Skip to main content

航天飞机在美国失传, 说明科学家是讲政治的


航天科学家是有理想有能力的人, 虽然美国发展航天是为了制造杀人武器, 但科学家
们自认为并非走狗, 而是在代表人类征服太空, 科学家们对工资高低不感兴趣, 自认为
是在做公益.

然而在目睹一些事件后, 科学家们改变了想法. 六十年代肯尼迪被华耳街大佬刺杀,
军工企业都被华耳街大佬控制, 华耳街在大量地印钱. 南美几国民选总统被美国特工刺
杀. 

自己身边, 实验室办公室连同厕所马桶下面都被FBI安装了窃听器, 所有电话电脑被监
听, 清洁工是FBI特工, 科学家们的家里也密布窃听器, 街对面楼上有中情局特工整天
用望远镜瞄自己家.

科学家们被迫服从MBA们的指手画脚, 领教了他们的Leadership是什么, 被迫服从他们
制订的骚扰式的古怪的规则. 科学家们互相递了个眼色, 不干了。

后来又目睹了911, 科学家们觉得为这样的雇主卖命有疑问. 又目睹了同性恋运动, 目
睹了占美国人口千分之一的富人都是玩钱不干活的社会寄生虫, 科学家们觉得这样的社
会不是自己理想的社会.

科学家们发现, 经过层层政审录取的新一代工程师, 虽然都有多个博士学位, 都夸夸
其谈, 都有很多性伴, 大多酗酒吸毒, 都是随时可能向FBI打小报告的特务, 但他们工
作上一塌糊涂, 连换算英制米制, 扭个螺丝也不会, 都是无理想无能力的废物.

科学家们终于摇摇头, 这是一群猪在为导演911的政府服务啊, 和代表人类探索太空的
理想格格不入, 这个航天计划, 还是拉鸡巴倒吧.  

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...