Skip to main content

小笑话

导师正在讲课,突然电话响了,他掏出来看了一下对我们说:“一般人的电话我是不接的,更何况是在上课,但这个人的电话对我来说很重要,我不能不接,请大家原谅一下。”然后,“喂,你好,我是×××……哦,你打错了!”


悟空和唐僧一起上某卫视非诚勿扰,悟空上台,24盏灯全灭。理由:1.没房没车只有一根破棍。2.保镖职业危险。3.动不动打妖精,对女生不温柔。4.坐过牢,曾被压五指山下500年。唐僧上台,哗!灯全亮。理由:1.公务员;2.皇上兄弟,后台最硬。3.精通梵文等外语。4.长得帅。5.最关键一点:有宝马!

某人带小狗到银行存款,小狗从不随地大小便,便前都会叫。正当他看报排队时,小狗汪汪直叫,只好将报纸铺在地上给它方便。存完款后,他一手抱着狗一手拿着包有狗便的报纸向银行外走去。突然一辆摩托冲出,抢走他手上的报纸包。他当时就惊呆了!众路人:真可怜!看,人都傻了,有四五万吧?


医生:“你有没有听我的建议,睡觉时将窗户打开?”病人:“有。”医生:“那么你的气喘完全不见了吧?”病人:“还在。但是我的手机、电视、笔记本电脑都不见了。”

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...