Skip to main content

穿透力和击停力测试


Penetration and stopping power tests:
Part 1: https://www.youtube.com/watch?v=1z_GQfsNB3M&feature=youtu.be
Part 2: https://www.youtube.com/watch?v=4x0cr3Nb6pA
Part 3: https://www.youtube.com/watch?v=BJ0prw8_zds
Part 4: https://www.youtube.com/watch?v=fr2qVzIg8qU

 

 发信人: noghsot (noghsot), 信区: GunsAndGears
标  题: Re: 穿透力和击停力测试
发信站: BBS 未名空间站 (Sun Oct 18 12:46:43 2020, 美东)

类似的测试好多,如果我没记错的话:
1、.22lr穿透力不如想象的怂。就是停止力很怂,而且可靠性垃圾。
2、9mm在家庭环境下,fmj穿透一点不怂,比556不差。所以家防一定hjp。
3、556,如果用家防专用的hjp,穿透力一点不强,而且停止力很好,远好于其他弹种。
4、12ga,7-8号鸟弹基本上没有穿透力,打人远距离也打不死,所以不要用来家防,停
止力距离稍远也不够。slug家防距离穿透最狠,所以不要用来家防。最后结论就是0-4
号的鹿弹最佳。

。。。。。
结论就是:
1、家防可用556,但是要配好弹种。
2、9mm可用,pcc或者手枪都好,但是要配好弹种。
3、12ga,如果扛得住后座,家防可用,也要配好弹种。

其他口径类似,脱离具体弹种说穿透和停止力都是耍流氓。。。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec