Skip to main content

睡前看的段子

睡前看的段子

1)与老婆结婚三年,一直用TT避孕,现在事业稳定了想要小孩,可老婆说再等等... 我偷偷把所有TT都扎了小孔,老婆不知道。没多久果然怀孕,我故意装作不知情,问老婆怎么回事。意想不到的事发生了……老婆声泪俱下的向我坦白交代…………



2)一群人在一家僻静荒凉的小店吃饭。一共六个人,服务员却拿来了七副筷子。一人笑道:“多好的鬼故事开头啊!”众人都笑。服务员看看他们,数了数,不好意思道:“拿错了拿错了。”然后他撤走了两双。桌上寂然。.



3)有人说;俩人相互惦记的,叫爱情。一个人自个儿瞎琢磨的,叫犯贱。。。

4)有人说:男人,是用下半身思考的;女人,是用下半身吃饭的;

5)又要刪他电话,拉黑企鹅号码,取消微博关注,烧了他的丑照,丢光他送的东西,不见他的家人,避开他经常出入的地方,要通知自己的朋友自己失恋,要整天麻烦自己的朋友陪着自己、安慰自己。分手好烦啊!所以我懒得分手!你们说对吗?

6)上了这么多年论坛,发现还是成人论坛网友素质最高,没有谩骂没有歧视,通篇回复都是:“楼主辛苦了;好人一生平安!...”不愧是带有成人两个字的地方啊!

7)天冷了,丈夫找毛衣。妻子说:“洗了一下,小了,送给我哥了。”丈夫又找毛裤。妻子又说:“洗了一下,小了,送给我弟了。”丈夫火了:“你把我也洗一下,送给你妹吧!”

8)世界上最遥远的距离不是生与死也不是相爱不知,而是中国南方的冬天被窝里和被窝外的距离!

9)没结婚的像结婚的一样同居,结婚的像没结婚的一样分居;动物像人一样穿衣服,人像动物一样露着肉;小孩像大人一样成熟,大人像小孩一样幻稚;女人像男人一样爷们,男人像女人一样娘们;没钱的像有钱的一样装富,有钱的像没钱的一样装穷;情人像夫人一样四处招摇,夫人像情人一样深居简出。

10)每对甜蜜的情侣背后,一个星期总有那么两三天想一巴掌扇死对方!

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...