Skip to main content

也说说哥经历的两起踩踏事件吧

发信人: freelife (飞哥飞不动), 信区: WaterWorld
标  题: 也说说哥经历的两起踩踏事件吧
发信站: BBS 未名空间站 (Thu Jan  1 14:45:07 2015, 美东)



1)大概是初中二年级吧,那时开全年级大会,每次结束大家一窝蜂散伙。终于有一次在
狭小的楼梯里,大家挤成一团,下面的要上去,上面的要上去。 哥当时看着人多,决
定等会。结果上下人流对冲,哭喊一片,几个老师看势头不对,在下面死命抵住最下面
,又有老师从别的楼梯上到上面,让上面的人流撤退,总算控制住了。几个学生昏倒,
楼梯里的凳子全都挤成了碎片。

2)那是大二,每次周末学校公演电影,很多学生。一次电影正在放,大家或坐或站,忽
然人群中央起了骚动,据说一女生晕倒,男生抱着大喊让路。结果就像投了了个炸弹,
人群哄得向四周散去。哥一开始坐在中间一带,后来来个同学没凳子,我说你坐我这,
我去了最外围,基本没受影响。中间偏外的同学最惨,还好没人伤亡,但是挤破的椅子
,鞋,眼镜满地都是。有些手脚快的,都被挤到了树上,墙上,有人被挤到了附近的阴
沟里。。。

人多的地方踩踏最容易发生,特别是有点风吹草动,就是波的传播,践踏必然发生。没
事别去凑热闹,看见人多到一定程度,赶紧撤离。。。
--
办公楼里办公间,办公间里程序员;
程序人员写程序,又拿程序换酒钱。
酒醒只在机前坐,酒醉还来机下眠;
酒醉酒醒日复日,写来写去年复年。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...