Skip to main content

有人真心的觉得gmail好用吗?

我用gmail,win下和osx下都有客户端,搜索的时候一般用web界面。

邮件太多,现在mac下的客户端已经慢的像shi了,win下就凑合用opera当客户端。

单从用户界面上来说,win下没有一个客户端能赶上gmail的web界面,osx下那个叫sq啥
的,很对胃口,无奈没有windows版,


我感觉这帮搞pc开发的,全都活在上个世纪,现在尼玛全是宽屏,你设计个宽屏
freiendly的界面能死呀?尼玛东西全给我垂直堆起来,你是想我把屏幕竖起来用吗?



别比了,现阶段web的app做再好,也还远不如同类的native的程序。web app的主要优
点是方便,不用安装,到哪儿都可以用。说到比native app好用就过了。gmail也做的
很不错了,也就一个search值得提一下,这个还是在服务器做的


gmail是现在我唯一主动在用的gg服务, 如果不算匿名youtube的话.

用来四处注册收垃圾邮件, client端用native client, 很少用它的webUI. 感觉就是总
要提防些, 经常能收到针对性很强的广告邮件, 相比之下别人感觉干净很多. 最
annoying的就是要向我问电话号码, 已经告诉它N次我不要用它的2-step
authentication, 还是不时蹦出来.

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...