Skip to main content

给男士的建议

发信人: catlily (catrose), 信区: Piebridge
标  题: 给男士的建议
发信站: BBS 未名空间站 (Sun Apr 15 12:37:39 2012, 美东)

回来灌一瓢~~~~~

世界上根本没有WSN,只是没有遇见那个适合你的人而已,或者说有一类人太真实了,
把自己的想法表现出来了,而且目的性太强了。调整一下战略方式,就会成功的。我说
一下我遇见过的几个受欢迎的类型,
这里的女生也可以说说自己喜欢的类型特点,好对这里的男的有些帮助,

(1)绅士儒雅,性格温和,对老师尊敬,对同事谦和。工作认真努力,为人处事,进
退有度。

(2)长得不高,但是会穿衣服,时尚,有品位。主要是性格和头脑,为人非常NICE,
会暧昧,懂情调,跟女生不远不近,但是跟女生关系非常好,会体贴人。为人办事,非
常有自己的特色,绝对跟他人不一样,属于iconoclast的这种人。头脑聪明,有自己的
见解,能让周围的人心服口服,并且欣赏他。

(3)性格温和,从来不会跟朋友生气,跟女生关系很亲近,经常在网上主动跟女性朋友
聊天,即使他自己不感兴趣的女性,他也会耐心的聊天劝导宽慰,会不基于任何目的性的
跟女生一起出去hang out,耐心又好脾气,让女性非常有安全感。从来不主动追求女生
,但是跟女生关系又很近,大部分都是女生去追他。

PS: 对比一些被称为WSN的男性,目的性太强,比如一个男生追一个女生,女生跟他出
去看电影,男的就想动手动脚,如果女生拒绝,还想跟这个男生继续做朋友,可以出来
看看电影吃吃饭,这些男的就会说:“我很忙,没时间陪你,做这些无聊的事情。”这
样的目的性就太强了。一般的女生都不喜欢这种类型。

这就是方法和方式的问题。所以换个方法,也许是让人变得虚伪,隐藏自己,但是这样
确实成功率会高很多。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...