Skip to main content

kindle要是做成手机大小就好咯


哥是民工,每天在工地搬砖,劳动间隙喜欢用爬满老茧的手点开手机上的阅读器,学习
《windows 7一月通》,计划年前学完之后,开始看更高级的《三个月掌握word》,因
为哥最近在追一个康奈尔的妹子,怕她嫌哥文化程度低。
哥的ntc看书很耗电,哥很喜欢kindle的感觉,跟看真正的书似的,哥当年读到初二就
没读下去,直接南下福建了,当时工余也很喜欢看书,最喜欢的是《故事会》,和《知
音》,《故事会》里面那一个个鲜活的形象,跃然纸上,其中也有很多讲述我们外来务
工人员生活点滴的小品,《知音》却是一本有着高尚文学情调的书。后来跟一个厂的一
个哥们一起来到了美国,哥的行李箱里就装了十本《故事会》和五本《知音》。
起初用洗碗攒下来的钱买了个ntc,这几年在一家工地做工,收入翻倍,这个月买了台
打折的4s。昨天下班换了套hugo boss的西服,跟妹子约会,妹子比哥先到,哥看见她
拿着一个黑白的平板,哥当时说要送她一个最新的ipad5,妹子白了哥一眼,妹子说平
板是最新的电子墨水。哥拿来端详一番,发现上头的字就跟印上去的似的,就好像把一
张纸糊在了平板上,挺好玩的,让哥又想起来当初看故事会的日子了。跟妹子吃完饭,
哥跑回宿舍,踩着板凳把行李箱拽下来,翻出了故事会和知音,静静摩挲,还能嗅到书
本的油墨香,比起妹子的体香,哥还是更喜欢知识的香味。
要是kindle能做成手机大小就好咯,哥放在口袋里,搬砖累了,就找棵树一靠,摸出
kindle,继续学习windows 7了。昨天我跟妹子说,康戳(那个词哥不会拼)加c是复制
文件,着实让妹子吃了一惊,哥当时心里美的啊,真比10年前头一次从组长那里领工资
还美。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...