Skip to main content

关于老中想在美国生活-我的观点



很多人跟我一样,还是属于受中国农根文化几千年影响的一代,猥琐,只能躲在自己的
一亩
三分地里面内斗。不知道几百年前西方人就已经开始全世界探索和征服。

现在,英国人建立的国家,加拿大,美国,澳大利亚,新西兰,都是英国人的朋友加兄
弟。当年这些人也是政治观念不一样,内斗的死去活来,那些英国人才出走来到美国建
立了美国,当年美国英国也打仗了,美国加拿大也打仗了。可是你现在回头看看,一个
好汉三个帮,这些英国人建立的国家,在打仗的时候互相支持,经济上互通有无,国民
互相旅行便利,你移居到我的地方,我移居到你的地方没有任何阻碍,找个老公老婆生
个下一代也不担心文化断裂融入不了。

你说中国人,21世纪了,为什么还是那个小农思想,自己把自己划了个圈,象猪圈一样
,只能在这个圈里生活,出了这个圈,就是天朝弃民,就是该死。难道不能象西方人一
样,全世界各地开枝散叶,为中华民族的生存做出更大的贡献?

如果全世界多几个华人建立的国家,有事情大家互相帮忙,我们可以互相移居,有更多
的工作机会,在这样的国家找老公老婆也不是问题,生下一代也不担心黄皮白心,这难
道不是一件很好的事情吗?

要是哪个老中能多在国外留几个种,管他老中老外婚内婚外替你生的,都是你的种,几
十几百年后,你的什么张家族李家族,无论中美欧澳非洲,全世界几百号人
聚集在一起,纪念你这个多情的老祖宗,这难道不也是一个男人的巨大成功?这不也是
中国人的一个巨大成功?管他是哪个政治观念派别,都是中国人的成功。

从这一点上来说,小留这样的新一代小孩都是好样的,能够在信息大潮里面长大,接受
新鲜事务,勇于捍卫自己的利益,不象我们老一代比较猥琐,比较自恨,小留们才是早
上8-9点钟的太阳。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...