Skip to main content

人生只有相遇没有错过(转载)



有个书生对另一个女子很倾心,于是两家约定了婚姻。书生没有功名,家徒四壁,所以
决定外出挣钱,准备回来之后就迎娶订了亲的女子。过得很久,书生赚了些钱,兴冲冲
回到家里,却发现因为时日已久,那个女子已经嫁为人妇。书生万念俱灰,一病不起,
终于到了弥留之际。家人心急如焚又无可奈何,请了一位大师前来。大师笑而不语,拿
出一面镜子让书生看。书生奄奄一息,却在镜子里看到了一幅活生生的画卷:一片潮汐
翻涌的海滩上躺着一具女尸,赤身裸体,岸边人来人往,却没有人管那个女尸。此时一
个男子走来,将身上的衣服脱下,盖在女子身上,然后离去。很久之后又来一个男子,
在滩涂边挖了个坑将那女子埋了。书生迷惑不解,大师解释道:“此女人乃是你未婚妻
子的前生,你是那个给她披衣的人,那个埋她的便是她如今的丈夫。你和她并非无缘,
前生已有缘分。今生你与她相识,乃是她前来报你披衣之恩,而她终究要嫁的却是前世
埋她的人。人生若斯,只有相遇,没有错过。”书生大悟,从奄奄一息中活了过来。

想一想,其实人生真的如此,遇见了便是缘,错过了不是没有缘分,而是这份缘分属于
别人,如此看来,人生真的只有相遇,没有错过。你错过,是为了把机会留给别人;别
人错过的很可能就成了你的机会,人人都会错过,人人都会遇到,人生就在这遇到与错
过中,所以真的没有必要为错过的遗憾,而要珍惜遇到的,不要再让它错过。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...