Skip to main content

怎样能成富翁(1)--ZT

通向财富的道路有千万条,但条条道路都惊人地相似。而且令人诧异的是,拼命积累财富的男人也惊人地相似,他们在心理特征上就像是同一个模子压出来的一样。    

百万富翁有诸多特征,绝大多数白手起家的百万富翁都是出身贫穷的人,积累金钱对于那些一贫如洗的人有着不可抗拒的力量。  

这些男人是很有冒险精神的,他们敢于冒那些脚踏实地、像苦工似地挣钱的男人所不敢涉足的风险。他们是精明强干的,他们很有远见卓识;他们的天才在于能知道如何利用别人的主意来赚钱。这是赚钱的真正秘诀———利用别人创造性的思想,并且把它们运用到实际中去。    

这样的男人很容易和别人打成一片。他们很有洞察力,他们会观察别人,知道如何通过与别人打交道来获得他们所需要的东西,也知道别人对他们的反应如何。追求财富的人内心深处有着强烈的孤独感,但他们并不因此而去追求政治上的名望和成就。赚钱是他们绝对全神贯注的追求。这给他们胜于一切的最大满足和快乐。

获取财富“指南”:    

1、让金钱成为你的情人。  
别在性爱上浪费时间和精力,你会发现,从长远来看,赚钱比性爱更让人兴奋,这可不是空头支票。寻求需求,满足需求。追求财富者的最大天分是瞄准时机,预测所需。大众牌小汽车,美国快餐食品都是满足人们需要的例子。  

2、谨防从众心理。  
群众心理弊病多,即使它是正确的,追随它一般也没有什么利润。在一般情况下,摘取经济精华的都是带头人而不是追随者。    

3、当雇主而不是雇员。
那些满足于雇主付给他们高薪的男人并不是真正追求财富的人,他们的目标仅仅是成就感或权力欲。你最好去当老板,即使雇员只有你一个,赚的钱也会比任何一个公司付给你的多。    

4、发展你的支配技巧。
大多数人认为,支配别人,让他们去做你想让他们干的事情非常恶劣。然而,实际情况是,我们时时都在自己没有意识到的情况下支配着别人。    

5、追求财富的人常常是直觉地支配着别人,而且是个行家里手。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...