Skip to main content

婚姻其实不只是爱情,有很多社会成分在里面。

婚姻其实不只是爱情,有很多社会成分在里面。大致有三个层次

1、最低级,搭伙过日子。从集体效应出发,2个人共同生活的成本低于两个单独个人的
生活成本。若是形成一人主外,一人主内的情形就更好了。

2、爱情加色情。两个被性欲驱动的年轻人在一起生活,都觉得对方十分重要。什么艰
难险阻都可以克服。也就是通常小说里的爱情。

3、繁衍后代。老公老婆变孩子他妈,孩子他爸。其实这条才是从人性上来说最根本的
。搭伙过日子未必要和人固定下来。爱情属于欲望的一种,易变性太强,也很难说长久
。长久的爱情为什么被人传唱,还不是因为太少。
    只有出于一起繁衍后代的欲望,才是持续时间最长的情况。无数老一辈人“有了孩
子就不想离婚”的俗话可以印证。
    可惜计划生育祸国殃民,杀灭生育文化,这一条本来是婚姻最稳固的基石,如今却
沦落到应付爹妈的层次。实在是令人扼腕叹息。

如今局面似乎更糟糕,连搭伙过日子都不算了。纯从欲望出发,随心所欲。
不过细细想想,改革开放以来,一切都要随心所欲其实一直是各类伦理道德变异的方向
:孩子不要了,堕胎随便了,离婚可以感情不合了,同居正常了,流氓罪消失了。
矮贼万恶啊。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...