This commit is contained in:
2023-04-21 17:27:55 +02:00
56 changed files with 1215 additions and 5489 deletions

View File

@@ -1,23 +1 @@
[
"obsidian-git",
"obsidian-mind-map",
"table-editor-obsidian",
"calendar",
"obsidian-advanced-slides",
"cm-editor-syntax-highlight-obsidian",
"code-block-copy",
"url-into-selection",
"obsidian-dictionary-plugin",
"obsidian-languagetool-plugin",
"obsidian-image-toolkit",
"quick-latex",
"obsidian-excel-to-markdown-table",
"obsidian-icons-plugin",
"juggl",
"obsidian-plugin-toc",
"drawio-obsidian",
"obsidian-completr",
"execute-code",
"nldates-obsidian",
"obsidian-livesync"
]
["obsidian-git","obsidian-mind-map","table-editor-obsidian","calendar","obsidian-advanced-slides","cm-editor-syntax-highlight-obsidian","code-block-copy","url-into-selection","obsidian-dictionary-plugin","obsidian-languagetool-plugin","obsidian-image-toolkit","quick-latex","obsidian-excel-to-markdown-table","obsidian-icons-plugin","juggl","obsidian-plugin-toc","drawio-obsidian","obsidian-completr","execute-code","nldates-obsidian","obsidian-livesync","obsidian-dynamic-toc","obsidian-excalidraw-plugin","obsidian-wordnet-plugin"]

23
.obsidian/graph.json vendored
View File

@@ -1,22 +1 @@
{
"collapse-filter": true,
"search": "",
"showTags": false,
"showAttachments": false,
"hideUnresolved": false,
"showOrphans": true,
"collapse-color-groups": true,
"colorGroups": [],
"collapse-display": true,
"showArrow": false,
"textFadeMultiplier": 0,
"nodeSizeMultiplier": 1,
"lineSizeMultiplier": 1,
"collapse-forces": true,
"centerStrength": 0.518713248970312,
"repelStrength": 10,
"linkStrength": 1,
"linkDistance": 250,
"scale": 1,
"close": false
}
{"collapse-filter":true,"search":"","showTags":false,"showAttachments":false,"hideUnresolved":false,"showOrphans":true,"collapse-color-groups":true,"colorGroups":[],"collapse-display":true,"showArrow":false,"textFadeMultiplier":0,"nodeSizeMultiplier":1,"lineSizeMultiplier":1,"collapse-forces":true,"centerStrength":0.518713248970312,"repelStrength":10,"linkStrength":1,"linkDistance":250,"scale":1,"close":false}

View File

@@ -1,28 +1 @@
{
"obsidian-git:commit": [
{
"modifiers": [
"Alt"
],
"key": "C"
}
],
"obsidian-git:push2": [
{
"modifiers": [
"Alt"
],
"key": "P"
}
],
"obsidian-excalidraw-plugin:excalidraw-autocreate-newtab": [
{
"modifiers": [
"Alt",
"Mod",
"Shift"
],
"key": "E"
}
]
}
{"obsidian-git:commit":[{"modifiers":["Alt"],"key":"C"}],"obsidian-git:push2":[{"modifiers":["Alt"],"key":"P"}],"obsidian-excalidraw-plugin:excalidraw-autocreate-newtab":[{"modifiers":["Alt","Mod","Shift"],"key":"E"}]}

View File

@@ -1,10 +1 @@
{
"id": "better-pdf-plugin",
"name": "Better PDF Plugin",
"version": "1.4.0",
"minAppVersion": "0.11.13",
"description": "Goal of this Plugin in to implement a native PDF handling workflow",
"author": "MSzturc",
"authorUrl": "https://github.com/MSzturc",
"isDesktopOnly": false
}
{"id":"better-pdf-plugin","name":"Better PDF Plugin","version":"1.4.0","minAppVersion":"0.11.13","description":"Goal of this Plugin in to implement a native PDF handling workflow","author":"MSzturc","authorUrl":"https://github.com/MSzturc","isDesktopOnly":false}

View File

@@ -1,10 +1 @@
{
"id": "calendar",
"name": "Calendar",
"description": "Calendar view of your daily notes",
"version": "1.5.10",
"author": "Liam Cain",
"authorUrl": "https://github.com/liamcain/",
"isDesktopOnly": false,
"minAppVersion": "0.9.11"
}
{"id":"calendar","name":"Calendar","description":"Calendar view of your daily notes","version":"1.5.10","author":"Liam Cain","authorUrl":"https://github.com/liamcain/","isDesktopOnly":false,"minAppVersion":"0.9.11"}

View File

@@ -1,10 +1 @@
{
"id": "cm-editor-syntax-highlight-obsidian",
"name": "Editor Syntax Highlight",
"author": "death_au",
"authorUrl": "https://github.com/deathau",
"description": "Show syntax highlighing in code blocks the editor",
"isDesktopOnly": false,
"version": "0.1.3",
"minAppVersion": "0.10.0"
}
{"id":"cm-editor-syntax-highlight-obsidian","name":"Editor Syntax Highlight","author":"death_au","authorUrl":"https://github.com/deathau","description":"Show syntax highlighing in code blocks the editor","isDesktopOnly":false,"version":"0.1.3","minAppVersion":"0.10.0"}

View File

@@ -1,8 +1 @@
{
"id": "code-block-copy",
"name": "Copy button for code blocks",
"author": "Daniel Brandenburg",
"description": "Copy button for code blocks",
"isDesktopOnly": false,
"version": "0.1.0"
}
{"id":"code-block-copy","name":"Copy button for code blocks","author":"Daniel Brandenburg","description":"Copy button for code blocks","isDesktopOnly":false,"version":"0.1.0"}

View File

@@ -1,10 +1 @@
{
"id": "drawio-obsidian",
"name": "Diagrams",
"version": "1.5.0",
"minAppVersion": "0.9.12",
"description": "Draw.io diagrams for Obsidian. This plugin introduces diagrams that can be included within notes or as stand-alone files. Diagrams are created as SVG files (although .drawio extensions are also supported).",
"author": "Sam Greenhalgh",
"authorUrl": "https://www.radicalresearch.co.uk/",
"isDesktopOnly": true
}
{"id":"drawio-obsidian","name":"Diagrams","version":"1.5.0","minAppVersion":"0.9.12","description":"Draw.io diagrams for Obsidian. This plugin introduces diagrams that can be included within notes or as stand-alone files. Diagrams are created as SVG files (although .drawio extensions are also supported).","author":"Sam Greenhalgh","authorUrl":"https://www.radicalresearch.co.uk/","isDesktopOnly":true}

View File

@@ -1,10 +1 @@
{
"id": "execute-code",
"name": "Execute Code",
"version": "1.8.0",
"minAppVersion": "0.12.0",
"description": "Allows to execute code snippets within a note. Supported programming languages: C, CPP, Dart, Golang, Groovy, Kotlin, Java, JavaScript, TypeScript, Lean, Lua, CSharp, Prolog, Rust, Python, R, Ruby, Wolfram Mathematica, Haskell, Scala, Racket, F#, Batch, Shell & Powershell.",
"author": "twibiral",
"authorUrl": "https://www.github.com/twibiral",
"isDesktopOnly": true
}
{"id":"execute-code","name":"Execute Code","version":"1.8.0","minAppVersion":"0.12.0","description":"Allows to execute code snippets within a note. Supported programming languages: C, CPP, Dart, Golang, Groovy, Kotlin, Java, JavaScript, TypeScript, Lean, Lua, CSharp, Prolog, Rust, Python, R, Ruby, Wolfram Mathematica, Haskell, Scala, Racket, F#, Batch, Shell & Powershell.","author":"twibiral","authorUrl":"https://www.github.com/twibiral","isDesktopOnly":true}

View File

@@ -1,10 +1 @@
{
"id": "juggl",
"name": "Juggl",
"version": "1.4.0",
"minAppVersion": "0.11.5",
"description": "Adds a completely interactive, stylable and expandable graph view to Obsidian.",
"author": "Emile",
"authorUrl": "https://twitter.com/emilevankrieken",
"isDesktopOnly": false
}
{"id":"juggl","name":"Juggl","version":"1.4.0","minAppVersion":"0.11.5","description":"Adds a completely interactive, stylable and expandable graph view to Obsidian.","author":"Emile","authorUrl":"https://twitter.com/emilevankrieken","isDesktopOnly":false}

View File

@@ -1,10 +1 @@
{
"id": "nldates-obsidian",
"name": "Natural Language Dates",
"description": "Create date-links based on natural language",
"version": "0.6.1",
"author": "Argentina Ortega Sainz",
"authorUrl": "https://argentinaos.com/",
"isDesktopOnly": false,
"minAppVersion": "0.13.0"
}
{"id":"nldates-obsidian","name":"Natural Language Dates","description":"Create date-links based on natural language","version":"0.6.1","author":"Argentina Ortega Sainz","authorUrl":"https://argentinaos.com/","isDesktopOnly":false,"minAppVersion":"0.13.0"}

View File

@@ -1,21 +1 @@
{
"port": "3000",
"autoReload": true,
"exportDirectory": "/export",
"enableChalkboard": false,
"enableOverview": false,
"enableMenu": false,
"enablePointer": false,
"enableTimeBar": false,
"theme": "black",
"highlightTheme": "zenburn",
"transition": "slide",
"transitionSpeed": "default",
"controls": true,
"progress": true,
"slideNumber": false,
"showGrid": false,
"autoComplete": "inPreview",
"paneMode": "split",
"motm": "2023-04-16T08:56:11.065Z"
}
{"port":"3000","autoReload":true,"exportDirectory":"/export","enableChalkboard":false,"enableOverview":false,"enableMenu":false,"enablePointer":false,"enableTimeBar":false,"theme":"black","highlightTheme":"zenburn","transition":"slide","transitionSpeed":"default","controls":true,"progress":true,"slideNumber":false,"showGrid":false,"autoComplete":"inPreview","paneMode":"split","motm":"2023-04-16T08:56:11.065Z"}

View File

@@ -1,3 +1 @@
{
"version": "1.20.0"
}
{"version":"1.20.0"}

View File

@@ -1,10 +1 @@
{
"id": "obsidian-advanced-slides",
"name": "Advanced Slides",
"version": "1.20.0",
"minAppVersion": "0.12.0",
"description": "Create markdown-based presentations in Obsidian",
"author": "Matthäus Szturc",
"authorUrl": "https://github.com/MSzturc",
"isDesktopOnly": true
}
{"id":"obsidian-advanced-slides","name":"Advanced Slides","version":"1.20.0","minAppVersion":"0.12.0","description":"Create markdown-based presentations in Obsidian","author":"Matthäus Szturc","authorUrl":"https://github.com/MSzturc","isDesktopOnly":true}

View File

@@ -1,10 +1 @@
{
"name": "reveal.js-menu",
"version": "2.1.0",
"homepage": "https://denehyg.github.io/reveal.js-menu",
"authors": ["Greg Denehy"],
"description": "A slideout menu for navigating reveal.js presentations",
"keywords": ["reveal", "menu"],
"license": "MIT, Copyright (C) 2020 Greg Denehy",
"ignore": ["**/.*", "node_modules", "bower_components", "test", "tests"]
}
{"name":"reveal.js-menu","version":"2.1.0","homepage":"https://denehyg.github.io/reveal.js-menu","authors":["Greg Denehy"],"description":"A slideout menu for navigating reveal.js presentations","keywords":["reveal","menu"],"license":"MIT, Copyright (C) 2020 Greg Denehy","ignore":["**/.*","node_modules","bower_components","test","tests"]}

View File

@@ -1,35 +1 @@
{
"name": "reveal.js-menu",
"version": "2.1.0",
"description": "A slideout menu for navigating reveal.js presentations",
"scripts": {
"test": "echo \"Error: no test specified\" && exit 1",
"build": "gulp"
},
"repository": {
"type": "git",
"url": "git+https://github.com/denehyg/reveal.js-menu.git"
},
"keywords": [
"reveal",
"menu"
],
"author": "Greg Denehy",
"license": "MIT, Copyright (C) 2020 Greg Denehy",
"bugs": {
"url": "https://github.com/denehyg/reveal.js-menu/issues"
},
"homepage": "https://github.com/denehyg/reveal.js-menu#readme",
"devDependencies": {
"@babel/core": "^7.10.4",
"@babel/preset-env": "^7.10.4",
"@rollup/plugin-babel": "^5.0.4",
"@rollup/plugin-commonjs": "^13.0.0",
"@rollup/plugin-node-resolve": "^8.1.0",
"babel-plugin-transform-html-import-to-string": "0.0.1",
"core-js": "^3.6.5",
"gulp": "^4.0.2",
"rollup": "^2.21.0",
"rollup-plugin-terser": "^6.1.0"
}
}
{"name":"reveal.js-menu","version":"2.1.0","description":"A slideout menu for navigating reveal.js presentations","scripts":{"test":"echo \"Error: no test specified\" && exit 1","build":"gulp"},"repository":{"type":"git","url":"git+https://github.com/denehyg/reveal.js-menu.git"},"keywords":["reveal","menu"],"author":"Greg Denehy","license":"MIT, Copyright (C) 2020 Greg Denehy","bugs":{"url":"https://github.com/denehyg/reveal.js-menu/issues"},"homepage":"https://github.com/denehyg/reveal.js-menu#readme","devDependencies":{"@babel/core":"^7.10.4","@babel/preset-env":"^7.10.4","@rollup/plugin-babel":"^5.0.4","@rollup/plugin-commonjs":"^13.0.0","@rollup/plugin-node-resolve":"^8.1.0","babel-plugin-transform-html-import-to-string":"0.0.1","core-js":"^3.6.5","gulp":"^4.0.2","rollup":"^2.21.0","rollup-plugin-terser":"^6.1.0"}}

View File

@@ -1,164 +1 @@
[
{
"displayName": "Note",
"replacement": "note",
"icon": "lucide-pencil",
"color": "#448aff"
},
{
"displayName": "Summary",
"replacement": "summary",
"icon": "lucide-clipboard-list",
"color": "#00b0ff"
},
{
"displayName": "Abstract",
"replacement": "abstract",
"icon": "lucide-clipboard-list",
"color": "#00b0ff"
},
{
"displayName": "TL;DR",
"replacement": "tldr",
"icon": "lucide-clipboard-list",
"color": "#00b0ff"
},
{
"displayName": "Info",
"replacement": "info",
"icon": "lucide-info",
"color": "#00b8d4"
},
{
"displayName": "To-Do",
"replacement": "todo",
"icon": "lucide-check-circle-2",
"color": "#00b8d4"
},
{
"displayName": "Tip",
"replacement": "tip",
"icon": "lucide-flame",
"color": "#00bfa6"
},
{
"displayName": "Hint",
"replacement": "hint",
"icon": "lucide-flame",
"color": "#00bfa6"
},
{
"displayName": "Important",
"replacement": "important",
"icon": "lucide-flame",
"color": "#00bfa6"
},
{
"displayName": "Success",
"replacement": "success",
"icon": "lucide-check",
"color": "#00c853"
},
{
"displayName": "Check",
"replacement": "check",
"icon": "lucide-check",
"color": "#00c853"
},
{
"displayName": "Done",
"replacement": "done",
"icon": "lucide-check",
"color": "#00c853"
},
{
"displayName": "Question",
"replacement": "question",
"icon": "lucide-help-circle",
"color": "#63dd17"
},
{
"displayName": "Help",
"replacement": "Help",
"icon": "lucide-help-circle",
"color": "#63dd17"
},
{
"displayName": "FAQ",
"replacement": "faq",
"icon": "lucide-help-circle",
"color": "#63dd17"
},
{
"displayName": "Warning",
"replacement": "warning",
"icon": "lucide-alert-triangle",
"color": "#ff9100"
},
{
"displayName": "Caution",
"replacement": "caution",
"icon": "lucide-alert-triangle",
"color": "#ff9100"
},
{
"displayName": "Attention",
"replacement": "attention",
"icon": "lucide-alert-triangle",
"color": "#ff9100"
},
{
"displayName": "Failure",
"replacement": "failure",
"icon": "lucide-x",
"color": "#ff5252"
},
{
"displayName": "Fail",
"replacement": "fail",
"icon": "lucide-x",
"color": "#ff5252"
},
{
"displayName": "Missing",
"replacement": "missing",
"icon": "lucide-x",
"color": "#ff5252"
},
{
"displayName": "Danger",
"replacement": "danger",
"icon": "lucide-zap",
"color": "#ff1744"
},
{
"displayName": "Error",
"replacement": "error",
"icon": "lucide-zap",
"color": "#ff1744"
},
{
"displayName": "Bug",
"replacement": "bug",
"icon": "lucide-bug",
"color": "#f50057"
},
{
"displayName": "Example",
"replacement": "example",
"icon": "lucide-list",
"color": "#7c4dff"
},
{
"displayName": "Quote",
"replacement": "quote",
"icon": "quote-glyph",
"color": "#9e9e9e"
},
{
"displayName": "Cite",
"replacement": "cite",
"icon": "quote-glyph",
"color": "#9e9e9e"
}
]
[{"displayName":"Note","replacement":"note","icon":"lucide-pencil","color":"#448aff"},{"displayName":"Summary","replacement":"summary","icon":"lucide-clipboard-list","color":"#00b0ff"},{"displayName":"Abstract","replacement":"abstract","icon":"lucide-clipboard-list","color":"#00b0ff"},{"displayName":"TL;DR","replacement":"tldr","icon":"lucide-clipboard-list","color":"#00b0ff"},{"displayName":"Info","replacement":"info","icon":"lucide-info","color":"#00b8d4"},{"displayName":"To-Do","replacement":"todo","icon":"lucide-check-circle-2","color":"#00b8d4"},{"displayName":"Tip","replacement":"tip","icon":"lucide-flame","color":"#00bfa6"},{"displayName":"Hint","replacement":"hint","icon":"lucide-flame","color":"#00bfa6"},{"displayName":"Important","replacement":"important","icon":"lucide-flame","color":"#00bfa6"},{"displayName":"Success","replacement":"success","icon":"lucide-check","color":"#00c853"},{"displayName":"Check","replacement":"check","icon":"lucide-check","color":"#00c853"},{"displayName":"Done","replacement":"done","icon":"lucide-check","color":"#00c853"},{"displayName":"Question","replacement":"question","icon":"lucide-help-circle","color":"#63dd17"},{"displayName":"Help","replacement":"Help","icon":"lucide-help-circle","color":"#63dd17"},{"displayName":"FAQ","replacement":"faq","icon":"lucide-help-circle","color":"#63dd17"},{"displayName":"Warning","replacement":"warning","icon":"lucide-alert-triangle","color":"#ff9100"},{"displayName":"Caution","replacement":"caution","icon":"lucide-alert-triangle","color":"#ff9100"},{"displayName":"Attention","replacement":"attention","icon":"lucide-alert-triangle","color":"#ff9100"},{"displayName":"Failure","replacement":"failure","icon":"lucide-x","color":"#ff5252"},{"displayName":"Fail","replacement":"fail","icon":"lucide-x","color":"#ff5252"},{"displayName":"Missing","replacement":"missing","icon":"lucide-x","color":"#ff5252"},{"displayName":"Danger","replacement":"danger","icon":"lucide-zap","color":"#ff1744"},{"displayName":"Error","replacement":"error","icon":"lucide-zap","color":"#ff1744"},{"displayName":"Bug","replacement":"bug","icon":"lucide-bug","color":"#f50057"},{"displayName":"Example","replacement":"example","icon":"lucide-list","color":"#7c4dff"},{"displayName":"Quote","replacement":"quote","icon":"quote-glyph","color":"#9e9e9e"},{"displayName":"Cite","replacement":"cite","icon":"quote-glyph","color":"#9e9e9e"}]

File diff suppressed because one or more lines are too long

View File

@@ -1,10 +1 @@
{
"id": "obsidian-completr",
"name": "Completr",
"version": "3.1.3",
"minAppVersion": "1.0.0",
"description": "This plugin provides advanced auto-completion functionality for LaTeX, Frontmatter and standard writing.",
"author": "tth05",
"authorUrl": "https://github.com/tth05",
"isDesktopOnly": true
}
{"id":"obsidian-completr","name":"Completr","version":"3.1.3","minAppVersion":"1.0.0","description":"This plugin provides advanced auto-completion functionality for LaTeX, Frontmatter and standard writing.","author":"tth05","authorUrl":"https://github.com/tth05","isDesktopOnly":true}

View File

@@ -191,6 +191,19 @@ Protection
PNL
PZlN
PaT
Please
PSID
PGU
PKn
PDB
PTB
Probleme
Passwort
Plakat
Plakats
Passwörtern
Privatsphäre
Passwortgewohnheiten
obj
oV
oYj
@@ -393,6 +406,15 @@ oSG
ozH
oWb
oAO
occurrence
oxo
oqj
ovM
ouj
ogQp
oTAe
offiziellen
oberen
Length
LCw
LN
@@ -629,6 +651,18 @@ LJt
LWM
LhPr
LEft
LmD
LMg
Lee
Lxe
LMi
LaTeX
Loginversuch
Links
Lösegeld
Layout
Linie
Lendenschurz
Filter
FlateDecode
Ff
@@ -873,6 +907,17 @@ Flags
FontBBox
FontFile
Font
For
FPv
FHlI
Fachhochschule
Farben
Freunde
Familie
Faktor
Figur
Figuren
Farbe
stream
se
sH
@@ -1109,6 +1154,28 @@ sEYI
sbP
sFq
shF
scanned
strongly
simple
space
sRGB
sig
scz
sBL
smj
sqn
sYy
sWTi
sWg
support
sollte
sein
schützen
sollten
schaffen
sicheren
sichere
simples
ZKs
ZN
Zf
@@ -1329,6 +1396,18 @@ ZIa
ZKYu
Zvl
Zfr
ZjF
ZwF
Zsf
ZRa
ZXiF
ZpC
Zzp
Zko
Zustellung
Zwecke
Zwei
Zeige
Who
We
WE
@@ -1549,6 +1628,21 @@ Win
WbJ
WKgy
WaTv
Webentwickler
Web
WvC
WOp
WOk
Wcd
WrM
WMK
WAX
WzWT
Wuq
Wichtige
Weiterverkauf
Wechsle
Wichtigkeit
KI
Kt
KF
@@ -1756,6 +1850,21 @@ KHTML
KtF
Kbnn
KFsA
KGO
KmZ
KJC
Kbr
KUmmi
KPT
Konto
Konformität
Kredite
Käufe
Kontozugriff
Konten
Kollegen
Kreis
Keine
bq
bQ
bG
@@ -1972,6 +2081,20 @@ bBU
bvB
bKm
bQq
before
below
blocks
beispielsweise
bkj
blf
bxI
beLc
bestätigen
bzw
betrügerische
beitragen
betont
besteht
iZ
ig
iA
@@ -2216,6 +2339,18 @@ iDyt
iER
iuWZ
iAc
iaH
iPNr
iZt
iPG
iGb
isz
ifQ
ihr
integrierte
indem
ihrem
info
GJe
GAG
GJ
@@ -2410,6 +2545,21 @@ Geräten
Gegensatz
Gecko
Gzj
GCW
Gbll
GQf
Gej
GUD
GBw
GYkb
Glaubwürdiger
Geschichte
Gründen
Geburtsdaten
Gestohlene
Gelb
Grün
Geburtsdatum
AO
Aw
Az
@@ -2633,6 +2783,32 @@ AXRt
AAAAAA
Ascent
Adobe
Additional
Antwortheader
Administratoren
AOT
ANfl
AsBM
AMO
ANn
Alj
All
Avg
Absenderadresse
Adresse
Absenders
Authentisches
Ansprechender
Aufmerksamkeit
Anmeldedaten
Anzeichen
Abwehr
Authentifizierungsmethode
Absenderadressen
Angriffsziele
Anhänge
Authentifizierung
Atmosphäre
QV
Qom
QJ
@@ -2841,6 +3017,16 @@ QAt
QcQ
QeR
Qpy
Quellen
QFYd
QRI
QwV
QAO
QmB
QdZ
QWC
QYW
QbW
nQC
nq
nR
@@ -3083,6 +3269,15 @@ nax
nNa
nps
nZV
nkn
nwg
nMQ
noi
noreply
noch
neues
nachdenken
nein
YJ
Yb
YwM
@@ -3289,6 +3484,12 @@ YiIyy
YAS
Ykk
YYK
YKR
YWU
YYL
YLud
YXZ
YEz
UIQ
Ue
UH
@@ -3519,6 +3720,18 @@ Uevgs
UCp
Uad
UTy
UVW
UKQI
UTB
URUh
UUn
Ugr
UIH
UYK
UZnva
ULZ
UZZ
Unterwäsche
TZ
TF
TP
@@ -3735,6 +3948,20 @@ TBg
TkH
TimesNewRomanPS
ToUnicode
Toh
TpE
TWTR
TTCO
TWc
TgwvI
TIJ
Tdm
Tml
TeY
Text
Technische
Titel
Teile
gO
gHoVo
gD
@@ -3949,6 +4176,22 @@ glx
ggN
gaJb
gjv
gelesen
gMQK
giQi
gjj
gca
gMpXv
gQq
gestaltet
gefälschten
gefährden
gefälschte
geschult
geringer
gekaperten
gezielte
gewährleisten
DMg
Dv
DLg
@@ -4167,6 +4410,20 @@ Descent
DOBH
DescendantFonts
DAAAAA
Default
DTsEF
Dyz
DQA
DrC
Dortmund
Design
Domainbasierte
DMARC
Dateien
Dokumente
Diese
Drittel
Dieses
xU
xM
xK
@@ -4343,6 +4600,15 @@ xmM
xbD
xtY
xref
xPJ
xnx
xdz
xbO
xuq
xyu
xrs
xMI
xTix
Hx
HV
HdH
@@ -4543,6 +4809,13 @@ Hpt
HZW
HTW
HcA
HttpOnly
HIJXYZghijvwxyz
HXo
Herkunft
Hintergrund
Hellblau
Helle
zo
zL
zE
@@ -4759,6 +5032,16 @@ zHKQ
zzf
zWx
zkh
zFz
zjjxU
zSWH
zux
zKhb
zMD
ziehen
zugehöriges
zwischen
zwei
hr
hAa
hH
@@ -4966,6 +5249,14 @@ häufig
hXYe
huW
hBq
hOG
hqn
hfl
hDQ
hyperref
herausfiltern
humorvolle
hält
pt
ps
pao
@@ -5184,6 +5475,18 @@ pswj
pWV
pMh
pxcu
plugins
pmQ
psq
pyX
portal
persönlichen
persönliche
professionell
plausible
preisgeben
platzieren
passwort
Ic
IT
Ir
@@ -5408,6 +5711,25 @@ Identity
Inter
ItalicMT
Info
Instructions
IRK
IEC
Idg
ICER
Iswu
IYS
INZ
IonAO
IzD
IYb
IKZJ
IaPc
IIZ
IKu
IUs
Ihr
Inhalt
Identität
ap
aE
at
@@ -5632,6 +5954,21 @@ azS
aVPkCX
amsa
aXEMH
automatically
available
above
alM
aPj
aWv
alxn
aufzubauen
annehmen
aufnehmen
auch
anbringen
austauschen
auffälligen
austausch
fb
fVVvD
fh
@@ -5909,6 +6246,25 @@ fhD
fnhF
fhy
foT
followed
file
files
festlegen
fMW
fve
fNOX
fhB
folgende
fälschen
fhdortmund
festgestellt
falsche
fiktiven
folgenden
freundliche
fröhliche
frische
figur
Bs
ByJ
BF
@@ -6114,6 +6470,16 @@ BaseFont
BAAAAA
BkG
BuET
Bilder
BCKEEI
Betreff
Berichterstattung
Banking
Betrug
Botschaft
Bedeutung
Bildschirm
Betrachtern
ek
eP
eVPm
@@ -6409,6 +6775,29 @@ eAr
eHr
eZj
eXI
each
every
erhöhen
eingesetzt
erx
eFl
ellu
eGG
enC
ergriffen
erwecken
enthalten
erzählen
einsehen
erfolgreiches
erfolgreich
erstellen
erregen
einfach
einfacher
entlocken
eigenen
einfache
tj
tg
tt
@@ -6677,6 +7066,21 @@ tGw
tWZ
tRf
trailer
them
txt
text
tpt
tKq
tPP
tmL
tKTZ
tCGmu
teX
tYWw
tJi
tuB
tätigen
trägt
JFRO
JG
JL
@@ -6877,6 +7281,9 @@ Jxs
John
JSESSIONID
JavaScript
JXq
JjLF
Jahren
kXW
kW
kp
@@ -7070,6 +7477,19 @@ kVA
kIJa
kiE
kcJI
konfiguriert
kKDLUI
kzM
kmm
kmVW
kgL
kkV
kkW
kcuW
könnten
könnte
kennzeichnen
klicken
EU
Evq
Er
@@ -7284,6 +7704,15 @@ Entitäten
Electron
EVj
EJa
EwE
EHk
EXv
Eindruck
Empfängers
Erfahrene
Erfolg
Events
Einladung
lX
ll
lC
@@ -7489,6 +7918,22 @@ like
lDe
lYy
lkE
list
listed
lyZ
lumi
lMV
lll
lNGx
lcE
lWS
lassen
legitimen
lohnenswerte
leicht
lesbare
lächelnde
legen
wG
wd
ws
@@ -7682,6 +8127,25 @@ wisC
wwE
wUQ
wyl
will
words
workspace
welche
welchen
wVw
wrYm
wOWo
wbe
wgcl
wB
wpeut
wirken
wurde
weitere
wichtige
wiederherzustellen
wähle
während
RmZh
Rp
RJ
@@ -7917,6 +8381,12 @@ RkhTH
RXYV
Rsr
Root
RGB
Reference
RUT
RWU
RWF
Ransomware
vJ
vS
vKDF
@@ -8147,6 +8617,28 @@ vuW
vdB
vVU
vFEZ
viewing
verwenden
vyh
vWb
vSno
vWm
vSF
vOp
viz
vJSP
verfasst
verdächtiger
verfügen
verschieben
verhindert
verkauft
verschlüsseln
verlangen
vor
vier
verdeutlichen
vermitteln
XE
Xd
XRb
@@ -8344,6 +8836,14 @@ Xlw
XVf
Xsz
Xsb
XYZ
Xje
XIt
XMp
XnfXi
XDd
XmR
XNpf
NW
Ni
Nj
@@ -8560,6 +9060,11 @@ Nzc
NjB
NCh
NFY
Not
Nwnm
Nachrichtenauthentifizierung
Nein
Namen
jhpK
jb
jl
@@ -8766,6 +9271,13 @@ jVS
jmA
jdFN
jcC
json
jwF
jEM
jbwF
jjR
jfmc
jRusx
My
Mm
MO
@@ -8960,6 +9472,24 @@ MIl
MnGi
Mid
MSs
Mit
MYF
MRu
MAq
Mug
MTP
MEzT
MTj
MUi
MyK
Mkk
Mbd
Mzc
Matrikelnummer
Mögliche
Menschen
Medien
Mache
qO
qj
qG
@@ -9148,6 +9678,13 @@ qAy
qAW
qLWV
qVW
qGZ
qCO
qmM
qss
qCWZ
quG
qzj
yB
yyNs
yQU
@@ -9348,6 +9885,9 @@ yHw
yFH
yhJ
yNDN
ydid
yud
yXN
ulC
uk
un
@@ -9576,6 +10116,16 @@ unsicheren
url
uzRJ
ugN
using
use
usw
uiQ
ugP
uTm
ujB
unteren
unter
unterwäsche
ma
ml
mB
@@ -9778,6 +10328,14 @@ many
mehrere
macht
mNcU
mode
meas
mEWO
mJT
mqF
mfw
müssen
mittleren
dg
dw
de
@@ -10026,6 +10584,23 @@ daW
dQe
dYU
dgT
deleted
desired
dürfen
desc
dvKQUg
dip
drY
dir
dXd
dwr
dortmund
dasselbe
dazu
durchführen
diagonalen
darüber
deine
VV
VA
Vsm
@@ -10252,6 +10827,15 @@ VOdp
VRL
VBHy
Vec
Viewing
ViU
VFg
VqyN
Vertrauen
Viele
Verspielte
Vergleiche
Vergleichen
SGN
Sg
SrEHO
@@ -10506,6 +11090,36 @@ Supplement
SlX
SBB
Size
Source
Sicherheit
Stylesheets
Sicherheitsfunktion
Setzen
Skripten
ShQ
SZC
SkHm
Schriftarten
Sicherheitsinformationen
Studienportal
Sicherheitsmaßnahmen
Spam
Spamfilter
Systeme
Sicherheitsbewusstseinstraining
Soziale
Shopping
Schwarzmarkt
Spear
Sicherheitsbewusstseinsschulungen
Sicherheitsrichtlinien
Sport
Schriftart
Symbol
Sie
Slogan
Schütze
Schmunzeln
rn
rE
rD
@@ -10736,6 +11350,20 @@ rVfB
rqhx
rKS
rNqV
resolve
recommend
replace
rKr
rcp
rehz
rTQ
rUW
rJe
rap
realistisch
regelmäßige
regelmäßig
roter
Cu
CL
Ch
@@ -10934,6 +11562,16 @@ CIDSystemInfo
COn
CAAAAA
Consolas
Conflicts
Cookie
Condition
CRT
Cnz
Cosow
CgLZ
Cez
Cyberkriminellen
Cartoon
OM
OWR
Os
@@ -11109,6 +11747,19 @@ OKW
Ouk
Ordering
OHm
Oqf
OKKS
OWm
OUM
OXu
OuB
OAoe
Ordner
Opfers
Online
Opfer
Organisationen
Orange
cgl
cj
content
@@ -11296,6 +11947,22 @@ cKr
cbU
cMh
cGJ
commit
commands
completr
conflicted
conflicts
clientseitigen
colour
curv
cKh
cfssb
crL
cQgs
cxR
cmT
czg
cartoon
öUS
öG
Überweisungsdetails
@@ -11310,10 +11977,14 @@ cGJ
äef
äqo
äF
ähnelt
üXI
üS
ükZ
über
übw
überzeugendere
übertrieben
ßc
ßI
ßVq

