Skip to main content

《史记 高铁追尾列传》

刘新民 1:49:16 AM

《史记 高铁追尾列传》 辛卯七月,时逢酷暑。二十三日晚,雷电交加。甬温线上,D301之头突撞D3115之尾。瞬时,车坠人亡,男女哀嚎,惨不忍睹。后计之,亡者四十,伤者二百余人。事后,匆埋车头,众疑有蹊跷,复掘之,乃成笑谈。
追尾之缘故,或言天灾,或言人祸,众说纷纭。初疑为雷击之故,复又言调度失误,輒归罪于信号系统。究为何因,尚待调查组之结论。只恐怕官官相护,民众终遭蒙骗。君不见,反贪局自身不清,纪委己身无纪,法官执法犯法,试问:谁人可信?何人可托?
救援之事,实为荒诞,既已停止救人,复又发现女童。赔偿之事,初言17万,又言50万,再言90万。讨价还价,犹若菜贩。网民或骂之,或讽之,或言部长该引咎辞职,或骂铁道部乃腐败鼠窝,理应严惩之。
最可叹国民道德沦丧,有丑女名“凤姐”者,竟为死难者而开怀喜乐。更有奸诈小人,借灾难之机,坑蒙拐骗。
宰相温公,疾病尚未痊愈,第六日踉跄奔赴灾情现场,献花圈,祭亡灵,安抚群众,接待记者。亡者家属或感激,或当宰相之面怒批救人之不力。可怜宰相大人,日益苍老,每遇大事,常废寝忘食,沧桑额头,白发日增,皱纹日深。尽管有菩萨心肠,可惜一人之力,纵有三头六臂,也无法挽救芸芸众生之万般劫难。
党政官员,多如牛毛,数量之多堪称世界之最,只可惜清官廉吏,少而又少,可谓世界之珍奇。每遇灾难事故,皆推诿卸责,常无一人挺身而出,挽救民众之生命,更无一人体恤民生之艰难,其铁石心肠堪比女娲补天之顽石。
君不见,朝野上下,污吏遍布,挥霍民脂民膏,哪管民众死活?污浊官场,汇狼聚匪,争权夺利,丑态百出!拍马逢迎,巧取豪夺,毫无半点廉耻之心,其脸皮之厚堪比西安城墙之拐角,更堪比三峡水库之大坝!
居庙堂之高,上不能为君分忧,下不能造福黎庶百姓,此等无能之辈充斥衙门,庸劣之徒占据公堂,怎能不朝纲松弛,礼崩乐坏?可怜我泱泱华夏,竟被龌龊之流操持把控!
太史公曰:贪官污吏,人人当诛而杀之,方可重正朝纲,以挽救党国之危难,支撑我中华颓倾之大厦。
天行健,君子当自强不息!平民百姓,当以自立自强为第一要务,勿幻想救世主,更勿幻想某党某团、某官某长!一切靠自己,方为幸福之长久根本!

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...