "test", "tests"]
|
||||
}
|
||||
{"name":"reveal.js-menu","version":"2.1.0","homepage":"https://denehyg.github.io/reveal.js-menu","authors":["Greg Denehy"],"description":"A slideout menu for navigating reveal.js presentations","keywords":["reveal","menu"],"license":"MIT, Copyright (C) 2020 Greg Denehy","ignore":["**/.*","node_modules","bower_components","test","tests"]}
|
||||
@@ -1,35 +1 @@
|
||||
{
|
||||
"name": "reveal.js-menu",
|
||||
"version": "2.1.0",
|
||||
"description": "A slideout menu for navigating reveal.js presentations",
|
||||
"scripts": {
|
||||
"test": "echo \"Error: no test specified\" && exit 1",
|
||||
"build": "gulp"
|
||||
},
|
||||
"repository": {
|
||||
"type": "git",
|
||||
"url": "git+https://github.com/denehyg/reveal.js-menu.git"
|
||||
},
|
||||
"keywords": [
|
||||
"reveal",
|
||||
"menu"
|
||||
],
|
||||
"author": "Greg Denehy",
|
||||
"license": "MIT, Copyright (C) 2020 Greg Denehy",
|
||||
"bugs": {
|
||||
"url": "https://github.com/denehyg/reveal.js-menu/issues"
|
||||
},
|
||||
"homepage": "https://github.com/denehyg/reveal.js-menu#readme",
|
||||
"devDependencies": {
|
||||
"@babel/core": "^7.10.4",
|
||||
"@babel/preset-env": "^7.10.4",
|
||||
"@rollup/plugin-babel": "^5.0.4",
|
||||
"@rollup/plugin-commonjs": "^13.0.0",
|
||||
"@rollup/plugin-node-resolve": "^8.1.0",
|
||||
"babel-plugin-transform-html-import-to-string": "0.0.1",
|
||||
"core-js": "^3.6.5",
|
||||
"gulp": "^4.0.2",
|
||||
"rollup": "^2.21.0",
|
||||
"rollup-plugin-terser": "^6.1.0"
|
||||
}
|
||||
}
|
||||
{"name":"reveal.js-menu","version":"2.1.0","description":"A slideout menu for navigating reveal.js presentations","scripts":{"test":"echo \"Error: no test specified\" && exit 1","build":"gulp"},"repository":{"type":"git","url":"git+https://github.com/denehyg/reveal.js-menu.git"},"keywords":["reveal","menu"],"author":"Greg Denehy","license":"MIT, Copyright (C) 2020 Greg Denehy","bugs":{"url":"https://github.com/denehyg/reveal.js-menu/issues"},"homepage":"https://github.com/denehyg/reveal.js-menu#readme","devDependencies":{"@babel/core":"^7.10.4","@babel/preset-env":"^7.10.4","@rollup/plugin-babel":"^5.0.4","@rollup/plugin-commonjs":"^13.0.0","@rollup/plugin-node-resolve":"^8.1.0","babel-plugin-transform-html-import-to-string":"0.0.1","core-js":"^3.6.5","gulp":"^4.0.2","rollup":"^2.21.0","rollup-plugin-terser":"^6.1.0"}}
|
||||
@@ -1,164 +1 @@
|
||||
[
|
||||
{
|
||||
"displayName": "Note",
|
||||
"replacement": "note",
|
||||
"icon": "lucide-pencil",
|
||||
"color": "#448aff"
|
||||
},
|
||||
{
|
||||
"displayName": "Summary",
|
||||
"replacement": "summary",
|
||||
"icon": "lucide-clipboard-list",
|
||||
"color": "#00b0ff"
|
||||
},
|
||||
{
|
||||
"displayName": "Abstract",
|
||||
"replacement": "abstract",
|
||||
"icon": "lucide-clipboard-list",
|
||||
"color": "#00b0ff"
|
||||
},
|
||||
{
|
||||
"displayName": "TL;DR",
|
||||
"replacement": "tldr",
|
||||
"icon": "lucide-clipboard-list",
|
||||
"color": "#00b0ff"
|
||||
},
|
||||
{
|
||||
"displayName": "Info",
|
||||
"replacement": "info",
|
||||
"icon": "lucide-info",
|
||||
"color": "#00b8d4"
|
||||
},
|
||||
{
|
||||
"displayName": "To-Do",
|
||||
"replacement": "todo",
|
||||
"icon": "lucide-check-circle-2",
|
||||
"color": "#00b8d4"
|
||||
},
|
||||
{
|
||||
"displayName": "Tip",
|
||||
"replacement": "tip",
|
||||
"icon": "lucide-flame",
|
||||
"color": "#00bfa6"
|
||||
},
|
||||
{
|
||||
"displayName": "Hint",
|
||||
"replacement": "hint",
|
||||
"icon": "lucide-flame",
|
||||
"color": "#00bfa6"
|
||||
},
|
||||
{
|
||||
"displayName": "Important",
|
||||
"replacement": "important",
|
||||
"icon": "lucide-flame",
|
||||
"color": "#00bfa6"
|
||||
},
|
||||
{
|
||||
"displayName": "Success",
|
||||
"replacement": "success",
|
||||
"icon": "lucide-check",
|
||||
"color": "#00c853"
|
||||
},
|
||||
{
|
||||
"displayName": "Check",
|
||||
"replacement": "check",
|
||||
"icon": "lucide-check",
|
||||
"color": "#00c853"
|
||||
},
|
||||
{
|
||||
"displayName": "Done",
|
||||
"replacement": "done",
|
||||
"icon": "lucide-check",
|
||||
"color": "#00c853"
|
||||
},
|
||||
{
|
||||
"displayName": "Question",
|
||||
"replacement": "question",
|
||||
"icon": "lucide-help-circle",
|
||||
"color": "#63dd17"
|
||||
},
|
||||
{
|
||||
"displayName": "Help",
|
||||
"replacement": "Help",
|
||||
"icon": "lucide-help-circle",
|
||||
"color": "#63dd17"
|
||||
},
|
||||
{
|
||||
"displayName": "FAQ",
|
||||
"replacement": "faq",
|
||||
"icon": "lucide-help-circle",
|
||||
"color": "#63dd17"
|
||||
},
|
||||
{
|
||||
"displayName": "Warning",
|
||||
"replacement": "warning",
|
||||
"icon": "lucide-alert-triangle",
|
||||
"color": "#ff9100"
|
||||
},
|
||||
{
|
||||
"displayName": "Caution",
|
||||
"replacement": "caution",
|
||||
"icon": "lucide-alert-triangle",
|
||||
"color": "#ff9100"
|
||||
},
|
||||
{
|
||||
"displayName": "Attention",
|
||||
"replacement": "attention",
|
||||
"icon": "lucide-alert-triangle",
|
||||
"color": "#ff9100"
|
||||
},
|
||||
{
|
||||
"displayName": "Failure",
|
||||
"replacement": "failure",
|
||||
"icon": "lucide-x",
|
||||
"color": "#ff5252"
|
||||
},
|
||||
{
|
||||
"displayName": "Fail",
|
||||
"replacement": "fail",
|
||||
"icon": "lucide-x",
|
||||
"color": "#ff5252"
|
||||
},
|
||||
{
|
||||
"displayName": "Missing",
|
||||
"replacement": "missing",
|
||||
"icon": "lucide-x",
|
||||
"color": "#ff5252"
|
||||
},
|
||||
{
|
||||
"displayName": "Danger",
|
||||
"replacement": "danger",
|
||||
"icon": "lucide-zap",
|
||||
"color": "#ff1744"
|
||||
},
|
||||
{
|
||||
"displayName": "Error",
|
||||
"replacement": "error",
|
||||
"icon": "lucide-zap",
|
||||
"color": "#ff1744"
|
||||
},
|
||||
{
|
||||
"displayName": "Bug",
|
||||
"replacement": "bug",
|
||||
"icon": "lucide-bug",
|
||||
"color": "#f50057"
|
||||
},
|
||||
{
|
||||
"displayName": "Example",
|
||||
"replacement": "example",
|
||||
"icon": "lucide-list",
|
||||
"color": "#7c4dff"
|
||||
},
|
||||
{
|
||||
"displayName": "Quote",
|
||||
"replacement": "quote",
|
||||
"icon": "quote-glyph",
|
||||
"color": "#9e9e9e"
|
||||
},
|
||||
{
|
||||
"displayName": "Cite",
|
||||
"replacement": "cite",
|
||||
"icon": "quote-glyph",
|
||||
"color": "#9e9e9e"
|
||||
}
|
||||
]
|
||||
[{"displayName":"Note","replacement":"note","icon":"lucide-pencil","color":"#448aff"},{"displayName":"Summary","replacement":"summary","icon":"lucide-clipboard-list","color":"#00b0ff"},{"displayName":"Abstract","replacement":"abstract","icon":"lucide-clipboard-list","color":"#00b0ff"},{"displayName":"TL;DR","replacement":"tldr","icon":"lucide-clipboard-list","color":"#00b0ff"},{"displayName":"Info","replacement":"info","icon":"lucide-info","color":"#00b8d4"},{"displayName":"To-Do","replacement":"todo","icon":"lucide-check-circle-2","color":"#00b8d4"},{"displayName":"Tip","replacement":"tip","icon":"lucide-flame","color":"#00bfa6"},{"displayName":"Hint","replacement":"hint","icon":"lucide-flame","color":"#00bfa6"},{"displayName":"Important","replacement":"important","icon":"lucide-flame","color":"#00bfa6"},{"displayName":"Success","replacement":"success","icon":"lucide-check","color":"#00c853"},{"displayName":"Check","replacement":"check","icon":"lucide-check","color":"#00c853"},{"displayName":"Done","replacement":"done","icon":"lucide-check","color":"#00c853"},{"displayName":"Question","replacement":"question","icon":"lucide-help-circle","color":"#63dd17"},{"displayName":"Help","replacement":"Help","icon":"lucide-help-circle","color":"#63dd17"},{"displayName":"FAQ","replacement":"faq","icon":"lucide-help-circle","color":"#63dd17"},{"displayName":"Warning","replacement":"warning","icon":"lucide-alert-triangle","color":"#ff9100"},{"displayName":"Caution","replacement":"caution","icon":"lucide-alert-triangle","color":"#ff9100"},{"displayName":"Attention","replacement":"attention","icon":"lucide-alert-triangle","color":"#ff9100"},{"displayName":"Failure","replacement":"failure","icon":"lucide-x","color":"#ff5252"},{"displayName":"Fail","replacement":"fail","icon":"lucide-x","color":"#ff5252"},{"displayName":"Missing","replacement":"missing","icon":"lucide-x","color":"#ff5252"},{"displayName":"Danger","replacement":"danger","icon":"lucide-zap","color":"#ff1744"},{"displayName":"Error","replacement":"error","icon":"lucide-zap","color":"#ff1744"},{"displayName":"Bug","replacement":"bug","icon":"lucide-bug","color":"#f50057"},{"displayName":"Example","replacement":"example","icon":"lucide-list","color":"#7c4dff"},{"displayName":"Quote","replacement":"quote","icon":"quote-glyph","color":"#9e9e9e"},{"displayName":"Cite","replacement":"cite","icon":"quote-glyph","color":"#9e9e9e"}]
|
||||
4343
.obsidian/plugins/obsidian-completr/latex_commands.json
vendored
4343
.obsidian/plugins/obsidian-completr/latex_commands.json
vendored
File diff suppressed because one or more lines are too long
@@ -1,10 +1 @@
|
||||
{
|
||||
"id": "obsidian-completr",
|
||||
"name": "Completr",
|
||||
"version": "3.1.3",
|
||||
"minAppVersion": "1.0.0",
|
||||
"description": "This plugin provides advanced auto-completion functionality for LaTeX, Frontmatter and standard writing.",
|
||||
"author": "tth05",
|
||||
"authorUrl": "https://github.com/tth05",
|
||||
"isDesktopOnly": true
|
||||
}
|
||||
{"id":"obsidian-completr","name":"Completr","version":"3.1.3","minAppVersion":"1.0.0","description":"This plugin provides advanced auto-completion functionality for LaTeX, Frontmatter and standard writing.","author":"tth05","authorUrl":"https://github.com/tth05","isDesktopOnly":true}
|
||||
@@ -191,6 +191,19 @@ Protection
|
||||
PNL
|
||||
PZlN
|
||||
PaT
|
||||
Please
|
||||
PSID
|
||||
PGU
|
||||
PKn
|
||||
PDB
|
||||
PTB
|
||||
Probleme
|
||||
Passwort
|
||||
Plakat
|
||||
Plakats
|
||||
Passwörtern
|
||||
Privatsphäre
|
||||
Passwortgewohnheiten
