Skip to main content

焦虑, 无比焦虑和绝望


我来说说我的感受。我很理解薄厚的心情,但我今天晚上突然有点豁然开朗。我就是薄
厚,我现在仔细算了算我每天的工作时间,其实有时候我一天啥都不干,干什么了呢?
焦虑。无比焦虑和绝望。这严重影响了我的工作效率和生活。因为我一旦开始想试验,
头脑里就有抵触情绪,就觉得这工作有什么意义,我要耗一辈子吗?然后就开始上网干
别的。我觉得对于那种衣食无忧没有生活压力的人可以做下去,但是对于有生活压力,
有梦想的人来说,可以改行。可是我突然明白无论改不改行,都要过的快乐。别总想改
,但什么都没做,蹉跎了岁月。所以,要做行动派,过自己想要的日子。要理智。如果
现在不做薄厚就没有收入来源,那么就做好,同时每天抽出时间为改行而努力。人就这
么短暂的一生,并且随着年龄的增长,改行的机会越来越少。所以希望大家都努力做行
动派,实现自己的梦想。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec