Skip to main content

失戀兩年,還是一直想念她,我這樣是不是心理有疾病

太完美的前女友,走進了她的生活,遺憾卻沒有走進她的生命裡。

症狀:

1.分手都快兩年了,但感覺就在昨天。
2.每週都會給她寫信,不然心裡很不踏實,雖然只收到過一封回信,但是拿著又是讀了
又讀。
3.想起她就讓人平靜,看以前的照片發呆,覺得已經是親人了。
4.後來交過一個很不錯女友,但是前女友痕跡太深沒法擺脫,沒法投入,最后提出分手
5.心裡一直打算一個人過
6.會一直想念她的好,她的微笑
7.會一直回想去看五顏六色,漫山遍野野花盛開的日子
8.會每天散步談心
9.會做可口的飯菜,多放上一雙筷子,幻想她就在旁邊坐著的時候。
10. 會車窗打開時一想起她就眼眶濕潤
11. 會想念她從來不會講一個髒字

晚上聽著多年前君送給我的歌,讓懂你的人愛你。想想看,那時候的我,有些自私和浮
躁,不懂得關心和照顧對方的情緒。現在,有了一些新的體會。雖然似乎彼此的生活沒
有交集了,可是,為什麼你卻更進一步的侵入到我的生命裡,讓我無法擺脫。

我是要感激你的,因為你,改變了我生命的軌跡。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...