Skip to main content

标 题: 妈妈国内被骗100万


发信人: xinxiaozx (身体健康), 信区: Family
标  题: 妈妈国内被骗100万
关键字: 被骗
发信站: BBS 未名空间站 (Tue Aug 26 14:06:00 2014, 美东)

心情很郁闷,来这里倾诉一下吧。最近才知道,妈妈去年年底在国内被人骗掉了100万
,几乎一辈子的积蓄都没了,她不敢告诉我们,因为我爸在美国帮我的忙,她怕说了我
爸受不了,在美国病倒,在美国看病看不起,更加雪上加霜。我爸最近回国才知道这个
事,几晚上睡不着觉了,我也很担心他们。

按理说我妈根本不是一个糊涂的人,不知着了什么魔,接了一个电话说她被公安通缉,
然后她在公安部的网站上看到她的照片和身份证号码,还有我爸的一些信息,说要对她
进行调查,要她把存款转到她自己的一个空账号上。她好像就被吓到了,也不打电话和
我们商量,也不告诉任何亲戚,因为那人说她和别人说了别人也有麻烦。她就这样把钱
分三次转到那个自己的账号上,还把我委托她买的几十万国债也提前支取了,那是很高的
利息啊.也根本没和我商量一下. 后来她当天醒悟过来的时候,钱已经全部转没了.

我不知道她这一年是怎么过来的,想想都后怕,好在她现在身体没有出毛病,已经是不幸
中的大幸了.我就是很担心我爸,因为他才刚知道.他们两个一个普通职员,一个中学老师
,省吃俭用地一辈子,钱就这么没了,心理太难受了.虽然我劝他们想开点,但我心理也堵
的慌.真是觉得太奇怪了,我妈过去还常常教育我爸说很多网上骗子,她怎么会犯这么低
级的错误,好像当时换了个人,被催眠了似的,根本不是她会做的事啊.

我不知道这件事要多久才能过去,但是伤痛太大了.我自己还在读书,以后也挣不了多少
钱,也没法从经
济上支持他们多少,唉!就来这里倾诉一下.http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...