Skip to main content

哥今天讲一个马工致富的惊天大秘密

http://gengwg.blogspot.com/发信人: tallcuterich (不是在close房子,就是在close房子的路上), 信区: JobHunting
标  题: 哥今天讲一个马工致富的惊天大秘密,就这一次
发信站: BBS 未名空间站 (Tue Mar 17 12:03:35 2015, 美东)

趁着这几年马工行情还不错,好好干。

然后不要过的太奢侈,稍微收缩一下消费。多买点可以将来可以给自己带来收益的
asset,可以是投资,可以是business,然后work on them,not in them。

这样慢慢的就把w2/1099在自己的income stream里的比重慢慢降低。当w2/1099在你所
有收入比重降得很低的时候,那么你就可以退休了,去海滩冲浪,回国玩,分分钟的事。

就这一次,哥不能再泄露天机了。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...