Skip to main content

在别的论坛看到,觉得很有道理,搬到这里和大家分享

1、当你超过别人一点点,别人会嫉妒你;当你超过别人一大截,别人就会羡慕你。

2、如果你喜欢热闹,很可能是因为你灵魂感到寂寞,需要用喧嚣来填补心灵世界;如果你喜欢孤独,很可能是因为你内心世界充实丰富,并且不需要旁人介入。

3、同学聚会时,混得特别差和混得特别好的人一般都不会参加。前者或许是因为不好意思,后者则是实在太忙。

4、你被别人嫉妒,说明你卓越;你嫉妒别人,说明你无能。

5、恭维你的人越来越多,不一定是他们喜欢恭维人,而是因为你喜欢被恭维。

6、喝酒时,想巴结你的人和想你出丑的人会一直找你干杯。

7、真正了解你的人,除了你的朋友外,就是你的对手。所以,请重视对手,因为他们能最早发现你的过失;请感谢对手,因为他们能使你不断改进自己的工作。

8、不管你爬到多么高的位置,掌握多么大的权力,永远不要在故友面前摆架子,那是不尊重自己的表现。

9、不管你对抽烟喝酒的态度是赞成、反感还是无所谓,它们都是把现代人情感拉近的最快方式。

10、不论你如何了解一个人,那都是片面的,不是全部。

11、名声是个很奇怪的东西:你不花精力去追求它,它会找上门来;你拼命去追求它,它倒摆起架子来了。

12、如果一个人什么生活嗜好都没有,那么他往往也没有好朋友。

13、男人最怕女人问他爱不爱她,如果答得太快,她会说他草率;答得太慢,她又会说他不坚定。

14、如果上帝和魔鬼同时去追求一个美丽的少女,那么最终赢得少女芳心的很可能是魔鬼。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...