Skip to main content

几年前,我也很憧憬能以股票为生


但是后来我明白了,如果有别的赚钱的途径为什么不尝试一下呢?狡兔还有三窟呢!现
在回想起来,炒股反而是最容易的,只需要买和卖,坐在电脑前面做一个宅男宅女即可
,只要能保证稳定的利润也不失为一种轻松快乐的赚钱的途径。但是炒股----尤其是想
以炒股为生做短线或波段-----有一个很大的弊端,那就是会遇到瓶颈,也就是说平均
利润到了一定程度以后想往上很难,在这种情况下只有两种解决办法(至少对我来说目
前只能想到两个):一个是像巴菲特那样做价值投资,利滚利,一个就是在做股票的同
时开始转型,有倾向性的做一些其他的行业,如果能同时盈利就可以大幅度弥补炒股的
瓶颈,我是一个急性子的人,所以选择了后者。原则只有一个:坚决不给人打工,我讨
厌被人管,讨厌看别人脸色,更讨厌固定的上班时间,当然了,如果我给别人规定上班
时间我还是很乐意的,呵呵呵!

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...