Skip to main content

人潜意识崇拜金子和暴力?根源在于人是被设置的

发信人: voidness (先有没有), 信区: History
标  题: 人潜意识崇拜金子和暴力?根源在于人是被设置的
发信站: BBS 未名空间站 (Tue Aug 23 19:31:05 2011, 美东)

我发现人的潜意识里有很深的对金子的崇拜,还有对暴力破坏
的快感。你仔细想想是不是。砸个东西有种莫名其妙的快感。

有点玄乎,根源是:

印度远古传说曾说外星人到地球采金,需要劳动力而创造了人类。
至于为什么要金子是因为他们星球的大气需要金元素来维持,
而金元素在宇宙中并不多。

金矿并不集中,如何采呢?经研究地球上有这么多动物,多数
不能改造为劳动力(听指令),于是乎基因制造了人类。这过
程曾经失败,低智能“人”泛滥。你要是外星人如何做呢?灭
了丫的重来!这就是大洪水的来源。

为了让人能自动采金,基因里特地加入了趋金和趋暴力基因,采矿
需要暴力性破坏,而对金子的崇拜使之能见金就喜从心来。外星
人就做等收金子了。

TNND.We are programmed.

到现在我都有砸东西的快感,要是砸出来一块金子,我会乐昏过去!

你呢?

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...