Skip to main content

我心目中的男人

发信人: cattie (blue), 信区: man
标  题: 【征文活动】我心目中的男人
发信站: BBS 未名空间站 (Mon Dec  5 21:28:01 2011, 美东)

他首先要有一颗big heart, 懂得宽容,慈悲, 为他人着想。 这样的人, 会对自己
父母好,和兄弟姐妹亲,知道照顾自己的家人, 也知道善待穷人和不幸的人。

其次, 他是个热爱生活很阳光的人, 会去欣赏平凡生活里很简单很美好的每一件事,爱美食,爱美景,爱玩并且非常会玩。和他在一起, 永远不会boring。

他是个很有担待有责任心的人, 无论对他人是否严格, 他首先是个很勤奋刻苦,对自
己要求严格的人。 他可以有时候goofing around, 看看武侠,玩玩游戏, 该做正事
的时候, 绝对不马虎,不逃避。

他很有魅力, 可是会让人绝对放心。 看见美女, 可以和老婆/女朋友一起扭头欣赏,
评头论足,哈哈一笑,可是他不会试图去吸引美女的注意, 不会把老婆/女朋友去和其
他女人比较, 因为老婆/女朋友或许不是最美,不是最温柔,最聪明,可是老婆/女朋
友是他的老婆/女朋友。

他比我聪明很多。这很重要吧,毕竟我是个糊涂虫。此外,我需要这个个人可以让我偶尔小崇拜一下。

至于高大帅气,这个仁者见仁,毕竟情人眼里出西施。 可是他是个越看越耐看的人,
有时候他低头一笑, 会有让我想去拥抱一下的冲动, 这大概也是种魅力?

当然, last but not the least, 他爱我。
灌的差不多啦, 先想了这么多。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...