From d40d0e6145e15edae7dd6b3a8432c7ada88087fe Mon Sep 17 00:00:00 2001 From: camperbot Date: Mon, 15 May 2023 19:36:59 +0530 Subject: [PATCH] chore(i18n,learn): processed translations (#50391) --- .../data-cleaning-and-visualizations.md | 4 +- .../loading-data-and-advanced-indexing.md | 2 +- .../port-scanner.md | 4 +- .../sha-1-password-cracker.md | 14 ++--- .../stock-price-checker.md | 2 +- ...ur-site-via-https-only-with-helmet.hsts.md | 2 +- ...lmet-using-the-parent-helmet-middleware.md | 6 +-- ...client-side-caching-with-helmet.nocache.md | 4 +- ...fetching-with-helmet.dnsprefetchcontrol.md | 6 +-- ...ash-and-compare-passwords-synchronously.md | 4 +- ...-information-using-helmet.hidepoweredby.md | 4 +- .../install-and-require-helmet.md | 2 +- ...-of-clickjacking-with-helmet.frameguard.md | 4 +- ...pting-xss-attacks-with-helmet.xssfilter.md | 8 +-- ...ing-untrusted-html-with-helmet.ienoopen.md | 2 +- ...olicy-with-helmet.contentsecuritypolicy.md | 10 ++-- .../understand-bcrypt-hashes.md | 6 +-- .../introduction-and-setup.md | 2 +- .../data-structures/create-a-queue-class.md | 6 +-- ...ete-a-leaf-node-in-a-binary-search-tree.md | 2 +- .../data-structures/invert-a-binary-tree.md | 2 +- ...erform-a-difference-on-two-sets-of-data.md | 2 +- ...form-a-subset-check-on-two-sets-of-data.md | 8 +-- ...orm-an-intersection-on-two-sets-of-data.md | 2 +- .../data-structures/typed-arrays.md | 4 +- .../use-.has-and-.size-on-an-es6-set.md | 2 +- ...pread-and-notes-for-es5-set-integration.md | 2 +- .../rosetta-code/24-game.md | 4 +- .../9-billion-names-of-god-the-integer.md | 2 +- .../rosetta-code/abc-problem.md | 16 +++--- ...ient-and-perfect-number-classifications.md | 8 +-- .../rosetta-code/accumulator-factory.md | 6 +-- .../rosetta-code/ackermann-function.md | 10 ++-- .../rosetta-code/align-columns.md | 2 +- .../rosetta-code/amicable-pairs.md | 12 ++--- .../rosetta-code/averages-mode.md | 2 +- .../averages-pythagorean-means.md | 2 +- .../rosetta-code/averages-root-mean-square.md | 4 +- .../rosetta-code/babbage-problem.md | 2 +- .../rosetta-code/balanced-brackets.md | 40 +++++++------- ...cles-of-given-radius-through-two-points.md | 14 ++--- .../rosetta-code/closest-pair-problem.md | 4 +- .../rosetta-code/combinations.md | 10 ++-- .../rosetta-code/comma-quibbling.md | 12 ++--- .../rosetta-code/compare-a-list-of-strings.md | 26 +++++----- .../convert-seconds-to-compound-duration.md | 8 +-- .../count-occurrences-of-a-substring.md | 8 +-- .../rosetta-code/count-the-coins.md | 8 +-- .../rosetta-code/cramers-rule.md | 6 +-- .../cumulative-standard-deviation.md | 14 ++--- .../rosetta-code/cusip.md | 22 ++++---- .../rosetta-code/cut-a-rectangle.md | 14 ++--- .../rosetta-code/date-format.md | 4 +- .../rosetta-code/date-manipulation.md | 14 ++--- .../rosetta-code/day-of-the-week.md | 8 +-- .../rosetta-code/deal-cards-for-freecell.md | 10 ++-- .../rosetta-code/deepcopy.md | 4 +- .../define-a-primitive-data-type.md | 6 +-- .../rosetta-code/department-numbers.md | 2 +- .../rosetta-code/discordian-date.md | 16 +++--- .../rosetta-code/dot-product.md | 14 ++--- .../rosetta-code/element-wise-operations.md | 16 +++--- .../rosetta-code/emirp-primes.md | 10 ++-- .../rosetta-code/entropy.md | 14 ++--- .../rosetta-code/equilibrium-index.md | 14 ++--- .../rosetta-code/ethiopian-multiplication.md | 16 +++--- .../rosetta-code/euler-method.md | 14 ++--- .../evaluate-binomial-coefficients.md | 12 ++--- .../execute-a-markov-algorithm.md | 14 ++--- .../extensible-prime-generator.md | 10 ++-- .../rosetta-code/factorial.md | 12 ++--- .../factors-of-a-mersenne-number.md | 10 ++-- .../rosetta-code/factors-of-an-integer.md | 8 +-- .../rosetta-code/farey-sequence.md | 12 ++--- .../fibonacci-n-step-number-sequences.md | 16 +++--- .../rosetta-code/fibonacci-sequence.md | 4 +- .../rosetta-code/fibonacci-word.md | 8 +-- .../rosetta-code/fizzbuzz.md | 6 +-- .../rosetta-code/fractran.md | 12 ++--- .../rosetta-code/gamma-function.md | 18 +++---- .../rosetta-code/gaussian-elimination.md | 14 ++--- .../rosetta-code/general-fizzbuzz.md | 22 ++++---- .../generate-lower-case-ascii-alphabet.md | 16 +++--- .../rosetta-code/generator-exponential.md | 14 ++--- .../rosetta-code/gray-code.md | 20 +++---- .../rosetta-code/greatest-common-divisor.md | 16 +++--- .../greatest-subsequential-sum.md | 16 +++--- .../rosetta-code/hailstone-sequence.md | 10 ++-- .../rosetta-code/happy-numbers.md | 26 +++++----- .../rosetta-code/harshad-or-niven-series.md | 8 +-- .../rosetta-code/hash-from-two-arrays.md | 16 +++--- .../rosetta-code/hash-join.md | 8 +-- .../rosetta-code/heronian-triangles.md | 10 ++-- .../hofstadter-figure-figure-sequences.md | 24 ++++----- .../rosetta-code/hofstadter-q-sequence.md | 12 ++--- .../rosetta-code/i-before-e-except-after-c.md | 20 +++---- .../rosetta-code/iban.md | 14 ++--- .../rosetta-code/identity-matrix.md | 10 ++-- .../rosetta-code/iterated-digits-squaring.md | 16 +++--- .../rosetta-code/jaro-distance.md | 16 +++--- .../rosetta-code/jortsort.md | 16 +++--- .../rosetta-code/josephus-problem.md | 14 ++--- .../rosetta-code/k-d-tree.md | 16 +++--- .../rosetta-code/kaprekar-numbers.md | 18 +++---- .../rosetta-code/knapsack-problem-0-1.md | 12 ++--- .../rosetta-code/knapsack-problem-bounded.md | 10 ++-- .../knapsack-problem-continuous.md | 12 ++--- .../knapsack-problem-unbounded.md | 10 ++-- .../rosetta-code/knights-tour.md | 14 ++--- .../largest-int-from-concatenated-ints.md | 14 ++--- .../rosetta-code/last-friday-of-each-month.md | 20 +++---- .../rosetta-code/last-letter-first-letter.md | 14 ++--- .../rosetta-code/leap-year.md | 16 +++--- .../rosetta-code/least-common-multiple.md | 14 ++--- .../rosetta-code/left-factorials.md | 18 +++---- .../rosetta-code/letter-frequency.md | 16 +++--- .../rosetta-code/levenshtein-distance.md | 18 +++---- .../linear-congruential-generator.md | 14 ++--- .../rosetta-code/long-multiplication.md | 14 ++--- .../longest-common-subsequence.md | 14 ++--- .../longest-increasing-subsequence.md | 16 +++--- .../rosetta-code/longest-string-challenge.md | 14 ++--- .../rosetta-code/look-and-say-sequence.md | 18 +++---- ...oop-over-multiple-arrays-simultaneously.md | 16 +++--- .../rosetta-code/lu-decomposition.md | 16 +++--- .../rosetta-code/lucas-lehmer-test.md | 16 +++--- .../rosetta-code/ludic-numbers.md | 16 +++--- .../luhn-test-of-credit-card-numbers.md | 18 +++---- .../rosetta-code/lychrel-numbers.md | 16 +++--- .../rosetta-code/lzw-compression.md | 18 +++---- .../rosetta-code/s-expressions.md | 6 +-- .../sailors-coconuts-and-a-monkey-problem.md | 8 +-- .../rosetta-code/search-a-list-of-records.md | 14 ++--- .../rosetta-code/sedols.md | 10 ++-- .../rosetta-code/self-describing-numbers.md | 10 ++-- .../rosetta-code/self-referential-sequence.md | 14 ++--- .../rosetta-code/semiprime.md | 24 ++++----- .../rosetta-code/set-consolidation.md | 26 +++++----- .../rosetta-code/set-of-real-numbers.md | 26 +++++----- .../rosetta-code/sha-1.md | 14 ++--- .../rosetta-code/sha-256.md | 14 ++--- .../sort-an-array-of-composite-structures.md | 10 ++-- .../rosetta-code/sort-disjoint-sublist.md | 14 ++--- .../rosetta-code/sort-stability.md | 14 ++--- .../sort-using-a-custom-comparator.md | 14 ++--- .../sorting-algorithms-bead-sort.md | 12 ++--- .../sorting-algorithms-bogosort.md | 14 ++--- .../sorting-algorithms-cocktail-sort.md | 14 ++--- .../sorting-algorithms-comb-sort.md | 12 ++--- .../sorting-algorithms-gnome-sort.md | 14 ++--- .../sorting-algorithms-pancake-sort.md | 16 +++--- .../sorting-algorithms-permutation-sort.md | 14 ++--- .../sorting-algorithms-shell-sort.md | 14 ++--- .../sorting-algorithms-stooge-sort.md | 14 ++--- .../sorting-algorithms-strand-sort.md | 14 ++--- .../rosetta-code/soundex.md | 28 +++++----- .../rosetta-code/spiral-matrix.md | 10 ++-- ...ter-string-based-on-change-of-character.md | 14 ++--- .../rosetta-code/state-name-puzzle.md | 10 ++-- .../rosetta-code/stern-brocot-sequence.md | 14 ++--- .../rosetta-code/straddling-checkerboard.md | 20 +++---- .../rosetta-code/stream-merge.md | 14 ++--- ...s-and-extended-characters-from-a-string.md | 14 ++--- .../rosetta-code/subleq.md | 6 +-- .../rosetta-code/sudoku.md | 10 ++-- .../rosetta-code/sum-digits-of-an-integer.md | 16 +++--- .../rosetta-code/sum-multiples-of-3-and-5.md | 14 ++--- .../rosetta-code/sum-of-a-series.md | 14 ++--- .../rosetta-code/sum-of-squares.md | 14 ++--- .../rosetta-code/sum-to-100.md | 16 +++--- .../sutherland-hodgman-polygon-clipping.md | 10 ++-- .../rosetta-code/symmetric-difference.md | 16 +++--- .../rosetta-code/taxicab-numbers.md | 10 ++-- .../tokenize-a-string-with-escaping.md | 8 +-- .../rosetta-code/top-rank-per-group.md | 4 +- .../rosetta-code/topological-sort.md | 12 ++--- .../rosetta-code/towers-of-hanoi.md | 4 +- .../rosetta-code/vector-cross-product.md | 6 +-- .../rosetta-code/vector-dot-product.md | 16 +++--- .../rosetta-code/word-frequency.md | 16 +++--- .../rosetta-code/word-wrap.md | 8 +-- .../rosetta-code/y-combinator.md | 12 ++--- .../zeckendorf-number-representation.md | 46 ++++++++-------- .../zhang-suen-thinning-algorithm.md | 10 ++-- .../build-a-tic-tac-toe-game.md | 2 +- .../chart-the-stock-market.md | 2 +- .../p2p-video-chat-application.md | 2 +- .../deep-learning-demystified.md | 2 +- .../book-recommendation-engine-using-knn.md | 4 +- .../cat-and-dog-image-classifier.md | 18 +++---- .../tensorflow/core-learning-algorithms.md | 4 +- .../tensorflow/introduction-to-tensorflow.md | 2 +- ...processing-with-rnns-building-the-model.md | 2 +- .../exponents-and-logarithms.md | 2 +- .../ratios-and-proportions-extra.md | 2 +- .../jquery/remove-an-element-using-jquery.md | 2 +- .../problem-244-sliders.md | 16 +++--- .../problem-245-coresilience.md | 16 +++--- .../problem-246-tangents-to-an-ellipse.md | 26 +++++----- .../problem-247-squares-under-a-hyperbola.md | 24 ++++----- ...which-eulers-totient-function-equals-13.md | 8 +-- .../problem-249-prime-subset-sums.md | 10 ++-- .../problem-250-250250.md | 6 +-- .../problem-251-cardano-triplets.md | 12 ++--- .../problem-252-convex-holes.md | 14 ++--- .../problem-253-tidying-up.md | 52 +++++++++---------- .../problem-254-sums-of-digit-factorials.md | 16 +++--- .../problem-255-rounded-square-roots.md | 30 +++++------ .../problem-256-tatami-free-rooms.md | 24 ++++----- .../problem-257-angular-bisectors.md | 14 ++--- ...problem-258-a-lagged-fibonacci-sequence.md | 12 ++--- .../problem-259-reachable-numbers.md | 22 ++++---- .../problem-260-stone-game.md | 30 +++++------ .../problem-261-pivotal-square-sums.md | 10 ++-- .../problem-262-mountain-range.md | 16 +++--- ...roblem-263-an-engineers-dream-come-true.md | 24 ++++----- .../problem-264-triangle-centres.md | 22 ++++---- .../problem-265-binary-circles.md | 18 +++---- .../problem-266-pseudo-square-root.md | 14 ++--- .../problem-267-billionaire.md | 16 +++--- ...ur-distinct-prime-factors-less-than-100.md | 8 +-- ...ynomials-with-at-least-one-integer-root.md | 24 ++++----- .../problem-270-cutting-squares.md | 18 +++---- .../problem-271-modular-cubes-part-1.md | 10 ++-- .../problem-272-modular-cubes-part-2.md | 10 ++-- .../problem-273-sum-of-squares.md | 16 +++--- .../problem-274-divisibility-multipliers.md | 20 +++---- .../problem-275-balanced-sculptures.md | 22 ++++---- .../problem-276-primitive-triangles.md | 10 ++-- ...problem-277-a-modified-collatz-sequence.md | 24 ++++----- ...m-278-linear-combinations-of-semiprimes.md | 12 ++--- ...th-integral-sides-and-an-integral-angle.md | 6 +-- .../problem-280-ant-and-seeds.md | 10 ++-- .../problem-281-pizza-toppings.md | 14 ++--- .../problem-282-the-ackermann-function.md | 10 ++-- ...h-the-area--perimeter-ratio-is-integral.md | 14 ++--- .../problem-284-steady-squares.md | 14 ++--- .../problem-285-pythagorean-odds.md | 14 ++--- .../problem-286-scoring-probabilities.md | 10 ++-- ...encoding-a-simple-compression-algorithm.md | 34 ++++++------ .../problem-288-an-enormous-factorial.md | 14 ++--- .../problem-289-eulerian-cycles.md | 18 +++---- .../problem-290-digital-signature.md | 6 +-- .../problem-291-panaitopol-primes.md | 8 +-- .../problem-292-pythagorean-polygons.md | 22 ++++---- .../problem-293-pseudo-fortunate-numbers.md | 14 ++--- .../jquery/remove-an-element-using-jquery.md | 2 +- .../6406bb32f9ed593f26c33b2b.md | 8 +-- .../6407b940b8983005578d0824.md | 12 ++--- .../6407c303b4272606c019f338.md | 16 +++--- .../6407c6a2c2159309994779a5.md | 6 +-- .../6410f149110ec60fd40fcfe1.md | 12 ++--- .../6410f97a721cd1144804b7a8.md | 12 ++--- .../64110377201e7b1a0de0d558.md | 6 +-- .../64110998bc00321fd8052ab5.md | 12 ++--- .../64110a03f6a450209b01f45c.md | 2 +- .../css-foundations-exercise-d.md | 22 ++++---- 257 files changed, 1589 insertions(+), 1589 deletions(-) diff --git a/curriculum/challenges/german/08-data-analysis-with-python/data-analysis-with-python-course/data-cleaning-and-visualizations.md b/curriculum/challenges/german/08-data-analysis-with-python/data-analysis-with-python-course/data-cleaning-and-visualizations.md index 6e0ec2cef1a..b7f2328453e 100644 --- a/curriculum/challenges/german/08-data-analysis-with-python/data-analysis-with-python-course/data-cleaning-and-visualizations.md +++ b/curriculum/challenges/german/08-data-analysis-with-python/data-analysis-with-python-course/data-cleaning-and-visualizations.md @@ -31,7 +31,7 @@ plt.subplot(1, 2, 1) ## --answers-- -My figure will have one column, two rows, and I am going to start drawing in the first (left) plot. +Meine Abbildung wird eine Spalte und zwei Zeilen haben, und ich beginne in dem ersten ("linken") Plot zu zeichnen. --- @@ -39,7 +39,7 @@ I am going to start drawing in the first (left) plot, my figure will have two ro --- -My figure will have one row, two columns, and I am going to start drawing in the first (left) plot. +Meine Abbildung wird eine Spalte und zwei Zeilen haben, und ich beginne in dem ersten ("linken") Plot zu zeichnen. ## --video-solution-- diff --git a/curriculum/challenges/german/08-data-analysis-with-python/numpy/loading-data-and-advanced-indexing.md b/curriculum/challenges/german/08-data-analysis-with-python/numpy/loading-data-and-advanced-indexing.md index 5eb265a61fe..f8a2e93dc14 100644 --- a/curriculum/challenges/german/08-data-analysis-with-python/numpy/loading-data-and-advanced-indexing.md +++ b/curriculum/challenges/german/08-data-analysis-with-python/numpy/loading-data-and-advanced-indexing.md @@ -14,7 +14,7 @@ dashedName: loading-data-and-advanced-indexing ## --text-- -Given a file named `data.txt` with these contents: +Gegeben ist eine Datei namens `data.txt` mit folgenden Inhalten:
 29,97,32,100,45
diff --git a/curriculum/challenges/german/09-information-security/information-security-projects/port-scanner.md b/curriculum/challenges/german/09-information-security/information-security-projects/port-scanner.md
index b3650398359..c1ea791aa90 100644
--- a/curriculum/challenges/german/09-information-security/information-security-projects/port-scanner.md
+++ b/curriculum/challenges/german/09-information-security/information-security-projects/port-scanner.md
@@ -16,7 +16,7 @@ Du wirst Videokurs: Python für jedermann (14 Stunden)
 
@@ -79,7 +79,7 @@ Schreibe deinen Code in `port_scanner.py`. Für die Entwicklung kannst du `main.
 
 ## Testen
 
-The unit tests for this project are in `test_module.py`. We imported the tests from `test_module.py` to `main.py` for your convenience. The tests will run automatically whenever you hit the "run" button.
+The unit tests for this project are in `test_module.py`. We imported the tests from `test_module.py` to `main.py` for your convenience. Die Tests werden automatisch ausgeführt, wenn du auf den "Run"-Button klickst.
 
 ## Submitting
 
diff --git a/curriculum/challenges/german/09-information-security/information-security-projects/sha-1-password-cracker.md b/curriculum/challenges/german/09-information-security/information-security-projects/sha-1-password-cracker.md
index 49108553bda..304ddc2ac47 100644
--- a/curriculum/challenges/german/09-information-security/information-security-projects/sha-1-password-cracker.md
+++ b/curriculum/challenges/german/09-information-security/information-security-projects/sha-1-password-cracker.md
@@ -16,7 +16,7 @@ Du wirst Python for Everybody Video Course (14 hours)
 
@@ -28,17 +28,17 @@ Wir sind noch dabei, den interaktiven Teil des Python-Kurses zu entwickeln. For
 
 Passwords should never be stored in plain text. They should be stored as hashes, just in case the password list is discovered. Allerdings werden nicht alle Hashwerte gleich erstellt.
 
-For this project you will learn about the importance of good security by creating a password cracker to figure out passwords that were hashed using SHA-1.
+In diesem Projekt lernst du die Bedeutung guter Sicherheit kennen, indem du einen Passwort-Cracker erstellst, um Passwörter herauszufinden, die mit SHA-1 gehasht wurden.
 
-Create a function that takes in a SHA-1 hash of a password and returns the password if it is one of the top 10,000 passwords used. If the SHA-1 hash is NOT of a password in the database, return "PASSWORD NOT IN DATABASE".
+Create a function that takes in a SHA-1 hash of a password and returns the password if it is one of the top 10,000 passwords used. Wenn der SHA-1 Hash NICHT von einem Passwort in der Datenbank ist, gib "PASSWORT NICHT IN DATABASE" zurück.
 
-The function should hash each password from `top-10000-passwords.txt` and compare it to the hash passed into the function.
+Die Funktion sollte jedes Passwort mit `top-10000-passwords.txt` hashen und mit dem Hashwert vergleichen, der in die Funktion übergeben wurde.
 
-The function should take an optional second argument named `use_salts`. If set to true, each salt string from the file `known-salts.txt` should be appended AND prepended to each password from `top-10000-passwords.txt` before hashing and before comparing it to the hash passed into the function.
+Die Funktion sollte ein optionales zweites Argument mit dem Namen `use_salts` verwenden. If set to true, each salt string from the file `known-salts.txt` should be appended AND prepended to each password from `top-10000-passwords.txt` before hashing and before comparing it to the hash passed into the function.
 
