Skip to main content

标 题: 这个韩国船长要在中国的话肯定枪毙了

http://gengwg.blogspot.com/发信人: dsb (大手笔), 信区: Military
标  题: 这个韩国船长要在中国的话肯定枪毙了
发信站: BBS 未名空间站 (Thu Apr 17 01:30:34 2014, 美东)

海损发生的时候,韩国船长一方面应该立刻派人下去探查海损情况,另一方面要马上把
所有的旅客集中起来,在船员的带领下,分组到救生艇附近集结,并把所有的救生筏都
放下到海面。等待检查海损的人汇报情况后再做弃船命令。

可实际上这韩国船长还没弄清情况自己就跑路了,丫跑路前甚至要求旅客呆在原地不动
,熟悉船舶情况的船员也没带领什么旅客,倒是自己先跑了出来。更严重的是,等船完
全沉没后这海面才放了4条救生艇。他妈的放救生艇救生筏连10秒钟都不用(看看
Captain Philips就知道了)。


国际海事组织要求弃船后船长是最后一个撤离的。所以当年土鳖烟台11.24特大海难后
大舜号的船长曲恒明连跑都没打算跑,因为丫知道他要丢下这300多号死鬼自己跑上岸
,等待他的也是共产党的子弹。所以至少保了晚节。

韩国Sewol沉没,折射出韩国这样的国家的职业操守和公民的道德水准,离发达国家,
甚至土鳖国这样的国家都很遥远。一有点屁事自己就先跑路了。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec