Skip to main content

国内来的文科生家里都很硬

发信人: caress (轻轻爱抚), 信区: WaterWorld
标  题: 国内来的文科生家里都很硬
发信站: BBS 未名空间站 (Fri Dec  9 20:15:26 2011, 美东)

读金融的 读法律的 读会计的 读mba的。。。

家里做官的,所见大到副部级。家里经商的多有钱的都有,究竟谁量级比谁高,没搞这
方面不知怎么比。甚至于有遇到老公经商的,富一代啊,你相信24岁在京郊买loft,开
超跑的富一代吗?自己创业,不需要学历,相当低调的人,不熟不问什么也看不出来。
只有在消费的时候才会发现,人家老婆刷卡各种一线品牌不用思考。

大多最多是3年的program,都呆不久,注重的是利用周末和放假玩遍美国。直升机算什
么,游轮算什么,赌场算什么,夜店算什么。就经历比大多数人更灿烂的人生。趁着年
轻又多金。最大的悲哀是什么,年轻的时候苦,没钱,但是消费欲望强玩心大,苦苦10
年读下书,在美国找了工作结了婚拿了绿卡,攒下了钱,发现自己早就没了激情,钱变
成了一堆数字。等到四十岁不敢生小孩,最终都全了,还傻傻觉得自己的人生是成功的
。那是因为你周围都是跟你一样和不如你的人。你想过自己创业吗???你有那种痞子
气混社会的野心吗???不要以为自己多么智慧,从小念书多强多强,哪所著名学府毕
业的,真的都有用了吗?

作为一个深陷于苦海中的小小理工phd,发发牢骚而已,见得多了一些,只是觉得,人生
,对于特定的人类,太不值得了。纯属瞎写,毫无逻辑,见谅。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...