|
||||
obj
|
||||
oV
|
||||
oYj
|
||||
@@ -393,6 +406,15 @@ oSG
|
||||
ozH
|
||||
oWb
|
||||
oAO
|
||||
occurrence
|
||||
oxo
|
||||
oqj
|
||||
ovM
|
||||
ouj
|
||||
ogQp
|
||||
oTAe
|
||||
offiziellen
|
||||
oberen
|
||||
Length
|
||||
LCw
|
||||
LN
|
||||
@@ -629,6 +651,18 @@ LJt
|
||||
LWM
|
||||
LhPr
|
||||
LEft
|
||||
LmD
|
||||
LMg
|
||||
Lee
|
||||
Lxe
|
||||
LMi
|
||||
LaTeX
|
||||
Loginversuch
|
||||
Links
|
||||
Lösegeld
|
||||
Layout
|
||||
Linie
|
||||
Lendenschurz
|
||||
Filter
|
||||
FlateDecode
|
||||
Ff
|
||||
@@ -873,6 +907,17 @@ Flags
|
||||
FontBBox
|
||||
FontFile
|
||||
Font
|
||||
For
|
||||
FPv
|
||||
FHlI
|
||||
Fachhochschule
|
||||
Farben
|
||||
Freunde
|
||||
Familie
|
||||
Faktor
|
||||
Figur
|
||||
Figuren
|
||||
Farbe
|
||||
stream
|
||||
se
|
||||
sH
|
||||
@@ -1109,6 +1154,28 @@ sEYI
|
||||
sbP
|
||||
sFq
|
||||
shF
|
||||
scanned
|
||||
strongly
|
||||
simple
|
||||
space
|
||||
sRGB
|
||||
sig
|
||||
scz
|
||||
sBL
|
||||
smj
|
||||
sqn
|
||||
sYy
|
||||
sWTi
|
||||
sWg
|
||||
support
|
||||
sollte
|
||||
sein
|
||||
schützen
|
||||
sollten
|
||||
schaffen
|
||||
sicheren
|
||||
sichere
|
||||
simples
|
||||
ZKs
|
||||
ZN
|
||||
Zf
|
||||
@@ -1329,6 +1396,18 @@ ZIa
|
||||
ZKYu
|
||||
Zvl
|
||||
Zfr
|
||||
ZjF
|
||||
ZwF
|
||||
Zsf
|
||||
ZRa
|
||||
ZXiF
|
||||
ZpC
|
||||
Zzp
|
||||
Zko
|
||||
Zustellung
|
||||
Zwecke
|
||||
Zwei
|
||||
Zeige
|
||||
Who
|
||||
We
|
||||
WE
|
||||
@@ -1549,6 +1628,21 @@ Win
|
||||
WbJ
|
||||
WKgy
|
||||
WaTv
|
||||
Webentwickler
|
||||
Web
|
||||
WvC
|
||||
WOp
|
||||
WOk
|
||||
Wcd
|
||||
WrM
|
||||
WMK
|
||||
WAX
|
||||
WzWT
|
||||
Wuq
|
||||
Wichtige
|
||||
Weiterverkauf
|
||||
Wechsle
|
||||
Wichtigkeit
|
||||
KI
|
||||
Kt
|
||||
KF
|
||||
@@ -1756,6 +1850,21 @@ KHTML
|
||||
KtF
|
||||
Kbnn
|
||||
KFsA
|
||||
KGO
|
||||
KmZ
|
||||
KJC
|
||||
Kbr
|
||||
KUmmi
|
||||
KPT
|
||||
Konto
|
||||
Konformität
|
||||
Kredite
|
||||
Käufe
|
||||
Kontozugriff
|
||||
Konten
|
||||
Kollegen
|
||||
Kreis
|
||||
Keine
|
||||
bq
|
||||
bQ
|
||||
bG
|
||||
@@ -1972,6 +2081,20 @@ bBU
|
||||
bvB
|
||||
bKm
|
||||
bQq
|
||||
before
|
||||
below
|
||||
blocks
|
||||
beispielsweise
|
||||
bkj
|
||||
blf
|
||||
bxI
|
||||
beLc
|
||||
bestätigen
|
||||
bzw
|
||||
betrügerische
|
||||
beitragen
|
||||
betont
|
||||
besteht
|
||||
iZ
|
||||
ig
|
||||
iA
|
||||
@@ -2216,6 +2339,18 @@ iDyt
|
||||
iER
|
||||
iuWZ
|
||||
iAc
|
||||
iaH
|
||||
iPNr
|
||||
iZt
|
||||
iPG
|
||||
iGb
|
||||
isz
|
||||
ifQ
|
||||
ihr
|
||||
integrierte
|
||||
indem
|
||||
ihrem
|
||||
info
|
||||
GJe
|
||||
GAG
|
||||
GJ
|
||||
@@ -2410,6 +2545,21 @@ Geräten
|
||||
Gegensatz
|
||||
Gecko
|
||||
Gzj
|
||||
GCW
|
||||
Gbll
|
||||
GQf
|
||||
Gej
|
||||
GUD
|
||||
GBw
|
||||
GYkb
|
||||
Glaubwürdiger
|
||||
Geschichte
|
||||
Gründen
|
||||
Geburtsdaten
|
||||
Gestohlene
|
||||
Gelb
|
||||
Grün
|
||||
Geburtsdatum
|
||||
AO
|
||||
Aw
|
||||
Az
|
||||
@@ -2633,6 +2783,32 @@ AXRt
|
||||
AAAAAA
|
||||
Ascent
|
||||
Adobe
|
||||
Additional
|
||||
Antwortheader
|
||||
Administratoren
|
||||
AOT
|
||||
ANfl
|
||||
AsBM
|
||||
AMO
|
||||
ANn
|
||||
Alj
|
||||
All
|
||||
Avg
|
||||
Absenderadresse
|
||||
Adresse
|
||||
Absenders
|
||||
Authentisches
|
||||
Ansprechender
|
||||
Aufmerksamkeit
|
||||
Anmeldedaten
|
||||
Anzeichen
|
||||
Abwehr
|
||||
Authentifizierungsmethode
|
||||
Absenderadressen
|
||||
Angriffsziele
|
||||
Anhänge
|
||||
Authentifizierung
|
||||
Atmosphäre
|
||||
QV
|
||||
Qom
|
||||
QJ
|
||||
@@ -2841,6 +3017,16 @@ QAt
|
||||
QcQ
|
||||
QeR
|
||||
Qpy
|
||||
Quellen
|
||||
QFYd
|
||||
QRI
|
||||
QwV
|
||||
QAO
|
||||
QmB
|
||||
QdZ
|
||||
QWC
|
||||
QYW
|
||||
QbW
|
||||
nQC
|
||||
nq
|
||||
nR
|
||||
@@ -3083,6 +3269,15 @@ nax
|
||||
nNa
|
||||
nps
|
||||
nZV
|
||||
nkn
|
||||
nwg
|
||||
nMQ
|
||||
noi
|
||||
noreply
|
||||
noch
|
||||
neues
|
||||
nachdenken
|
||||
nein
|
||||
YJ
|
||||
Yb
|
||||
YwM
|
||||
@@ -3289,6 +3484,12 @@ YiIyy
|
||||
YAS
|
||||
Ykk
|
||||
YYK
|
||||
YKR
|
||||
YWU
|
||||
YYL
|
||||
YLud
|
||||
YXZ
|
||||
YEz
|
||||
UIQ
|
||||
Ue
|
||||
UH
|
||||
@@ -3519,6 +3720,18 @@ Uevgs
|
||||
UCp
|
||||
Uad
|
||||
UTy
|
||||
UVW
|
||||
UKQI
|
||||
UTB
|
||||
URUh
|
||||
UUn
|
||||
Ugr
|
||||
UIH
|
||||
UYK
|
||||
UZnva
|
||||
ULZ
|
||||
UZZ
|
||||
Unterwäsche
|
||||
TZ
|
||||
TF
|
||||
TP
|
||||
@@ -3735,6 +3948,20 @@ TBg
|
||||
TkH
|
||||
TimesNewRomanPS
|
||||
ToUnicode
|
||||
Toh
|
||||
TpE
|
||||
TWTR
|
||||
TTCO
|
||||
TWc
|
||||
TgwvI
|
||||
TIJ
|
||||
Tdm
|
||||
Tml
|
||||
TeY
|
||||
Text
|
||||
Technische
|
||||
Titel
|
||||
Teile
|
||||
gO
|
||||
gHoVo
|
||||
gD
|
||||
@@ -3949,6 +4176,22 @@ glx
|
||||
ggN
|
||||
gaJb
|
||||
gjv
|
||||
gelesen
|
||||
gMQK
|
||||
giQi
|
||||
gjj
|
||||
gca
|
||||
gMpXv
|
||||
gQq
|
||||
gestaltet
|
||||
gefälschten
|
||||
gefährden
|
||||
gefälschte
|
||||
geschult
|
||||
geringer
|
||||
gekaperten
|
||||
gezielte
|
||||
gewährleisten
|
||||
DMg
|
||||
Dv
|
||||
DLg
|
||||
@@ -4167,6 +4410,20 @@ Descent
|
||||
DOBH
|
||||
DescendantFonts
|
||||
DAAAAA
|
||||
Default
|
||||
DTsEF
|
||||
Dyz
|
||||
DQA
|
||||
DrC
|
||||
Dortmund
|
||||
Design
|
||||
Domainbasierte
|
||||
DMARC
|
||||
Dateien
|
||||
Dokumente
|
||||
Diese
|
||||
Drittel
|
||||
Dieses
|
||||
xU
|
||||
xM
|
||||
xK
|
||||
@@ -4343,6 +4600,15 @@ xmM
|
||||
xbD
|
||||
xtY
|
||||
xref
|
||||
xPJ
|
||||
xnx
|
||||
xdz
|
||||
xbO
|
||||
xuq
|
||||
xyu
|
||||
xrs
|
||||
xMI
|
||||
xTix
|
||||
Hx
|
||||
HV
|
||||
HdH
|
||||
@@ -4543,6 +4809,13 @@ Hpt
|
||||
HZW
|
||||
HTW
|
||||
HcA
|
||||
HttpOnly
|
||||
HIJXYZghijvwxyz
|
||||
HXo
|
||||
Herkunft
|
||||
Hintergrund
|
||||
Hellblau
|
||||
Helle
|
||||
zo
|
||||
zL
|
||||
zE
|
||||
@@ -4759,6 +5032,16 @@ zHKQ
|
||||
zzf
|
||||
zWx
|
||||
zkh
|
||||
zFz
|
||||
zjjxU
|
||||
zSWH
|
||||
zux
|
||||
zKhb
|
||||
zMD
|
||||
ziehen
|
||||
zugehöriges
|
||||
zwischen
|
||||
zwei
|
||||
hr
|
||||
hAa
|
||||
hH
|
||||
@@ -4966,6 +5249,14 @@ häufig
|
||||
hXYe
|
||||
huW
|
||||
hBq
|
||||
hOG
|
||||
hqn
|
||||
hfl
|
||||
hDQ
|
||||
hyperref
|
||||
herausfiltern
|
||||
humorvolle
|
||||
hält
|
||||
pt
|
||||
ps
|
||||
pao
|
||||
@@ -5184,6 +5475,18 @@ pswj
|
||||
pWV
|
||||
pMh
|
||||
pxcu
|
||||
plugins
|
||||
pmQ
|
||||
psq
|
||||
pyX
|
||||
portal
|
||||
persönlichen
|
||||
persönliche
|
||||
professionell
|
||||
plausible
|
||||
preisgeben
|
||||
platzieren
|
||||
passwort
|
||||
Ic
|
||||
IT
|
||||
Ir
|
||||
@@ -5408,6 +5711,25 @@ Identity
|
||||
Inter
|
||||
ItalicMT
|
||||
Info
|
||||
Instructions
|
||||
IRK
|
||||
IEC
|
||||
Idg
|
||||
ICER
|
||||
Iswu
|
||||
IYS
|
||||
INZ
|
||||
IonAO
|
||||
IzD
|
||||
IYb
|
||||
IKZJ
|
||||
IaPc
|
||||
IIZ
|
||||
IKu
|
||||
IUs
|
||||
Ihr
|
||||
Inhalt
|
||||
Identität
|
||||
ap
|
||||
aE
|
||||
at
|
||||
@@ -5632,6 +5954,21 @@ azS
|
||||
aVPkCX
|
||||
amsa
|
||||
aXEMH
|
||||
automatically
|
||||
available
|
||||
above
|
||||
alM
|
||||
aPj
|
||||
aWv
|
||||
alxn
|
||||
aufzubauen
|
||||
annehmen
|
||||
aufnehmen
|
||||
auch
|
||||
anbringen
|
||||
austauschen
|
||||
auffälligen
|
||||
austausch
|
||||
fb
|
||||
fVVvD
|
||||
fh
|
||||
@@ -5909,6 +6246,25 @@ fhD
|
||||
fnhF
|
||||
fhy
|
||||
foT
|
||||
followed
|
||||
file
|
||||
files
|
||||
festlegen
|
||||
fMW
|
||||
fve
|
||||
fNOX
|
||||
fhB
|
||||
folgende
|
||||
fälschen
|
||||
fhdortmund
|
||||
festgestellt
|
||||
falsche
|
||||
fiktiven
|
||||
folgenden
|
||||
freundliche
|
||||
fröhliche
|
||||
frische
|
||||
figur
|
||||
Bs
|
||||
ByJ
|
||||
BF
|
||||
@@ -6114,6 +6470,16 @@ BaseFont
|
||||
BAAAAA
|
||||
BkG
|
||||
BuET
|
||||
Bilder
|
||||
BCKEEI
|
||||
Betreff
|
||||
Berichterstattung
|
||||
Banking
|
||||
Betrug
|
||||
Botschaft
|
||||
Bedeutung
|
||||
Bildschirm
|
||||
Betrachtern
|
||||
ek
|
||||
eP
|
||||
eVPm
|
||||
@@ -6409,6 +6775,29 @@ eAr
|
||||
eHr
|
||||
eZj
|
||||
eXI
|
||||
each
|
||||
every
|
||||
erhöhen
|
||||
eingesetzt
|
||||
erx
|
||||
eFl
|
||||
ellu
|
||||
eGG
|
||||
enC
|
||||
ergriffen
|
||||
erwecken
|
||||
enthalten
|
||||
erzählen
|
||||
einsehen
|
||||
erfolgreiches
|
||||
erfolgreich
|
||||
erstellen
|
||||
erregen
|
||||
einfach
|
||||
einfacher
|
||||
entlocken
|
||||
eigenen
|
||||
einfache
|
||||
tj
|
||||
tg
|
||||
tt
|
||||
@@ -6677,6 +7066,21 @@ tGw
|
||||
tWZ
|
||||
tRf
|
||||
trailer
|
||||
them
|
||||
txt
|
||||
text
|
||||
tpt
|
||||
tKq
|
||||
tPP
|
||||
tmL
|
||||
tKTZ
|
||||
tCGmu
|
||||
teX
|
||||
tYWw
|
||||
tJi
|
||||
tuB
|
||||
tätigen
|
||||
trägt
|
||||
JFRO
|
||||
JG
|
||||
JL
|
||||
@@ -6877,6 +7281,9 @@ Jxs
|
||||
John
|
||||
JSESSIONID
|
||||
JavaScript
|
||||
JXq
|
||||
JjLF
|
||||
Jahren
|
||||
kXW
|
||||
kW
|
||||
kp
|
||||
@@ -7070,6 +7477,19 @@ kVA
|
||||
kIJa
|
||||
kiE
|
||||
kcJI
|
||||
konfiguriert
|
||||
kKDLUI
|
||||
kzM
|
||||
kmm
|
||||
kmVW
|
||||
kgL
|
||||
kkV
|
||||
kkW
|
||||
kcuW
|
||||
könnten
|
||||
könnte
|
||||
kennzeichnen
|
||||
klicken
|
||||
EU
|
||||
Evq
|
||||
Er
|
||||
@@ -7284,6 +7704,15 @@ Entitäten
|
||||
Electron
|
||||
EVj
|
||||
EJa
|
||||
EwE
|
||||
EHk
|
||||
EXv
|
||||
Eindruck
|
||||
Empfängers
|
||||
Erfahrene
|
||||
Erfolg
|
||||
Events
|
||||
Einladung
|
||||
lX
|
||||
ll
|
||||
lC
|
||||
@@ -7489,6 +7918,22 @@ like
|
||||
lDe
|
||||
lYy
|
||||
lkE
|
||||
list
|
||||
listed
|
||||
lyZ
|
||||
lumi
|
||||
lMV
|
||||
lll
|
||||
lNGx
|
||||
lcE
|
||||
lWS
|
||||
lassen
|
||||
legitimen
|
||||
lohnenswerte
|
||||
leicht
|
||||
lesbare
|
||||
lächelnde
|
||||
legen
|
||||
wG
|
||||
wd
|
||||
ws
|
||||
@@ -7682,6 +8127,25 @@ wisC
|
||||
wwE
|
||||
wUQ
|
||||
wyl
|
||||
will
|
||||
words
|
||||
workspace
|
||||
welche
|
||||
welchen
|
||||
wVw
|
||||
wrYm
|
||||
wOWo
|
||||
wbe
|
||||
wgcl
|
||||
wB
|
||||
wpeut
|
||||
wirken
|
||||
wurde
|
||||
weitere
|
||||
wichtige
|
||||
wiederherzustellen
|
||||
wähle
|
||||
während
|
||||
RmZh
|
||||
Rp
|
||||
