Skip to main content

你必须非常努力,才能看起来毫不费力


有一个很浪漫的故事
有一群人,他们积极自律,每天按计划行事,有条不紊;他们不张扬,把自己当成最卑
微的小草,等待着人生开出花朵的那天。他们早晨5点多起来健身,你在睡觉;7点开始
享受丰盛的早餐,蛋白质维生素淀粉粗纤维样样俱全,为新的一天起了一个好头,当他
们收拾妥当准备开始一整天的工作时,你还在睡觉;他们用上午的高效时间完成了一个
又一个任务,甚至发现的新的商机,发现了有可能给人生带来改观的机遇,当午餐时间
临近,他们伸了伸腰,准备稍作休息,此时你终于起床。他们的午餐不铺张浪费,却营
养全面,他们有选择的进食,因为清楚的知道自己想要的是什么,而你也在起床之后但
觉到了饿意,你早早的洗了把脸,甚至连牙都没刷,打开冰箱,拿出了昨晚跟朋友high
过之后带回来的薯条以及可乐;午睡之后,他们重新积极的投入工作,而你也终于吃饱
喝足,坐在了电脑前。是的,你的一天开始了。晚上回到家里,他们也打开了电脑,也
许是为了完成白天没来得及做完的工作,也许是因为前两天刚报了一个网络课堂,此时
你还沉浸在dota中,你发的贴子还不够有人气,你发现空老师又更新微薄了,电视剧里
男女猪脚还没有最后在一起,作恶多端的女二号还没有得到应有的报应。终于,22点到
了,他们停下了工作,或许去满满的书架上拿下了一本书,或许拿起了自己心爱的乐器
打算练练手,或许已经上床睡觉。当然,睡之前他们会想一想,自己在这一天都做了什
么,有什么收获,又有什么教训。最后,他们又重新提醒了一下自己那个埋在内心深处
的梦想,然后满意的睡去了。此时的你还在等待升级,还在顶贴子,还在刷微薄,还在
为了男一号女一号哭哭啼啼,你的一天才刚刚开始精彩。后半夜,你隐约感到了困意,
依依不舍的关掉了电脑,身上已经很臭,你却懒得去洗一个澡。你走向了乱糟糟的床,
钻进了肮脏的被窝,掏出了手机——是的,爪机党伤不起。

你隐约知道自己的身边有那么一群“他们”,可是你却没有办法实实在在的感受到他们
的存在。直到有一天,你和“他/她”终于浪漫的相见了——他/她是老总,你是普通的
打工仔;他 /她是主任,你是弱爆了的小职员;他/她游历各国,念着你想念的大学,
拍着你想拍的照片,过着你想过的生活,他/她各种恣意的小清新,而你,是的,我知
道你恨小清新,可是这又有什么关系?事实已经如此,你就是那个电脑荧光照射下的SB。


如果你再不改变的话。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...