Skip to main content

标  题: Re: 你不优秀,认识谁都没用

FatWallet Coupons and Deals发信人: qazwsxd12 (aasdad), 信区: Faculty
标  题: Re: 你不优秀,认识谁都没用
发信站: BBS 未名空间站 (Thu Nov 12 00:30:13 2015, 美东)

1. 人活得是艺术,所谓well-rounded是指各方面都要well-rounded, 哪方面都不能疏
忽,数理化走遍天下都不怕是错的是指的走遍天下都不怕是错的,不是说你不该学数理
化。也不是说你该只学数理化。鸡汤常常是错的不是因为鸡汤道理是错的,是因为读的
人为了喝了鸡汤就不用吃米粉就不用吃蔬菜了,

2. “刚好遇到一困难,想到了这位“大人物””,有困难才想到人家啊,别说大人物
,扫马路的也没空。你这市侩也太明显了,有没有想想有没有共同爱好,不时约出来打
个球什么的。要了个电话三个月不理然后突然冒出来要人家帮忙?如果你觉得这样好,
一你情商底下,二你极端自私,三你生活毫无情趣(需要和人交流的就是要求别人的时
候。。)

3. Expect太多/太市侩,总是希望别人解决你的生活事业心理,总有人情商太低太孤独
动不动就whine"blahblahblah, 但是不能交心“,你动不动和人家交心干嘛,上班有个
一起吃午饭的说说天气下班有个人骂骂公司讲讲色情笑话多好,和你爹妈也不能天天”
交心“吧,这么说的人不光没人交心,也没人一起玩,一起吃饭,一起看电影。

just relax, enjoy your life and most important of all, make ALL effort, not 
just to advance ur career, not just to make money, but to enjoy ALL aspects 
of ur life and ALL the goodies this society affords u. then everything will 
come

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...