RJ
|
||||
@@ -7917,6 +8381,12 @@ RkhTH
|
||||
RXYV
|
||||
Rsr
|
||||
Root
|
||||
RGB
|
||||
Reference
|
||||
RUT
|
||||
RWU
|
||||
RWF
|
||||
Ransomware
|
||||
vJ
|
||||
vS
|
||||
vKDF
|
||||
@@ -8147,6 +8617,28 @@ vuW
|
||||
vdB
|
||||
vVU
|
||||
vFEZ
|
||||
viewing
|
||||
verwenden
|
||||
vyh
|
||||
vWb
|
||||
vSno
|
||||
vWm
|
||||
vSF
|
||||
vOp
|
||||
viz
|
||||
vJSP
|
||||
verfasst
|
||||
verdächtiger
|
||||
verfügen
|
||||
verschieben
|
||||
verhindert
|
||||
verkauft
|
||||
verschlüsseln
|
||||
verlangen
|
||||
vor
|
||||
vier
|
||||
verdeutlichen
|
||||
vermitteln
|
||||
XE
|
||||
Xd
|
||||
XRb
|
||||
@@ -8344,6 +8836,14 @@ Xlw
|
||||
XVf
|
||||
Xsz
|
||||
Xsb
|
||||
XYZ
|
||||
Xje
|
||||
XIt
|
||||
XMp
|
||||
XnfXi
|
||||
XDd
|
||||
XmR
|
||||
XNpf
|
||||
NW
|
||||
Ni
|
||||
Nj
|
||||
@@ -8560,6 +9060,11 @@ Nzc
|
||||
NjB
|
||||
NCh
|
||||
NFY
|
||||
Not
|
||||
Nwnm
|
||||
Nachrichtenauthentifizierung
|
||||
Nein
|
||||
Namen
|
||||
jhpK
|
||||
jb
|
||||
jl
|
||||
@@ -8766,6 +9271,13 @@ jVS
|
||||
jmA
|
||||
jdFN
|
||||
jcC
|
||||
json
|
||||
jwF
|
||||
jEM
|
||||
jbwF
|
||||
jjR
|
||||
jfmc
|
||||
jRusx
|
||||
My
|
||||
Mm
|
||||
MO
|
||||
@@ -8960,6 +9472,24 @@ MIl
|
||||
MnGi
|
||||
Mid
|
||||
MSs
|
||||
Mit
|
||||
MYF
|
||||
MRu
|
||||
MAq
|
||||
Mug
|
||||
MTP
|
||||
MEzT
|
||||
MTj
|
||||
MUi
|
||||
MyK
|
||||
Mkk
|
||||
Mbd
|
||||
Mzc
|
||||
Matrikelnummer
|
||||
Mögliche
|
||||
Menschen
|
||||
Medien
|
||||
Mache
|
||||
qO
|
||||
qj
|
||||
qG
|
||||
@@ -9148,6 +9678,13 @@ qAy
|
||||
qAW
|
||||
qLWV
|
||||
qVW
|
||||
qGZ
|
||||
qCO
|
||||
qmM
|
||||
qss
|
||||
qCWZ
|
||||
quG
|
||||
qzj
|
||||
yB
|
||||
yyNs
|
||||
yQU
|
||||
@@ -9348,6 +9885,9 @@ yHw
|
||||
yFH
|
||||
yhJ
|
||||
yNDN
|
||||
ydid
|
||||
yud
|
||||
yXN
|
||||
ulC
|
||||
uk
|
||||
un
|
||||
@@ -9576,6 +10116,16 @@ unsicheren
|
||||
url
|
||||
uzRJ
|
||||
ugN
|
||||
using
|
||||
use
|
||||
usw
|
||||
uiQ
|
||||
ugP
|
||||
uTm
|
||||
ujB
|
||||
unteren
|
||||
unter
|
||||
unterwäsche
|
||||
ma
|
||||
ml
|
||||
mB
|
||||
@@ -9778,6 +10328,14 @@ many
|
||||
mehrere
|
||||
macht
|
||||
mNcU
|
||||
mode
|
||||
meas
|
||||
mEWO
|
||||
mJT
|
||||
mqF
|
||||
mfw
|
||||
müssen
|
||||
mittleren
|
||||
dg
|
||||
dw
|
||||
de
|
||||
@@ -10026,6 +10584,23 @@ daW
|
||||
dQe
|
||||
dYU
|
||||
dgT
|
||||
deleted
|
||||
desired
|
||||
dürfen
|
||||
desc
|
||||
dvKQUg
|
||||
dip
|
||||
drY
|
||||
dir
|
||||
dXd
|
||||
dwr
|
||||
dortmund
|
||||
dasselbe
|
||||
dazu
|
||||
durchführen
|
||||
diagonalen
|
||||
darüber
|
||||
deine
|
||||
VV
|
||||
VA
|
||||
Vsm
|
||||
@@ -10252,6 +10827,15 @@ VOdp
|
||||
VRL
|
||||
VBHy
|
||||
Vec
|
||||
Viewing
|
||||
ViU
|
||||
VFg
|
||||
VqyN
|
||||
Vertrauen
|
||||
Viele
|
||||
Verspielte
|
||||
Vergleiche
|
||||
Vergleichen
|
||||
SGN
|
||||
Sg
|
||||
SrEHO
|
||||
@@ -10506,6 +11090,36 @@ Supplement
|
||||
SlX
|
||||
SBB
|
||||
Size
|
||||
Source
|
||||
Sicherheit
|
||||
Stylesheets
|
||||
Sicherheitsfunktion
|
||||
Setzen
|
||||
Skripten
|
||||
ShQ
|
||||
SZC
|
||||
SkHm
|
||||
Schriftarten
|
||||
Sicherheitsinformationen
|
||||
Studienportal
|
||||
Sicherheitsmaßnahmen
|
||||
Spam
|
||||
Spamfilter
|
||||
Systeme
|
||||
Sicherheitsbewusstseinstraining
|
||||
Soziale
|
||||
Shopping
|
||||
Schwarzmarkt
|
||||
Spear
|
||||
Sicherheitsbewusstseinsschulungen
|
||||
Sicherheitsrichtlinien
|
||||
Sport
|
||||
Schriftart
|
||||
Symbol
|
||||
Sie
|
||||
Slogan
|
||||
Schütze
|
||||
Schmunzeln
|
||||
rn
|
||||
rE
|
||||
rD
|
||||
@@ -10736,6 +11350,20 @@ rVfB
|
||||
rqhx
|
||||
rKS
|
||||
rNqV
|
||||
resolve
|
||||
recommend
|
||||
replace
|
||||
rKr
|
||||
rcp
|
||||
rehz
|
||||
rTQ
|
||||
rUW
|
||||
rJe
|
||||
rap
|
||||
realistisch
|
||||
regelmäßige
|
||||
regelmäßig
|
||||
roter
|
||||
Cu
|
||||
CL
|
||||
Ch
|
||||
@@ -10934,6 +11562,16 @@ CIDSystemInfo
|
||||
COn
|
||||
CAAAAA
|
||||
Consolas
|
||||
Conflicts
|
||||
Cookie
|
||||
Condition
|
||||
CRT
|
||||
Cnz
|
||||
Cosow
|
||||
CgLZ
|
||||
Cez
|
||||
Cyberkriminellen
|
||||
Cartoon
|
||||
OM
|
||||
OWR
|
||||
Os
|
||||
@@ -11109,6 +11747,19 @@ OKW
|
||||
Ouk
|
||||
Ordering
|
||||
OHm
|
||||
Oqf
|
||||
OKKS
|
||||
OWm
|
||||
OUM
|
||||
OXu
|
||||
OuB
|
||||
OAoe
|
||||
Ordner
|
||||
Opfers
|
||||
Online
|
||||
Opfer
|
||||
Organisationen
|
||||
Orange
|
||||
cgl
|
||||
cj
|
||||
content
|
||||
@@ -11296,6 +11947,22 @@ cKr
|
||||
cbU
|
||||
cMh
|
||||
cGJ
|
||||
commit
|
||||
commands
|
||||
completr
|
||||
conflicted
|
||||
conflicts
|
||||
clientseitigen
|
||||
colour
|
||||
curv
|
||||
cKh
|
||||
cfssb
|
||||
crL
|
||||
cQgs
|
||||
cxR
|
||||
cmT
|
||||
czg
|
||||
cartoon
|
||||
öUS
|
||||
öG
|
||||
Überweisungsdetails
|
||||
@@ -11310,10 +11977,14 @@ cGJ
|
||||
äef
|
||||
äqo
|
||||
äF
|
||||
ähnelt
|
||||
üXI
|
||||
üS
|
||||
ükZ
|
||||
über
|
||||
übw
|
||||
überzeugendere
|
||||
übertrieben
|
||||
ßc
|
||||
ßI
|
||||
ßVq
|
||||
|
||||
@@ -1,10 +1 @@
|
||||
{
|
||||
"id": "obsidian-dictionary-plugin",
|
||||
"name": "Dictionary",
|
||||
"version": "2.22.0",
|
||||
"minAppVersion": "0.12.11",
|
||||
"description": "This is a simple dictionary for the Obsidian Note-Taking Tool.",
|
||||
"author": "phibr0",
|
||||
"authorUrl": "https://github.com/phibr0",
|
||||
"isDesktopOnly": false
|
||||
}
|
||||
{"id":"obsidian-dictionary-plugin","name":"Dictionary","version":"2.22.0","minAppVersion":"0.12.11","description":"This is a simple dictionary for the Obsidian Note-Taking Tool.","author":"phibr0","authorUrl":"https://github.com/phibr0","isDesktopOnly":false}
|
||||
@@ -1,9 +1 @@
|
||||
{
|
||||
"id": "obsidian-dynamic-toc",
|
||||
"name": "Dynamic Table of Contents",
|
||||
"author": "aidurber",
|
||||
"description": "An Obsidian plugin to generate Tables of Contents that stay up to date with your document outline.",
|
||||
"minAppVersion": "0.11.0",
|
||||
"version": "0.0.27",
|
||||
"repo": "aidurber/obsidian-plugin-dynamic-toc"
|
||||
}
|
||||
{"id":"obsidian-dynamic-toc","name":"Dynamic Table of Contents","author":"aidurber","description":"An Obsidian plugin to generate Tables of Contents that stay up to date with your document outline.","minAppVersion":"0.11.0","version":"0.0.27","repo":"aidurber/obsidian-plugin-dynamic-toc"}
|
||||
File diff suppressed because one or more lines are too long
@@ -1,11 +1 @@
|
||||
{
|
||||
"id": "obsidian-excalidraw-plugin",
|
||||
"name": "Excalidraw",
|
||||
"version": "1.8.23",
|
||||
"minAppVersion": "1.1.6",
|
||||
"description": "An Obsidian plugin to edit and view Excalidraw drawings",
|
||||
"author": "Zsolt Viczian",
|
||||
"authorUrl": "https://zsolt.blog",
|
||||
"fundingUrl": "https://ko-fi.com/zsolt",
|
||||
"isDesktopOnly": false
|
||||
}
|
||||
{"id":"obsidian-excalidraw-plugin","name":"Excalidraw","version":"1.8.23","minAppVersion":"1.1.6","description":"An Obsidian plugin to edit and view Excalidraw drawings","author":"Zsolt Viczian","authorUrl":"https://zsolt.blog","fundingUrl":"https://ko-fi.com/zsolt","isDesktopOnly":false}
|
||||
@@ -1,10 +1 @@
|
||||
{
|
||||
"id": "obsidian-excel-to-markdown-table",
|
||||
"name": "Excel to Markdown Table",
|
||||
"version": "0.4.0",
|
||||
"minAppVersion": "0.12.0",
|
||||
"description": "An Obsidian plugin to paste data from Microsoft Excel, Google Sheets, Apple Numbers and LibreOffice Calc as Markdown tables in Obsidian editor.",
|
||||
"author": "Ganessh Kumar R P <rpganesshkumar@gmail.com>",
|
||||
"authorUrl": "https://ganesshkumar.com",
|
||||
"isDesktopOnly": false
|
||||
}
|
||||
{"id":"obsidian-excel-to-markdown-table","name":"Excel to Markdown Table","version":"0.4.0","minAppVersion":"0.12.0","description":"An Obsidian plugin to paste data from Microsoft Excel, Google Sheets, Apple Numbers and LibreOffice Calc as Markdown tables in Obsidian editor.","author":"Ganessh Kumar R P <rpganesshkumar@gmail.com>","authorUrl":"https://ganesshkumar.com","isDesktopOnly":false}
|
||||
10
.obsidian/plugins/obsidian-git/manifest.json
vendored
10
.obsidian/plugins/obsidian-git/manifest.json
vendored
@@ -1,9 +1 @@
|
||||
{
|
||||
"id": "obsidian-git",
|
||||
"name": "Obsidian Git",
|
||||
"description": "Backup your vault with Git.",
|
||||
"isDesktopOnly": false,
|
||||
"fundingUrl": "https://ko-fi.com/vinzent",
|
||||
"js": "main.js",
|
||||
"version": "2.19.1"
|
||||
}
|
||||
{"id":"obsidian-git","name":"Obsidian Git","description":"Backup your vault with Git.","isDesktopOnly":false,"fundingUrl":"https://ko-fi.com/vinzent","js":"main.js","version":"2.19.1"}
|
||||
@@ -1,10 +1 @@
|
||||
{
|
||||
"id": "obsidian-icons-plugin",
|
||||
"name": "Icons",
|
||||
"version": "0.3.0",
|
||||
"minAppVersion": "0.10.7",
|
||||
"description": "Add icons to your Obsidian notes.",
|
||||
"author": "Camillo Visini",
|
||||
"authorUrl": "https://github.com/visini",
|
||||
"isDesktopOnly": true
|
||||
}
|
||||
{"id":"obsidian-icons-plugin","name":"Icons","version":"0.3.0","minAppVersion":"0.10.7","description":"Add icons to your Obsidian notes.","author":"Camillo Visini","authorUrl":"https://github.com/visini","isDesktopOnly":true}
|
||||
@@ -1,10 +1 @@
|
||||
{
|
||||
"id": "obsidian-languagetool-plugin",
|
||||
"name": "LanguageTool Integration",
|
||||
"version": "0.3.3",
|
||||
"minAppVersion": "0.15.2",
|
||||
"description": "Inofficial LanguageTool plugin",
|
||||
"author": "Clemens Ertle",
|
||||
"authorUrl": "https://github.com/Clemens-E",
|
||||
"isDesktopOnly": false
|
||||
}
|
||||
{"id":"obsidian-languagetool-plugin","name":"LanguageTool Integration","version":"0.3.3","minAppVersion":"0.15.2","description":"Inofficial LanguageTool plugin","author":"Clemens Ertle","authorUrl":"https://github.com/Clemens-E","isDesktopOnly":false}
|
||||
@@ -1,10 +1 @@
|
||||
{
|
||||
"id": "obsidian-plugin-toc",
|
||||
"name": "Table of Contents",
|
||||
"author": "Andrew Lisowski",
|
||||
