Skip to main content

怎么摆脱contractor公司的纠缠,他们威胁说要sue我


几个月前楼主被裁了,正好有个contractor公司说提供培训,就跟着去上课了。
上了几节课就被要求签一个很狗血的合同,不平等条约都是说各种违反条约的情况楼主
都得给他们付钱。
其中一条就是说一旦签了这个合同,然后不参加他们的marketing不为他们工作就得付
5000美刀。但楼主后来拿到口头offer说三个月后找不到工作就free。
悲催的楼主只好签下卖身契,偏偏在课程结束之后一周就拿到一个offer(这个是一个
多月前朋友帮忙递的,但一直没消息,lz就以为没戏了)。
楼主想给自己干活,但又不想给那华丽丽的5000刀,于是跟他们说要回国了,并且停了
跟他们联系的电话,也没有收到任何来自他们的邮件。

但现在突然接到他们的电话了(这个号码从来没跟他们说过,但可能在求职网站上还有
存留):说知道我没回国,这种行为违反了合约,要sue我。他们怎么确定我没回国的
呢,就因为这个号码吗?而且我也没接过他们的电话啊,他们怎么确定一定就是我呢?
难道contractor公司可以查移民局的记录吗,知道我到底回国没有?

现在楼主打算付一些钱,把事情结了。但怎么开口跟他们谈了,现在说会不会显得气势
太弱,被狮子大开口?
而且他们本身也不合法,楼主明明entry level小虾米一个,跟着上了几节课,就把我
包装成六七年的senior一名。这个,楼主也不习惯这么瞎搞啊。

大家尽管拍我吧,希望能在拍砖之余给点建议。多谢!

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec