Skip to main content

古楚国和现俄国

http://gengwg.blogspot.com/
     古楚国                           
1. 颛顼的后代,混合了华夏南蛮的文化  
2. 拼命想回归华夏,国君鬻熊给周文王当火师累死,曾孙才得到子的封号(也许中间
又当了几代火师)。
3. 国君朝见天子不能进殿,只能当服务员。天子赐宴,只能跟鲜卑王一起在殿外看守
火堆。
4. 周天子多次讨伐楚国,周昭王就三次,把楚国从汉水上游赶到长江北岸。
5. 楚武王封子为王,表示不跟周朝玩了,另立旗帜“吾蛮夷也,不同中原之号谥”。
在自己的旗子下玩。
6. 楚国努力发展,称霸,看不起楚国的中原小国比如郑卫,都要来楚国朝见,华夏正
统晋国跟楚国盟誓平分霸权。
7. 楚被秦灭,不过项羽刘邦得到天下,现在中国人用刘邦朝代名称自称。

     现俄国 
1. 从彼得大帝开始学习西方,混合了草原和西欧的文化。 
2. 想加入西方民主的旗帜下,苏联解体,加入G8,其实没权利,比如想开除就开除。
3. 西方各国根本没有真正接纳俄国。
4. 北约一直扩到格鲁吉亚,乌克兰附近。
5. 普京表示受西方骗了。暂时没另立旗子(还是中国聪明,老早就立了个中国特色社
会主义的旗子)。
6. 不知道俄国能不能知耻而后勇了,真正崛起前应该有个中间过程,比如跟西方霸主
合约平分霸权。
7. 几百年后才知道。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...