View File

@@ -1,10 +1 @@
{
"id": "obsidian-dictionary-plugin",
"name": "Dictionary",
"version": "2.22.0",
"minAppVersion": "0.12.11",
"description": "This is a simple dictionary for the Obsidian Note-Taking Tool.",
"author": "phibr0",
"authorUrl": "https://github.com/phibr0",
"isDesktopOnly": false
}
{"id":"obsidian-dictionary-plugin","name":"Dictionary","version":"2.22.0","minAppVersion":"0.12.11","description":"This is a simple dictionary for the Obsidian Note-Taking Tool.","author":"phibr0","authorUrl":"https://github.com/phibr0","isDesktopOnly":false}

View File

@@ -1,9 +1 @@
{
"id": "obsidian-dynamic-toc",
"name": "Dynamic Table of Contents",
"author": "aidurber",
"description": "An Obsidian plugin to generate Tables of Contents that stay up to date with your document outline.",
"minAppVersion": "0.11.0",
"version": "0.0.27",
"repo": "aidurber/obsidian-plugin-dynamic-toc"
}
{"id":"obsidian-dynamic-toc","name":"Dynamic Table of Contents","author":"aidurber","description":"An Obsidian plugin to generate Tables of Contents that stay up to date with your document outline.","minAppVersion":"0.11.0","version":"0.0.27","repo":"aidurber/obsidian-plugin-dynamic-toc"}

File diff suppressed because one or more lines are too long

View File

@@ -1,11 +1 @@
{
"id": "obsidian-excalidraw-plugin",
"name": "Excalidraw",
"version": "1.8.23",
"minAppVersion": "1.1.6",
"description": "An Obsidian plugin to edit and view Excalidraw drawings",
"author": "Zsolt Viczian",
"authorUrl": "https://zsolt.blog",
"fundingUrl": "https://ko-fi.com/zsolt",
"isDesktopOnly": false
}
{"id":"obsidian-excalidraw-plugin","name":"Excalidraw","version":"1.8.23","minAppVersion":"1.1.6","description":"An Obsidian plugin to edit and view Excalidraw drawings","author":"Zsolt Viczian","authorUrl":"https://zsolt.blog","fundingUrl":"https://ko-fi.com/zsolt","isDesktopOnly":false}

View File

@@ -1,10 +1 @@
{
"id": "obsidian-excel-to-markdown-table",
"name": "Excel to Markdown Table",
"version": "0.4.0",
"minAppVersion": "0.12.0",
"description": "An Obsidian plugin to paste data from Microsoft Excel, Google Sheets, Apple Numbers and LibreOffice Calc as Markdown tables in Obsidian editor.",
"author": "Ganessh Kumar R P <rpganesshkumar@gmail.com>",
"authorUrl": "https://ganesshkumar.com",
"isDesktopOnly": false
}
{"id":"obsidian-excel-to-markdown-table","name":"Excel to Markdown Table","version":"0.4.0","minAppVersion":"0.12.0","description":"An Obsidian plugin to paste data from Microsoft Excel, Google Sheets, Apple Numbers and LibreOffice Calc as Markdown tables in Obsidian editor.","author":"Ganessh Kumar R P <rpganesshkumar@gmail.com>","authorUrl":"https://ganesshkumar.com","isDesktopOnly":false}

View File

@@ -1,9 +1 @@
{
"id": "obsidian-git",
"name": "Obsidian Git",
"description": "Backup your vault with Git.",
"isDesktopOnly": false,
"fundingUrl": "https://ko-fi.com/vinzent",
"js": "main.js",
"version": "2.19.1"
}
{"id":"obsidian-git","name":"Obsidian Git","description":"Backup your vault with Git.","isDesktopOnly":false,"fundingUrl":"https://ko-fi.com/vinzent","js":"main.js","version":"2.19.1"}

View File

@@ -1,10 +1 @@
{
"id": "obsidian-icons-plugin",
"name": "Icons",
"version": "0.3.0",
"minAppVersion": "0.10.7",
"description": "Add icons to your Obsidian notes.",
"author": "Camillo Visini",
"authorUrl": "https://github.com/visini",
"isDesktopOnly": true
}
{"id":"obsidian-icons-plugin","name":"Icons","version":"0.3.0","minAppVersion":"0.10.7","description":"Add icons to your Obsidian notes.","author":"Camillo Visini","authorUrl":"https://github.com/visini","isDesktopOnly":true}

View File

@@ -1,10 +1 @@
{
"id": "obsidian-languagetool-plugin",
"name": "LanguageTool Integration",
"version": "0.3.3",
"minAppVersion": "0.15.2",
"description": "Inofficial LanguageTool plugin",
"author": "Clemens Ertle",
"authorUrl": "https://github.com/Clemens-E",
"isDesktopOnly": false
}
{"id":"obsidian-languagetool-plugin","name":"LanguageTool Integration","version":"0.3.3","minAppVersion":"0.15.2","description":"Inofficial LanguageTool plugin","author":"Clemens Ertle","authorUrl":"https://github.com/Clemens-E","isDesktopOnly":false}

View File

@@ -1,10 +1 @@
{
"id": "obsidian-plugin-toc",
"name": "Table of Contents",
"author": "Andrew Lisowski",
"authorUrl": "https://twitter.com/hipstersmoothie",
"description": "Create a table of contents for a note.",
"isDesktopOnly": false,
"minAppVersion": "0.10.12",
"version": "0.1.4"
}
{"id":"obsidian-plugin-toc","name":"Table of Contents","author":"Andrew Lisowski","authorUrl":"https://twitter.com/hipstersmoothie","description":"Create a table of contents for a note.","isDesktopOnly":false,"minAppVersion":"0.10.12","version":"0.1.4"}

File diff suppressed because one or more lines are too long

View File

@@ -0,0 +1,5 @@
var w=Object.defineProperty;var y=Object.getOwnPropertyDescriptor;var N=Object.getOwnPropertyNames;var D=Object.prototype.hasOwnProperty;var C=(a,s)=>{for(var t in s)w(a,t,{get:s[t],enumerable:!0})},v=(a,s,t,e)=>{if(s&&typeof s=="object"||typeof s=="function")for(let o of N(s))!D.call(a,o)&&o!==t&&w(a,o,{get:()=>s[o],enumerable:!(e=y(s,o))||e.enumerable});return a};var x=a=>v(w({},"__esModule",{value:!0}),a);var r=(a,s,t)=>new Promise((e,o)=>{var i=d=>{try{g(t.next(d))}catch(S){o(S)}},n=d=>{try{g(t.throw(d))}catch(S){o(S)}},g=d=>d.done?e(d.value):Promise.resolve(d.value).then(i,n);g((t=t.apply(a,s)).next())});var W={};C(W,{default:()=>T});module.exports=x(W);var E=require("obsidian");var u=require("obsidian"),c=class extends u.EditorSuggest{constructor(t){super(t.app);this.plugin=t,this.updatePattern()}updatePattern(){this.pattern=new RegExp(`.*${this.plugin.settings.slashCommandShortcut}(.*)$`)}onTrigger(t,e,o){if(this.plugin.settings.slashCommandEnabled===!1)return;let i=e.getRange({line:t.line,ch:0},{line:t.line,ch:t.ch}),n=this.pattern.exec(i);if(n){let g=n[1];return this.lastEditorSuggestTriggerInfo={start:{line:t.line,ch:t.ch-g.length-this.plugin.settings.slashCommandShortcut.length},end:{line:t.line,ch:t.ch},query:n[1]},this.lastEditorSuggestTriggerInfo}else return null}getSuggestions(t){return this.plugin.dictionarySuggestor.query(t.query)}renderSuggestion(t,e){e.createEl("b",{text:t.Term}),e.createEl("br"),e.appendText(t.Definition)}selectSuggestion(t,e){let o=this.plugin.app.workspace.getActiveViewOfType(u.MarkdownView);this.close(),e.ctrlKey?(new u.Notice(t.Term+`
`+t.Definition,6e4),o.editor.replaceRange("",this.lastEditorSuggestTriggerInfo.start,this.lastEditorSuggestTriggerInfo.end)):o.editor.replaceRange(this.plugin.renderDefinitionFromTemplate(t.Term,t.Definition),this.lastEditorSuggestTriggerInfo.start,this.lastEditorSuggestTriggerInfo.end)}};var l=require("obsidian");var p=class extends l.FuzzySuggestModal{constructor(t){super(t.app);this.plugin=t,this.setPlaceholder("type word to lookup in WordNet"),setTimeout(()=>r(this,null,function*(){let e=this.plugin.manifest.dir+"/dict-WordNet.json",o=this.app.vault.adapter;if(yield o.exists(e)){let i=yield o.read(e);this.wordNet=yield JSON.parse(i)}else if(navigator.onLine===!1)new l.Notice("You do not have an internet connection, and the WordNet dictionary cannot be downloaded. Please restore your interent connection and resteart Obsidian",3e4),this.plugin.unload();else{let i=new l.Notice("WordNet dictionary is being downloaded, this may take a few minutes. This message will disappear when the process is complete.",0);try{let n=yield(0,l.request)({url:"https://github.com/TfTHacker/Obsidian-WordNet/releases/download/WordNetJson/dict-WordNet.json"});i.hide(),n==="Not Found"||n==='{"error":"Not Found"}'?(new l.Notice("The WordNet dictionary file is not currently available for download. Please try again later or contact the developer on Twitter: @TfThacker for support.",3e4),this.plugin.unload()):(this.wordNet=yield JSON.parse(n),yield o.write(e,JSON.stringify(this.wordNet)))}catch(n){console.log(`Error in WordNet dictinary: ${n}`),new l.Notice(`An error has occured with the download, please try again later: ${n}`),this.plugin.unload()}}if(yield o.exists(this.plugin.manifest.dir+"/dict-MyDict.json")){let i=yield o.read(this.plugin.manifest.dir+"/dict-MyDict.json");this.customDict=yield JSON.parse(i)}else this.customDict=null}),10)}query(t){let e=[],o=t.toLocaleLowerCase(),i=0;if(this.customDict!=null)for(let n=0;n<this.customDict.length&&i<30;n++)this.customDict[n].SearchTerm.startsWith(o)&&(e.push(this.customDict[n]),i++);i=0;for(let n=0;n<this.wordNet.length&&i<20;n++)this.wordNet[n].SearchTerm.startsWith(o)&&(e.push(this.wordNet[n]),i++);return e}getItems(){let t="";if(this.inputEl.value.trim().length==0){let e=this.app.workspace.getActiveViewOfType(l.MarkdownView);e!=null&&e.getMode()!=null&&e.editor.somethingSelected()&&(t=e.editor.getSelection(),this.inputEl.value=t,this.inputEl.setSelectionRange(0,t.length))}else t=this.inputEl.value.trim();return t===""?[]:this.query(t)}getItemText(t){return t.SearchTerm}onChooseItem(t,e){}renderSuggestion(t,e){e.createEl("b",{text:t.item.Term}),e.createEl("br"),e.appendText(t.item.Definition)}onChooseSuggestion(t,e){let o=this.plugin.app.workspace.getActiveViewOfType(l.MarkdownView);o!=null&&o.getMode()==="source"?o.editor.replaceSelection(this.plugin.renderDefinitionFromTemplate(t.item.Term,t.item.Definition)):new l.Notice(t.item.Term+`
`+t.item.Definition,1e4)}};var m=require("obsidian"),b=require("obsidian");var h={enableRibbon:!0,slashCommandEnabled:!0,slashCommandShortcut:";;",insertTemplate:`**{term}**
{definition}
`},f=class extends b.PluginSettingTab{constructor(t,e){super(t,e);this.plugin=e}display(){let{containerEl:t}=this;t.empty(),t.createEl("h2",{text:"Obsidian42 - WordNet Dictionary Setting"}),t.createEl("b",{text:"Ribbon Support"}),new m.Setting(t).setName("Enable Ribbon Support").setDesc("Toggle on and off the WordNet dictionary button in the ribbon.").addToggle(i=>{i.setValue(this.plugin.settings.enableRibbon),i.onChange(n=>r(this,null,function*(){this.plugin.settings.enableRibbon=n,this.plugin.settings.enableRibbon===!1?this.plugin.ribbonIcon.remove():this.plugin.configureRibbonCommand(),yield this.plugin.saveSettings()}))}),t.createEl("b",{text:"Slash Command"}),new m.Setting(t).setName("Enable the Slash Command").setDesc("Toggle on and off the slash command.").addToggle(i=>{i.setValue(this.plugin.settings.slashCommandEnabled),i.onChange(n=>r(this,null,function*(){this.plugin.settings.slashCommandEnabled=n,yield this.plugin.saveSettings()}))});let e;new m.Setting(t).setName("Slash Command Characters").setDesc("The characters that will invoke the slash command. The command character cannot be a space.").addExtraButton(i=>{i.setIcon("reset").setTooltip("Reset to default").onClick(()=>r(this,null,function*(){this.plugin.settings.slashCommandShortcut=h.slashCommandShortcut,yield this.plugin.saveSettings(),this.plugin.editSuggester.updatePattern(),e.setValue(this.plugin.settings.slashCommandShortcut)}))}).addText(i=>{e=i,i.setValue(this.plugin.settings.slashCommandShortcut),i.onChange(n=>r(this,null,function*(){let g=n.trim().length===0?h.slashCommandShortcut:n;this.plugin.settings.slashCommandShortcut=g,yield this.plugin.saveSettings(),this.plugin.editSuggester.updatePattern()}))}),t.createEl("b",{text:"Template"});let o;new m.Setting(t).setName("Template for inserting a definition").setDesc("The template used for inserting a WordNet definition. Use {term} for the term looked up and {definition} for the defintion of that term.").addExtraButton(i=>{i.setIcon("reset").setTooltip("Reset to default").onClick(()=>r(this,null,function*(){this.plugin.settings.insertTemplate=h.insertTemplate,yield this.plugin.saveSettings(),o.setValue(this.plugin.settings.insertTemplate)}))}).addTextArea(i=>{o=i,i.setValue(this.plugin.settings.insertTemplate),i.onChange(n=>r(this,null,function*(){let g=n.trim().length===0?h.insertTemplate:n;this.plugin.settings.insertTemplate=g,yield this.plugin.saveSettings()})),i.inputEl.rows=2,i.inputEl.cols=40})}};var T=class extends E.Plugin{configureRibbonCommand(){this.ribbonIcon=this.addRibbonIcon("book-open-check","WordNet Dictionary",()=>r(this,null,function*(){this.dictionarySuggestor.open()}))}onload(){return r(this,null,function*(){console.log("loading WordNet plugin"),yield this.loadSettings(),this.addSettingTab(new f(this.app,this)),this.dictionarySuggestor=new p(this),this.settings.enableRibbon&&this.configureRibbonCommand(),this.addCommand({id:"open-wordnet-suggestor",name:"Look up a word",callback:()=>{this.dictionarySuggestor.open()}}),this.editSuggester=new c(this),this.registerEditorSuggest(this.editSuggester)})}onunload(){console.log("unloading WordNet plugin")}renderDefinitionFromTemplate(t,e){return this.settings.insertTemplate.replace("{term}",t).replace("{definition}",e)}loadSettings(){return r(this,null,function*(){this.settings=Object.assign({},h,yield this.loadData())})}saveSettings(){return r(this,null,function*(){yield this.saveData(this.settings)})}};