"authorUrl": "https://twitter.com/hipstersmoothie",
|
||||
"description": "Create a table of contents for a note.",
|
||||
"isDesktopOnly": false,
|
||||
"minAppVersion": "0.10.12",
|
||||
"version": "0.1.4"
|
||||
}
|
||||
{"id":"obsidian-plugin-toc","name":"Table of Contents","author":"Andrew Lisowski","authorUrl":"https://twitter.com/hipstersmoothie","description":"Create a table of contents for a note.","isDesktopOnly":false,"minAppVersion":"0.10.12","version":"0.1.4"}
|
||||
1
.obsidian/plugins/obsidian-wordnet-plugin/dict-WordNet.json
vendored
Normal file
1
.obsidian/plugins/obsidian-wordnet-plugin/dict-WordNet.json
vendored
Normal file
File diff suppressed because one or more lines are too long
5
.obsidian/plugins/obsidian-wordnet-plugin/main.js
vendored
Normal file
5
.obsidian/plugins/obsidian-wordnet-plugin/main.js
vendored
Normal file
@@ -0,0 +1,5 @@
|
||||
var w=Object.defineProperty;var y=Object.getOwnPropertyDescriptor;var N=Object.getOwnPropertyNames;var D=Object.prototype.hasOwnProperty;var C=(a,s)=>{for(var t in s)w(a,t,{get:s[t],enumerable:!0})},v=(a,s,t,e)=>{if(s&&typeof s=="object"||typeof s=="function")for(let o of N(s))!D.call(a,o)&&o!==t&&w(a,o,{get:()=>s[o],enumerable:!(e=y(s,o))||e.enumerable});return a};var x=a=>v(w({},"__esModule",{value:!0}),a);var r=(a,s,t)=>new Promise((e,o)=>{var i=d=>{try{g(t.next(d))}catch(S){o(S)}},n=d=>{try{g(t.throw(d))}catch(S){o(S)}},g=d=>d.done?e(d.value):Promise.resolve(d.value).then(i,n);g((t=t.apply(a,s)).next())});var W={};C(W,{default:()=>T});module.exports=x(W);var E=require("obsidian");var u=require("obsidian"),c=class extends u.EditorSuggest{constructor(t){super(t.app);this.plugin=t,this.updatePattern()}updatePattern(){this.pattern=new RegExp(`.*${this.plugin.settings.slashCommandShortcut}(.*)$`)}onTrigger(t,e,o){if(this.plugin.settings.slashCommandEnabled===!1)return;let i=e.getRange({line:t.line,ch:0},{line:t.line,ch:t.ch}),n=this.pattern.exec(i);if(n){let g=n[1];return this.lastEditorSuggestTriggerInfo={start:{line:t.line,ch:t.ch-g.length-this.plugin.settings.slashCommandShortcut.length},end:{line:t.line,ch:t.ch},query:n[1]},this.lastEditorSuggestTriggerInfo}else return null}getSuggestions(t){return this.plugin.dictionarySuggestor.query(t.query)}renderSuggestion(t,e){e.createEl("b",{text:t.Term}),e.createEl("br"),e.appendText(t.Definition)}selectSuggestion(t,e){let o=this.plugin.app.workspace.getActiveViewOfType(u.MarkdownView);this.close(),e.ctrlKey?(new u.Notice(t.Term+`
|
||||
`+t.Definition,6e4),o.editor.replaceRange("",this.lastEditorSuggestTriggerInfo.start,this.lastEditorSuggestTriggerInfo.end)):o.editor.replaceRange(this.plugin.renderDefinitionFromTemplate(t.Term,t.Definition),this.lastEditorSuggestTriggerInfo.start,this.lastEditorSuggestTriggerInfo.end)}};var l=require("obsidian");var p=class extends l.FuzzySuggestModal{constructor(t){super(t.app);this.plugin=t,this.setPlaceholder("type word to lookup in WordNet"),setTimeout(()=>r(this,null,function*(){let e=this.plugin.manifest.dir+"/dict-WordNet.json",o=this.app.vault.adapter;if(yield o.exists(e)){let i=yield o.read(e);this.wordNet=yield JSON.parse(i)}else if(navigator.onLine===!1)new l.Notice("You do not have an internet connection, and the WordNet dictionary cannot be downloaded. Please restore your interent connection and resteart Obsidian",3e4),this.plugin.unload();else{let i=new l.Notice("WordNet dictionary is being downloaded, this may take a few minutes. This message will disappear when the process is complete.",0);try{let n=yield(0,l.request)({url:"https://github.com/TfTHacker/Obsidian-WordNet/releases/download/WordNetJson/dict-WordNet.json"});i.hide(),n==="Not Found"||n==='{"error":"Not Found"}'?(new l.Notice("The WordNet dictionary file is not currently available for download. Please try again later or contact the developer on Twitter: @TfThacker for support.",3e4),this.plugin.unload()):(this.wordNet=yield JSON.parse(n),yield o.write(e,JSON.stringify(this.wordNet)))}catch(n){console.log(`Error in WordNet dictinary: ${n}`),new l.Notice(`An error has occured with the download, please try again later: ${n}`),this.plugin.unload()}}if(yield o.exists(this.plugin.manifest.dir+"/dict-MyDict.json")){let i=yield o.read(this.plugin.manifest.dir+"/dict-MyDict.json");this.customDict=yield JSON.parse(i)}else this.customDict=null}),10)}query(t){let e=[],o=t.toLocaleLowerCase(),i=0;if(this.customDict!=null)for(let n=0;n<this.customDict.length&&i<30;n++)this.customDict[n].SearchTerm.startsWith(o)&&(e.push(this.customDict[n]),i++);i=0;for(let n=0;n<this.wordNet.length&&i<20;n++)this.wordNet[n].SearchTerm.startsWith(o)&&(e.push(this.wordNet[n]),i++);return e}getItems(){let t="";if(this.inputEl.value.trim().length==0){let e=this.app.workspace.getActiveViewOfType(l.MarkdownView);e!=null&&e.getMode()!=null&&e.editor.somethingSelected()&&(t=e.editor.getSelection(),this.inputEl.value=t,this.inputEl.setSelectionRange(0,t.length))}else t=this.inputEl.value.trim();return t===""?[]:this.query(t)}getItemText(t){return t.SearchTerm}onChooseItem(t,e){}renderSuggestion(t,e){e.createEl("b",{text:t.item.Term}),e.createEl("br"),e.appendText(t.item.Definition)}onChooseSuggestion(t,e){let o=this.plugin.app.workspace.getActiveViewOfType(l.MarkdownView);o!=null&&o.getMode()==="source"?o.editor.replaceSelection(this.plugin.renderDefinitionFromTemplate(t.item.Term,t.item.Definition)):new l.Notice(t.item.Term+`
|
||||
`+t.item.Definition,1e4)}};var m=require("obsidian"),b=require("obsidian");var h={enableRibbon:!0,slashCommandEnabled:!0,slashCommandShortcut:";;",insertTemplate:`**{term}**
|
||||
{definition}
|
||||
`},f=class extends b.PluginSettingTab{constructor(t,e){super(t,e);this.plugin=e}display(){let{containerEl:t}=this;t.empty(),t.createEl("h2",{text:"Obsidian42 - WordNet Dictionary Setting"}),t.createEl("b",{text:"Ribbon Support"}),new m.Setting(t).setName("Enable Ribbon Support").setDesc("Toggle on and off the WordNet dictionary button in the ribbon.").addToggle(i=>{i.setValue(this.plugin.settings.enableRibbon),i.onChange(n=>r(this,null,function*(){this.plugin.settings.enableRibbon=n,this.plugin.settings.enableRibbon===!1?this.plugin.ribbonIcon.remove():this.plugin.configureRibbonCommand(),yield this.plugin.saveSettings()}))}),t.createEl("b",{text:"Slash Command"}),new m.Setting(t).setName("Enable the Slash Command").setDesc("Toggle on and off the slash command.").addToggle(i=>{i.setValue(this.plugin.settings.slashCommandEnabled),i.onChange(n=>r(this,null,function*(){this.plugin.settings.slashCommandEnabled=n,yield this.plugin.saveSettings()}))});let e;new m.Setting(t).setName("Slash Command Characters").setDesc("The characters that will invoke the slash command. The command character cannot be a space.").addExtraButton(i=>{i.setIcon("reset").setTooltip("Reset to default").onClick(()=>r(this,null,function*(){this.plugin.settings.slashCommandShortcut=h.slashCommandShortcut,yield this.plugin.saveSettings(),this.plugin.editSuggester.updatePattern(),e.setValue(this.plugin.settings.slashCommandShortcut)}))}).addText(i=>{e=i,i.setValue(this.plugin.settings.slashCommandShortcut),i.onChange(n=>r(this,null,function*(){let g=n.trim().length===0?h.slashCommandShortcut:n;this.plugin.settings.slashCommandShortcut=g,yield this.plugin.saveSettings(),this.plugin.editSuggester.updatePattern()}))}),t.createEl("b",{text:"Template"});let o;new m.Setting(t).setName("Template for inserting a definition").setDesc("The template used for inserting a WordNet definition. Use {term} for the term looked up and {definition} for the defintion of that term.").addExtraButton(i=>{i.setIcon("reset").setTooltip("Reset to default").onClick(()=>r(this,null,function*(){this.plugin.settings.insertTemplate=h.insertTemplate,yield this.plugin.saveSettings(),o.setValue(this.plugin.settings.insertTemplate)}))}).addTextArea(i=>{o=i,i.setValue(this.plugin.settings.insertTemplate),i.onChange(n=>r(this,null,function*(){let g=n.trim().length===0?h.insertTemplate:n;this.plugin.settings.insertTemplate=g,yield this.plugin.saveSettings()})),i.inputEl.rows=2,i.inputEl.cols=40})}};var T=class extends E.Plugin{configureRibbonCommand(){this.ribbonIcon=this.addRibbonIcon("book-open-check","WordNet Dictionary",()=>r(this,null,function*(){this.dictionarySuggestor.open()}))}onload(){return r(this,null,function*(){console.log("loading WordNet plugin"),yield this.loadSettings(),this.addSettingTab(new f(this.app,this)),this.dictionarySuggestor=new p(this),this.settings.enableRibbon&&this.configureRibbonCommand(),this.addCommand({id:"open-wordnet-suggestor",name:"Look up a word",callback:()=>{this.dictionarySuggestor.open()}}),this.editSuggester=new c(this),this.registerEditorSuggest(this.editSuggester)})}onunload(){console.log("unloading WordNet plugin")}renderDefinitionFromTemplate(t,e){return this.settings.insertTemplate.replace("{term}",t).replace("{definition}",e)}loadSettings(){return r(this,null,function*(){this.settings=Object.assign({},h,yield this.loadData())})}saveSettings(){return r(this,null,function*(){yield this.saveData(this.settings)})}};
|
||||
1
.obsidian/plugins/obsidian-wordnet-plugin/manifest.json
vendored
Normal file
1
.obsidian/plugins/obsidian-wordnet-plugin/manifest.json
vendored
Normal file
@@ -0,0 +1 @@
|
||||
{"id":"obsidian-wordnet-plugin","name":"Obsidian42 - WordNet Dictionary","version":"2.0.2","minAppVersion":"1.1.1","description":"WordNet is a large lexical database of English developed by Princeton University.","author":"TfT Hacker","authorUrl":"https://github.com/TfTHacker/Obsidian-WordNet","isDesktopOnly":false}
|
||||
1
.obsidian/plugins/obsidian-wordnet-plugin/styles.css
vendored
Normal file
1
.obsidian/plugins/obsidian-wordnet-plugin/styles.css
vendored
Normal file
@@ -0,0 +1 @@
|
||||
|
||||
11
.obsidian/plugins/quick-latex/manifest.json