 Hier sind ein paar gehashte Passwörter, mit denen die Funktion getestet werden kann:
 
-- `b305921a3723cd5d70a375cd21a61e60aabb84ec` should return "sammy123"
+- `b305921a3723cd5d70a375cd21a61e60aabb84ec` sollte "sammy123" zurückgeben
 - `c7ab388a5ebefbf4d550652f1eb4d833e5316e3e` should return "abacab"
 - `5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8` sollte "Passwort" zurückgeben
 
@@ -48,7 +48,7 @@ Hier sind einige gehashte Passwörter, mit denen die Funktion getestet werden so
 - `da5a4e8cf89539e66097acd2f8af128acae2f8ae` should return "q1w2e3r4t5"
 - `ea3f62d498e3b98557f9f9cd0d905028b3b019e1` sollte "bubbles1" zurückgeben
 
-The `hashlib` library has been imported for you. You should consider using it in your code. Learn more about "hashlib" here.
+Die `hashlib`-Bibliothek wurde für dich importiert. You should consider using it in your code. Erfahre hier mehr über "hashlib" .
 
 ## Entwicklung
 
diff --git a/curriculum/challenges/german/09-information-security/information-security-projects/stock-price-checker.md b/curriculum/challenges/german/09-information-security/information-security-projects/stock-price-checker.md
index 32f644a0b92..7d2b57e2a95 100644
--- a/curriculum/challenges/german/09-information-security/information-security-projects/stock-price-checker.md
+++ b/curriculum/challenges/german/09-information-security/information-security-projects/stock-price-checker.md
@@ -82,7 +82,7 @@ async (getUserInput) => {
 };
 ```
 
-The `stockData` property includes the `stock` symbol as a string, the `price` as a number, and `likes` as a number.
+Die `stockData`-Eigenschaft enthält das `stock`-Symbol als ein String, den `price` als eine Zahl und `likes` als eine Zahl.
 
 ```js
 async (getUserInput) => {
diff --git a/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/ask-browsers-to-access-your-site-via-https-only-with-helmet.hsts.md b/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/ask-browsers-to-access-your-site-via-https-only-with-helmet.hsts.md
index 46eb845e16e..e424ab698a9 100644
--- a/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/ask-browsers-to-access-your-site-via-https-only-with-helmet.hsts.md
+++ b/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/ask-browsers-to-access-your-site-via-https-only-with-helmet.hsts.md
@@ -14,7 +14,7 @@ HTTP Strict Transport Security (HSTS) ist eine Web-Sicherheitsrichtlinie, die da
 
 # --instructions--
 
-Konfiguriere `helmet.hsts()`, um HTTPS für die nächsten 90 Tage zu verwenden. Übergib das Konfigurations-Objekt `{maxAge: timeInSeconds, force: true}`. You can create a variable `ninetyDaysInSeconds = 90*24*60*60;` to use for the `timeInSeconds`. Replit hat bereits Hsts aktiviert. Um seine Einstellungen zu überschreiben, musst du das Feld "force" auf true im Konfigurations-Objekt setzen. We will intercept and restore the Replit header, after inspecting it for testing.
+Konfiguriere `helmet.hsts()`, um HTTPS für die nächsten 90 Tage zu verwenden. Übergib das Konfigurations-Objekt `{maxAge: timeInSeconds, force: true}`. You can create a variable `ninetyDaysInSeconds = 90*24*60*60;` to use for the `timeInSeconds`. Replit hat bereits Hsts aktiviert. Um seine Einstellungen zu überschreiben, musst du das Feld "force" auf true im Konfigurations-Objekt setzen. Wir werden den Replit-Header abfangen und wiederherstellen, nachdem wir ihn zu Testzwecken genauer überprüft haben.
 
 Hinweis: Die Konfiguration von HTTPS auf einer benutzerdefinierten Website erfordert den Erwerb einer Domain und eines SSL/TLS-Zertifikats.
 
diff --git a/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/configure-helmet-using-the-parent-helmet-middleware.md b/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/configure-helmet-using-the-parent-helmet-middleware.md
index ebcf0d8e0aa..69b22168223 100644
--- a/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/configure-helmet-using-the-parent-helmet-middleware.md
+++ b/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/configure-helmet-using-the-parent-helmet-middleware.md
@@ -1,6 +1,6 @@
 ---
 id: 587d8249367417b2b2512c40
-title: Configure Helmet Using the ‘parent’ helmet() Middleware
+title: Konfigurieren von Helmet unter Verwendung der 'parent' helmet()-Middleware
 challengeType: 2
 forumTopicId: 301575
 dashedName: configure-helmet-using-the-parent-helmet-middleware
@@ -10,9 +10,9 @@ dashedName: configure-helmet-using-the-parent-helmet-middleware
 
 As a reminder, this project is being built upon the following starter project on Replit, or cloned from GitHub.
 
