Skip to main content

一个理工科猥琐男的十年

发信人: Dreamer (不要问我从哪里来), 信区: Dreamer
标  题: 我平平淡淡的萎缩理工男的十年
发信站: BBS 未名空间站 (Sat Oct 20 19:59:27 2012, 美东)

2002年北大大三,考GT
2003年非典,签证一次过,出国,来了第二个月买了车
2004年开车去了迈阿密,去了黄石,去了加拿大,科研不表
2005年和女朋友结婚,幸福无比,科研开始入门
2006年回国腐败,第一篇杂志文章发表
2007年科研有进展,生活稳定
2008年考虑毕业,孩子出生,幸福
2009年工作,工作后第二个月买房,老婆也开始工作,买了第一辆新车
2010年老婆换工作,交绿卡,两周后批准,交485
2011年都绿了,夏天回国腐败,买了第二辆新车
2012年夏天回国腐败,努力做好爸爸好妈妈,希望下面工作和收入都更上一层楼

这就是一个理工科猥琐男的十年

Comments

  1. 发信人: nanodog (上海狗狗), 信区: Dreamer
    标 题: 我也写写我的苦逼10年
    发信站: BBS 未名空间站 (Sat Oct 20 12:35:44 2012, 美东)

    有没有比我更苦逼的?

    第一年,刚来美国读化学博士。第一天就对美国很失望,差点哭了,太破旧了。玩,涨
    了很多肉
    第二年,老婆过来了,生活好了。
    第三年,客观原因,换了学校,期间也想找工作,最后还是继续苦逼博士
    第四年,苦逼做实验
    第五年,苦逼做实验,第一个孩子出生
    第六年,觉得读博没前途,想找工作,被老板阻断
    第七年,毕业。第二个孩子出生
    第八年,薄厚
    第九年,薄厚
    第十年,千老。年底合同到期,即将失业
    --

    ReplyDelete

Post a Comment

https://gengwg.blogspot.com/

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...