Skip to main content

十八叹

秋天的太阳不说话,
只照亮我身上鲜红的花。

气温远远过了十八度,
为什么这世界却冷得象冰窟?

千钧压在身上磐石也心疼,
虽然那些车并没有十八轮。

车轮已把我的衣碾烂,
对不起,妈妈,我浪费了十八元。

我见过庙里的十八罗汉,
但现在他们都闭上了眼。

几分钟慢得如十八年,
车却快得将岁月斩断。

妈妈我再也不会乱走会很乖,
你说外面有豺狼真不是瞎掰。

万一我走不过这道坎,
请为我奏一曲追魂十八拍。

当我的身体向天堂飞升,
这沉重的人世就轻了十八斤。

我会去寻找一片净土,
在那儿良知不会被收购。

我知道二不比十八大,
父母官开会小孩子插不上话。

但我要说,地狱有十八层,
可别让我亲爱的土地往下沉。

这个月已过了十八天,
我的生命还在挣扎着向前。

听说女大会有十八变,
但愿我能长大都看见。

到了十八岁我要变成熟,
很多人给他们一辈子也不够。

我将学会十八般武艺,
但我不会用它们将弱者欺。

我将登上十八座高山,
为了摸一摸那依然洁净的蓝天。

也许我会遇上十八道弯,
但我将一直勇敢向前。

   2011.10.18


Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...