Skip to main content

君子生而辱,不如死而荣

http://gengwg.blogspot.com/

与报恩、尽忠相对应,汉代人复仇起来也毫不留情。不同地域、不同阶层、不同年龄、
不同性别的人,均以复仇为尚。汉武帝欲一举消灭匈奴,打的旗号就是国恨家仇:“高
皇帝遗朕平城之忧,高后时单于书绝悖逆。昔齐襄公复九世之雠,春秋大之!” 最有
名的复仇者要算酒泉女子赵娥。在其父被仇人杀死、而自己三个兄弟均病亡的情况下,
赵娥一直等候了十余年,才等到良机刺死仇人,然后坦然到县衙自首:“父仇已报,请
就刑戮”。县令当即决定“解印绶欲与俱亡”,宁可罢官也要释放她。对两汉复仇风气
之烈,东汉的桓谭曾感叹:“今人相杀伤,虽已伏法,而私结怨雠,子孙相报,后忿深
前,至于灭户殄业,而俗称豪健,故虽有怯弱,犹勉而行之,此为听人自理而无复法禁
者也。” 汉代从政府到民间对于复仇的宽容和肯定,使懦者勇,弱者强,激励了悍勇
刚烈的民风。


董仲舒在《春秋繁露》中说:“君子生而辱,不如死而荣。” 汉代人承先秦余绪,义
不受辱者比比皆是。据学者彭卫统计,两汉史籍记载了200多起自杀事件,自尊和尽忠
型的自杀者的数量最多,几乎涉及当时社会的所有阶层――从皇亲贵族到文武百官,从
士人宾客到普通百姓。李广耻对刀笔吏,引刀自刭;田延年不愿“入牢狱,使众人指笑
我,卒徒唾吾背”,自刎死;萧望之不愿“老人牢狱,苟求生活”,饮鸩自杀;宣帝要
将盖宽饶下狱,后者即引刀自刭北阙下;池阳狱椽王立不知家人受贿,被调查,即杀身
以自明;蔡伦耻受辱,沐浴整衣冠,饮药而死。仅汉武帝一朝,名臣自杀者就可以列出
一长串,如赵绾、王臧、李广、李蔡、张汤、王卿、暴胜之、商丘成等。而最为惊心动
魄的大概要算汉初田横五百士的故事了。刘邦即位后,田横不愿受辱称臣于汉而自杀,
手下五百人闻讯皆自杀从死,徐悲鸿曾作画以颂之。
--

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...