Skip to main content

标 题: 搞不懂:习王怎么会走到现在的地步呢?

发信人: cxjcxj256 (天汉星星), 信区: Military
标  题: 搞不懂:习王怎么会走到现在的地步呢?
发信站: BBS 未名空间站 (Tue Jul 31 10:50:40 2018, 美东)

搞不懂:习王怎么会走到现在的地步呢?

习在地方上也算是平和敦厚开明的领导人,王则是著名的改革派官员,国人当初给予很
高的期望,希望能够沿着改革开放的道路继续往前走,可是怎么两人结合怎么却往极左
独裁的方向上走了呢?还修宪取消任期,真的几乎让所有的人大跌眼镜,觉得有点不可
思议,很多人在痛骂,实在搞不懂,莫非权力真的有如此大腐化人的魔力?

本来国人以为任期制完全可以制止住个人独裁,现在才知道任期制还是远远不够的,脆
弱的像一张纸,短短五年时间就能打破这一国人心中的宪法规定的最基本政治制度,而
人大根本没有任何制约作用。

虽然有点悲观,但是对于中国的未来依然还是有信心,因为中国的复兴是现在中国人最
大的期望,特别是有民族情怀的人,人心所向,又到了关键时刻,不到万不得已真的不
希望国家乱了,这很大程度上取决于习和元老们的选择,取决于习的内心,真有精忠报
国的精神,大家商量协商处理,习还是有大把机会留下好名声的。

一个较好的选择:选择接班人;两届到点按时交班,不破坏既有规则留下历史骂名;由
人民政协提出重新修宪恢复任期制,同时规定宪法修改需要由中央、人民政协、人大三
个会议通过,保证宪法的权威性稳定性;新设立一个法定的监国机构,负责协商高层权
力交接以及重大政治问题,高层交班后在可其中任职以保障政治和人身安全,大国里这
点也是很现实的需要。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...