Skip to main content

MCP:这垃圾公司又开始打爱国悲情牌了

用钱雇佣的稀土证卷商开始游说国会,放幻灯片请吃饭开party,总而言之一句话:目前美国最尖端的武器,都要用用稀土。100%依赖中国进口。而像MCP这样西半球最大的稀土生产商,又一次面临破产危险。
 上一次大千稀土热的时候,为了爱国为了反华,狗剩一口气在三个月内把MCP的目标价提升三次,一直调高到120的目标价。又是放债,又是发股票凑足了钱。这些钱哪里去了?美国不腐败。这些爱国者的血汗钱哪里去了?
   这MCP垃圾公司根本就无法和中国的稀土竞争。他们的理由是:中国生产稀土没有环境代价,因此成本较低,而这个MCP股市吸血鬼,我自己打扮成天使和美国拯救者,说不是自己无能而是共军太狡猾了。
   据说广西农民从山腰挖点土拉到县城就能换钱。这没办法,地球是旋转的,离心力把稀土离心到了东半球。
现在正密切注意MCP的二次炒作行为,看看前赴后继的爱国者,特别是二狗子,怎么二次上当。到时候,咱们也跟着打打酱油。
http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...