Skip to main content

3年独居生活总结


1,打扫卫生不需要面面俱到,集中打扫厨房和卫生间即可,只要这两处干净了,整个
家看起来就会像新的一样。书桌啊,床啊,这些都不需要太整齐,乱中有序即可。所谓
乱中有序,大致就是,不属于这个空间的物品决不能出现在这个空间里,比如床上坚决
不能有衣物,衣物是属于衣柜的,衣物只要在衣柜里,再怎么乱都不会很乱,床上只有
杯子枕头的话,再怎么不整齐也还是整齐的

2,添置新家具的时候,搬回家一定要立刻安装好,决不能拖拖拉拉。要知道,没有立
刻安装好的东西,这辈子都装不好了。比如我家客厅地面上现在有一只装了一半的灯,
已经大半年了,我打算随它去了。偶尔扫一眼,也不失为一件很好的艺术品,全世界独
一无二。幸好刚搬家的时候,一口气把必需品都装完了,否则我现在会不会还没有床呢
,想想真是后怕

3,冰箱里的东西要记得吃,记不得吃的话干脆别买,尽量外食,贵就贵一点,至少不
会浪费。这几年扔掉的过期牛奶,面包,鸡蛋等等等等等,大概可以按吨计算了吧,真
的很浪费。有阵子看了一部法国纪录片,专门讲食物的。有几个场景至今印象深刻,比
如,流浪汉在垃圾堆里捡到了一袋面包,他指着面包说,人们都以为面包过了保质期就
坏了,实际上还好得很呢。还有个场景,是说效仿“拾穗者”去农田捡土豆,有很多土
豆因为奇形怪状不能贩卖而被丢弃,其实这些被扔掉的都是可以吃的,还能捡到心形的
土豆。当时看完电影便下定决心再也不浪费任何食物,可惜坚持了一周就不了了之了,
可惜。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...