-`app.use(helmet())` will automatically include all the middleware introduced above, except `noCache()`, and `contentSecurityPolicy()`, but these can be enabled if necessary. Du kannst auch jede andere Middleware einzeln deaktivieren oder konfigurieren, indem du ein Konfigurationsobjekt verwendest.
+`app.use(helmet())` enthält automatisch alle oben eingeführten Middlewares, außer `noCache()`, und `contentSecurityPolicy()`, aber diese können bei Bedarf aktiviert werden. Du kannst auch jede andere Middleware einzeln deaktivieren oder konfigurieren, indem du ein Konfigurationsobjekt verwendest.
 
-**Example:**
+**Beispiel:**
 
 ```js
 app.use(helmet({
diff --git a/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/disable-client-side-caching-with-helmet.nocache.md b/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/disable-client-side-caching-with-helmet.nocache.md
index e41d8a3d310..fc4dbf3fe89 100644
--- a/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/disable-client-side-caching-with-helmet.nocache.md
+++ b/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/disable-client-side-caching-with-helmet.nocache.md
@@ -1,6 +1,6 @@
 ---
 id: 587d8249367417b2b2512c3e
-title: Disable Client-Side Caching with helmet.noCache()
+title: Client-Side Caching mit helmet.noCache() deaktivieren
 challengeType: 2
 forumTopicId: 301576
 dashedName: disable-client-side-caching-with-helmet-nocache
@@ -10,7 +10,7 @@ dashedName: disable-client-side-caching-with-helmet-nocache
 
 As a reminder, this project is being built upon the following starter project on Replit, or cloned from GitHub.
 
-If you are releasing an update for your website, and you want the users to always download the newer version, you can (try to) disable caching on client’s browser. It can be useful in development too. Caching has performance benefits, which you will lose, so only use this option when there is a real need.
+Wenn du ein Update für deine Website herausgibst und du möchtest, dass die Nutzer immer die neuere Version herunterladen, kannst du das Caching im Browser des Kunden deaktivieren (oder es versuchen). Es kann auch für die Entwicklung nützlich sein. Die Zwischenspeicherung hat Leistungsvorteile, die du verlieren wirst, daher solltest du diese Option nur nutzen, wenn es wirklich notwendig ist.
 
 # --instructions--
 
diff --git a/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/disable-dns-prefetching-with-helmet.dnsprefetchcontrol.md b/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/disable-dns-prefetching-with-helmet.dnsprefetchcontrol.md
index 10e742b96a1..e259b178727 100644
--- a/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/disable-dns-prefetching-with-helmet.dnsprefetchcontrol.md
+++ b/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/disable-dns-prefetching-with-helmet.dnsprefetchcontrol.md
@@ -1,6 +1,6 @@
 ---
 id: 587d8248367417b2b2512c3d
-title: Disable DNS Prefetching with helmet.dnsPrefetchControl()
+title: DNS Prefetching mit helmet.dnsPrefetchControl() deaktivieren
 challengeType: 2
 forumTopicId: 301577
 dashedName: disable-dns-prefetching-with-helmet-dnsprefetchcontrol
@@ -8,9 +8,9 @@ dashedName: disable-dns-prefetching-with-helmet-dnsprefetchcontrol
 
 # --description--
 
-As a reminder, this project is being built upon the following starter project on Replit, or cloned from GitHub.
+Zur Erinnerung: Dieses Projekt baut auf dem folgenden Starterprojekt auf: Replit oder geklont von GitHub.
 
-To improve performance, most browsers prefetch DNS records for the links in a page. Auf diese Weise ist die Ziel-IP bereits bekannt, wenn der Nutzer auf einen Link klickt. This may lead to over-use of the DNS service (if you own a big website, visited by millions people…), privacy issues (one eavesdropper could infer that you are on a certain page), or page statistics alteration (some links may appear visited even if they are not). Wenn du ein hohes Sicherheitsbedürfnis hast, kannst du das DNS-Prefetching deaktivieren, was allerdings mit Leistungseinbußen verbunden ist.
+Um die Leistung zu verbessern, rufen die meisten Browser DNS-Einträge für die Links auf einer Seite vorab ab. Auf diese Weise ist die Ziel-IP bereits bekannt, wenn der Nutzer auf einen Link klickt. This may lead to over-use of the DNS service (if you own a big website, visited by millions people…), privacy issues (one eavesdropper could infer that you are on a certain page), or page statistics alteration (some links may appear visited even if they are not). Wenn du ein hohes Sicherheitsbedürfnis hast, kannst du das DNS-Prefetching deaktivieren, was allerdings mit Leistungseinbußen verbunden ist.
 
 # --instructions--
 
diff --git a/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/hash-and-compare-passwords-synchronously.md b/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/hash-and-compare-passwords-synchronously.md
index 4bea45b0c6b..a6d3441ded0 100644
--- a/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/hash-and-compare-passwords-synchronously.md
+++ b/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/hash-and-compare-passwords-synchronously.md
@@ -26,13 +26,13 @@ with the result being a boolean true or false.
 
 # --instructions--
 
-Add the function in and log the result to the console to see it working.
+Füge die Funktion ein und protokolliere das Ergebnis in der Konsole, um zu sehen, ob sie funktioniert.
 
 Reiche deine Seite ein, wenn du davon ausgehst, alles richtig gemacht zu haben.
 
 # --hints--
 
-Sync hash should be generated and correctly compared.
+Der Sync-Hash sollte generiert und korrekt verglichen werden.
 
