Skip to main content

男不养猫


男不养猫:
汉末,蜀汉裸眠成风。李郎喜猫,夜必共枕。入夜,李郎春梦,尘根起伏。猫惊为鼠,
捕之,尘根断,吞食。有邻闻之,广为传。故老者多嘱子孙:猫为男患,不可养之。史
记,蜀太监盛,亦猫为之。


女不养狗:
汉末,东岳有郎,喜结连理。月余,夫欲差之鲁中,甚忧娇妻,遂购一雄犬,一伴妻之
苦闷,二防贼之淫威。三栽后,夫还,入门闻犬吠,抬首观冷颜。是夜,夫欲行周公之
礼,惊见妻肤旧痕累累,惑,追其由。妻无奈:狗解人意,夜夜同眠。。。。  翌日,
夫杀犬,然妻念旧情,殉之山崖。

作者:阿喂
链接:https://www.zhihu.com/question/20583660/answer/34482479
来源:知乎
著作权归作者所有。商业转载请联系作者获得授权,非商业转载请注明出处。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...