Skip to main content

没机会归了,老死他乡的命

当年出国时,朋友们纷纷祝贺,都说出国发财了别忘了常回来看看。我很矜持地笑着客
气说哪里哪里,心里却乐开了花。当时一美元黑市兑差不多十块人民币,当时我根本就
没想过有一天想回去。

临走前的那天晚上和女朋友滚床单到天亮。女朋友一次又一次地对我说你要等着我,那
时她在新东方准备考托。一年后她告诉我她放弃了,还催我快点回去结婚。可是没等到
我放假,她就告诉我不必回去了。。。。。我地女人就这么地没了。

熬了几年终于熬出头了,接下来工作了,换车了,恋爱了失恋了又恋爱了又失恋了,终
于绿了,买房了换工作了卖房了又买房了。。。。。浑浑噩噩地折腾了差不多十年,白
头发都出来了,我地青春就这么地没了。

最近一次回国是前年的事了,当时老朋友们已经拒绝我买单了。就这几年老朋友们都鸟
枪换炮了,发财的发财,升官的升官,个个都有些什么喜事,天天有人请,真个是三天
一小醉五天一大醉,但我觉得越来越插不上话了。人家谈官场、谈生意、谈女人,都不
是我了解的。父母亲老了不少,尤其让我伤感。我出国时,父亲走路还带风的,现在已
经有些迟钝了,脸上也生出了老年斑。以前每次回去母亲就追着我要结婚,那次回去竟
然不提了,大概是怕伤了我的自尊。自从那次回去后就萌生了回国的念头,这两年也通
过各种关系不断地和国内联系,末了竟然发现自己已经回不去了!专业没优势,年纪不
饶人,打工高不成低不就,自己做缺钱缺技术,回去不要说孝敬二老,能不给他们添愁
就算不错了。回头看看这些年自己走过的路,觉得挺苦逼的。

点真背,艹。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...