Skip to main content

川普的历史地位绝对在林肯和里根之上

 标  题: 川普的历史地位绝对在林肯和里根之上·
发信站: BBS 未名空间站 (Thu Nov  5 19:44:51 2020, 美东)

应该说是古今中外非常优秀的一个领导人了。任期主要政绩为


1. 从中东撤军,体恤穷人的孩子,不让军火商拿他们当炮灰赚钱
2.减税,不许投资医药业的财团以帮助穷人的名义吸血中产
3.和中国打贸易战,促使工作回流美国
4.抗疫表现出的大无畏精神鼓舞了很多美国人。我认为抗疫初期必须DOWNPLAY疫情,否
则连菜店工人都不上班的话,死亡就不是二十万,而是几千万饿死了


关于林肯,黑奴是解放了,如何处置解放了的黑奴的问题那是一团糟,给后世子孙带来
了无穷无尽的烦恼。里根自从遇刺以后就和利益集团同流合污了,没啥好说的。

古今中外能做到川普所做到的不多,卡扎菲算一个,还有一个我就不说名字了,大家都
能猜到。川普在西方国家的历史地位和汉武帝在中国的历史地位应该差不多

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec