Skip to main content

中国的泼妇文化



上两个星期由于公司项目比较忙,晚上回家时老婆孩子都已经睡了。最后几天加班到凌
晨4点,然后早上8点又起床参加公司电话会议。累得整个人都快散架了,周末就想好好
休息一下。

今天睡到中午才起床,结果一起床就被老婆劈头大骂,说我把她的电脑弄坏了。那台电
脑本来就是我为在家办公方便买的电脑,前年回国创业时就给老婆用了。老婆基本属于
电脑盲,以前我还经常给她修,后来也懒得管了。

我天天加班,哪有时间用她的电脑。结果一起床,本来挺好的心情,全被她搅坏了。

我非常不理解,为什么有这样一种人,不论说什么话,都需要用骂人的方式来沟通。给
我的感觉就是,整个一没进化完全的猴子。攻击性非常强,有事肯定是别人的错,它自
已永远是完美的。

女人本来是以温柔为美,一有事就扯大嗓门和男人吵,除了体现出自身的素质低,还能
有什么别的作用吗?

中国的文化,自古以来,就是好男不和女斗。可是碰见这种动不动就骂人的女人,哪个
男人都会受不了吧。士可杀,不可辱,女人难道不懂吗?

除了老婆外,其它敢骂我或者我亲人的人,统统都被我教训过了。可是对待老婆,我发
现啥策略都不管用。

我就不明白,女人凭什么就认为,一纸婚书,就赋予了她随时随地可以开口大骂的权利
。中国的文化,读书人是儒生,要彬彬有礼,可是就没有说,对泼妇,要怎么办,也要
一视同仁,彬彬有礼吗?

对于女人来说,除了能宣泄自已的情绪,还能有啥好处?

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...