View File

@@ -0,0 +1 @@
{"id":"obsidian-wordnet-plugin","name":"Obsidian42 - WordNet Dictionary","version":"2.0.2","minAppVersion":"1.1.1","description":"WordNet is a large lexical database of English developed by Princeton University.","author":"TfT Hacker","authorUrl":"https://github.com/TfTHacker/Obsidian-WordNet","isDesktopOnly":false}

View File

@@ -0,0 +1 @@

View File

@@ -1,10 +1 @@
{
"id": "quick-latex",
"name": "Quick Latex for Obsidian",
"version": "2.6.1",
"minAppVersion": "0.9.12",
"description": "Speedup latex math typing with auto fraction, align block shortcut, matrix shortcut...etc",
"author": "joeyuping",
"authorUrl": "https://github.com/joeyuping/quick_latex_obsidian",
"isDesktopOnly": false
}
{"id":"quick-latex","name":"Quick Latex for Obsidian","version":"2.6.1","minAppVersion":"0.9.12","description":"Speedup latex math typing with auto fraction, align block shortcut, matrix shortcut...etc","author":"joeyuping","authorUrl":"https://github.com/joeyuping/quick_latex_obsidian","isDesktopOnly":false}

View File

@@ -1,6 +1 @@
{
"formatType": "normal",
"showRibbonIcon": true,
"bindEnter": true,
"bindTab": true
}
{"formatType":"normal","showRibbonIcon":true,"bindEnter":true,"bindTab":true}

View File

@@ -1,12 +1 @@
{
"id": "table-editor-obsidian",
"name": "Advanced Tables",
"author": "Tony Grosinger",
"authorUrl": "https://grosinger.net",
"description": "Improved table navigation, formatting, manipulation, and formulas",
"isDesktopOnly": false,
"minAppVersion": "1.0.0",
"version": "0.18.1",
"js": "main.js",
"donation": "https://buymeacoffee.com/tgrosinger"
}
{"id":"table-editor-obsidian","name":"Advanced Tables","author":"Tony Grosinger","authorUrl":"https://grosinger.net","description":"Improved table navigation, formatting, manipulation, and formulas","isDesktopOnly":false,"minAppVersion":"1.0.0","version":"0.18.1","js":"main.js","donation":"https://buymeacoffee.com/tgrosinger"}

View File

@@ -1,8 +1 @@
{
"id": "url-into-selection",
"name": "Paste URL into selection",
"description": "Paste URL \"into\" selected text.",
"isDesktopOnly": false,
"js": "main.js",
"version": "1.7.0"
}
{"id":"url-into-selection","name":"Paste URL into selection","description":"Paste URL \"into\" selected text.","isDesktopOnly":false,"js":"main.js","version":"1.7.0"}

View File

@@ -1,195 +1 @@
{
"main": {
"id": "c7c97a7e516b37bf",
"type": "split",
"children": [
{
"id": "6b508f296a879f99",
"type": "tabs",
"children": [
{
"id": "5a719e0c4cd1ab48",
"type": "leaf",
"state": {
"type": "empty",
"state": {}
}
}
]
}
],
"direction": "vertical"
},
"left": {
"id": "f552c30cc0488855",
"type": "mobile-drawer",
"children": [
{
"id": "70c7a5d5a2dfd7f4",
"type": "leaf",
"state": {
"type": "file-explorer",
"state": {
"sortOrder": "alphabetical"
}
}
},
{
"id": "13d093706b2317f4",
"type": "leaf",
"state": {
"type": "search",
"state": {
"query": "",
"matchingCase": false,
"explainSearch": false,
"collapseAll": false,
"extraContext": false,
"sortOrder": "alphabetical"
}
}
},
{
"id": "b1a1f22380ff3aab",
"type": "leaf",
"state": {
"type": "tag",
"state": {
"sortOrder": "frequency",
"useHierarchy": true
}
}
},
{
"id": "0f3ca3a76126dda0",
"type": "leaf",
"state": {
"type": "starred",
"state": {}
}
}
],
"currentTab": 0
},
"right": {
"id": "0836b77bd8b39680",
"type": "mobile-drawer",
"children": [
{
"id": "dd7843c2f011652b",
"type": "leaf",
"state": {
"type": "backlink",
"state": {
"collapseAll": false,
"extraContext": false,
"sortOrder": "alphabetical",
"showSearch": false,
"searchQuery": "",
"backlinkCollapsed": false,
"unlinkedCollapsed": true
}
}
},
{
"id": "6e2275e467f52e8d",
"type": "leaf",
"state": {
"type": "outgoing-link",
"state": {
"linksCollapsed": false,
"unlinkedCollapsed": true
}
}
},
{
"id": "488a3930a391e9ea",
"type": "leaf",
"state": {
"type": "outline",
"state": {}
}
},
{
"id": "3e6291ff931bc997",
"type": "leaf",
"state": {
"type": "calendar",
"state": {}
}
},
{
"id": "6f629f7c2f2bc8a7",
"type": "leaf",
"state": {
"type": "juggl_nodes",
"state": {}
}
},
{
"id": "b671a4b8b4d27231",
"type": "leaf",
"state": {
"type": "juggl_style",
"state": {}
}
},
{
"id": "c17502545a7c0f7c",
"type": "leaf",
"state": {
"type": "advanced-tables-toolbar",
"state": {}
}
}
],
"currentTab": 6
},
"left-ribbon": {
"hiddenItems": {
"table-editor-obsidian:Advanced Tables Toolbar": false,
"obsidian-livesync:Replicate": false,
"obsidian-livesync:Show log": false,
"obsidian-excalidraw-plugin:Create new drawing": false,
"switcher:Open quick switcher": false,
"graph:Open graph view": false,
"canvas:Create new canvas": false,
"daily-notes:Open today's daily note": false,
"templates:Insert template": false,
"command-palette:Open command palette": false,
"juggl:Juggl global graph": false
}
},
"active": "5a719e0c4cd1ab48",
"lastOpenFiles": [
"Excalidraw/Drawing 2023-04-17 08.21.36.excalidraw.md",
"Untitled.md",
"Untitled 1.md",
"Excalidraw/Drawing 2023-04-17 08.21.00.excalidraw.md",
"Informationssicherheit/Ueb2/Ueb2.md",
"README.md",
"Informationssicherheit/Ueb1/01-ueb_uebungsblatt.pdf",
"Informationssicherheit/Ueb1/20230330_19h30m31s_grim.png",
"Informationssicherheit/Ueb1/20230330_19h34m13s_grim.png",
"Informationssicherheit/Ueb1/20230331_07h21m13s_grim.png",
"Informationssicherheit/Ueb1/20230331_10h28m24s_grim.png",
"Informationssicherheit/Ueb1/20230331_10h28m43s_grim.png",
"Informationssicherheit/Ueb1/20230331_14h12m43s_grim.png",
"Informationssicherheit/Ueb1/20230331_16h17m48s_grim.png",
"Informationssicherheit/Ueb1/20230331_16h21m51s_grim.png",
"Informationssicherheit/Ueb1/20230331_16h22m19s_grim.png",
"Informationssicherheit/Ueb1/20230331_16h29m50s_grim.png",
"Informationssicherheit/Ueb1/Ueb01.md",
"Informationssicherheit/Ueb1/Ueb01.pdf",
"Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf",
"Informationssicherheit/VL/01-orga-motivation-handout.pdf",
"Informationssicherheit/VL/02-terminologie-handout.pdf",
"Informationssicherheit/VL/03-fm-orga-handout.pdf",
"CCN/VL01.md",
"Algorithmen und Datenstrukturen/UEB01.md",
"Informationssicherheit/Ueb1",
"Informationssicherheit/Ueb2",
"Informationssicherheit/VL",
"CCN"
]
}
{"main":{"id":"c7c97a7e516b37bf","type":"split","children":[{"id":"6b508f296a879f99","type":"tabs","children":[{"id":"5a719e0c4cd1ab48","type":"leaf","state":{"type":"empty","state":{}}}]}],"direction":"vertical"},"left":{"id":"f552c30cc0488855","type":"mobile-drawer","children":[{"id":"70c7a5d5a2dfd7f4","type":"leaf","state":{"type":"file-explorer","state":{"sortOrder":"alphabetical"}}},{"id":"13d093706b2317f4","type":"leaf","state":{"type":"search","state":{"query":"","matchingCase":false,"explainSearch":false,"collapseAll":false,"extraContext":false,"sortOrder":"alphabetical"}}},{"id":"b1a1f22380ff3aab","type":"leaf","state":{"type":"tag","state":{"sortOrder":"frequency","useHierarchy":true}}},{"id":"0f3ca3a76126dda0","type":"leaf","state":{"type":"starred","state":{}}}],"currentTab":0},"right":{"id":"0836b77bd8b39680","type":"mobile-drawer","children":[{"id":"dd7843c2f011652b","type":"leaf","state":{"type":"backlink","state":{"collapseAll":false,"extraContext":false,"sortOrder":"alphabetical","showSearch":false,"searchQuery":"","backlinkCollapsed":false,"unlinkedCollapsed":true}}},{"id":"6e2275e467f52e8d","type":"leaf","state":{"type":"outgoing-link","state":{"linksCollapsed":false,"unlinkedCollapsed":true}}},{"id":"488a3930a391e9ea","type":"leaf","state":{"type":"outline","state":{}}},{"id":"3e6291ff931bc997","type":"leaf","state":{"type":"calendar","state":{}}},{"id":"6f629f7c2f2bc8a7","type":"leaf","state":{"type":"juggl_nodes","state":{}}},{"id":"b671a4b8b4d27231","type":"leaf","state":{"type":"juggl_style","state":{}}},{"id":"c17502545a7c0f7c","type":"leaf","state":{"type":"advanced-tables-toolbar","state":{}}}],"currentTab":6},"left-ribbon":{"hiddenItems":{"table-editor-obsidian:Advanced Tables Toolbar":false,"obsidian-livesync:Replicate":false,"obsidian-livesync:Show log":false,"obsidian-excalidraw-plugin:Create new drawing":false,"switcher:Open quick switcher":false,"graph:Open graph view":false,"canvas:Create new canvas":false,"daily-notes:Open today's daily note":false,"templates:Insert template":false,"command-palette:Open command palette":false,"juggl:Juggl global graph":false}},"active":"5a719e0c4cd1ab48","lastOpenFiles":["Excalidraw/Drawing 2023-04-17 08.21.36.excalidraw.md","Untitled.md","Untitled 1.md","Excalidraw/Drawing 2023-04-17 08.21.00.excalidraw.md","Informationssicherheit/Ueb2/Ueb2.md","README.md","Informationssicherheit/Ueb1/01-ueb_uebungsblatt.pdf","Informationssicherheit/Ueb1/20230330_19h30m31s_grim.png","Informationssicherheit/Ueb1/20230330_19h34m13s_grim.png","Informationssicherheit/Ueb1/20230331_07h21m13s_grim.png","Informationssicherheit/Ueb1/20230331_10h28m24s_grim.png","Informationssicherheit/Ueb1/20230331_10h28m43s_grim.png","Informationssicherheit/Ueb1/20230331_14h12m43s_grim.png","Informationssicherheit/Ueb1/20230331_16h17m48s_grim.png","Informationssicherheit/Ueb1/20230331_16h21m51s_grim.png","Informationssicherheit/Ueb1/20230331_16h22m19s_grim.png","Informationssicherheit/Ueb1/20230331_16h29m50s_grim.png","Informationssicherheit/Ueb1/Ueb01.md","Informationssicherheit/Ueb1/Ueb01.pdf","Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf","Informationssicherheit/VL/01-orga-motivation-handout.pdf","Informationssicherheit/VL/02-terminologie-handout.pdf","Informationssicherheit/VL/03-fm-orga-handout.pdf","CCN/VL01.md","Algorithmen und Datenstrukturen/UEB01.md","Informationssicherheit/Ueb1","Informationssicherheit/Ueb2","Informationssicherheit/VL","CCN"]}

View File

@@ -9,18 +9,43 @@
"dimension": 62.59025270758123,
"children": [
{
"id": "e2194e3299515374",
"id": "829ecd06322baed5",
"type": "leaf",
"state": {
"type": "markdown",
"state": {
"file": "CCN/VL01.md",
"file": "Informationssicherheit/Ueb3/Ueb3.md",
"mode": "source",
"source": false
}
}
},
{
"id": "4b8ad56e1fd78890",
"type": "leaf",
"state": {
"type": "markdown",
"state": {
"file": "Informationssicherheit/Ueb3/Ueb3.md",
"mode": "source",
"source": false
}
}
},
{
"id": "54e804bb6061872b",
"type": "leaf",
"state": {
"type": "markdown",
"state": {
"file": "conflict-files-obsidian-git.md",
"mode": "source",
"source": false
}
}
}
]
],
"currentTab": 2
},
{
"id": "47553fa673bb1eb6",
@@ -28,12 +53,12 @@
"dimension": 37.40974729241877,
"children": [
{
"id": "20668ba691cd80b3",
"id": "b2fab346c5df81de",
"type": "leaf",
"state": {
"type": "pdf",
"state": {
"file": "Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf"
"file": "Informationssicherheit/Ueb3/03-ueb_uebungsblatt.pdf"
}
}
}
@@ -103,7 +128,7 @@
"state": {
"type": "backlink",
"state": {
"file": "CCN/VL01.md",
"file": "conflict-files-obsidian-git.md",
"collapseAll": false,
"extraContext": false,
"sortOrder": "alphabetical",
@@ -120,7 +145,7 @@
"state": {
"type": "outgoing-link",
"state": {
"file": "CCN/VL01.md",
"file": "conflict-files-obsidian-git.md",
"linksCollapsed": false,
"unlinkedCollapsed": true
}
@@ -143,7 +168,7 @@
"state": {
"type": "outline",
"state": {
"file": "CCN/VL01.md"
"file": "conflict-files-obsidian-git.md"
}
}
},
@@ -202,26 +227,39 @@
"juggl:Juggl global graph": false
}
},
"active": "b8336cb3c3d06be9",
"active": "54e804bb6061872b",
"lastOpenFiles": [
"CCN/Ex01/ccn1-exercise1.pdf",
"CCN/Ex01",
"Informationssicherheit/Ueb3/Ueb3.md",
"conflict-files-obsidian-git.md",
"unterwäsche_austausch_nein.jpg.md",
"Informationssicherheit/Ueb3/03-ueb_uebungsblatt.pdf",
"Informationssicherheit/VL/03-ueb_uebungsblatt.pdf",
"Informationssicherheit/Ueb2/Ueb2.md",
"Informationssicherheit/Ueb2/Ueb2.pdf",
"Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf",
"Informationssicherheit/Ueb3",
"Informationssicherheit/VL/04-recht-standards-handout.pdf",
"CCN/VL01.md",
"Mathe/KW16/UEB.md",
"Mathe/KW16/KW16-EWuuEV_vor.pdf",
"Mathe/KW16/KW16-EWuuEV.pdf",
"Mathe/KW16",
"Mathe",
"CCN/Ex01/Exercise 1.md",
"CCN/Ex01/CCN-1 - introduction.pdf",
"CCN/Ex01/2023-04-18_11-08.png",
"CCN/Ex01/1.3 Alpha 2 Playtesting Guide (DO NOT SHARE).pdf",
"Algorithmen und Datenstrukturen/UEB03/UEB03.md",
"Algorithmen und Datenstrukturen/UEB01/UEB01.md",
"Informationssicherheit/Ueb2/2023-04-17_15-55.png",
"Informationssicherheit/Ueb2/2023-04-17_14-16.png",
"Untitled 1.md",
"Untitled.md",
"Excalidraw/Drawing 2023-04-17 08.21.36.excalidraw.md",
"Excalidraw/Drawing 2023-04-17 08.21.00.excalidraw.md",
"Excalidraw",
"FH/Informationssicherheit/Ueb2/Ueb2.md",
"README.md",
"FH/Informationssicherheit/Ueb2/test.md",
"Informationssicherheit/Ueb2/test2.md",
"Informationssicherheit/Ueb2/Untitled.md",
"Informationssicherheit/Ueb1/01-ueb_uebungsblatt.pdf",
"Informationssicherheit/Ueb1/20230330_19h30m31s_grim.png",
"Informationssicherheit/Ueb1/20230330_19h34m13s_grim.png",
"Informationssicherheit/Ueb1/20230331_07h21m13s_grim.png",
@@ -229,16 +267,9 @@
"Informationssicherheit/Ueb1/20230331_10h28m43s_grim.png",
"Informationssicherheit/Ueb1/20230331_14h12m43s_grim.png",
"Informationssicherheit/Ueb1/20230331_16h17m48s_grim.png",
"Informationssicherheit/Ueb1/20230331_16h21m51s_grim.png",
"Informationssicherheit/Ueb1/Ueb01.md",
"Informationssicherheit/Ueb1/Ueb01.pdf",
"Informationssicherheit/VL/01-orga-motivation-handout.pdf",
"Informationssicherheit/VL/02-terminologie-handout.pdf",
"Informationssicherheit/VL/03-fm-orga-handout.pdf",
"CCN/VL01.md",
"Algorithmen und Datenstrukturen/UEB01.md",
"2023-04-16.md",
"Informationssicherheit/Ueb1",
"FH/2023-04-16.md",
"FH/Informationssicherheit/Ueb1/Ueb01.md",
"FH/Informationssicherheit/Ueb01.md",

View File

@@ -0,0 +1,5 @@
```java
Link<String> ende = new Link<String>("Letzter", null);
Link<String> mittleresElement = new Link<String>("Test", ende);
Link<String> anfang= new Link<String>("TErster", mittleresElement);
```

Binary file not shown.

Binary file not shown.

Binary file not shown.

After

Width:  |  Height:  |  Size: 65 KiB

Binary file not shown.

