Skip to main content

为什么先秦的牛逼高人这么多


而且是很集中的出现。 孔,老,孙子,鬼谷子,墨子,韩非,随便列几个,都是响当
当的牛逼,看看道德经现在还在传遍全世界,孙子兵法连美国这么现代化的国家都列为
第一兵书,鬼谷派出两个学生就玩转六国,这种牛逼法后世完全不能比。。。难道是战
争激发人们的潜力?还是后来的秦皇焚书坑儒和汉武的罢黜百家造成国人思想碰撞减少
?

在孔老之前,也有极牛逼的,比如太公,周公,还有老庄所谓的“古之真人”,这些级
数高的离谱。其实,按古代的人口,恶劣的生存条件和知识传播条件,还能这么密集度
的牛人辈出,而近代这么多的人口基数,比当时好几百倍的条件,却没能出稍微能望其
项背的人物,实在是耻辱啊!

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...