Skip to main content

说说我帮过的国人吧。

某女,大学里不熟,某一日忽然无限热烙,然后提起男朋友找工已有一年,OPT快过期
了,只好她拉下脸来求人REFER。 这怎能不帮?我于是帮他把简历发給我所有工业界朋
友,只可惜他的东西太学术,没人有兴趣。后来有很简单问题问她,EMAIL 不回,电话
不接。听别人谈起才知道另一个人帮他找到了。

某男,朋友的同学。裸奔LA找工作,一年找不到借钱度日。通过朋友找到我,一口一个
大姐叫得甜。我让他住我家,请他吃饭,替他光投简历。后来就没有后来了。我还是通
过朋友才知道他找到个很好的工作,就在我家附近。再后来在超市碰到,比陌生人还陌
生。

我曾经想做一个好人,但无数次发现做了傻瓜。人都有求生欲望,有求于人的时候,那
个人都是非常可爱的。不再有利用价值之后,不过是个不相干的人。

我是不是还会帮人?很难。无条件爱世人的是上帝。

大家都羡慕INDIAN,因为他们团结就是力量。但是我觉得中国人不可能。几千年一盘散
沙的文化积累下来,唯利是图,明哲保身。帮国人,失望的多。尤其是上海人呕,显得
热呼的无一例外都是有所求的,利用完不踩你两脚就不错了。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...