Skip to main content

评比各个系统


以下纯粹个人片面观点:

windows:从dos算起,用了超过二十年,使用过几乎所有个人版本以及部分server版本
,现在有三台电脑分别装xp,7和8,8用的最多,感觉95%满意。真正让我离不开
windows的其实只有三样东西:remote desktop,office和visual studio.

mac:从apple II开始,时不时的用过各个版本,现在有一个MBA接近一年半. 买它纯粹
因为硬件手感好,95%满意。

linux/unix:从9x年开始陆续用过很多版本,现在vmware里有一个ubuntu,平时主要
ssh到学校server上工作,用linux主要是因为工作需要,90%满意。

iphone:使用iPhone 4超过两年,95%满意。不太喜欢apple封闭专制的做法。

windows phone:使用920超过三个月,95%满意,两个主要缺点:1)电池有时突然下的
很快,重启才会好;2)缺少一些app比如google voice,mint等。不过这也不算微软的
错。

android:偶尔用过,感觉一般,乱,像linux,90%满意。

另外简单讨论一下软件:
latex:写文章用,90%满意。就像linux,android,单反相机,手动车一样,喜欢精确
控制的人会喜欢,但大多数人还是更喜欢windows,iphone,傻瓜机,自动车。

总之每样东西都有特点(优点和缺点),你用它肯定是因为有离不开它的地方,无它。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...