Skip to main content

爸放了一个又大又长的屁,妈在旁说了句



1. 甲:你最想为祖国做什么?   乙:移民,不给祖国添乱!。。。   甲:你认为爱
国的最好方式是什么?   乙:移民,去给万恶的帝国主义添乱!”
2. "屁,就是你吃下去的食物们不屈的灵魂。"——好精辟……
3. “你们用盗版的时候有想过做出这款软件的程序员吗?!他们该如何养家糊口?!
”    “哈哈哈别逗了程序员哪有家要养啊”(@ForsakenRei)

4. 我在一个知名女性论坛浏览增长见识的时候,发现有妹子这么提问:“当一个男人
跟你搭讪,怎样区别他到底是猥琐好色还是风趣友善???”,我哈哈一笑,点进去打
算回个贴,却发现里面大约两百多条回帖,都只有三个字------------“看长相。”(
@叫兽易小星)
 
5. 我爸放了一个又大又长的屁,我妈在旁边头都没回,说了句:你是要起飞吗?

6. 正在上数学课。数学老师叫我起来回答问题,我突然脑子一抽,跟同桌说:“元芳
,你怎么看?”
全班和老师都在笑,更牛的是,同桌说:“大人,元芳乃是一介武夫,不懂数学。”

7. 小孩子过周岁生日“ 抓周”,父母将各类物品放在孩 子身边,想看看孩子会抓哪
一个 ,

结果小孩子把所有东西都砸的 稀巴烂。 母亲担心的说:“哎呀 ,全砸了,这下看不
出孩子将来做什么了?”
父亲沉思片刻,忽然身体一震,说:“我靠,这龟儿子以后肯定是城管!”

8. 出租车到目的地了,司机:“到了,35元。”MM无辜的望着司机大哥:“不好意思
,请你倒回去一点吧。”
司机:“纳尼?”MM:“我只带了30元。”司机:“……”

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...