Skip to main content

论钥匙串在跑步中的九大应用 V1.1

1)记圈. 开跑前将钥匙环握在掌心,第一圈套大拇指,第二圈换到食指, 如此递增,到第6
圈又回到大拇指. 自己只要记住轮了几次就知道总圈数,在跑道上记错1圈很容易,记错5
圈比较难. 相对用心记圈数和捏手指记圈数要节省一点脑力.

2)警示.  跑步时经常有人在前面慢走挡路, 如果不声不响从旁边绕过会将其吓一跳.他
们也可能不知道后面有人而突然转向和你碰撞, 或扭头吐痰吐到你, 甚至做扩胸运动一
拳打在你身上. 这时一种比较礼貌的方法是接近后, 放松手中的钥匙,随着跑动发出叮
铛悦耳的声音, 90%的人会注意到并主动让路.

3)防身. 在夜晚跑步时, 有时担心遇到坏人, 钥匙握在手中也有几分壮胆作用. 可以将
钥匙环握在手心, 用中指和无名指夹住钥匙露出半寸, 危急时刻挥出攻击对方面部, 或
有奇效.

4)刮汗. 用宽大的钥匙可以把面部和额头汗水一下刮掉, 比用袖子擦汗爽

5)报复. 当不遵守规矩的小汽车从你身边经过时, 你的钥匙是件破坏油漆的利器.(俺没
干过这个事)

6)导航. 白天在外面跑步, 根据手机或电子表的时间, 用两根钥匙模拟出当前时针的位
置和12点的位置, 将当前时针的那根钥匙对准太阳的方向, 两根钥匙的正中间就是正南
方.

7)医疗. 有时侯在外面跑步可能因为低血糖, 中暑, 或体温过低出现头晕欲昏迷的情况
, 这时候可以用钥匙尖端刺激自己的人中, 百会等穴位, 保持清醒, 争取到赢得救援的
时间

8)餐饮. 跑步中带的一些小零食的塑料袋可能不易撕开, 可以用钥匙去划

9) 逃生. 需要在钥匙串上串一小截钢锯条(3-5厘米即可),   不引人注目, 万一在外面
被人绑架, 有一线希望利用锯条把绳子锯断逃生.

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...