Skip to main content

标 题: 震撼4分44秒 北大美女大学生让整个世界沉默

发信人: zhonghangyue (中行说), 信区: Military
标  题: 震撼4分44秒 北大美女大学生让整个世界沉默
发信站: BBS 未名空间站 (Sat Sep 13 18:40:03 2014, 美东)

她叫刘媛媛,是北京大学法学院研一的学生,上月初她的一场演讲,仅仅4分44秒,却
震撼了在场所有人,让整个世界都沉默了!



她说:「现实逼年轻人为求生存没了梦想,没时间关心政治、关心环境、国家的命运」
,「现实生活遵守规则的老实人,往往一辈子默默无闻,而弄虚作假的人最后却名利双
收。」

「不要变成你年轻的时候,最痛恨、厌恶的那种成年人。如果将来摆路边摊,就不要卖
地沟油小吃,不要短斤缺两。如果开工厂当老板,就不要偷工减料,净生产一些次品。」

「每一个普通人,在自己普通的岗位上,做一个好人是非常有意义的,每一个人生下来
都注定会改变世界,因为我们不是禽兽,我们是人。」

「不要因为『现实』,因为利益,而去扭曲自己的创值观,而去做埋没良心的事情。」

「如果我将来是一个公正严明的法官,那么这个社会就因为多了一个好法官,而变好了
一点点。」

「如果有人跟你说:『年轻人,你不要看不惯,千万要适应社会』,一定要告诉他:『
我跟你不一样,我不是来适应社会的,我是来改变社会的。』」

……

这场演说让全场沉默,更让网友们省思……http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...