Skip to main content

标 题: 四川辣椒油,简单的要命,好吃的想哭!

http://www.mitbbs.com/article_t/Food/32061787.html

发信人: perfectcat (perfectcat), 信区: Food
标  题: 四川辣椒油,简单的要命,好吃的想哭!
发信站: BBS 未名空间站 (Tue Nov 7 21:38:56 2017, 美东)

每次去家门口的那家牛肉拉面馆,就对她放在桌上的那罐子辣椒油迷恋不已。三个字,
红!香!辣!做口水鸡,吃汤面,吃炒饭,无论是吃什么都要放上一点,又香又辣超好
吃。自制的辣椒油保存一周后香料的味道会被进一步的激发出来,味道会更浓郁。简直
就是好吃的不得了。非常安全健康的自制麻香油泼辣子诞生了。居家必备,送礼佳品……

材料:油(菜籽油更佳)500ml,辣椒干80g,花椒适量,白芝麻适量,桂皮一块,八角
3个,盐适量

做法:
1.准备干辣椒100g,用水冲洗掉浮灰,去蒂,吹干水分后打成粉末状
2.白芝麻洗净后小火炒香后和辣椒碎混合
3.取约500ML左右的菜籽油,怕太辣的可以增加油的份额,倒入锅中,小火慢慢加热,
放入花椒,八角和桂皮,小火慢炸,激发出香味,当感觉到油温慢慢升高,用白芝麻测
试,当丢下去有明显滋滋滋的样子,关火
4.将香料捞出
5.将油分批倒入准备好的大碗中,用筷子搅拌一下,热油浇上去后会沸腾
6.冷却后用保鲜膜盖住,静置一夜后更红更香,入密封瓶保存,简直好吃的你想不到

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...