Skip to main content
http://gengwg.blogspot.com/

圣女和圣男,在你们说出爱情至上,婚姻美满的时候。希望用一生去验证婚姻这个东西
是什么。大部分人,只是没有出轨的资本和姿色。在乏味空虚的婚姻中默默平衡和忍耐
,或者出色的演绎着所谓的甜蜜,连自己都觉得恶心。

在面临事业,疾病,灾难的时候,婚姻这个东西是最容易坍塌的。如果没有坍塌,是因
为,还没有找到另一个心灵支点。


亲情和爱情比起来,爱情就是搓比,充满了自私和色与利的交换。择偶的整个过程,就
是在衡量色相和金钱。

把生命用来孝敬双亲,因为他们是为你真实付出的人。欠谁的,还谁,天经地义。
把生命用来努力工作,因为那是你的衣食来源。付出什么,得到什么,这这个领域基本
成立。
把生命用来爱孩子,因为那是另一个你在世间的延续,你教给他什么,决定了他将来是
否快乐。


婚姻是一出戏,临了,谁又是谁的谁。如果有来世,根本没有必要相见。不求有恩,但
求无怨。


婚姻是世间最无奈的事。既然走进来,就不能轻易出去,因为父母和孩子需要一个所谓
的家的容器和概念,来支持他们的存在感。

不要浪费自己的时间和生命在本质没有用的事情上。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec