Skip to main content

相信爱情是一种信念

发信人: PeachRed (红桃子), 信区: Love
标  题: [LOVE三月征文]相信爱情是一种信念
发信站: BBS 未名空间站 (Mon Mar  5 16:03:22 2012, 美东)

我想写一些很感人的文字来讨论一下爱情,或者说说我们为什么要相信爱情。可是憋了
半天,写了删,删了写,也没写出来让我自己感动的东西。其实我是一个比较悲观的人
。从小多愁善感,喜欢恋爱的感觉,可望被别人呵护,被别人爱,但是总是觉得好像没
有一个人能100%的像我期望的那样来爱我。尤其是经历的几段所谓的“爱情”之后,对
爱情这个东西越来越困惑。对爱的定义也很迷糊。现在我还在不停的寻找和探索着,在
爱情的路上历练,摔倒然后又爬起来。

我们总喜欢把爱情定义为“天长地久,甜甜蜜蜜,亲亲我我”,总是把爱情想象的很美
好,然后突然有一天发现原来爱情不总是美好的时候。就开始长吁短叹,妄自菲薄。抱
怨男人不专一,抱怨女人太势利。其实,男人的花心和女人的势力和爱情没有关系。男
人自古都花心,女人自古都势力。而爱情是有保鲜期的。

相信爱情是一种信念,是把爱情经营下去需要的力量,但是并不代表只要相信爱情就能
长久。两个人互相爱着对方是把爱情经营下去的条件,但是也不代表两个相爱的人就能
一定永远在一起。爱情把两个毫不相干的人连在一起真是很不容易的事情。这两个毫不
相干的人还要坚定不移地相亲相爱下去更不容易;两个人都需要努力,都 需要用心,
一起扶持,理解,呵护对方。当一个人感觉疲倦了,累了,想放弃的时候,另一个人能
做他/她的支柱。爱情的脆弱就是在于放弃比坚持容易。不要轻言放弃。

世界上有什么人什么事是完美的。爱情也不是完美的。我们能做到的就是在拥有的时候
能珍惜;在牵手的时候拉紧;在相爱的时候,好好的全心全意地爱下去。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...