vendored
11
.obsidian/plugins/quick-latex/manifest.json
vendored
@@ -1,10 +1 @@
|
||||
{
|
||||
"id": "quick-latex",
|
||||
"name": "Quick Latex for Obsidian",
|
||||
"version": "2.6.1",
|
||||
"minAppVersion": "0.9.12",
|
||||
"description": "Speedup latex math typing with auto fraction, align block shortcut, matrix shortcut...etc",
|
||||
"author": "joeyuping",
|
||||
"authorUrl": "https://github.com/joeyuping/quick_latex_obsidian",
|
||||
"isDesktopOnly": false
|
||||
}
|
||||
{"id":"quick-latex","name":"Quick Latex for Obsidian","version":"2.6.1","minAppVersion":"0.9.12","description":"Speedup latex math typing with auto fraction, align block shortcut, matrix shortcut...etc","author":"joeyuping","authorUrl":"https://github.com/joeyuping/quick_latex_obsidian","isDesktopOnly":false}
|
||||
@@ -1,6 +1 @@
|
||||
{
|
||||
"formatType": "normal",
|
||||
"showRibbonIcon": true,
|
||||
"bindEnter": true,
|
||||
"bindTab": true
|
||||
}
|
||||
{"formatType":"normal","showRibbonIcon":true,"bindEnter":true,"bindTab":true}
|
||||
@@ -1,12 +1 @@
|
||||
{
|
||||
"id": "table-editor-obsidian",
|
||||
"name": "Advanced Tables",
|
||||
"author": "Tony Grosinger",
|
||||
"authorUrl": "https://grosinger.net",
|
||||
"description": "Improved table navigation, formatting, manipulation, and formulas",
|
||||
"isDesktopOnly": false,
|
||||
"minAppVersion": "1.0.0",
|
||||
"version": "0.18.1",
|
||||
"js": "main.js",
|
||||
"donation": "https://buymeacoffee.com/tgrosinger"
|
||||
}
|
||||
{"id":"table-editor-obsidian","name":"Advanced Tables","author":"Tony Grosinger","authorUrl":"https://grosinger.net","description":"Improved table navigation, formatting, manipulation, and formulas","isDesktopOnly":false,"minAppVersion":"1.0.0","version":"0.18.1","js":"main.js","donation":"https://buymeacoffee.com/tgrosinger"}
|
||||
@@ -1,8 +1 @@
|
||||
{
|
||||
"id": "url-into-selection",
|
||||
"name": "Paste URL into selection",
|
||||
"description": "Paste URL \"into\" selected text.",
|
||||
"isDesktopOnly": false,
|
||||
"js": "main.js",
|
||||
"version": "1.7.0"
|
||||
}
|
||||
{"id":"url-into-selection","name":"Paste URL into selection","description":"Paste URL \"into\" selected text.","isDesktopOnly":false,"js":"main.js","version":"1.7.0"}
|
||||
196
.obsidian/workspace-mobile.json
vendored
196
.obsidian/workspace-mobile.json
vendored
@@ -1,195 +1 @@
|
||||
{
|
||||
"main": {
|
||||
"id": "c7c97a7e516b37bf",
|
||||
"type": "split",
|
||||
"children": [
|
||||
{
|
||||
"id": "6b508f296a879f99",
|
||||
"type": "tabs",
|
||||
"children": [
|
||||
{
|
||||
"id": "5a719e0c4cd1ab48",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "empty",
|
||||
"state": {}
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"direction": "vertical"
|
||||
},
|
||||
"left": {
|
||||
"id": "f552c30cc0488855",
|
||||
"type": "mobile-drawer",
|
||||
"children": [
|
||||
{
|
||||
"id": "70c7a5d5a2dfd7f4",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "file-explorer",
|
||||
"state": {
|
||||
"sortOrder": "alphabetical"
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "13d093706b2317f4",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "search",
|
||||
"state": {
|
||||
"query": "",
|
||||
"matchingCase": false,
|
||||
"explainSearch": false,
|
||||
"collapseAll": false,
|
||||
"extraContext": false,
|
||||
"sortOrder": "alphabetical"
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "b1a1f22380ff3aab",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "tag",
|
||||
"state": {
|
||||
"sortOrder": "frequency",
|
||||
"useHierarchy": true
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "0f3ca3a76126dda0",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "starred",
|
||||
"state": {}
|
||||
}
|
||||
}
|
||||
],
|
||||
"currentTab": 0
|
||||
},
|
||||
"right": {
|
||||
"id": "0836b77bd8b39680",
|
||||
"type": "mobile-drawer",
|
||||
"children": [
|
||||
{
|
||||
"id": "dd7843c2f011652b",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "backlink",
|
||||
"state": {
|
||||
"collapseAll": false,
|
||||
"extraContext": false,
|
||||
"sortOrder": "alphabetical",
|
||||
"showSearch": false,
|
||||
"searchQuery": "",
|
||||
"backlinkCollapsed": false,
|
||||
"unlinkedCollapsed": true
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "6e2275e467f52e8d",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "outgoing-link",
|
||||
"state": {
|
||||
"linksCollapsed": false,
|
||||
"unlinkedCollapsed": true
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "488a3930a391e9ea",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "outline",
|
||||
"state": {}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "3e6291ff931bc997",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "calendar",
|
||||
"state": {}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "6f629f7c2f2bc8a7",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "juggl_nodes",
|
||||
"state": {}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "b671a4b8b4d27231",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "juggl_style",
|
||||
"state": {}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "c17502545a7c0f7c",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "advanced-tables-toolbar",
|
||||
"state": {}
|
||||
}
|
||||
}
|
||||
],
|
||||
"currentTab": 6
|
||||
},
|
||||
"left-ribbon": {
|
||||
"hiddenItems": {
|
||||
"table-editor-obsidian:Advanced Tables Toolbar": false,
|
||||
"obsidian-livesync:Replicate": false,
|
||||
"obsidian-livesync:Show log": false,
|
||||
"obsidian-excalidraw-plugin:Create new drawing": false,
|
||||
"switcher:Open quick switcher": false,
|
||||
"graph:Open graph view": false,
|
||||
"canvas:Create new canvas": false,
|
||||
"daily-notes:Open today's daily note": false,
|
||||
"templates:Insert template": false,
|
||||
"command-palette:Open command palette": false,
|
||||
"juggl:Juggl global graph": false
|
||||
}
|
||||
},
|
||||
"active": "5a719e0c4cd1ab48",
|
||||
"lastOpenFiles": [
|
||||
"Excalidraw/Drawing 2023-04-17 08.21.36.excalidraw.md",
|
||||
"Untitled.md",
|
||||
"Untitled 1.md",
|
||||
"Excalidraw/Drawing 2023-04-17 08.21.00.excalidraw.md",
|
||||
"Informationssicherheit/Ueb2/Ueb2.md",
|
||||
"README.md",
|
||||
"Informationssicherheit/Ueb1/01-ueb_uebungsblatt.pdf",
|
||||
"Informationssicherheit/Ueb1/20230330_19h30m31s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230330_19h34m13s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230331_07h21m13s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230331_10h28m24s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230331_10h28m43s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230331_14h12m43s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230331_16h17m48s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230331_16h21m51s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230331_16h22m19s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230331_16h29m50s_grim.png",
|
||||
"Informationssicherheit/Ueb1/Ueb01.md",
|
||||
"Informationssicherheit/Ueb1/Ueb01.pdf",
|
||||
"Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf",
|
||||
"Informationssicherheit/VL/01-orga-motivation-handout.pdf",
|
||||
"Informationssicherheit/VL/02-terminologie-handout.pdf",
|
||||
"Informationssicherheit/VL/03-fm-orga-handout.pdf",
|
||||
"CCN/VL01.md",
|
||||
"Algorithmen und Datenstrukturen/UEB01.md",
|
||||
"Informationssicherheit/Ueb1",
|
||||
"Informationssicherheit/Ueb2",
|
||||
"Informationssicherheit/VL",
|
||||
"CCN"
|
||||
]
|
||||
}
|
||||
{"main":{"id":"c7c97a7e516b37bf","type":"split","children":[{"id":"6b508f296a879f99","type":"tabs","children":[{"id":"5a719e0c4cd1ab48","type":"leaf","state":{"type":"empty","state":{}}}]}],"direction":"vertical"},"left":{"id":"f552c30cc0488855","type":"mobile-drawer","children":[{"id":"70c7a5d5a2dfd7f4","type":"leaf","state":{"type":"file-explorer","state":{"sortOrder":"alphabetical"}}},{"id":"13d093706b2317f4","type":"leaf","state":{"type":"search","state":{"query":"","matchingCase":false,"explainSearch":false,"collapseAll":false,"extraContext":false,"sortOrder":"alphabetical"}}},{"id":"b1a1f22380ff3aab","type":"leaf","state":{"type":"tag","state":{"sortOrder":"frequency","useHierarchy":true}}},{"id":"0f3ca3a76126dda0","type":"leaf","state":{"type":"starred","state":{}}}],"currentTab":0},"right":{"id":"0836b77bd8b39680","type":"mobile-drawer","children":[{"id":"dd7843c2f011652b","type":"leaf","state":{"type":"backlink","state":{"collapseAll":false,"extraContext":false,"sortOrder":"alphabetical","showSearch":false,"searchQuery":"","backlinkCollapsed":false,"unlinkedCollapsed":true}}},{"id":"6e2275e467f52e8d","type":"leaf","state":{"type":"outgoing-link","state":{"linksCollapsed":false,"unlinkedCollapsed":true}}},{"id":"488a3930a391e9ea","type":"leaf","state":{"type":"outline","state":{}}},{"id":"3e6291ff931bc997","type":"leaf","state":{"type":"calendar","state":{}}},{"id":"6f629f7c2f2bc8a7","type":"leaf","state":{"type":"juggl_nodes","state":{}}},{"id":"b671a4b8b4d27231","type":"leaf","state":{"type":"juggl_style","state":{}}},{"id":"c17502545a7c0f7c","type":"leaf","state":{"type":"advanced-tables-toolbar","state":{}}}],"currentTab":6},"left-ribbon":{"hiddenItems":{"table-editor-obsidian:Advanced Tables Toolbar":false,"obsidian-livesync:Replicate":false,"obsidian-livesync:Show log":false,"obsidian-excalidraw-plugin:Create new drawing":false,"switcher:Open quick switcher":false,"graph:Open graph view":false,"canvas:Create new canvas":false,"daily-notes:Open today's daily note":false,"templates:Insert template":false,"command-palette:Open command palette":false,"juggl:Juggl global graph":false}},"active":"5a719e0c4cd1ab48","lastOpenFiles":["Excalidraw/Drawing 2023-04-17 08.21.36.excalidraw.md","Untitled.md","Untitled 1.md","Excalidraw/Drawing 2023-04-17 08.21.00.excalidraw.md","Informationssicherheit/Ueb2/Ueb2.md","README.md","Informationssicherheit/Ueb1/01-ueb_uebungsblatt.pdf","Informationssicherheit/Ueb1/20230330_19h30m31s_grim.png","Informationssicherheit/Ueb1/20230330_19h34m13s_grim.png","Informationssicherheit/Ueb1/20230331_07h21m13s_grim.png","Informationssicherheit/Ueb1/20230331_10h28m24s_grim.png","Informationssicherheit/Ueb1/20230331_10h28m43s_grim.png","Informationssicherheit/Ueb1/20230331_14h12m43s_grim.png","Informationssicherheit/Ueb1/20230331_16h17m48s_grim.png","Informationssicherheit/Ueb1/20230331_16h21m51s_grim.png","Informationssicherheit/Ueb1/20230331_16h22m19s_grim.png","Informationssicherheit/Ueb1/20230331_16h29m50s_grim.png","Informationssicherheit/Ueb1/Ueb01.md","Informationssicherheit/Ueb1/Ueb01.pdf","Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf","Informationssicherheit/VL/01-orga-motivation-handout.pdf","Informationssicherheit/VL/02-terminologie-handout.pdf","Informationssicherheit/VL/03-fm-orga-handout.pdf","CCN/VL01.md","Algorithmen und Datenstrukturen/UEB01.md","Informationssicherheit/Ueb1","Informationssicherheit/Ueb2","Informationssicherheit/VL","CCN"]}
