Skip to main content

商鞅变法

 发信人: cellcycle (vacoule), 信区: History
标  题: Re: 讨论一下 “商鞅变法” ?
发信站: BBS 未名空间站 (Tue Dec  1 13:45:00 2020, 美东)

另一方面,对于国民,有人分析是:

《商君书》包含驭民五术,如下:

1,壹民:统一思想。

2,弱民:国强民弱,治国之道,务在弱民。

3,疲民:为民寻事,疲于奔命,使民无瑕顾及他事。

4,辱民:一是无自尊自信;二是唆之相互检举揭发,终日生活于恐惧氛围中。

5,贫民:除了生活必须,剥夺余银余财(即通货膨胀或狂印钞票);人穷志短。

五者若不灵,杀之。

咱们逐一解读:第一条,统一思想。即,让老百姓有一个统一的认识。

这一点很重要,如果思想都不统一,百家争鸣,说什么都有,你拜他,我拜她,那怎么
行,必须让大家有一个共同的认识,心里想的一致,没有二心,这是最基本的。最好的
办法,是颁布一条准则,全民遵守。这一条很好理解;

第二条:弱民。

这一条的意思是,让百姓的实力削弱,如果百姓都富强了,富可敌国,那怎么行,不好
管理。估计商鞅给当时的统治者提的建议就是这个。

第三条:疲民,让老百姓疲于奔命。

这一条看似简单,其实是采用了战略,就像两个人打架,你故意消耗对方的体力;或者
,故意用别的事情拖延住对手,让对手没有那么多时间去思考。商鞅把这一条战术运用
到了民众身上。

第四条:辱民。

让民众没有自尊,让他们互相揭发,这样的话彼此没有信任感。试想,如果一群人互相
猜忌,那还能形成战斗力吗?不能抱团就没有威胁;连尊严都没有了,谈什么更高级的
想法。商鞅为什么不建议让民众活的更有尊严呢,这一点令人深思。

第五条:贫民。

不让民众有多余财富,这个很好理解,没有钱办不成事。整天为了一点钱奔波,生活都
顾不着了,哪还有那么多时间想别的。


########

总之对中华文化,除了孔孟/儒家,影响非常深远,直到快三千年的现在,有些东西 统
治阶层还在应用。。。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec