Skip to main content

最近H1N1流行,大家要坚持吃葱姜啊


悲剧的圣诞节啊。我家宝中招了,很惊险。烧了几乎1个礼拜。不知道是不是H1N1。反
正这病毒性感冒极厉害,我们大人很少生病的也病倒了,而且很重。最蠢的是还为了遵
守承诺去参加了party,把朋友一家搞病了,朋友的和我娃同龄的小娃烧了8天了。朋友
怕我们家担心今天才告诉我。
教大家冬天预防感冒的几招
1.葱姜萝卜鸡/排骨汤,汤里加一点点陈皮
2.早餐加点肉桂
3.红黑黄豆浆,我娃吃了咳嗽就好点。
4.早餐吃点姜枣汤
5.泡脚,保证脚是暖的(我家娃就是靠泡脚,生病期间脚冰冷的情况下泡脚,把头部的
温度拉下来了)没条件泡脚就灌暖水袋,没有暖水袋就妈妈把宝宝的脚放在怀里。
6.保证室内空气流通,特别是睡觉的时候要既保暖又流通,有条件的话让娃睡最大的房
间,才能保证空气的质量。
7.不要吃任何生冷,我家娃就是吃了西瓜,结果湿疹痒,老师又给脱了衣服只穿一件中
招的。
8.不是太冷太风的时候一定要出门去呼吸新鲜空气,我娃出去一趟回来咳嗽就好很多。
请大家帮我朋友的小娃pray一下吧,有包子,多谢了。实在是好担心。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...