Skip to main content

Re: 转一个VT今天的头条:心酸的男人和不要脸的女外F

发信人: guchaochen (guchaochen), 信区: WaterWorld
标  题: Re: 转一个VT今天的头条:心酸的男人和不要脸的女外F
发信站: BBS 未名空间站 (Mon Dec 30 14:24:42 2013, 美东)

大家好,我就是这个邮件的作者。目前已经回到上海,准备静养一段时间。从来不知道
有这个论坛,也不知道为什么会被转到这里,更没想到影响这么大,有好几位素不相识
的朋友都上微博关心鼓励我,我很感激!谢谢你们!

我现在的心情比较复杂,因为当初写邮件时要不要爆名字方面想了很久。那时一个人在
火车上,心里无比痛苦和愤怒,没怎么考虑后果,所以没忍住爆了名字。不得不感叹网
友们人肉的功力,事情的发展也远远超过了我的想象。

虽然我不太认可“爱过就应该静静离开”的观点,那样的话就好像自己被卖了还在乖乖
数钱。我觉得每个人做过的每件事都应该对此负责,结婚时许下的“我愿意”承诺,婚
后就应该无私的为家庭付出。而婚姻的不忠,必须应该受到道德上的谴责。

但是事情发展太快,远远超过了可以控制的范围,看到自己的前妻被骂些难听的话,心
里也确实怪怪的,说不出什么滋味。有位朋友说道今后我会后悔把名字曝出来,我想也
许他是对的吧。

我现在还需要一些帮助,如果各位网友有精力的话,不妨把攻击转变到帮助上吧。谢谢!
我已经联系上了那位韩国太太,我相信在这个事件中她受到的打击应该是最大的,毕竟
她还有2个幼小无辜的孩子,今后要面对的坎坷我无法想象。据她说,那个狠心的韩国
人已经想和她提离婚,所以如果谁知道有针对韩国人的妇女权益保护的团体或组织(最
好是弗吉尼亚黑堡或C堡地区),请贴出来。谢谢!我现在感觉已经比两天前好多了,
所以可以的话请帮帮那位可怜的韩国太太和她的孩子们。

再次感谢大家的关注,祝大家新年快乐!

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...