Skip to main content

power steering漏油

 
我刚好修过,去店里修别的告诉我power steering漏油,要900多。 你打开hood找到
power steering tank,看看是不是和它连接的那根橡皮管漏油了,要漏的话旁边会很油
腻。我后来自己换的,别的都很容易,就是这根管子不太容易拿出来。

先去dealer那买根一样的,是一根不规则的金属管,两头接着橡胶管,顺便把power
steering fluid也买上,先把tank里的油吸出来,把管子靠近车头换气扇的那端先松开
放油,下面找个盆接上。我第一次干没经验下面只是拿个纸板垫着,漏到地上一些,不
好洗。最后松开靠tank的那端。最难的部分就是把这根管子取出来。只有往车身方向去
有一个角度可以取出来,往车头方向不可能取出来。取出来以后同样的角度把新管子装
回去。加满power steering fluid。打火几秒钟以后关掉,再把power steering fluid
补加到刻度就完事了。

我的只是管子坏了,要不管的话其实漏的也很慢,只是power steering fluid会发黑,
对power steering pump不好。你这还要换power steering rack 难道是那坏了?

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...