46
CCN/Ex01/Exercise 1.md Normal file
View File

@@ -0,0 +1,46 @@
# Reference models
## 1
Which layer packs bits into bytes, bytes into frames, uses hardware addressing and implements error detection? Which device (network hardware) operates on this layer in principle?
- 2nd layer: Data link layer; Switches work on this layer
## 2
At which layer does the assignment of addresses and the forwarding of data packets from one end of the network to another take place? Which network hardware operates on this layer?
- Later 3: Network layer; Router
## 3
Which layer is responsible for establishing, running and terminating a process communication between 2 systems?
- Layer 5: Session layer
## 4
At which layer does data stream segmentation take place for communication between endpoints, is a mechanism for establishing/disestablishing virtual connections provided, and does detection and elimination of transport errors as well as flow control or congestion avoidance take place?
- Layer 4: Transport layer
## 5
Which layer determines signal levels, transmission speeds, and connector pinouts, and transmits bits in a transmission channel? Which network hardware operates on this layer?
- Layer 1: Physical layer; Network interface card
## 6
What boundary does the transport layer form between layers 5-7 and 1-3?
- The transport layer forms the boundary between the lower transporting layers, which are primarilly concerned with network tasks, and the application oriented layers
## 7
Contrast the OSI layer model with the widely used TCP/IP layer model. Which layers correspond to each other?
-
## 8
What are the addressing names of layers 2, 3, 4 and 7?
- Layer 2: MAC-adresses
- Layer 3: IP-adresses
- Layer 4: Port number
- Layer 7: Application specific adresses such as E-Mail or URL
## 9
Can collisions occur in point-to-point networks?
- No, the switch sends the data out only at the reciver port. With original Ethernet 10 Mbit/s with CSMA/CD collisions can still happen between switch and connected host
## 10
How are computer networks classified according to their extent?
- ![[2023-04-18_11-08.png]]
# Tools

View File

@@ -1 +0,0 @@

View File

@@ -1,3 +1,42 @@
- [[#Tabelle|Tabelle]]
- [[#Intro|Intro]]
- [[#Intro#1|1]]
- [[#Intro#2|2]]
- [[#Intro#3|3]]
- [[#Intro#4|4]]
- [[#Intro#5|5]]
- [[#Intro#6|6]]
- [[#Intro#7|7]]
- [[#Intro#8|8]]
- [[#Intro#9|9]]
- [[#Advanced|Advanced]]
- [[#Advanced#1|1]]
- [[#Advanced#2|2]]
- [[#Advanced#3|3]]
- [[#Mitigation|Mitigation]]
- [[#Mitigation#1|1]]
- [[#Mitigation#2|2]]
- [[#Mitigation#3|3]]
- [[#Mitigation#4|4]]
- [[#Mitigation#5|5]]
- [[#Aufgaben|Aufgaben]]
- [[#Aufgaben#a|a]]
- [[#Aufgaben#b|b]]
- [[#Aufgaben#c|c]]
- [[#Cross Site Scripting|Cross Site Scripting]]
- [[#Cross Site Scripting#1|1]]
- [[#Cross Site Scripting#2|2]]
- [[#Cross Site Scripting#3|3]]
- [[#Cross Site Scripting#4|4]]
- [[#Cross Site Scripting#5|5]]
- [[#Aufgaben|Aufgaben]]
- [[#Aufgaben#a|a]]
- [[#Aufgaben#b|b]]
- [[#Aufgaben#c|c]]
- [[#Aufgaben#d|d]]
- [[#Aufgaben#e|e]]
# 2.1
## Tabelle
@@ -14,14 +53,18 @@
## Intro
### 1
```
SELECT department FROM employees WHERE first_name='Bob'
```
- SELECT: Wählt Spalte aus
- FROM: Wählt Tabelle aus
- WHERE: Anweisung zum suchen
### 2
```
UPDATE employees SET department = 'Sales' WHERE first_name = 'Tobi' AND last_name = 'Barnett'
```
- UPDATE: Updated exestierende Daten
- SET: Wählt Spalte aus
@@ -29,14 +72,19 @@ UPDATE employees SET department = 'Sales' WHERE first_name = 'Tobi' AND last_nam
- AND: Und für die Abfragen der WHERE Anweisung
### 3
```
ALTER TABLE employees ADD phone varchar(20);
```
- ALTER: Verändert die Struktur einer Datenbank
- TABLE: Wählt Tabelle aus, die verändert werden soll
- ADD: Fügt eine Spalte hinzu
### 4
```
GRANT SELECT ON grant_rights TO unauthorized_user;
```
- GRANT: Gibt einem Benutzer Rechte
- SELECT: Wählt Spalte aus
@@ -44,7 +92,9 @@ GRANT SELECT ON grant_rights TO unauthorized_user;
- TO: Wählt Benutzer aus
### 5
```
SELECT * FROM user_data WHERE first_name = 'John' AND last_name = '' or '1' = '1
```
- Wird zu: SELECT * FROM user_data WHERE first_name = 'John' and last_name = 'Smith' or '1' = '1'
- '1' = '1' ist immer wahr
@@ -114,7 +164,7 @@ def sql_injection_advance_5():
password = ''
headers = {
'Cookie': 'JSESSIONID=8f8OmDA8QEB8JwmEJtPbWkvVtAM_2AerEHJoWYFT',
'Cookie': 'JSESSIONID=P9ImeJQVi_A20BBfojVn9ix_qaGR6PCKbRSI7395',
}
while True:
@@ -232,7 +282,7 @@ def sql_injection_mitigation_10():
index = 0
headers = {
'Cookie': 'JSESSIONID=8f8OmDA8QEB8JwmEJtPbWkvVtAM_2AerEHJoWYFT'
'Cookie': 'JSESSIONID=P9ImeJQVi_A20BBfojVn9ix_qaGR6PCKbRSI7395'
}
while True:
@@ -430,8 +480,9 @@ DOM-based XSS findet auf der Client-Seite (im Browser) statt und resultiert aus
- Sicherheits-Header: Es können Sicherheits-Header wie Content-Security-Policy (CSP) oder X-XSS-Protection verwendet werden, um sicherzustellen, dass nur vertrauenswürdige Ressourcen auf einer Seite geladen werden und um das Risiko von XSS-Angriffen zu verringern.
- Content-Security-Policy:
- Content-Security-Policy: ein HTTP-Antwortheader, den Webentwickler und Administratoren verwenden können, um die Sicherheit einer Webseite zu erhöhen. Mit CSP können sie festlegen, welche Inhalte (wie Skripte, Bilder, Stylesheets usw.) von welchen Quellen auf einer Webseite geladen werden dürfen.
- HTTP-Only-Cookies:
- HTTP-Only-Cookies: eine Sicherheitsfunktion, die bei der Verwendung von Cookies im Web eingesetzt wird. Durch das Setzen des HttpOnly-Flags in einem Cookie wird das Cookie so konfiguriert, dass es nur vom Server und nicht von clientseitigen Skripten, wie beispielsweise JavaScript, gelesen werden kann.
- Bibliotheken etc. Aktualisieren:
- Bibliotheken etc. Aktualisieren

Binary file not shown.

View File

@@ -0,0 +1,76 @@
# 3.1
# 3.2
# 3.3
## a
Um die Herkunft einer Phishing-E-Mail realistisch wirken zu lassen, könnten folgende Maßnahmen ergriffen werden:
1. **Absenderadresse fälschen**: Die E-Mail-Adresse des Absenders könnte so gestaltet werden, dass sie einer offiziellen E-Mail-Adresse der Fachhochschule Dortmund ähnelt, z.B. "support@fh-dortmund.de" oder "noreply@portal-fhdortmund.de".
2. **Authentisches Design**: Die Phishing-E-Mail sollte das Logo, die Farben und die Schriftarten der Fachhochschule Dortmund verwenden, um den Eindruck einer legitimen E-Mail zu erwecken.
3. **Verwendung von persönlichen Informationen**: Die E-Mail könnte persönliche Informationen über den Empfänger enthalten, z.B. Name und Matrikelnummer, um Vertrauen aufzubauen.
4. **Ansprechender Betreff**: Ein Betreff wie "Wichtige Sicherheitsinformationen für Ihr Studienportal-Konto" könnte die Aufmerksamkeit des Empfängers auf sich ziehen.
5. **Glaubwürdiger Inhalt**: Der Text der E-Mail sollte professionell verfasst sein und eine plausible Geschichte erzählen, z.B. dass ein verdächtiger Loginversuch festgestellt wurde und die Benutzer ihre Anmeldedaten bestätigen müssen, um ihr Konto zu schützen.
Mögliche Probleme:
- Erfahrene Benutzer könnten die falsche Absenderadresse oder andere Anzeichen einer gefälschten E-Mail erkennen.
- Technische Sicherheitsmaßnahmen könnten die Zustellung der Phishing-E-Mail verhindern oder sie als Spam kennzeichnen.
## b
Mechanismen zur Abwehr von Phishing bzw. Spam, die den Erfolg des fiktiven Angriffs gefährden könnten:
1. **Spamfilter**: E-Mail-Systeme verfügen über integrierte Spamfilter, die verdächtige E-Mails herausfiltern und in einen Spam-Ordner verschieben.
2. **Domainbasierte Nachrichtenauthentifizierung, Berichterstattung und Konformität (DMARC)**: DMARC ist eine E-Mail-Authentifizierungsmethode, die verhindert, dass gefälschte Absenderadressen verwendet werden.
3. **Sicherheitsbewusstseinstraining**: Wenn Benutzer geschult sind, Phishing-E-Mails zu erkennen, ist die Wahrscheinlichkeit geringer, dass sie auf betrügerische Links klicken oder ihre Anmeldedaten preisgeben.
## c
E-Mail-Adresse und zugehöriges Passwort sind aus folgenden Gründen lohnenswerte Angriffsziele:
- **Zugriff auf persönliche Informationen**: Angreifer können E-Mails und Anhänge einsehen, die persönliche Informationen wie Adressen, Telefonnummern oder Geburtsdaten enthalten.
- **Identitätsdiebstahl**: Mit diesen Informationen können Angreifer die Identität des Opfers annehmen und z.B. Kredite aufnehmen oder Online-Käufe tätigen.
- **Kontozugriff**: Viele Menschen verwenden dasselbe Passwort für mehrere Konten. Ein erfolgreiches Phishing kann dazu führen, dass Angreifer auch Zugriff auf andere Online-Konten erhalten, z.B. Soziale Medien, Online-Banking oder Online-Shopping-Konten.
- **Weiterverkauf**: Gestohlene Anmeldedaten können auf dem Schwarzmarkt verkauft werden, wo sie von anderen Cyberkriminellen für verschiedene Zwecke verwendet werden können, z.B. für weitere Phishing-Angriffe, Betrug oder Spam.
- **Spear-Phishing**: Mit den Informationen aus dem erfolgreich gekaperten E-Mail-Konto können Angreifer gezielte Spear-Phishing-Angriffe auf Freunde, Familie oder Kollegen des Opfers durchführen, indem sie persönliche Informationen verwenden, um noch überzeugendere Phishing-E-Mails zu erstellen.
- **Ransomware**: Angreifer könnten auch Ransomware in das E-Mail-Konto einschleusen, um wichtige Dateien und Dokumente zu verschlüsseln und Lösegeld vom Opfer zu verlangen, um den Zugriff wiederherzustellen.
Um die Sicherheit der Benutzer zu gewährleisten, sollten die Fachhochschule Dortmund und andere Organisationen Sicherheitsmaßnahmen ergreifen, wie z.B. regelmäßige Sicherheitsbewusstseinsschulungen, Zwei-Faktor-Authentifizierung und Sicherheitsrichtlinien für Passwörter. Diese Maßnahmen können dazu beitragen, die Wahrscheinlichkeit von erfolgreichen Phishing-Angriffen zu reduzieren.
# 3.4
## a/b
## [Jordi Bolz, TUS Ampen - Leichtathletik-Datenbank.DE](https://www.leichtathletik-datenbank.de/vereine/deutscher-leichtathletik-verband/westdeutschland/fussball-und-leichtathletik-verband-westfalen/westfalen-mitte/soest/tus-ampen/athleten/48687-jordi-bolz)
## [Bilder zur Stadtmeisterschaft - LAZ) Soest](http://www.lazsoest.de/index.php/item/201-erfolgreiche-stadtmeisterschaften)
## [2. Soester Hochsprung-Meeting 2014, LAZ Soest (14.09.2014 ...](https://www.leichtathletik-datenbank.de/wettkaempfe/deutscher-leichtathletik-verband/westdeutschland/fussball-und-leichtathletik-verband-westfalen/westfalen-mitte/soest/laz-soest/wk/2-soester-hochsprung-meeting-2014)
- Sport Events
## c
- Einladung zu Sport-Events (vor 10 Jahren)
# 3.5
Titel: "Passwörter sind wie Unterwäsche..."
Plakat-Design:
1. Hintergrund: Hellblau, um eine freundliche Atmosphäre zu schaffen.
2. Schriftart: Verspielte, leicht lesbare Schriftart, die die humorvolle Botschaft betont.
3. Farben: Helle, fröhliche Farben (z.B. Gelb, Orange, Grün), um Aufmerksamkeit zu erregen.
Layout:
- Im oberen Drittel des Plakats den Titel "Passwörter sind wie Unterwäsche..." platzieren.
- Im mittleren Teil des Plakats vier humorvolle Vergleiche zwischen Passwörtern und Unterwäsche anbringen, die die Bedeutung von sicheren Passwörtern verdeutlichen: a) "Wechsle sie regelmäßig!" - Zeige eine lächelnde Cartoon-Figur, die frische Unterwäsche und ein neues Passwort hält. b) "Teile sie nicht mit anderen!" - Zeige zwei Cartoon-Figuren, die Unterwäsche austauschen und dann ein "Nein"-Symbol (ein roter Kreis mit einer diagonalen Linie) darüber legen. c) "Mache sie nicht zu einfach!" - Zeige eine Cartoon-Figur mit übertrieben einfacher Unterwäsche (z.B. ein Lendenschurz) und einem Passwort wie "1234" auf einem Bildschirm. d) "Keine persönlichen Informationen!" - Zeige eine Cartoon-Figur, die Unterwäsche mit ihrem Namen darauf trägt und ein Passwort, das aus ihrem Geburtsdatum besteht.
- Im unteren Drittel des Plakats, unter den vier Vergleichen, platzieren Sie den Slogan "Schütze deine Privatsphäre - wähle sichere Passwörter!" in einer auffälligen Farbe.
Dieses humorvolle Plakat soll die Wichtigkeit von sicheren Passwörtern vermitteln und den Betrachtern ein Schmunzeln entlocken, während sie über ihre eigenen Passwortgewohnheiten nachdenken.

BIN
Mathe/KW16/KW16-EWuuEV.pdf Normal file

Binary file not shown.

Binary file not shown.

249
Mathe/KW16/UEB.md Normal file
View File

@@ -0,0 +1,249 @@
Um die Eigenwerte und Eigenvektoren einer Matrix zu berechnen, verfolgen wir die folgenden Schritte:
Gegeben ist die Matrix A:
$$
A = \begin{bmatrix}
18 & -20 \\
24 & -26
\end{bmatrix}
$$
1. Berechne die Determinante von $(A - \lambda I)$, wobei $\lambda$ der Eigenwert und $I$ die Identitätsmatrix ist:
$$
\begin{vmatrix}
18 - \lambda & -20 \\
24 & -26 - \lambda
\end{vmatrix}
$$
2. Berechne die Determinante dieser Matrix:
$$(18 - \lambda)((-26) - \lambda) - (-20)(24)$$
$$\lambda^2 - (-8)\lambda - 120$$
3. Löse das charakteristische Polynom, um die Eigenwerte zu erhalten:
$$\lambda^2 + 8\lambda - 120 = 0$$
Mit der quadratischen Formel erhalten wir:
$$\lambda = \frac{-b \pm \sqrt{b^2 - 4ac}}{2a}$$
In unserem Fall sind $a = 1$, $b = 8$ und $c = -120$:
$$\lambda = \frac{-8 \pm \sqrt{8^2 - 4 * 1 * (-120)}}{2 * 1}$$
$$\lambda = \frac{-8 \pm \sqrt{256 + 480}}{2}$$
$$\lambda = \frac{-8 \pm \sqrt{736}}{2}$$
Die beiden Eigenwerte sind:
$$\lambda_1 = \frac{-8 + \sqrt{736}}{2} \approx 4$$
$$\lambda_2 = \frac{-8 - \sqrt{736}}{2} \approx -30$$
4. Finde die Eigenvektoren für jeden Eigenwert, indem du $(A - \lambda I)v = 0$ löst:
Für $\lambda_1 = 4$:
$$(A - 4I)v = 0$$
$$
\begin{bmatrix}
14 & -20 \\
24 & -30
\end{bmatrix}
\begin{bmatrix}
x_1 \\
x_2
\end{bmatrix}
= \begin{bmatrix}
0 \\
0
\end{bmatrix}
$$
Wir können das Gleichungssystem vereinfachen:
$$14x_1 - 20x_2 = 0$$
Da es sich um ein homogenes Gleichungssystem handelt, können wir eine Variable frei wählen (z.B. $x_2 = 1$):
$$x_1 = \frac{20}{14}$$
Eigenvektor für $\lambda_1$:
$$
v_1 = \begin{bmatrix}
\frac{10}{7} \\
1
\end{bmatrix}
$$
Für $\lambda_2 = -30$:
$$(A - (-30)I)v = 0$$
$$
\begin{bmatrix}
48 & -20 \\
24 & 4
\end{bmatrix}
\begin{bmatrix}
x_1 \\
x_2
\end{bmatrix}
= \begin{bmatrix}
0 \\
0
\end{bmatrix}
$$
Wir können das Gleichungssystem vereinfachen:
$$48x_1 - 20x_2 = 0$$
Da es sich um ein homogenes Gleichungssystem handelt, können wir eine Variable frei wählen (z.B. $x_2 = 1$):
$$x_1 = \frac{20}{48}$$
Eigenvektor für $\lambda_2$:
$$
v_2 = \begin{bmatrix}
\frac{5}{12} \\
1
\end{bmatrix}
$$
Zusammengefasst haben wir die folgenden Eigenwerte und Eigenvektoren:
$$
Eigenwert 1 (\lambda_1): 4 \\
$$$$
Eigenvektor 1 (v_1): \begin{bmatrix}
\frac{10}{7} \\
1
\end{bmatrix}
$$$$
Eigenwert 2 (\lambda_2): -30 \\
$$$$
Eigenvektor 2 (v_2): \begin{bmatrix}
\frac{5}{12} \\
1
\end{bmatrix}
$$
$$$$
Beachte, dass die Eigenvektoren auf einen skalaren Faktor genau bestimmt sind, was bedeutet, dass jeder Vielfache eines Eigenvektors ebenfalls ein Eigenvektor ist. In diesem Fall haben wir die Eigenvektoren auf eine einfachere Form reduziert.
# 2
Um den Eigenwert und Eigenvektor einer Matrix zu berechnen, müssen wir zunächst das charakteristische Polynom finden und dieses lösen, um die Eigenwerte zu erhalten. Anschließend setzen wir die Eigenwerte in die Gleichung (A - λI)v = 0 ein, um die zugehörigen Eigenvektoren zu finden.
Gegeben ist die Matrix A:
A = $$\begin{bmatrix}
-1 & 2 & 4 \\
-2 & -6 & -8 \\
-4 & 2 & 7 \\
\end{bmatrix}$$
Das charakteristische Polynom erhalten wir, indem wir die Determinante von (A - λI) berechnen:
A - λI = $$\begin{bmatrix}
-1-\lambda & 2 & 4 \\
-2 & -6-\lambda & -8 \\
-4 & 2 & 7-\lambda \\
\end{bmatrix}$$
Det(A - λI) = $$(-1-\lambda)((-6-\lambda)(7-\lambda) - (-8)(2)) - 2(-2(7-\lambda) - (-8)(-4)) + 4(-2(2) - (-4)(-6-\lambda))$$
Nun berechnen wir die Determinante:
Det(A - λI) = $$(-1-\lambda)(-42 + 13\lambda - \lambda^2 + 16) - 2(14 - 8\lambda + 32) + 4(4 + 24 + 4\lambda)$$
Jetzt müssen wir die Eigenwerte λ finden, indem wir das charakteristische Polynom lösen:
$$\lambda^3 + 21\lambda^2 + 10\lambda - 118 = 0$$
Da dies ein kubisches Polynom ist, ist es nicht einfach, die Lösungen direkt zu finden. Eine numerische Lösung für die Eigenwerte ergibt:
λ1 ≈ -9.246
λ2 ≈ -5.465
λ3 ≈ -6.289
Jetzt berechnen wir die zugehörigen Eigenvektoren, indem wir jeden Eigenwert in die Gleichung (A - λI)v = 0 einsetzen:
1. Für λ1 ≈ -9.246:
(A - λ1I)v1 = 0
$$\begin{bmatrix}
8.246 & 2 & 4 \\
-2 & -3.246 & -8 \\
-4 & 2 & 16.246 \\
\end{bmatrix}
\begin{bmatrix}
x_1 \\
x_2 \\
x_3 \\
\end{bmatrix} =
\begin{bmatrix}
0 \\
0 \\
0 \\
\end{bmatrix}$$
Wir erhalten den Eigenvektor v1 ≈ (1, -1.282, 1).
2. Für λ2 ≈ -5.465:
(A - λ2I)v2 = 0
$$\begin{bmatrix}
4.465 & 2 & 4 \\
-2 & -0.535 & -8 \\
-4 & 2 & 12.465 \\
\end{bmatrix}
\begin{bmatrix}
x_1 \\
x_2 \\
x_3 \\
\end{bmatrix} =
\begin{bmatrix}
0 \\
0 \\
0 \\
\end{bmatrix}$$
Wir erhalten den Eigenvektor v2 ≈ (1, -0.416, 1).
3. Für λ3 ≈ -6.289:
(A - λ3I)v3 = 0
$$\begin{bmatrix}
5.289 & 2 & 4 \\
-2 & 0.289 & -8 \\
-4 & 2 & 13.289 \\
\end{bmatrix}
\begin{bmatrix}
x_1 \\
x_2 \\
x_3 \\
\end{bmatrix} =
\begin{bmatrix}
0 \\
0 \\
0 \\
\end{bmatrix}$$
Wir erhalten den Eigenvektor v3 ≈ (1, 1.943, 1).
Daher sind die Eigenwerte und zugehörigen Eigenvektoren der Matrix A:
λ1 ≈ -9.246, v1 ≈ (1, -1.282, 1)
λ2 ≈ -5.465, v2 ≈ (1, -0.416, 1)
λ3 ≈ -6.289, v3 ≈ (1, 1.943, 1)
Bitte beachten Sie, dass die Eigenvektoren nur bis auf einen konstanten Faktor bestimmt sind und daher in einer anderen Form angegeben werden können, solange sie kollinear sind.

View File

@@ -0,0 +1,18 @@
# Conflicts
Please resolve them and commit them using the commands `Obsidian Git: Commit all changes` followed by `Obsidian Git: Push`
(This file will automatically be deleted before commit)
[[#Additional Instructions]] available below file list
- Not a file: .obsidian/plugins/obsidian-completr/scanned_words.txt
- Not a file: .obsidian/workspace.json
# Additional Instructions
I strongly recommend to use "Source mode" for viewing the conflicted files. For simple conflicts, in each file listed above replace every occurrence of the following text blocks with the desired text.
```diff
<<<<<<< HEAD
File changes in local repository
=======
File changes in remote repository
>>>>>>> origin/main
```