Skip to main content

未来一百年可实现全球一国化

发信人: qwxqwsean (qiu), 信区: Military
标  题: 未来一百年可实现全球一国化
发信站: BBS 未名空间站 (Wed Dec 21 08:46:06 2011, 美东)

全球将变成一个由资产阶级联合执政的国家。 国家机器结构类似于现在的美国,目前
的世界各国将成为美国的各个州,表面上各州有某些自治权,实际上全国很统一。

世界资产阶级合众国的参议院是大资产阶级联盟,众议院是小资产阶级联盟,两院选举
一个总统,总统的职责是代表全世界大小资本家维持资本秩序,镇压P民造反。 如果这
个傀儡总统不能执行资产阶级联盟的意志,让他下台就太费事了,直接爆头。 

此时由于全世界仅有一个国家,没有外敌威胁,军费仍然占到GDP的一定比例,但不是
用于侵略或反侵略,而是用于对内维稳,实际上全是警察部队。 由于没有外国竞争,
也就不必再为了资本向敌国渗透而以民主忽悠敌国的屁民了,所以终止了对外的民主宣
传。

对内,也不必浪费时间用民主忽悠本国屁民了, 既然能够很容易地用暴力防止本国屁
民造反,屁民只不过是条已经被踩在鞋底下的蚯蚓,有谁会在乎鞋底下那条蚯蚓的所谓
的选票呢? 由于武器技术的进步,未来屁民造反比陈胜吴广起义难十万倍,以前拿起
一根竹竿就可以和政府军的长矛拼命,现在的屁民即使端起机枪,在装备精良的警察部
队面前也只是螳臂当车。 国家养的那么多警察,CIA, FBI, 反恐部队,全都是用来
防止屁民造反的。 由于没有了外敌威胁,军火商都转行了,屁民的拥枪权,由于失去
了军火商的支持,拥枪权也就被取消。 屁民是且仅仅是被人踩在鞋底下的蚯蚓而已,
不要说造反了,只要通过任何途径被无孔不入的CIA觉察到任何屁民对资产阶级联盟执
政有任何的不满,这个屁民的肉体立即就会从地球上消失, 新技术就是干这个用的。

屁民在全球一国化后想翻盘想洗牌?耐心等着一千万年以后可能出现的外星人部队来救
助吧。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...