Files
G4G0-2/.obsidian/workspace.json
2024-10-31 09:05:54 +00:00

253 lines
8.1 KiB
JSON

{
"main": {
"id": "b894e6395441bf91",
"type": "split",
"children": [
{
"id": "18e28060fe2de0a2",
"type": "tabs",
"children": [
{
"id": "d83bb0bbeeb86eec",
"type": "leaf",
"state": {
"type": "markdown",
"state": {
"file": "Penetration Testing/Week 7/Lecture 7 - Vulnerability Scanning.md",
"mode": "source",
"source": false
},
"icon": "lucide-file",
"title": "Lecture 7 - Vulnerability Scanning"
}
}
]
}
],
"direction": "vertical"
},
"left": {
"id": "29180f976da6913e",
"type": "split",
"children": [
{
"id": "5e6a5a1cfc68c394",
"type": "tabs",
"children": [
{
"id": "b645eb003ca29da3",
"type": "leaf",
"state": {
"type": "search",
"state": {
"query": "tag:#Subsets",
"matchingCase": false,
"explainSearch": false,
"collapseAll": false,
"extraContext": false,
"sortOrder": "alphabetical"
},
"icon": "lucide-search",
"title": "Search"
}
},
{
"id": "fffdf73e5f225916",
"type": "leaf",
"state": {
"type": "bookmarks",
"state": {},
"icon": "lucide-bookmark",
"title": "Bookmarks"
}
},
{
"id": "671043c113c40804",
"type": "leaf",
"state": {
"type": "file-explorer",
"state": {
"sortOrder": "alphabetical"
},
"icon": "lucide-folder-closed",
"title": "Files"
}
}
],
"currentTab": 2
}
],
"direction": "horizontal",
"width": 395.5
},
"right": {
"id": "ee8f6df41634f71e",
"type": "split",
"children": [
{
"id": "08c5be16080a33d4",
"type": "tabs",
"children": [
{
"id": "28df09223f5ff3ba",
"type": "leaf",
"state": {
"type": "backlink",
"state": {
"file": "Penetration Testing/Week 7/Lecture 7 - Vulnerability Scanning.md",
"collapseAll": false,
"extraContext": false,
"sortOrder": "alphabetical",
"showSearch": false,
"searchQuery": "",
"backlinkCollapsed": false,
"unlinkedCollapsed": true
},
"icon": "links-coming-in",
"title": "Backlinks for Lecture 7 - Vulnerability Scanning"
}
},
{
"id": "7bc5b41711af1822",
"type": "leaf",
"state": {
"type": "outgoing-link",
"state": {
"file": "Penetration Testing/Week 7/Lecture 7 - Vulnerability Scanning.md",
"linksCollapsed": false,
"unlinkedCollapsed": true
},
"icon": "links-going-out",
"title": "Outgoing links from Lecture 7 - Vulnerability Scanning"
}
},
{
"id": "1817c377e59b8531",
"type": "leaf",
"state": {
"type": "tag",
"state": {
"sortOrder": "frequency",
"useHierarchy": true
},
"icon": "lucide-tags",
"title": "Tags"
}
},
{
"id": "3f130e3d308d39ed",
"type": "leaf",
"state": {
"type": "outline",
"state": {
"file": "Penetration Testing/Week 7/Lecture 7 - Vulnerability Scanning.md"
},
"icon": "lucide-list",
"title": "Outline of Lecture 7 - Vulnerability Scanning"
}
},
{
"id": "2e33e92dc5f2fbae",
"type": "leaf",
"state": {
"type": "all-properties",
"state": {
"sortOrder": "frequency",
"showSearch": false,
"searchQuery": ""
},
"icon": "lucide-archive",
"title": "All properties"
}
},
{
"id": "ff4e63a36b080692",
"type": "leaf",
"state": {
"type": "git-view",
"state": {},
"icon": "git-pull-request",
"title": "Source Control"
}
},
{
"id": "390f03a34bed73fd",
"type": "leaf",
