vault backup: 2023-04-16 12:21:43

This commit is contained in:
2023-04-16 12:21:43 +02:00
parent b46c816c2b
commit 5b813adc36
274 changed files with 220951 additions and 30 deletions

View File

@@ -6,6 +6,7 @@
{
"id": "70d3e404042bb7e1",
"type": "tabs",
"dimension": 58.99100899100899,
"children": [
{
"id": "8d74a64b5bdd799c",
@@ -13,13 +14,30 @@
"state": {
"type": "markdown",
"state": {
"file": "Informationssicherheit/Ueb1/Ueb01.md",
"file": "Informationssicherheit/Ueb2/Ueb2.md",
"mode": "source",
"source": false
}
}
}
]
},
{
"id": "09960489beb8807f",
"type": "tabs",
"dimension": 41.00899100899101,
"children": [
{
"id": "9acdf2a1e42ed9ec",
"type": "leaf",
"state": {
"type": "pdf",
"state": {
"file": "Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf"
}
}
}
]
}
],
"direction": "vertical"
@@ -32,16 +50,6 @@
"id": "94d495814220bf82",
"type": "tabs",
"children": [
{
"id": "dee6158724d41ca6",
"type": "leaf",
"state": {
"type": "file-explorer",
"state": {
"sortOrder": "alphabetical"
}
}
},
{
"id": "70ca5d990fce7a86",
"type": "leaf",
@@ -64,12 +72,23 @@
"type": "starred",
"state": {}
}
},
{
"id": "e66cc33cf17c042a",
"type": "leaf",
"state": {
"type": "file-explorer",
"state": {
"sortOrder": "alphabetical"
}
}
}
]
],
"currentTab": 2
}
],
"direction": "horizontal",
"width": 300
"width": 200
},
"right": {
"id": "4540e984d4c131f5",
@@ -85,7 +104,7 @@
"state": {
"type": "backlink",
"state": {
"file": "Informationssicherheit/Ueb1/Ueb01.md",
"file": "Informationssicherheit/Ueb2/Ueb2.md",
"collapseAll": false,
"extraContext": false,
"sortOrder": "alphabetical",
@@ -102,7 +121,7 @@
"state": {
"type": "outgoing-link",
"state": {
"file": "Informationssicherheit/Ueb1/Ueb01.md",
"file": "Informationssicherheit/Ueb2/Ueb2.md",
"linksCollapsed": false,
"unlinkedCollapsed": true
}
@@ -125,9 +144,33 @@
"state": {
"type": "outline",
"state": {
"file": "Informationssicherheit/Ueb1/Ueb01.md"
"file": "Informationssicherheit/Ueb2/Ueb2.md"
}
}
},
{
"id": "4965238a34ee95eb",
"type": "leaf",
"state": {
"type": "calendar",
"state": {}
}
},
{
"id": "838787be957ae435",
"type": "leaf",
"state": {
"type": "juggl_nodes",
"state": {}
}
},
{
"id": "974f4434812d0416",
"type": "leaf",
"state": {
"type": "juggl_style",
"state": {}
}
}
]
}
@@ -143,11 +186,19 @@
"canvas:Create new canvas": false,
"daily-notes:Open today's daily note": false,
"templates:Insert template": false,
"command-palette:Open command palette": false
"command-palette:Open command palette": false,
"table-editor-obsidian:Advanced Tables Toolbar": false,
"obsidian-advanced-slides:Show Slide Preview": false,
"juggl:Juggl global graph": false
}
},
"active": "8d74a64b5bdd799c",
"lastOpenFiles": [
"2023-04-16.md",
"Informationssicherheit/Ueb2/Ueb2.md",
"Untitled Diagram.svg",
"Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf",
"Informationssicherheit/Ueb1/Ueb01.md",
"Informationssicherheit/Ueb1/01-ueb_uebungsblatt.pdf",
"Informationssicherheit/VL/01-orga-motivation-handout.pdf",
"Informationssicherheit/VL/02-terminologie-handout.pdf",
@@ -155,11 +206,8 @@
"CCN/VL01.md",
"Informationssicherheit/VL/03-fm-orga-handout.pdf",
"Informationssicherheit/VL",
"Informationssicherheit/Ueb2/Ueb2.md",
"Informationssicherheit/Ueb2/02-ueb_uebungsblatt.pdf",
"Informationssicherheit/Ueb2",
"Informationssicherheit/Ueb1/Ueb01.pdf",
"Informationssicherheit/Ueb1/Ueb01.md",
"Informationssicherheit/Ueb1/20230331_17h00m06s_grim.png",
"Informationssicherheit/Ueb1/20230331_16h29m50s_grim.png",
"Informationssicherheit/Ueb1/20230331_16h22m19s_grim.png",
@@ -169,7 +217,6 @@
"Informationssicherheit/Ueb1/20230331_10h28m43s_grim.png",
"Informationssicherheit/Ueb1/20230331_10h28m24s_grim.png",
"Informationssicherheit/Ueb1/20230331_07h21m13s_grim.png",
"Informationssicherheit/Ueb1/20230330_19h34m13s_grim.png",
"Informationssicherheit/Ueb1",
"Informationssicherheit"
]