Skip to main content

觉得很多帖子表现出写者
对老黑老墨在干什么, 其心理, 价值和观念,逻辑, 一点边都不着。
老黑老墨都不学华人,不是因为学不了,而是觉得煞笔。
最然也有一些个别老黑想靠教育努力挤进中产。 但是他们整体价值观念不是这样。
哪个社会都是搞政治的玩弄搞业务的。
老黑早就明白掘着屁股给白人干活是死路一条。只有玩政治才是出路,才能分到属于自
己人口比例的社会财富。
老黑根本不觉得福利是施舍。因为那是你不能不给的。那是他们的斗争果实,是抢来的
战利品, 比什么都有尊严。而且就是身强力壮拿福利更光荣,因为这更表现了福利是
战利品的特征。 你华人给老板打工舔屁眼,才是挣的施舍, 经济不好老板都不会消减
自己狗的开支,就先裁了你。你开个小买卖,经济稍差人家第一个就从你这里CUT支出
。等于是舔每个人的屁眼。
老黑不觉得钱是干出来的,他们不觉得自己和华尔街老板有什么本质区别。所以收入和
社会地位也不应该由什么区别。 比如奥巴马成天奢侈玩乐,老黑不会觉得有任何问题

老黑才不会觉得自己不上班就是不工作,他们是在搞政治, 这是上等人玩的,比如华
尔街老板,议员之类的。你看看老黑喜欢从事的职业,体育,娱乐界, 都不是小钱。

老黑中比较没有出息的,比如女孩子,才希望他能当个职业人士,和华人同工同酬。
挣点小钱。
其实这也不是老黑老墨特有的看法。
基本上除了亚裔, 其他人看法都差不多

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...