Skip to main content

以结婚为目的的恋爱都是别有用心

http://gengwg.blogspot.com/
有人假借毛主席说不以结婚为目的的恋爱都是耍流氓。我要旗帜鲜明的反对。我说以结
婚为目的的恋爱都是别有用心。国家说要花大价钱培养诺贝尔奖冲刺人,就是以结婚为
目的的恋爱。做科学不该是为了诺贝尔奖,不是为了名利,而应该是为了兴趣,好奇,
求知的欲望。婚姻是恋爱的结果而不是目的。正如拍照应该是旅游的结果而不是目的,
育儿是一种有意义的体验和经历,而不是为了将来回报。尊敬关心爱护父母是与父母感
情的结果而不是为了遵守孝道。三个概念,爱,性,婚姻。爱是无私的,无条件的,没
有爱的性是肤浅的,苍白的,绝望的,甚至是痛苦的。性是美好的,快乐的,爱和性是
都是永恒的,是人类的属性,是人的社会本性和生物本性决定的,是一对好基友。婚姻
是历史的,是随着社会的变化而出现,变更,并且最终要消亡的,正如国家,阶级一样
。婚姻是道德与法律的载体,而道德和法律是有历史和阶级局限性的。婚姻可以挟持爱
,更可以绑架性。只有充满真爱的婚姻才是美好的婚姻。暂时只能说到这了,更多论点
尚未形成。我们生活在一个快速发展的时代。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...