Skip to main content

madison 印象

去了madison,
wisconsin,终于去了一个新地方。不会写游记,也从来读不进游记,只有杂七杂八的一点印象:

-- 从chicago往madison开,两边是安静的玉米地。我想,ll也曾经这样路过吧。
-- 过了四个toll station,郁闷死了,还是南方好。
-- 虽然是盛夏,晚上很凉,有人穿着冬天的衣服,还有人干脆裹着被子在街上走。
-- 很典型的university town,有很多小店和自由的年轻人,像athens,chapel hill,和东岸一切平凡的小town。可是另一个角落,静谧破旧的房屋和街道,又像寥落时的new orleans。湖岸边车来车往的景象,可以冒充一下玄武湖畔。
-- 冰淇淋店出奇得多。后来方知,这里盛产奶制品。我的确吃到了最好吃的冰淇淋,可惜是在last minute;如此后知后觉。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...