Skip to main content

标  题: 又一周结束了 感慨下这周

发信人: timssb (蔡宝健), 信区: JobHunting
标  题: 又一周结束了 感慨下这周
发信站: BBS 未名空间站 (Sat Aug 26 03:33:18 2017, 美东)

这周状态不好 我自己经常去的chamber里面总是有人占 自己在工位上也无心拍码

外面看看日食 回到工位内网上看看帖子 blind上看看吐槽 周一就过去了
周二汽车check engine了,跑去修车,一天又过去了,dealer真心黑啊。花了我五百多。
周三好好工作了一把,交了七八十行code。
周四work from home,其实一直在打LOL,还重温了一下TI
今天周五,chamber里坐了一上午,下午101巨堵无比,开了一小时才开到家,到家已经
快5点了。
回来的路上捡了三个瓶子。

总结这周,工作3.42%,刷题0.00%,chamber干私事40%,修车看日食等杂事40%,修车
带娃等其他16.58%。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...