Skip to main content

说说当年元首怎样才能成功

说说当年元首怎样才能成功
1.不要急着东线动手,集中解决英国问题。慢工出细活,发展海军,加强空军,接连不
断地轰炸轰炸,搞到英国经济崩溃为止,彻底断了美国插手欧洲战场的念想。

2.如果搞不定英国,就和斯大林互相提防,但表面合作,搞个东西欧分治。

3.在保持对苏和平的前提下,把军事重点放在北非,清掉英国势力,一直冲到中东,大
搞石油。

4.反犹适可而止,经济领域限制犹太人,但科技领域保持开放,争取首先or很快搞出核
武器(这个超前,不太现实)

5.在苏德开战后,放下身段,开出天价,利诱日本北进。西伯利亚都给日本,军工技术
和石油钢铁都和日本分(战后),把日本拖下水,给苏联背后一刀。

这样美国会在很长时间置身事外,等到想动手也玩了。德国会成为第一超级大国,直到
希特勒死后分裂为止。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...