Skip to main content

给将军们普及下普通人碰到老黑要打架的招数

 发信人: xlzero (megatron), 信区: Military
标  题: 给将军们普及下普通人碰到老黑要打架的招数
发信站: BBS 未名空间站 (Mon Mar 29 15:33:37 2021, 美东)

1:你记住,不是打架,是保命,太多人觉得就是打架,实际上如果你赢了,你可能不
会打死对手,但是如果你输了,那可能被对手打死,所以将军们要记住,打架就是保命
,打输了可能就会死

2:永远不要随意对比你壮的开打,柿子还挑软的捏,老虎狮子去捕猎,也只是欺负食
草动物,马羊等等,而不是对着大象,你一米7的小身板,找个190的200斤老黑壮汉打
架,自己找虐

3:如果能跑先跑,我有同学当年上学路上碰到黑人堵路抢劫,他背着书包扭头就跑,
黑人追不上,这也是一招

4:如果避免不了打架,又跑不掉,被迫打架,先找家伙,棍子,刀,雨伞等等任何能
拿在手里的硬工具,一寸长一寸强,人类之所以区别于动物就是会使用工具,用雨伞记
住反过来用伞柄去敲

5:如果必须打架,没有地方跑,没有任何家伙赤手空拳的搏斗,记住,对壮汉你要贴
身抱住,不能隔着距离对打,你根本打不过(普通人),抱住贴身,你能直接去抱腿把
他推倒在地是最好的,因为普通人打架上身扭动用力,下盘不稳,一个抱摔会有出其不
意的效果,直接能摔蒙他。脑袋再磕到任何东西上,你就胜了。如果没有摔,也要把他
顶向后方,磕到任何地方也够他受的

最后,打架如果开打,就是为了你的命,一定要狠,能用牙齿咬也可以,咬脖子咬耳朵
咬脸,什么能用就用什么,抱住了咬也是普通人能做的,记住往死里咬,咬下一块肉最
好,一般人很难忍受这种疼痛,牙齿也是空手情况下,普通人最尖锐的武器,就算你事
后掉几颗牙,总比你被打死强

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...