Skip to main content

关于朋友间借车和借钱的正常手续

发信人: niubee (资深街霸卧槽立马勒戈壁), 信区: WaterWorld
标  题: 关于朋友间借车和借钱的正常手续
发信站: BBS 未名空间站 (Thu Aug  9 13:26:53 2012, 美东)

朋友间互相帮忙是应该的,但是要按照正常的手续来。不愿意按正常手续做的,都是另
有打算。真的打算负责任的朋友,是不在乎正常手续的,因为本来就是要承担这些责任
的。

借车。
1. 借车之前,给保险公司打电话,把朋友的名字加在drivers上。保险肯定会涨一些。
这个上涨的保险通知朋友。
2. 按照借车的天数里程数汽油收取一定的费用。朋友间关系铁的可以省略这一步。
3. 双方找律师签个agreement。出了事故的各种损失由朋友负责,包括请假修车,租车
,打官司等等各种事故后的时间金钱精力的开销。当然,律师费用朋友承担。
4. 还车的时候仔细检查车况,把朋友的名字从保险上去掉。差价账单朋友付。

借钱。
1. 先说明借钱的用途和借钱人的信用记录。评估风险。
2. 根据风险,确定借款利率。
3. 双方找律师签个agreement。包括每月分期偿还计划。固定资产抵押和违约期拍卖抵
押资产的手续费用。当然,律师费用朋友承担。

扭扭咧咧不想承担责任的朋友,关系实在很铁的,借车不行,我可以出钱你去租车。借
钱不行,我可以给朋友一些钱而且讲明不需要偿还。同时重新评估朋友关系。



--

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...