Skip to main content

打死半岁婴儿,击毙百岁老汉,美国这是怎么了?


107岁的阿肯色州黑人老汉Monroe Isadore昨天在家中被警察击毙。据说起因是与亲属
争吵不愿意离开家搬到老人公寓,争吵中逃出手枪威胁亲属被她们报警,警察谈判未果
冲入其家将其击毙。107岁的老汉,还是黑人,活到这个岁数大概全美国都是寥寥无几
了,当奥巴马总统的爷爷都够了,可惜就这样死了。

联想到前段时间还发生芝加哥的黑人罪犯用枪打死半岁换尿片婴儿的事件。半岁婴儿被
歹徒打死,百岁老人被警察击毙,让人不得不问美国这个国家到底是怎么了?

美国社会乱想丛生,人民的暴戾之气也越来越盛,而一国之总统却不花心思在国计民生
,整天忙着游说国会攻打万里之外的小国。不仅自己使出浑身解数,手下众将们也是拼
尽全力,不达目的誓不罢休。这得对该国有多恨,正义自由理念有多强才做得出啊!

看来美国这个民主自由的国家的领导,也不一定总是反映民意,维护美国广大人民的利
益,有时候是脱节的。政客们忙自己的,老百姓们也过自己的,出了事有各个城市的警
察来对付,反正大家都有枪,比火力就行了。

假如奥巴马可以连任,他会那么快就露出自己的真面目吗?大概不会,他还会”Hope
and Change”。但现在诺贝尔和平奖,医改,移民改革,经济复苏,每一个光环都似乎
在褪色。“听其言,观其行”,一个真正的好总统,看来是要通过时间来考验的。

美国人民心中的奥巴马到底如何,2016年,让我们拭目以待。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...