Skip to main content

战胜异地恋的金玉良言

如果不相信爱情,谨记以下守则也没用,因此打算或者已经是异地恋的你一定是个爱情唯心主义者,相信爱情并拥有坚定不移的心,这样你才能在异地恋的苦海中得道修行,最后功德圆满。注意守则不适合玩世不恭的少爷或者小姐!

1、 没有足够挑战的勇气,请不要涉足异地恋
2、 没有对爱情忠贞不二的心,请不要妄想有好的结局
3、 没有彼此信任的托付,请不要说“我爱你”
4、 没有及时的沟通,懒得电话、网络、或者跑路的话请迅速逃离现场
5、 没有确定那一天那一年走在一起,请现在设定一个目标
6、 没有平和的心态,急功近利的人请去背100遍《莲花经》
7、 没有相信的理由,找不到可以信仰的新年,请学习哲学之后来相爱
8、 没有较强的文字功底,请先去小学进修,异地恋免不了书信来往,溢美之词实在必要
9、 没有能力控制身体的欲望,请转身离开
10、 没有强大的经济能力,请选择近一点的恋爱
11、 没有甜言蜜语的巧舌,请先抄写拿破仑的情书1000遍
12、 没有宽广的胸怀,请慎重选择异地恋
13、 没有底线的爱情不如不要
14、 没有表白的感情还是不要
15、 没有互道晚安习惯的,请从今天开始及时补充

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...