 ```js
 (getUserInput) =>
diff --git a/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/hide-potentially-dangerous-information-using-helmet.hidepoweredby.md b/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/hide-potentially-dangerous-information-using-helmet.hidepoweredby.md
index c1cd789591e..52096df3037 100644
--- a/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/hide-potentially-dangerous-information-using-helmet.hidepoweredby.md
+++ b/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/hide-potentially-dangerous-information-using-helmet.hidepoweredby.md
@@ -1,6 +1,6 @@
 ---
 id: 587d8247367417b2b2512c37
-title: Hide Potentially Dangerous Information Using helmet.hidePoweredBy()
+title: Ausblenden potenziell gefährlicher Informationen mit helmet.hidePoweredBy()
 challengeType: 2
 forumTopicId: 301580
 dashedName: hide-potentially-dangerous-information-using-helmet-hidepoweredby
@@ -10,7 +10,7 @@ dashedName: hide-potentially-dangerous-information-using-helmet-hidepoweredby
 
 As a reminder, this project is being built upon the following starter project on Replit, or cloned from GitHub.
 
-Hackers can exploit known vulnerabilities in Express/Node if they see that your site is powered by Express. `X-Powered-By: Express` is sent in every request coming from Express by default. Use the `helmet.hidePoweredBy()` middleware to remove the X-Powered-By header.
+Hacker können bekannte Schwachstellen in Express/Node ausnutzen, wenn sie sehen, dass deine Website von Express betrieben wird. `X-Powered-By: Express` wird standardmäßig in jeder Anfrage von Express gesendet. Verwende die `helmet.hidePoweredBy()`-Middleware, um den X-Powered-By-Header zu entfernen.
 
 # --hints--
 
diff --git a/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/install-and-require-helmet.md b/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/install-and-require-helmet.md
index ac65357fc95..effb62f9213 100644
--- a/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/install-and-require-helmet.md
+++ b/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/install-and-require-helmet.md
@@ -22,7 +22,7 @@ If you use Replit, follow these steps to set up the project:
 
 When you are done, make sure a working demo of your project is hosted somewhere public. Then submit the URL to it in the Solution Link field.
 
-Helmet helps you secure your Express apps by setting various HTTP headers.
+Helmet hilft dir, deine Express-Anwendungen durch die Einstellung verschiedener HTTP-Header zu sichern.
 
 # --instructions--
 
diff --git a/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/mitigate-the-risk-of-clickjacking-with-helmet.frameguard.md b/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/mitigate-the-risk-of-clickjacking-with-helmet.frameguard.md
index 2c6db890147..22f1f943a89 100644
--- a/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/mitigate-the-risk-of-clickjacking-with-helmet.frameguard.md
+++ b/curriculum/challenges/german/09-information-security/information-security-with-helmetjs/mitigate-the-risk-of-clickjacking-with-helmet.frameguard.md
@@ -1,6 +1,6 @@
 ---
 id: 587d8247367417b2b2512c38
-title: Mitigate the Risk of Clickjacking with helmet.frameguard()
+title: Minimiere das Risiko von Clickjacking mit helmet.frameguard()
 challengeType: 2
 forumTopicId: 301582
 dashedName: mitigate-the-risk-of-clickjacking-with-helmet-frameguard
@@ -10,7 +10,7 @@ dashedName: mitigate-the-risk-of-clickjacking-with-helmet-frameguard
 
 As a reminder, this project is being built upon the following starter project on Replit, or cloned from GitHub.
 
-Deine Seite könnte ohne deine Zustimmung in ein `` oder `