Skip to main content

标 题: 股市,币市,游戏,工作,人生其实都一个道理

发信人: pker (我要那天再挡不住我眼), 信区: Stock
标  题: 股市,币市,游戏,工作,人生其实都一个道理
发信站: BBS 未名空间站 (Thu Feb  8 14:17:19 2018, 美东)

#1
在绝对的实力前面,任何计谋策略阴谋阳谋都是屁。
比如百亿资金要压盘的时候,小散能做的就是跑路。

#2
在实力相差不是很大的情况下,
比如50%以内的差距:狭路相逢勇者胜。
熊牛相逢,实力相当,谁不怕死谁就赢。

我半血射手遇到全血坦克,不但不退,反而冲上去。
坦克一想,肯定丫后面有人,赶快逃跑,结果被活活射死。

#3
奇迹只会出现在你的坚持的时候,不会出现在你祈祷乞求的时候。
二战斯大林格勒保卫战,这个不解释了。

#4
人都是猥琐的,包括人的群体,你个人的力量也许什么改变不了,
但是如果你不怕死的精神,疯狂的态度,可能会感染观望派,导致形势逆转。

以上法则重要性按数字顺序排列,
当你困惑在某一条的时候,请参考上面一条。

如果你是温拿,请善待loser,士可杀不可辱。
如果你是loser,你唯一翻盘的资本就是疯狂和不怕死。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...