|
||||
75
.obsidian/workspace.json
vendored
75
.obsidian/workspace.json
vendored
@@ -9,18 +9,43 @@
|
||||
"dimension": 62.59025270758123,
|
||||
"children": [
|
||||
{
|
||||
"id": "e2194e3299515374",
|
||||
"id": "829ecd06322baed5",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "markdown",
|
||||
"state": {
|
||||
"file": "CCN/VL01.md",
|
||||
"file": "Informationssicherheit/Ueb3/Ueb3.md",
|
||||
"mode": "source",
|
||||
"source": false
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "4b8ad56e1fd78890",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "markdown",
|
||||
"state": {
|
||||
"file": "Informationssicherheit/Ueb3/Ueb3.md",
|
||||
"mode": "source",
|
||||
"source": false
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "54e804bb6061872b",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "markdown",
|
||||
"state": {
|
||||
"file": "conflict-files-obsidian-git.md",
|
||||
"mode": "source",
|
||||
"source": false
|
||||
}
|
||||
}
|
||||
}
|
||||
]
|
||||
],
|
||||
"currentTab": 2
|
||||
},
|
||||
{
|
||||
"id": "47553fa673bb1eb6",
|
||||
@@ -28,12 +53,12 @@
|
||||
"dimension": 37.40974729241877,
|
||||
"children": [
|
||||
{
|
||||
"id": "20668ba691cd80b3",
|
||||
"id": "b2fab346c5df81de",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "pdf",
|
||||
"state": {
|
||||
"file": "Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf"
|
||||
"file": "Informationssicherheit/Ueb3/03-ueb_uebungsblatt.pdf"
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -103,7 +128,7 @@
|
||||
"state": {
|
||||
"type": "backlink",
|
||||
"state": {
|
||||
"file": "CCN/VL01.md",
|
||||
"file": "conflict-files-obsidian-git.md",
|
||||
"collapseAll": false,
|
||||
"extraContext": false,
|
||||
"sortOrder": "alphabetical",
|
||||
@@ -120,7 +145,7 @@
|
||||
"state": {
|
||||
"type": "outgoing-link",
|
||||
"state": {
|
||||
"file": "CCN/VL01.md",
|
||||
"file": "conflict-files-obsidian-git.md",
|
||||
"linksCollapsed": false,
|
||||
"unlinkedCollapsed": true
|
||||
}
|
||||
@@ -143,7 +168,7 @@
|
||||
"state": {
|
||||
"type": "outline",
|
||||
"state": {
|
||||
"file": "CCN/VL01.md"
|
||||
"file": "conflict-files-obsidian-git.md"
|
||||
}
|
||||
}
|
||||
},
|
||||
@@ -202,26 +227,39 @@
|
||||
"juggl:Juggl global graph": false
|
||||
}
|
||||
},
|
||||
"active": "b8336cb3c3d06be9",
|
||||
"active": "54e804bb6061872b",
|
||||
"lastOpenFiles": [
|
||||
"CCN/Ex01/ccn1-exercise1.pdf",
|
||||
"CCN/Ex01",
|
||||
"Informationssicherheit/Ueb3/Ueb3.md",
|
||||
"conflict-files-obsidian-git.md",
|
||||
"unterwäsche_austausch_nein.jpg.md",
|
||||
"Informationssicherheit/Ueb3/03-ueb_uebungsblatt.pdf",
|
||||
"Informationssicherheit/VL/03-ueb_uebungsblatt.pdf",
|
||||
"Informationssicherheit/Ueb2/Ueb2.md",
|
||||
"Informationssicherheit/Ueb2/Ueb2.pdf",
|
||||
"Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf",
|
||||
"Informationssicherheit/Ueb3",
|
||||
"Informationssicherheit/VL/04-recht-standards-handout.pdf",
|
||||
"CCN/VL01.md",
|
||||
"Mathe/KW16/UEB.md",
|
||||
"Mathe/KW16/KW16-EWuuEV_vor.pdf",
|
||||
"Mathe/KW16/KW16-EWuuEV.pdf",
|
||||
"Mathe/KW16",
|
||||
"Mathe",
|
||||
"CCN/Ex01/Exercise 1.md",
|
||||
"CCN/Ex01/CCN-1 - introduction.pdf",
|
||||
"CCN/Ex01/2023-04-18_11-08.png",
|
||||
"CCN/Ex01/1.3 Alpha 2 Playtesting Guide (DO NOT SHARE).pdf",
|
||||
"Algorithmen und Datenstrukturen/UEB03/UEB03.md",
|
||||
"Algorithmen und Datenstrukturen/UEB01/UEB01.md",
|
||||
"Informationssicherheit/Ueb2/2023-04-17_15-55.png",
|
||||
"Informationssicherheit/Ueb2/2023-04-17_14-16.png",
|
||||
"Untitled 1.md",
|
||||
"Untitled.md",
|
||||
"Excalidraw/Drawing 2023-04-17 08.21.36.excalidraw.md",
|
||||
"Excalidraw/Drawing 2023-04-17 08.21.00.excalidraw.md",
|
||||
"Excalidraw",
|
||||
"FH/Informationssicherheit/Ueb2/Ueb2.md",
|
||||
"README.md",
|
||||
"FH/Informationssicherheit/Ueb2/test.md",
|
||||
"Informationssicherheit/Ueb2/test2.md",
|
||||
"Informationssicherheit/Ueb2/Untitled.md",
|
||||
"Informationssicherheit/Ueb1/01-ueb_uebungsblatt.pdf",
|
||||
"Informationssicherheit/Ueb1/20230330_19h30m31s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230330_19h34m13s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230331_07h21m13s_grim.png",
|
||||
@@ -229,16 +267,9 @@
|
||||
"Informationssicherheit/Ueb1/20230331_10h28m43s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230331_14h12m43s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230331_16h17m48s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230331_16h21m51s_grim.png",
|
||||
"Informationssicherheit/Ueb1/Ueb01.md",
|
||||
"Informationssicherheit/Ueb1/Ueb01.pdf",
|
||||
"Informationssicherheit/VL/01-orga-motivation-handout.pdf",
|
||||
"Informationssicherheit/VL/02-terminologie-handout.pdf",
|
||||
"Informationssicherheit/VL/03-fm-orga-handout.pdf",
|
||||
"CCN/VL01.md",
|
||||
"Algorithmen und Datenstrukturen/UEB01.md",
|
||||
"2023-04-16.md",
|
||||
"Informationssicherheit/Ueb1",
|
||||
"FH/2023-04-16.md",
|
||||
"FH/Informationssicherheit/Ueb1/Ueb01.md",
|
||||
"FH/Informationssicherheit/Ueb01.md",
|
||||
|
||||
5
Algorithmen und Datenstrukturen/UEB03/UEB03.md
Normal file
5
Algorithmen und Datenstrukturen/UEB03/UEB03.md
Normal file
@@ -0,0 +1,5 @@
|
||||
```java
|
||||
Link<String> ende = new Link<String>("Letzter", null);
|
||||
Link<String> mittleresElement = new Link<String>("Test", ende);
|
||||
Link<String> anfang= new Link<String>("TErster", mittleresElement);
|
||||
```
|
||||
BIN
Algorithmen und Datenstrukturen/UEB03/UEB03.pdf
Normal file
BIN
Algorithmen und Datenstrukturen/UEB03/UEB03.pdf
Normal file
Binary file not shown.
BIN
Algorithmen und Datenstrukturen/UEB03/VL03-Listen.pdf
Normal file
BIN
Algorithmen und Datenstrukturen/UEB03/VL03-Listen.pdf
Normal file
Binary file not shown.
BIN
CCN/Ex01/1.3 Alpha 2 Playtesting Guide (DO NOT SHARE).pdf
Normal file
BIN
CCN/Ex01/1.3 Alpha 2 Playtesting Guide (DO NOT SHARE).pdf
Normal file
Binary file not shown.
BIN
CCN/Ex01/2023-04-18_11-08.png
Normal file
BIN
CCN/Ex01/2023-04-18_11-08.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 65 KiB |
BIN
CCN/Ex01/CCN-1 - introduction.pdf
Normal file
BIN
CCN/Ex01/CCN-1 - introduction.pdf
Normal file
Binary file not shown.
46
CCN/Ex01/Exercise 1.md
Normal file
46
CCN/Ex01/Exercise 1.md
Normal file
@@ -0,0 +1,46 @@
|
||||
# Reference models
|
||||
## 1
|
||||
Which layer packs bits into bytes, bytes into frames, uses hardware addressing and implements error detection? Which device (network hardware) operates on this layer in principle?
|
||||
- 2nd layer: Data link layer; Switches work on this layer
|
||||
|
||||
## 2
|
||||
At which layer does the assignment of addresses and the forwarding of data packets from one end of the network to another take place? Which network hardware operates on this layer?
|
||||
- Later 3: Network layer; Router
|
||||
|
||||
## 3
|
||||
Which layer is responsible for establishing, running and terminating a process communication between 2 systems?
|
||||
- Layer 5: Session layer
|
||||
|
||||
## 4
|
||||
At which layer does data stream segmentation take place for communication between endpoints, is a mechanism for establishing/disestablishing virtual connections provided, and does detection and elimination of transport errors as well as flow control or congestion avoidance take place?
|
||||
- Layer 4: Transport layer
|
||||
|
||||
## 5
|
||||
Which layer determines signal levels, transmission speeds, and connector pinouts, and transmits bits in a transmission channel? Which network hardware operates on this layer?
|
||||
- Layer 1: Physical layer; Network interface card
|
||||
|
||||
## 6
|
||||
What boundary does the transport layer form between layers 5-7 and 1-3?
|
||||
- The transport layer forms the boundary between the lower transporting layers, which are primarilly concerned with network tasks, and the application oriented layers
|
||||
|
||||
## 7
|
||||
Contrast the OSI layer model with the widely used TCP/IP layer model. Which layers correspond to each other?
|
||||
-
|
||||
|
||||
## 8
|
||||
What are the addressing names of layers 2, 3, 4 and 7?
|
||||
- Layer 2: MAC-adresses
|
||||
- Layer 3: IP-adresses
|
||||
- Layer 4: Port number
|
||||
- Layer 7: Application specific adresses such as E-Mail or URL
|
||||
|
||||
## 9
|
||||
Can collisions occur in point-to-point networks?
|
||||
- No, the switch sends the data out only at the reciver port. With original Ethernet 10 Mbit/s with CSMA/CD collisions can still happen between switch and connected host
|
||||
|
||||
## 10
|
||||
How are computer networks classified according to their extent?
