Skip to main content

腾讯: 朝廷反改革面目彻底暴露


http://news.qq.com/zt2011/zxzg/1908.htm

改革的攻坚之年,终于到来。在晚清最后十年的改革进程中,没有哪一年比1908年更为关键——呼唤真改革的民意,在这一年第一次以运动的方式爆发出来。朝 廷如何应对这汹涌澎湃的民意,直接决定着人心的去留与改革的成败——但终究,朝廷还是义无反顾地走上了假改革、反改革之路;革命,也终于不可避免……

反改革案例一:下达谕旨,禁止绅商和学生“干预国家政治”

反改革案例二:颁布《大清报律》,压制一切不利于朝廷的言论

反改革案例三:出台《结社集会律》,打压开国会请愿运动

反改革案例四:颁布《钦定宪法大纲》,君主专制反较改革之前更盛


结束语:

晚清最后十年的宪政改革,终于在1908年明目张胆地登上了专制的马车,一路绝尘而去,清廷也将因此在三年之后灰飞烟灭。

此种转折,《神州日报》早在1907年即已有充分之预测:

“自去年宣布立宪后,而各种之风潮,非常之惨剧,皆相随而至,不特为立宪诸国所未闻,抑亦为开明专制国所未有。由是观之,政府之于专制也,乃取其实而不欲 居其名,于立宪也,则取其名而惟恐蹈其实……吾以今日现象卜之,过此而往,政府之政策必不外二方面:于一方面也,必日益言销融满汉,必日益言改良庶政,必 日益言宣布宪法,必日益言予民自由;于一方面也,必日益派侦探,必日益捕党人,必日益钤制学界,必日益添募陆军。而所谓立宪云立宪云者,则亦言之愈殷,去 之愈远,而国民之对于此立宪也,则亦如镜之花,如水之月,可望而不可即。……念前途之茫茫,真不觉仰天而大恸也!”(《论国民之前途与救国之责任》,载 《神州日报》1907年9月1日)

1908年11月,慈禧去世,临终前忽叹曰:“不当允彼等立宪。”少顷,又曰:“误矣,毕竟不当立宪。”(据恽毓鼎《澄斋日记》)


改革在这一年,死了。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...