"state": {
"type": "mermaid-toolbar-view",
"state": {},
"icon": "trident-custom",
"title": "Mermaid Toolbar"
}
}
],
"currentTab": 5
}
],
"direction": "horizontal",
"width": 307.5
},
"left-ribbon": {
"hiddenItems": {
"graph:Open graph view": false,
"command-palette:Open command palette": false,
"switcher:Open quick switcher": false,
"obsidian-git:Open Git source control": false,
"obsidian-full-calendar:Open Full Calendar": false,
"omnisearch:Omnisearch": false,
"mermaid-tools:Open Mermaid Toolbar": false
}
},
"active": "d83bb0bbeeb86eec",
"lastOpenFiles": [
"Software Project with Agile Techinques/Assignment/lu12412ehlt.tmp",
"Data Structures/Past-Exam-Qestions.odt",
"Data Structures/lu12412ehlq.tmp",
"Data Structures/Week 7/Week 7.md",
"Penetration Testing/Week 7/Lecture 7 - Vulnerability Scanning.md",
"Penetration Testing/Week 7",
"Software Project with Agile Techinques/Assignment/Assignment 1.odt",
"Software Project with Agile Techinques/Assignment/lu12412ehh9.tmp",
"Penetration Testing/Week 6/Workshop 6.md",
"Data Structures/Week 7",
"Penetration Testing/Week 6/dns-exfil-infil/securecorp.txt",
"Penetration Testing/Week 6/dns-exfil-infil/requirements.txt",
"Penetration Testing/Week 6/dns-exfil-infil/packetySimple.py",
"Penetration Testing/Week 6/dns-exfil-infil/packetyGrabber.py",
"Penetration Testing/Week 6/dns-exfil-infil/README.md",
"Penetration Testing/Week 6/dns-exfil-infil/dns-exfil-infil/README.md",
"Pasted image 20241025143543.png",
"Pasted image 20241025141715.png",
"Pasted image 20241025141348.png",
"Software Project with Agile Techinques/Assignment/Assignment 1.md",
"AI & Data Mining/Week 6/Lecture 12 - Decision Trees (ID3).md",
"Pasted image 20241025132339.png",
"AI & Data Mining/Week 6/Lecture 11 - ID3.md",
"Pasted image 20241024132906.png",
"Pasted image 20241024132411.png",
"Client Server Systems/PHPStorm Repo/workshop6/images/new_uos_logo.jpg",
"Client Server Systems/PHPStorm Repo/workshop6/fonts/glyphicons-halflings-regular.svg",
"Penetration Testing/Week 6/Lecture 6 - Threat Modelling.md",
"Pasted image 20241024094143.png",
"Pasted image 20241024094123.png",
"AI & Data Mining/Week 5/Tutorial 9 - PRISM.md",
"AI & Data Mining/Week 5/Lecture 9 - PRISM.md",
"AI & Data Mining/Week 4/Workshop 4 - Nearest Neighbor.md",
"Networking and Security/Week 4/Workshop 4 - Routing.md",
"Penetration Testing/Week 4/Workshop 4 - Google Dorking.md",
"Penetration Testing/Week 4/Week 4 - Pre-Engagement.md",
"Penetration Testing/Week 3/Lecture 3 - Blue Team.md",
"Penetration Testing/Week 5/Lecture 5 - Reconnaisance.md",
"Data Structures/Week 5/Lecture 9 - Stacks.md",
"Client Server Systems/PHPStorm Repo/README.md",
"PHPStorm/README.md",
"Software Project with Agile Techinques/Week 3/Study Skills - Class Diagrams.md",
"README.md",
"AI & Data Mining/Week 4/Tutorial 4 - Nearest Neighbor.md",
"AI & Data Mining/Week 4/Lecture 7 - Nearest Neighbor.md",
"Penetration Testing/Week 3/Workshop 3 - netcat.md",
"Database Systems/Untitled.canvas",
"Untitled 1.canvas",
"Untitled.canvas"
]
}