|
||||
- ![[2023-04-18_11-08.png]]
|
||||
|
||||
# Tools
|
||||
|
||||
@@ -1 +0,0 @@
|
||||
|
||||
@@ -1,3 +1,42 @@
|
||||
- [[#Tabelle|Tabelle]]
|
||||
- [[#Intro|Intro]]
|
||||
- [[#Intro#1|1]]
|
||||
- [[#Intro#2|2]]
|
||||
- [[#Intro#3|3]]
|
||||
- [[#Intro#4|4]]
|
||||
- [[#Intro#5|5]]
|
||||
- [[#Intro#6|6]]
|
||||
- [[#Intro#7|7]]
|
||||
- [[#Intro#8|8]]
|
||||
- [[#Intro#9|9]]
|
||||
- [[#Advanced|Advanced]]
|
||||
- [[#Advanced#1|1]]
|
||||
- [[#Advanced#2|2]]
|
||||
- [[#Advanced#3|3]]
|
||||
- [[#Mitigation|Mitigation]]
|
||||
- [[#Mitigation#1|1]]
|
||||
- [[#Mitigation#2|2]]
|
||||
- [[#Mitigation#3|3]]
|
||||
- [[#Mitigation#4|4]]
|
||||
- [[#Mitigation#5|5]]
|
||||
- [[#Aufgaben|Aufgaben]]
|
||||
- [[#Aufgaben#a|a]]
|
||||
- [[#Aufgaben#b|b]]
|
||||
- [[#Aufgaben#c|c]]
|
||||
- [[#Cross Site Scripting|Cross Site Scripting]]
|
||||
- [[#Cross Site Scripting#1|1]]
|
||||
- [[#Cross Site Scripting#2|2]]
|
||||
- [[#Cross Site Scripting#3|3]]
|
||||
- [[#Cross Site Scripting#4|4]]
|
||||
- [[#Cross Site Scripting#5|5]]
|
||||
- [[#Aufgaben|Aufgaben]]
|
||||
- [[#Aufgaben#a|a]]
|
||||
- [[#Aufgaben#b|b]]
|
||||
- [[#Aufgaben#c|c]]
|
||||
- [[#Aufgaben#d|d]]
|
||||
- [[#Aufgaben#e|e]]
|
||||
|
||||
|
||||
|
||||
# 2.1
|
||||
## Tabelle
|
||||
@@ -14,14 +53,18 @@
|
||||
## Intro
|
||||
|
||||
### 1
|
||||
```
|
||||
SELECT department FROM employees WHERE first_name='Bob'
|
||||
```
|
||||
|
||||
- SELECT: Wählt Spalte aus
|
||||
- FROM: Wählt Tabelle aus
|
||||
- WHERE: Anweisung zum suchen
|
||||
|
||||
### 2
|
||||
```
|
||||
UPDATE employees SET department = 'Sales' WHERE first_name = 'Tobi' AND last_name = 'Barnett'
|
||||
```
|
||||
|
||||
- UPDATE: Updated exestierende Daten
|
||||
- SET: Wählt Spalte aus
|
||||
@@ -29,14 +72,19 @@ UPDATE employees SET department = 'Sales' WHERE first_name = 'Tobi' AND last_nam
|
||||
- AND: Und für die Abfragen der WHERE Anweisung
|
||||
|
||||
### 3
|
||||
```
|
||||
ALTER TABLE employees ADD phone varchar(20);
|
||||
```
|
||||
|
||||
|
||||
- ALTER: Verändert die Struktur einer Datenbank
|
||||
- TABLE: Wählt Tabelle aus, die verändert werden soll
|
||||
- ADD: Fügt eine Spalte hinzu
|
||||
|
||||
### 4
|
||||
```
|
||||
GRANT SELECT ON grant_rights TO unauthorized_user;
|
||||
```
|
||||
|
||||
- GRANT: Gibt einem Benutzer Rechte
|
||||
- SELECT: Wählt Spalte aus
|
||||
@@ -44,7 +92,9 @@ GRANT SELECT ON grant_rights TO unauthorized_user;
|
||||
- TO: Wählt Benutzer aus
|
||||
|
||||
### 5
|
||||
```
|
||||
SELECT * FROM user_data WHERE first_name = 'John' AND last_name = '' or '1' = '1
|
||||
```
|
||||
|
||||
- Wird zu: SELECT * FROM user_data WHERE first_name = 'John' and last_name = 'Smith' or '1' = '1'
|
||||
- '1' = '1' ist immer wahr
|
||||
@@ -114,7 +164,7 @@ def sql_injection_advance_5():
|
||||
password = ''
|
||||
|
||||
headers = {
|
||||
'Cookie': 'JSESSIONID=8f8OmDA8QEB8JwmEJtPbWkvVtAM_2AerEHJoWYFT',
|
||||
'Cookie': 'JSESSIONID=P9ImeJQVi_A20BBfojVn9ix_qaGR6PCKbRSI7395',
|
||||
}
|
||||
|
||||
while True:
|
||||
@@ -232,7 +282,7 @@ def sql_injection_mitigation_10():
|
||||
index = 0
|
||||
|
||||
headers = {
|
||||
'Cookie': 'JSESSIONID=8f8OmDA8QEB8JwmEJtPbWkvVtAM_2AerEHJoWYFT'
|
||||
'Cookie': 'JSESSIONID=P9ImeJQVi_A20BBfojVn9ix_qaGR6PCKbRSI7395'
|
||||
}
|
||||
|
||||
while True:
|
||||
@@ -430,8 +480,9 @@ DOM-based XSS findet auf der Client-Seite (im Browser) statt und resultiert aus
|
||||
|
||||
- Sicherheits-Header: Es können Sicherheits-Header wie Content-Security-Policy (CSP) oder X-XSS-Protection verwendet werden, um sicherzustellen, dass nur vertrauenswürdige Ressourcen auf einer Seite geladen werden und um das Risiko von XSS-Angriffen zu verringern.
|
||||
|
||||
- Content-Security-Policy:
|
||||
- Content-Security-Policy: ein HTTP-Antwortheader, den Webentwickler und Administratoren verwenden können, um die Sicherheit einer Webseite zu erhöhen. Mit CSP können sie festlegen, welche Inhalte (wie Skripte, Bilder, Stylesheets usw.) von welchen Quellen auf einer Webseite geladen werden dürfen.
|
||||
|
||||
- HTTP-Only-Cookies:
|
||||
- HTTP-Only-Cookies: eine Sicherheitsfunktion, die bei der Verwendung von Cookies im Web eingesetzt wird. Durch das Setzen des HttpOnly-Flags in einem Cookie wird das Cookie so konfiguriert, dass es nur vom Server und nicht von clientseitigen Skripten, wie beispielsweise JavaScript, gelesen werden kann.
|
||||
|
||||
- Bibliotheken etc. Aktualisieren:
|
||||
|
||||
- Bibliotheken etc. Aktualisieren
|
||||
|
||||
BIN
Informationssicherheit/Ueb3/03-ueb_uebungsblatt.pdf
Normal file
BIN
Informationssicherheit/Ueb3/03-ueb_uebungsblatt.pdf
Normal file
Binary file not shown.
76
Informationssicherheit/Ueb3/Ueb3.md
Normal file
76
Informationssicherheit/Ueb3/Ueb3.md
Normal file
@@ -0,0 +1,76 @@
|
||||
# 3.1
|
||||
|
||||
|
||||
# 3.2
|
||||
|
||||
|
||||
# 3.3
|
||||
## a
|
||||
Um die Herkunft einer Phishing-E-Mail realistisch wirken zu lassen, könnten folgende Maßnahmen ergriffen werden:
|
||||
|
||||
1. **Absenderadresse fälschen**: Die E-Mail-Adresse des Absenders könnte so gestaltet werden, dass sie einer offiziellen E-Mail-Adresse der Fachhochschule Dortmund ähnelt, z.B. "support@fh-dortmund.de" oder "noreply@portal-fhdortmund.de".
|
||||
2. **Authentisches Design**: Die Phishing-E-Mail sollte das Logo, die Farben und die Schriftarten der Fachhochschule Dortmund verwenden, um den Eindruck einer legitimen E-Mail zu erwecken.
|
||||
3. **Verwendung von persönlichen Informationen**: Die E-Mail könnte persönliche Informationen über den Empfänger enthalten, z.B. Name und Matrikelnummer, um Vertrauen aufzubauen.
|
||||
4. **Ansprechender Betreff**: Ein Betreff wie "Wichtige Sicherheitsinformationen für Ihr Studienportal-Konto" könnte die Aufmerksamkeit des Empfängers auf sich ziehen.
|
||||
5. **Glaubwürdiger Inhalt**: Der Text der E-Mail sollte professionell verfasst sein und eine plausible Geschichte erzählen, z.B. dass ein verdächtiger Loginversuch festgestellt wurde und die Benutzer ihre Anmeldedaten bestätigen müssen, um ihr Konto zu schützen.
|
||||
|
||||
Mögliche Probleme:
|
||||
|
||||
- Erfahrene Benutzer könnten die falsche Absenderadresse oder andere Anzeichen einer gefälschten E-Mail erkennen.
|
||||
- Technische Sicherheitsmaßnahmen könnten die Zustellung der Phishing-E-Mail verhindern oder sie als Spam kennzeichnen.
|
||||
|
||||
## b
|
||||
Mechanismen zur Abwehr von Phishing bzw. Spam, die den Erfolg des fiktiven Angriffs gefährden könnten:
|
||||
|
||||
1. **Spamfilter**: E-Mail-Systeme verfügen über integrierte Spamfilter, die verdächtige E-Mails herausfiltern und in einen Spam-Ordner verschieben.
|
||||
2. **Domainbasierte Nachrichtenauthentifizierung, Berichterstattung und Konformität (DMARC)**: DMARC ist eine E-Mail-Authentifizierungsmethode, die verhindert, dass gefälschte Absenderadressen verwendet werden.
|
||||
3. **Sicherheitsbewusstseinstraining**: Wenn Benutzer geschult sind, Phishing-E-Mails zu erkennen, ist die Wahrscheinlichkeit geringer, dass sie auf betrügerische Links klicken oder ihre Anmeldedaten preisgeben.
|
||||
|
||||
## c
|
||||
E-Mail-Adresse und zugehöriges Passwort sind aus folgenden Gründen lohnenswerte Angriffsziele:
|
||||
|
||||
- **Zugriff auf persönliche Informationen**: Angreifer können E-Mails und Anhänge einsehen, die persönliche Informationen wie Adressen, Telefonnummern oder Geburtsdaten enthalten.
|
||||
- **Identitätsdiebstahl**: Mit diesen Informationen können Angreifer die Identität des Opfers annehmen und z.B. Kredite aufnehmen oder Online-Käufe tätigen.
|
||||
- **Kontozugriff**: Viele Menschen verwenden dasselbe Passwort für mehrere Konten. Ein erfolgreiches Phishing kann dazu führen, dass Angreifer auch Zugriff auf andere Online-Konten erhalten, z.B. Soziale Medien, Online-Banking oder Online-Shopping-Konten.
|
||||
- **Weiterverkauf**: Gestohlene Anmeldedaten können auf dem Schwarzmarkt verkauft werden, wo sie von anderen Cyberkriminellen für verschiedene Zwecke verwendet werden können, z.B. für weitere Phishing-Angriffe, Betrug oder Spam.
|
||||
- **Spear-Phishing**: Mit den Informationen aus dem erfolgreich gekaperten E-Mail-Konto können Angreifer gezielte Spear-Phishing-Angriffe auf Freunde, Familie oder Kollegen des Opfers durchführen, indem sie persönliche Informationen verwenden, um noch überzeugendere Phishing-E-Mails zu erstellen.
|
||||
- **Ransomware**: Angreifer könnten auch Ransomware in das E-Mail-Konto einschleusen, um wichtige Dateien und Dokumente zu verschlüsseln und Lösegeld vom Opfer zu verlangen, um den Zugriff wiederherzustellen.
|
||||
|
||||
Um die Sicherheit der Benutzer zu gewährleisten, sollten die Fachhochschule Dortmund und andere Organisationen Sicherheitsmaßnahmen ergreifen, wie z.B. regelmäßige Sicherheitsbewusstseinsschulungen, Zwei-Faktor-Authentifizierung und Sicherheitsrichtlinien für Passwörter. Diese Maßnahmen können dazu beitragen, die Wahrscheinlichkeit von erfolgreichen Phishing-Angriffen zu reduzieren.
|
||||
|
||||
|
||||
|
||||
# 3.4
|
||||
## a/b
|
||||
## [Jordi Bolz, TUS Ampen - Leichtathletik-Datenbank.DE](https://www.leichtathletik-datenbank.de/vereine/deutscher-leichtathletik-verband/westdeutschland/fussball-und-leichtathletik-verband-westfalen/westfalen-mitte/soest/tus-ampen/athleten/48687-jordi-bolz)
|
||||
|
||||
## [Bilder zur Stadtmeisterschaft - LAZ) Soest](http://www.lazsoest.de/index.php/item/201-erfolgreiche-stadtmeisterschaften)
|
||||
|
||||
## [2. Soester Hochsprung-Meeting 2014, LAZ Soest (14.09.2014 ...](https://www.leichtathletik-datenbank.de/wettkaempfe/deutscher-leichtathletik-verband/westdeutschland/fussball-und-leichtathletik-verband-westfalen/westfalen-mitte/soest/laz-soest/wk/2-soester-hochsprung-meeting-2014)
|
||||
- Sport Events
|
||||
|
||||
## c
|
||||
- Einladung zu Sport-Events (vor 10 Jahren)
|
||||
|
||||
# 3.5
|
||||
|
||||
Titel: "Passwörter sind wie Unterwäsche..."
|
||||
|
||||
Plakat-Design:
|
||||
|
||||
1. Hintergrund: Hellblau, um eine freundliche Atmosphäre zu schaffen.
|
||||
2. Schriftart: Verspielte, leicht lesbare Schriftart, die die humorvolle Botschaft betont.
|
||||
3. Farben: Helle, fröhliche Farben (z.B. Gelb, Orange, Grün), um Aufmerksamkeit zu erregen.
|
||||
|
||||
Layout:
|
||||
|
||||
- Im oberen Drittel des Plakats den Titel "Passwörter sind wie Unterwäsche..." platzieren.
|
||||
|
||||
- Im mittleren Teil des Plakats vier humorvolle Vergleiche zwischen Passwörtern und Unterwäsche anbringen, die die Bedeutung von sicheren Passwörtern verdeutlichen: a) "Wechsle sie regelmäßig!" - Zeige eine lächelnde Cartoon-Figur, die frische Unterwäsche und ein neues Passwort hält. b) "Teile sie nicht mit anderen!" - Zeige zwei Cartoon-Figuren, die Unterwäsche austauschen und dann ein "Nein"-Symbol (ein roter Kreis mit einer diagonalen Linie) darüber legen. c) "Mache sie nicht zu einfach!" - Zeige eine Cartoon-Figur mit übertrieben einfacher Unterwäsche (z.B. ein Lendenschurz) und einem Passwort wie "1234" auf einem Bildschirm. d) "Keine persönlichen Informationen!" - Zeige eine Cartoon-Figur, die Unterwäsche mit ihrem Namen darauf trägt und ein Passwort, das aus ihrem Geburtsdatum besteht.
|
||||
|
||||
- Im unteren Drittel des Plakats, unter den vier Vergleichen, platzieren Sie den Slogan "Schütze deine Privatsphäre - wähle sichere Passwörter!" in einer auffälligen Farbe.
|
||||
|
||||
|
||||
Dieses humorvolle Plakat soll die Wichtigkeit von sicheren Passwörtern vermitteln und den Betrachtern ein Schmunzeln entlocken, während sie über ihre eigenen Passwortgewohnheiten nachdenken.
|
||||
|
||||
|
||||
BIN
Informationssicherheit/VL/04-recht-standards-handout.pdf
Normal file
BIN
Informationssicherheit/VL/04-recht-standards-handout.pdf
Normal file
Binary file not shown.
