Skip to main content

2014, 我的10个愿望


1.    祝愿父母健康
希望半瘫痪的母亲少一些病痛的折磨,希望快70的父亲保持硬朗,能够继续像现在那样
有精力陪伴,照顾他的妻子,我的妈妈。

2.    祝愿老婆开心,儿子快乐
老婆开心,就能让老公感受到幸福。儿子童年快乐,长大才能建立正常的人格和自信。
希望2014又是一个家和万事兴。

3.    祝愿弟弟百尺竿头,更进一步
弟弟很聪明,但却大器晚成,30老几才得到公司的重用,希望新的机会把他的潜能都发
挥出来,不再怀才不遇。全家人和和睦睦。

4.    祝愿中国更加富强,人民平平安安
来美多年,但对祖国还是充满了感情,不管政治见解如何,乐见新的领导层把中国带的
更加强大。希望洪水,地震,台风等这些年年夺去很多中国人生命的天灾人祸能够少一
些,更多人获得有尊严。

5.    祝愿中日和平,不要发生战争
国耻难忘,但现在的中国更需要和平。甲午年不要再爆发甲午战争,龟兔赛跑,中国终
将赢回自己固有的地位。

6.    祝愿美国经济继续健康复苏,S&P突破1900点
2013年的强劲复苏,让我的所有投资都取得了丰厚的回报。乐于向政府交更多的税,乐
见更多美国人找到工作,重新恢复购买力。希望美国经济持续健康增长,惠及更多的人
,希望美国继续繁荣,能够保持住那些独特的优点。

7.    祝愿DENVER BRONCOS夺得超级碗
希望我们强大的野马队,能够在最强QB Payton Manning的带领下,见神杀神,见佛杀
佛,一举捧回超级碗。

8.    祝愿一个精彩的世界杯
等了四年,希望这届世界杯不要让人失望,有很多经典的比赛留给人回味。

9.    祝愿IPHONE-6有革命性的突破
如果按照惯例的话,苹果将在2014年9~10月份推出新的苹果手机,希望这次的苹果手机
能够给人耳目一新的感觉,不要再换汤不换药。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...