Skip to main content

也说说“接盘男"


接盘这俩字,不知什么时候出现得越来越多了。男人说起接盘,往往都带着贬义,似乎
自己吃了多大的亏似的,很苦逼。有的人说绝不做“接盘”男,一定要找个处女。有的
稍微放宽点说,只不接wF的盘。

归根到底是当代处女低龄化,能找到个处女结婚的不容易了,所以“接盘”似乎成了不
得已的事实。即便你找了个处女,她最终也嫁给你,但在离婚率如此高的时代,你们俩
一旦离婚,你若再婚“接盘”的几率会大得多。你可能还会是个“接盘男"。我看不成
为接盘男最保险的办法就是独身。否则,就得想得开,不要把“接盘”想得那么不痛快
,即便接了,心理上有这样吃亏的想法去开始一段relationship也很苦逼,给自己找不
自在,想幸福也很难。

“接盘”就如半杯水, 你看到的是满的那面还是空的那面,完全取决于你。你有你的
选择。一个人看问题的方面不同结果也会不同。要想自己过得好,正面的心理暗示还是
很起作用的。记得《 no string attached》那部电影里的一段台词,一下让我有了另
外的认识。那个女实习医生和一个小伙子最初只是Friend with Benefits的关系,还对
外保密。当小伙子的朋友看他面色喜悦和对待女医生的态度问他是不是和她上床了,他
忍不住说是了。他的朋友是满带羡慕地说你和她上了,觉得他能找到这样的女人上床挺
了不起。后来暗恋那个女医生的男医生对那个小伙子挑衅说,你这样的,人家也就是和
你玩玩, 最后真正嫁给的还是我这样的人。人男医生不觉得自己娶了她变成苦逼“接
盘男”而是决斗的胜利者。

我看国男也该改改这“接盘男”的想法。不要觉得自己是吃亏了,而是认为自己是最终
的竞争胜利者。因为你战胜了其他对手最终让这个女人嫁给了你。所以“接盘男”其实
是胜利者。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...