vault backup: 2023-04-18 12:03:13
This commit is contained in:
45
.obsidian/workspace.json
vendored
45
.obsidian/workspace.json
vendored
@@ -6,7 +6,7 @@
|
||||
{
|
||||
"id": "08ad9b53ade42d31",
|
||||
"type": "tabs",
|
||||
"dimension": 62.59025270758123,
|
||||
"dimension": 47.73922187171398,
|
||||
"children": [
|
||||
{
|
||||
"id": "e2194e3299515374",
|
||||
@@ -14,8 +14,8 @@
|
||||
"state": {
|
||||
"type": "markdown",
|
||||
"state": {
|
||||
"file": "Informationssicherheit/Ueb2/Ueb2.md",
|
||||
"mode": "preview",
|
||||
"file": "CCN/Ex01/Exercise 1.md",
|
||||
"mode": "source",
|
||||
"source": false
|
||||
}
|
||||
}
|
||||
@@ -25,19 +25,30 @@
|
||||
{
|
||||
"id": "47553fa673bb1eb6",
|
||||
"type": "tabs",
|
||||
"dimension": 37.40974729241877,
|
||||
"dimension": 52.26077812828601,
|
||||
"children": [
|
||||
{
|
||||
"id": "20668ba691cd80b3",
|
||||
"id": "7446620410a970a1",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "pdf",
|
||||
"state": {
|
||||
"file": "Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf"
|
||||
"file": "CCN/Ex01/CCN-1 - introduction.pdf"
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"id": "61a2c54b2f74b659",
|
||||
"type": "leaf",
|
||||
"state": {
|
||||
"type": "pdf",
|
||||
"state": {
|
||||
"file": "CCN/Ex01/ccn1-exercise1.pdf"
|
||||
}
|
||||
}
|
||||
}
|
||||
]
|
||||
],
|
||||
"currentTab": 1
|
||||
}
|
||||
],
|
||||
"direction": "vertical"
|
||||
@@ -103,7 +114,7 @@
|
||||
"state": {
|
||||
"type": "backlink",
|
||||
"state": {
|
||||
"file": "Informationssicherheit/Ueb2/Ueb2.md",
|
||||
"file": "CCN/Ex01/Exercise 1.md",
|
||||
"collapseAll": false,
|
||||
"extraContext": false,
|
||||
"sortOrder": "alphabetical",
|
||||
@@ -120,7 +131,7 @@
|
||||
"state": {
|
||||
"type": "outgoing-link",
|
||||
"state": {
|
||||
"file": "Informationssicherheit/Ueb2/Ueb2.md",
|
||||
"file": "CCN/Ex01/Exercise 1.md",
|
||||
"linksCollapsed": false,
|
||||
"unlinkedCollapsed": true
|
||||
}
|
||||
@@ -143,7 +154,7 @@
|
||||
"state": {
|
||||
"type": "outline",
|
||||
"state": {
|
||||
"file": "Informationssicherheit/Ueb2/Ueb2.md"
|
||||
"file": "CCN/Ex01/Exercise 1.md"
|
||||
}
|
||||
}
|
||||
},
|
||||
@@ -205,10 +216,15 @@
|
||||
},
|
||||
"active": "e2194e3299515374",
|
||||
"lastOpenFiles": [
|
||||
"CCN/Ex01",
|
||||
"Informationssicherheit/Ueb2/Ueb2.pdf",
|
||||
"CCN/Ex01/ccn1-exercise1.pdf",
|
||||
"CCN/Ex01/Exercise 1.md",
|
||||
"CCN/Ex01/2023-04-18_11-08.png",
|
||||
"CCN/Ex01/CCN-1 - introduction.pdf",
|
||||
"Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf",
|
||||
"Informationssicherheit/Ueb2/Ueb2.md",
|
||||
"CCN/VL01.md",
|
||||
"CCN/Ex01",
|
||||
"Informationssicherheit/Ueb2/Ueb2.pdf",
|
||||
"Informationssicherheit/Ueb2/2023-04-17_15-55.png",
|
||||
"Informationssicherheit/Ueb2/2023-04-17_14-16.png",
|
||||
"Untitled 1.md",
|
||||
@@ -229,17 +245,12 @@
|
||||
"Informationssicherheit/Ueb1/20230331_10h28m43s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230331_14h12m43s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230331_16h17m48s_grim.png",
|
||||
"Informationssicherheit/Ueb1/20230331_16h21m51s_grim.png",
|
||||
"Informationssicherheit/Ueb1/Ueb01.md",
|
||||
"Informationssicherheit/Ueb1/Ueb01.pdf",
|
||||
"Informationssicherheit/VL/01-orga-motivation-handout.pdf",
|
||||
"Informationssicherheit/VL/02-terminologie-handout.pdf",
|
||||
"Informationssicherheit/VL/03-fm-orga-handout.pdf",
|
||||
"CCN/VL01.md",
|
||||
"Algorithmen und Datenstrukturen/UEB01.md",
|
||||
"2023-04-16.md",
|
||||
"Informationssicherheit/Ueb1",
|
||||
"Informationssicherheit/VL",
|
||||
"FH/2023-04-16.md",
|
||||
"FH/Informationssicherheit/Ueb1/Ueb01.md",
|
||||
"FH/Informationssicherheit/Ueb01.md",
|
||||
|
||||
Reference in New Issue
Block a user