Skip to main content

标 题: 20世纪的头号白眼狼是中国

美帝这边经济好的不行,发信人: haruhashi (春橋), 信区: Military
标  题: 20世纪的头号白眼狼是中国
发信站: BBS 未名空间站 (Mon Oct  1 23:55:20 2018, 美东)

中国真TMD是白眼狼啊。 20年代苏联支持国共的国民革命,建黄埔军校,出钱出枪出干
部,革命刚成功,蒋梅毒就投靠米英,4.12屠杀共产党。30年代抗日,米英怕得罪日本
,拒绝出售武器,苏联从38年-41年援助了1200多架飞机,包括当时最先进的I-26下单
翼可收起落架战斗机,SB轻型轰炸机,还有苏联红军空军志愿军,麻痹的转过背就去舔
米国,舔飞虎队流氓。40年代的解放战争,50年代中共掌权,毛子国出钱出枪出技术出
人,扶大了,立即就翻脸,找个借口建长波台危害主权,麻痹的军事同盟国之间建个共
用的指挥潜艇的长波台,算太正常不过了,现在米国
这么敌视,中国还经常让米国空母在香港靠岸,香港妓女良家,迫不及待的到他嫖资给
米军卖淫,也不叫唤什么主权了。

鲜血凝成的友谊的朝鲜,也是说叛变就叛变,90年代偷偷去承认南朝鲜。2000年代后自
鸣得意,搞六方会谈,逼朝鲜放弃核武器,结果自己的驻韩国大使叛变,成了米韩的卧
底,中朝谈判策略和底线全盘暴露。最近包子就更二了,一边在贸易,南海,台湾问题
上挨着米国左右开弓不停打来的耳光,一方面配合米国制裁朝鲜,驱逐朝鲜在华企业。

同志加兄弟的越南党,人民和军队,60, 70年代帮中国在南线抗住了50多万米军,140
多万伪军,700多万吨弹药的疯狂进攻,这个数量比米军二战在欧洲和太平洋战场的弹
药消耗总量还大。 越南人民和军队牺牲极为惨重,75年终于取得了胜利,把米国从中
南半岛驱逐了。 结果76年先主席尸骨未寒,北京就政变,79年矮贼刚上台,为了讨好
米国,交投名状,就入侵越南,在北越烧杀掠夺无恶不作。

唯一不变的,就是米国虐兔千百遍,兔子舔米国如初恋。 麻痹的从蒋梅毒到邓矮贼,
到刁胖子,从prof. 一筐.shit到格雷丝.高,种种倒贴嫖资卖淫,种种心连心, 种种
的一边挨耳光,一边说洋泾滨的表衷心。

这样的track record, 以后很难在江湖上混了。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...