Skip to main content

省钱的几个阶段

发信人: xiaoyu3 (小猫钓鱼), 信区: PennySaver
标  题: 省钱的几个阶段
发信站: BBS 未名空间站 (Thu Aug 14 13:55:49 2014, 美东)

1.
刚开始上省版学习,天啊,原来这么多东西都可以这么便宜,甚至免费倒转,以前亏大
发了啊。学习热情高涨,每天看帖子讨论单子不亦乐乎,为了买玩算好的单子不怕烧汽
油费时间跑n家店,圆满完成任务的时候那个乐,忘记用几张coupon的时候那个沮丧。
家里囤货越来越多,不管是有用的没用的。

2.
该屯的屯上了,手里一堆白条,越看越没什么可买,愁。家里的东西是看着它过期扔掉
呢还是去捐掉呢,太多了。狠狠心把白条烧成吃的,歇。可是习惯性回来看帖子,看到
免费倒转心里那个痒啊。

3.
发现不搞丢能空出好多时间干别的啊,对免费倒转渐渐的也不痒了。家里需要的东西快
用完了上来瞅瞅问问有啥丢不,能省则省,没赶上最好的丢没免费也没那么沮丧了,甚
对胖子要求高的想想懒得弄了,没胖子也上了。

http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...