Skip to main content

成年人的爱情






成年人的爱情,有两项最基本要求:智商和情商足以支撑自己去谈一场恋爱,对自己的
言行负责。你既然和他在一起,都是你自己的判断和选择,那么恋情不成功,就应该承
担其后果,而不是痛哭流涕满地打滚,觉得那人对不起你,觉得全世界都对不起你。就
像粗暴的妇科医生呵斥的那样,“你爽的时候怎么不想今天?”

要知道大部分人不是特意来骗你上床的或骗你钱财的,就算有,如果你相处一段时间都
不能发现,那也是你过于迟钝,或者当时心甘情愿、甘之如饴,只不过分手之后要找后
账而已。所以,说什么被欺骗被背叛,说什么我爱你比你爱我多,说什么你没有珍惜我
,说什么你们女人都太虚荣势利你们男人都好花心……这种话,听起来就好弱势。

男人过于强调男人的压力与劳累,女人过于强调生理的弱小和苦楚,这也是弱势的表现
。你们别把什么都搞成田忌赛马嘛,总是用相对弱项的去跟人家拼感情,希望能额外加
分得到谅解和照顾,这简直就是耍赖。万一没拿到名次,立刻开始计算盈亏,看看这段
感情是亏了还是赚了,看自己是掌控了局面还是被掌控的那个,看到底自己是Asshole还
是对方是Bitch……

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...