Skip to main content

我说说财务自由的好处

发信人: grainsw (grainsw), 信区: Military
标  题: 我说说财务自由的好处
发信站: BBS 未名空间站 (Thu Mar 28 09:29:40 2019, 美东)

我看各位吹的神乎其神的,什么package 30万也好,50万也好。就算真有这么多,你扪
心自问一下,有没有担心哪天落到苏老大的下场?你半夜做梦有没有梦见被裁员,然后
吓醒?

财务自由的好处是什么?不是loser们想象的,就是自由了不上班,整天就吃喝玩乐,
游山玩水了。这种事,做个几个星期我就厌倦了,除非你就是一个旅游的铁粉,恨不得
365天天在世界上逛。况且,孩子还小还在家读书。我的体验是,世界上最舒心的事是
躺在在家的床上睡觉。星级酒店的湖畔天台上喝咖啡和自家deck上喝,也没啥差别,这
种事做多了都没意思。

最大的好处就两个字:踏实,钱给你最大的安全感。什么公司倒闭,layoff,三哥上司
的勾心斗角都和你没关系。最大的风险也就是美国股市2008了,就算跌去一半又怎么样
呢?哥还是有钱人,还是平安退休。和你们公司的CEO一样,就算把公司搞砸了,自己
还是有金色降落伞备用。

真正的自由了的是,免于做你不不喜欢的事的自由,时间自由是最大的自由。当然,你
也可以自己骗自己,我就是喜欢上班看三哥上司的脸色。哥现在干任何事都是不急不忙
,路上遇到路怒什么的也不生气,你们忙你们先请,哥的时间限制只有生命的限制。

其次的自由才是金钱的自由,想买什么不用考虑价钱,喜欢就行。这就不多说了。

最后的自由是财物的自由,就是你的钱是自由的,不是绑在弯曲小黑屋里的。投资这事
,世界各地只要有网络都可以做。哥过几年把资产都搬到BVI去,儿子读大学了,我的
居住地就搬那儿去。每年那里住两星期,其余中国、美国各不超过半年,就不用给两个
恶霸交税了。照顾黑墨木的重大责任就交给你们和你们的后代了。呵呵

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...