Skip to main content

中国人唯一自认为能拿的出手的就只有饮食了

从自给自足小农经济, 到师夷长技以制夷, 然后整个国家
被蹂躏,最后破碎,再跟着苏联老大哥,后又被老毛蹂躏,最
后,还是得学西方。

发展到现在,回头看看,中国人,几乎没有任何东西让我们
打心底的自信了

科技,创新完败,无论过去还是现在

制度,文化,软实力,没有影响力,连过去半壁江山的宋朝,辽的影响力都没有

30年经济埋头发展,算是多少不用太自卑。。但是,人均各方面比发达国家还是差一大
截,扪心自问底气也是不足。

转了一圈回头望望,什么孔子老子毫无影响力,周边国家关系也搞得不咋地。到头来,
唯一最能拿的出手的就只剩下吃了。


也怪不得水版里北方南方互相瞧不起, 随便一个简单的粽子的做法成千上万,秒杀各
种面包。

随便一个简单面条,武汉的热干面,兰州拉面,担担面,炸酱面,清汤面,刀削面,西
红柿鸡蛋面,牛腩面,  各种面。。。。 整个西方加起来才只有一个意大利通心粉。
。结果,后来发现山西的同学家里竟然做出一种很类似通心粉的面。。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...