BIN
Mathe/KW16/KW16-EWuuEV.pdf
Normal file
BIN
Mathe/KW16/KW16-EWuuEV.pdf
Normal file
Binary file not shown.
BIN
Mathe/KW16/KW16-EWuuEV_vor.pdf
Normal file
BIN
Mathe/KW16/KW16-EWuuEV_vor.pdf
Normal file
Binary file not shown.
249
Mathe/KW16/UEB.md
Normal file
249
Mathe/KW16/UEB.md
Normal file
@@ -0,0 +1,249 @@
|
||||
Um die Eigenwerte und Eigenvektoren einer Matrix zu berechnen, verfolgen wir die folgenden Schritte:
|
||||
|
||||
Gegeben ist die Matrix A:
|
||||
|
||||
$$
|
||||
A = \begin{bmatrix}
|
||||
18 & -20 \\
|
||||
24 & -26
|
||||
\end{bmatrix}
|
||||
$$
|
||||
|
||||
1. Berechne die Determinante von $(A - \lambda I)$, wobei $\lambda$ der Eigenwert und $I$ die Identitätsmatrix ist:
|
||||
|
||||
$$
|
||||
\begin{vmatrix}
|
||||
18 - \lambda & -20 \\
|
||||
24 & -26 - \lambda
|
||||
\end{vmatrix}
|
||||
$$
|
||||
|
||||
2. Berechne die Determinante dieser Matrix:
|
||||
|
||||
$$(18 - \lambda)((-26) - \lambda) - (-20)(24)$$
|
||||
|
||||
$$\lambda^2 - (-8)\lambda - 120$$
|
||||
|
||||
3. Löse das charakteristische Polynom, um die Eigenwerte zu erhalten:
|
||||
|
||||
$$\lambda^2 + 8\lambda - 120 = 0$$
|
||||
|
||||
Mit der quadratischen Formel erhalten wir:
|
||||
|
||||
$$\lambda = \frac{-b \pm \sqrt{b^2 - 4ac}}{2a}$$
|
||||
|
||||
In unserem Fall sind $a = 1$, $b = 8$ und $c = -120$:
|
||||
|
||||
$$\lambda = \frac{-8 \pm \sqrt{8^2 - 4 * 1 * (-120)}}{2 * 1}$$
|
||||
|
||||
$$\lambda = \frac{-8 \pm \sqrt{256 + 480}}{2}$$
|
||||
|
||||
$$\lambda = \frac{-8 \pm \sqrt{736}}{2}$$
|
||||
|
||||
Die beiden Eigenwerte sind:
|
||||
|
||||
$$\lambda_1 = \frac{-8 + \sqrt{736}}{2} \approx 4$$
|
||||
$$\lambda_2 = \frac{-8 - \sqrt{736}}{2} \approx -30$$
|
||||
|
||||
4. Finde die Eigenvektoren für jeden Eigenwert, indem du $(A - \lambda I)v = 0$ löst:
|
||||
|
||||
Für $\lambda_1 = 4$:
|
||||
|
||||
$$(A - 4I)v = 0$$
|
||||
|
||||
$$
|
||||
\begin{bmatrix}
|
||||
14 & -20 \\
|
||||
24 & -30
|
||||
\end{bmatrix}
|
||||
\begin{bmatrix}
|
||||
x_1 \\
|
||||
x_2
|
||||
\end{bmatrix}
|
||||
= \begin{bmatrix}
|
||||
0 \\
|
||||
0
|
||||
\end{bmatrix}
|
||||
$$
|
||||
|
||||
Wir können das Gleichungssystem vereinfachen:
|
||||
|
||||
$$14x_1 - 20x_2 = 0$$
|
||||
|
||||
Da es sich um ein homogenes Gleichungssystem handelt, können wir eine Variable frei wählen (z.B. $x_2 = 1$):
|
||||
|
||||
$$x_1 = \frac{20}{14}$$
|
||||
|
||||
Eigenvektor für $\lambda_1$:
|
||||
|
||||
$$
|
||||
v_1 = \begin{bmatrix}
|
||||
\frac{10}{7} \\
|
||||
1
|
||||
\end{bmatrix}
|
||||
$$
|
||||
|
||||
Für $\lambda_2 = -30$:
|
||||
|
||||
$$(A - (-30)I)v = 0$$
|
||||
|
||||
$$
|
||||
\begin{bmatrix}
|
||||
48 & -20 \\
|
||||
24 & 4
|
||||
\end{bmatrix}
|
||||
\begin{bmatrix}
|
||||
x_1 \\
|
||||
x_2
|
||||
\end{bmatrix}
|
||||
= \begin{bmatrix}
|
||||
0 \\
|
||||
0
|
||||
\end{bmatrix}
|
||||
$$
|
||||
|
||||
Wir können das Gleichungssystem vereinfachen:
|
||||
$$48x_1 - 20x_2 = 0$$
|
||||
|
||||
Da es sich um ein homogenes Gleichungssystem handelt, können wir eine Variable frei wählen (z.B. $x_2 = 1$):
|
||||
|
||||
$$x_1 = \frac{20}{48}$$
|
||||
|
||||
Eigenvektor für $\lambda_2$:
|
||||
|
||||
$$
|
||||
v_2 = \begin{bmatrix}
|
||||
\frac{5}{12} \\
|
||||
1
|
||||
\end{bmatrix}
|
||||
$$
|
||||
|
||||
Zusammengefasst haben wir die folgenden Eigenwerte und Eigenvektoren:
|
||||
|
||||
$$
|
||||
Eigenwert 1 (\lambda_1): 4 \\
|
||||
$$$$
|
||||
Eigenvektor 1 (v_1): \begin{bmatrix}
|
||||
\frac{10}{7} \\
|
||||
1
|
||||
\end{bmatrix}
|
||||
$$$$
|
||||
|
||||
Eigenwert 2 (\lambda_2): -30 \\
|
||||
$$$$
|
||||
Eigenvektor 2 (v_2): \begin{bmatrix}
|
||||
\frac{5}{12} \\
|
||||
1
|
||||
\end{bmatrix}
|
||||
$$
|
||||
$$$$
|
||||
Beachte, dass die Eigenvektoren auf einen skalaren Faktor genau bestimmt sind, was bedeutet, dass jeder Vielfache eines Eigenvektors ebenfalls ein Eigenvektor ist. In diesem Fall haben wir die Eigenvektoren auf eine einfachere Form reduziert.
|
||||
|
||||
|
||||
|
||||
|
||||
# 2
|
||||
|
||||
Um den Eigenwert und Eigenvektor einer Matrix zu berechnen, müssen wir zunächst das charakteristische Polynom finden und dieses lösen, um die Eigenwerte zu erhalten. Anschließend setzen wir die Eigenwerte in die Gleichung (A - λI)v = 0 ein, um die zugehörigen Eigenvektoren zu finden.
|
||||
|
||||
Gegeben ist die Matrix A:
|
||||
|
||||
A = $$\begin{bmatrix}
|
||||
-1 & 2 & 4 \\
|
||||
-2 & -6 & -8 \\
|
||||
-4 & 2 & 7 \\
|
||||
\end{bmatrix}$$
|
||||
|
||||
Das charakteristische Polynom erhalten wir, indem wir die Determinante von (A - λI) berechnen:
|
||||
|
||||
A - λI = $$\begin{bmatrix}
|
||||
-1-\lambda & 2 & 4 \\
|
||||
-2 & -6-\lambda & -8 \\
|
||||
-4 & 2 & 7-\lambda \\
|
||||
\end{bmatrix}$$
|
||||
|
||||
Det(A - λI) = $$(-1-\lambda)((-6-\lambda)(7-\lambda) - (-8)(2)) - 2(-2(7-\lambda) - (-8)(-4)) + 4(-2(2) - (-4)(-6-\lambda))$$
|
||||
|
||||
Nun berechnen wir die Determinante:
|
||||
|
||||
Det(A - λI) = $$(-1-\lambda)(-42 + 13\lambda - \lambda^2 + 16) - 2(14 - 8\lambda + 32) + 4(4 + 24 + 4\lambda)$$
|
||||
|
||||
Jetzt müssen wir die Eigenwerte λ finden, indem wir das charakteristische Polynom lösen:
|
||||
|
||||
$$\lambda^3 + 21\lambda^2 + 10\lambda - 118 = 0$$
|
||||
|
||||
Da dies ein kubisches Polynom ist, ist es nicht einfach, die Lösungen direkt zu finden. Eine numerische Lösung für die Eigenwerte ergibt:
|
||||
|
||||
λ1 ≈ -9.246
|
||||
λ2 ≈ -5.465
|
||||
λ3 ≈ -6.289
|
||||
|
||||
Jetzt berechnen wir die zugehörigen Eigenvektoren, indem wir jeden Eigenwert in die Gleichung (A - λI)v = 0 einsetzen:
|
||||
|
||||
1. Für λ1 ≈ -9.246:
|
||||
(A - λ1I)v1 = 0
|
||||
$$\begin{bmatrix}
|
||||
8.246 & 2 & 4 \\
|
||||
-2 & -3.246 & -8 \\
|
||||
-4 & 2 & 16.246 \\
|
||||
\end{bmatrix}
|
||||
\begin{bmatrix}
|
||||
x_1 \\
|
||||
x_2 \\
|
||||
x_3 \\
|
||||
\end{bmatrix} =
|
||||
\begin{bmatrix}
|
||||
0 \\
|
||||
0 \\
|
||||
0 \\
|
||||
\end{bmatrix}$$
|
||||
|
||||
Wir erhalten den Eigenvektor v1 ≈ (1, -1.282, 1).
|
||||
|
||||
2. Für λ2 ≈ -5.465:
|
||||
(A - λ2I)v2 = 0
|
||||
$$\begin{bmatrix}
|
||||
4.465 & 2 & 4 \\
|
||||
-2 & -0.535 & -8 \\
|
||||
-4 & 2 & 12.465 \\
|
||||
\end{bmatrix}
|
||||
\begin{bmatrix}
|
||||
x_1 \\
|
||||
x_2 \\
|
||||
x_3 \\
|
||||
\end{bmatrix} =
|
||||
\begin{bmatrix}
|
||||
0 \\
|
||||
0 \\
|
||||
0 \\
|
||||
\end{bmatrix}$$
|
||||
|
||||
Wir erhalten den Eigenvektor v2 ≈ (1, -0.416, 1).
|
||||
|
||||
3. Für λ3 ≈ -6.289:
|
||||
(A - λ3I)v3 = 0
|
||||
$$\begin{bmatrix}
|
||||
5.289 & 2 & 4 \\
|
||||
-2 & 0.289 & -8 \\
|
||||
-4 & 2 & 13.289 \\
|
||||
\end{bmatrix}
|
||||
\begin{bmatrix}
|
||||
x_1 \\
|
||||
x_2 \\
|
||||
x_3 \\
|
||||
\end{bmatrix} =
|
||||
\begin{bmatrix}
|
||||
0 \\
|
||||
0 \\
|
||||
0 \\
|
||||
\end{bmatrix}$$
|
||||
|
||||
Wir erhalten den Eigenvektor v3 ≈ (1, 1.943, 1).
|
||||
|
||||
Daher sind die Eigenwerte und zugehörigen Eigenvektoren der Matrix A:
|
||||
|
||||
λ1 ≈ -9.246, v1 ≈ (1, -1.282, 1)
|
||||
λ2 ≈ -5.465, v2 ≈ (1, -0.416, 1)
|
||||
λ3 ≈ -6.289, v3 ≈ (1, 1.943, 1)
|
||||
|
||||
Bitte beachten Sie, dass die Eigenvektoren nur bis auf einen konstanten Faktor bestimmt sind und daher in einer anderen Form angegeben werden können, solange sie kollinear sind.
|
||||
18
conflict-files-obsidian-git.md
Normal file
18
conflict-files-obsidian-git.md
Normal file
@@ -0,0 +1,18 @@
|
||||
# Conflicts
|
||||
Please resolve them and commit them using the commands `Obsidian Git: Commit all changes` followed by `Obsidian Git: Push`
|
||||
(This file will automatically be deleted before commit)
|
||||
[[#Additional Instructions]] available below file list
|
||||
|
||||
- Not a file: .obsidian/plugins/obsidian-completr/scanned_words.txt
|
||||
- Not a file: .obsidian/workspace.json
|
||||
|
||||
# Additional Instructions
|
||||
I strongly recommend to use "Source mode" for viewing the conflicted files. For simple conflicts, in each file listed above replace every occurrence of the following text blocks with the desired text.
|
||||
|
||||
```diff
|
||||
<<<<<<< HEAD
|
||||
File changes in local repository
|
||||
=======
|
||||
File changes in remote repository
|
||||
>>>>>>> origin/main
|
||||
```
|
||||
Reference in New Issue
Block a user