Skip to main content

黑格尔和爱因斯坦谈中国人和中国历史

 



[ 1 ]

发信人: sansudaoist (三俗道), 信区: History
标  题: 黑格尔和爱因斯坦谈中国人和中国历史
发信站: BBS 未名空间站 (Fri Oct 29 12:46:50 2021, 美东)

【 在 ABCNBC (小李飞刀) 的大作中提到: 】
: 黑格尔说:“中国历史从本质上看是没有历史的,它只是君主覆灭的一再重复而已。任
: 何进步都不可能从中产生。几千年恶棍们轮流坐庄,炮灰们总是做祭品,这才是中国历
: 史的本来面目。事实上,中国任何一次革命都没能使这个国家取得尺寸的进步。”
: 他还说道:“麻木和冷漠的民众,是专制政体最稳固的群众基础!


爱因斯坦20年代访中国,也在日记里面记录下类似的感受。
他们共同的困惑是,为什么德国只有500年文字历史,而中国居然
有3000+年文字历史,还没有亡国; 肯定是中国没有历史!

不幸的是,爱因斯坦回德国后,很快希特勒就上台了,
几乎灭绝欧洲犹太人,顺便害死大多数喝鸡血的德国青壮炮灰。

黑格尔估计在哲学天堂中,为爱因斯坦叫好啊!
整天搞极端,玉石俱焚 的白人,才拥有哲学/历史!
这些小黄人在黑格尔,爱因斯坦面前,卑微不堪。。。
Put them in their right place!

黑格尔不明白的是:这些奉白人胡说为圭臬,羞惭无地自容的黄奴们,
怎么不赶快自挂东南枝啊?  居然唧唧歪歪两百年,还在无地自容!

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...