Skip to main content

最近遇到的接近拔枪的情况



这个是我带着枪最接近拔枪的时候,对方突然试图开我车门这种动作和我每次上车前注
意防止的停车场抢劫行为吻合,条件反射枪就是为这个准备的,但是摸到枪以后,理智
判断对方没有武器,不存在生命危险,没有拔枪。只是给了不要接近警告。对方这个动
作非常危险

在停车场,我直行突然有车要从车位倒车,我判断距离不够,可能会有危险,鸣笛警告
。对方停了一下,然后继续倒车,我长时间鸣笛直到对方停下,停后对方又继续,我又
鸣笛,对方人下车,我警告对方回去,不听,走到我车窗前,问我为什么不让,我告诉
我有路权,我感觉距离不够,为避免不必要危险,不能让,这个是对双方最负责的做法
。对方说已经等了几个车了,该轮到自己走了。我说不对,我有路权,你没有,并不是
大家平等路权,所以不论你等多久,只要没有安全你就不能走,我鸣笛就是警告你,我
不会冒险让你硬插进来

对方开始问我信息,我很反感,要开车离开,对方突然情绪失控说我骂人,抓我车门,
要让我下车。

从这人下车开始,我就开始警觉,当时车上有上膛手枪。直到试图开我车门时,我右手
马上到手枪上,警告对方不要靠近。

事后咨询警察,警察说应该报警告这个人harassing。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...