Skip to main content

简单省时午餐系列---包菜培根炒米粉


中午老在外面吃其实也不是个事儿,自己做的便当,吃下去的食材安全放心,没有过多
的油啊什么的,健健康康的,一天都能神清气爽的。今天是这个系列第一帖,来个我挺
喜欢的,菜啊饭啊肉啊混一起的。

包菜培根炒米粉:
1.细米粉开水下锅,煮至无硬心,也不要煮过了,因为一会儿还要再回锅的。
2.米粉沥干水,用自来水冲凉,防止米粉粘在一起。如果觉得米粉太长,可以用剪刀随
便剪一下,随意就好,不需要固定章法的。
3.3片培根肉切小块,包菜切丝。
4.锅烧热,加少许油,下培根块,炒熟,加包菜丝,等包菜丝软了就能加入适量盐,糖
调味,培根本身就有咸味,调味的时候盐可以少放。
5.倒入煮好的米粉翻炒,加生抽调味,如果觉得太干,可以加少许水。别加成老抽了哦
,要不然颜色该不好看了。
6.出锅!可随意加入油辣椒,老干妈,剁椒等。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...