Skip to main content

你会不会按那个button?

2009-01-23 09:13:19   来自: Lillian (开始懂了)
Lost Season 2 / 迷失 第二季的评论   4 star rating4 star rating4 star rating4 star rating 4
提示: 有关键情节透露

有一群人,飞机坠毁在一个荒岛上,他们怎么办?

医生JACK自然地担当起了LEADER的角色,在领导大家生存的同时发现了荒岛上难以解释的秘密。

一开始看LOST以为是那种荒岛求生片,但是我完全错了。剧中主角们在荒岛上发现了一个HATCH,里面有各种现代化设施,还有一台电脑。他们必须在每108分钟在电脑上输入一串数字。

为什么要隔108分钟就输入数字?没人知道,他们只是收到了警告如果不输入的话,警报响起,后果很严重。什么后果?没人知道。

事实上是,在他们飞机坠毁之前,有个人有次没有及时按下button。结果天摇地动,那个人赶快去按,恢复了正常。但是之前电脑上全是system failure的警告,同时,主角们的那架飞机坠毁了。他没有按button,同时经过荒岛上空的飞机坠毁了。。。

这和生活很像,有的时候,价值观告诉你你一定要怎么怎么做,究竟为什么自己也不知道,但是很多人告诉你,你不这样做的话,后果很严重。结果我们就像LOST里的人一样,无法离开那个HATCH,一辈子都呆在那里,去按下那个莫名其妙的BUTTON。

终于有一天,locke决定不再按那个BUTTON了,他阻止了所有人(包括某黑人为了按那个button差点把locke炸死,因为他觉得不按的话后果很严重)。终于,那个button在发出system failure的警告后没有被按下。结果。。。结果真的严重的。

locke最终说了一句,i was wrong。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...