Skip to main content

大家都没想过为什么二战之后只有中国崛起了么

发信人: mikeandlily (mike), 信区: Military
标  题: 大家都没想过为什么二战之后只有中国崛起了么?
发信站: BBS 未名空间站 (Tue Jan 22 10:35:52 2019, 美东)

美国所谓的皿煮,搞垮了东欧,分裂了苏联,搞乱了中东,东南亚发展缓慢,印度甚至
还有很多文盲,把非洲和拉美弄得民不聊生,日本欧洲韩国台湾稍微起势,立马把你打
压下去,为什么偏偏只有中国能崛起?大家都没想过么?
原因很简单,主权独立。很多国家口口声声主权独立,真的独立了么?加拿大把防控全
部给美国,就只能任人宰割,欧洲虽然心里不服但是也不敢得罪美国,台湾蒋经国时代
想发展核武器被美国强行压下来,日本更不用说,小蛋蛋都被美国捏着。印度的核心资
产被英国人掏空了,这样的国家能崛起成政治、经济、军事全方位强国才真是见鬼了。
中国能崛起就是因为主权独立。首先,政治是独立的。这是打仗打出来的,小日本,国
民党,美国领导的联合国,苏联,印度,越南;其次经济是独立的,核心资产都在国家
,苏联垮台就是因为国有资产都被一些国贼给私吞了,不垮才怪,印度发展缓慢也是因
为核心资产都在英国人手里;还有就是军事实力够强,没有人敢和中国打仗了。再加上
人民够勤奋,想不崛起就难了。
很多国家口口声声主权独立,其实都是狗屁。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...