Skip to main content

标 题: 警惕印度猎头的骗局!


发信人: greenlands (sunflower), 信区: SanFrancisco
标  题: 警惕印度猎头的骗局!
发信站: BBS 未名空间站 (Sat Mar  1 17:25:22 2014, 美东)

简述:印度猎头用调虎离山计,阻挡竞争力强的人不去争职位,来保证印度人上位!
(我讲出来是为了你们提高警惕,记得要submition number, 了解一下这家猎头公司。)

我一直做contractor,所以和猎头打交道是家常便饭。一天一个新职位被posted,我接
到一个印度女人电话,简单几句后就说要submit我,他们公司很好的,什么条件都会答
应我。嘱咐我就不要再和别的猎头公司谈这个职位了。还说会给我发邮件。嘱咐我不要
打电话过来追问因为一旦hiring manager决定面试我,他们立刻会通知我的。我当时刚
要出门,没等看到邮件过来就答应她了。

一会儿回来后一个白人猎头带着洪亮热情的声音来电话,网上看到了我的简历,我完全
符合这个位子要求,他请求我答应他们公司submit我。我说真对不起,我已经答应另外
一个猎头去submit我了。白人又问了一下情况后,说,‘你听我的,那些人不submit你
,他们只不过告诉你他们会submit你,实际上他们只submit他们自己的人!我知道他们
是怎么干的。’

我当时感觉是:竞争对手之间说别人坏话不足为奇,不必在意。我说:‘那我可告诉你
这个情况了,你可别怪我让你白辛苦。’他说不会的,于是我就答应了。过一会儿,他
打回电话来说:'你被submit了,submition number 是#########'.

此时此刻我突然想起那个印度女人没有给我submition number!!! 
同一个名字不可以被submit两次,如果那个印度女人真的submit我了,后来那个白人就
不会成功submit.

再回忆一下,那么多疑点我居然相信了!
那个自称猎头的女人说话很不专业,哆哆嗦嗦很害怕的感觉,电话声音也很不清楚。我
按照手机上她留下的电话号码打过去没人接。按照她给我留的邮箱,我写信过去问,再
也没有回复,邮箱也不象是公司的。

你们说说,是怎么回事?我的感觉是:印度人常用的手法调虎离山,按住有竞争力的人
不去争那个位子,这样印度人就会上位!

我在乎的并不是一个职位而是一个善良人受到如此卑鄙的欺骗。 回想,以前我有多少
次印度猎头告诉我被submit了,然而完全是个骗局呢?http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...