Skip to main content

北美wsn的故事


大学同学Y君身上发生的真实故事:

Y君到加拿大留学,拿到驾驶执照后第一次开车经高速去探访远方一朋友。

由于时间已是午夜,加上人生地不熟,很自然的Y君错过了高速公路出口。看看路上车
辆稀少加上实在怕再次走错路,再加上侥幸心理作怪,Y君决定倒车回到错过的出口。
不幸的是,万一总是能够成真,一辆小车追尾撞上Y君的车屁股。

可能是老外比较守法,通知了警察后,两个人没有争吵,老实坐在车内等着。

Y君想:这回麻烦了,才拿到的驾驶执照也可能保不住

一会骑警到了,先低身在后面的车辆了解情况,不到两分钟,起身走到Y君的车窗前。Y
君想好了一肚子的话预备接受警察的提问。谁知道,骑警没有提问,直接一个手势,“
你可以走了”

Y君大惑:“我可以走了?”

骑警:“后面那个家伙喝醉了,他说你在高速公路上倒车”
--

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...