Skip to main content

谁都逃不过新冠

 发信人: milkmyduds (挤我蛋), 信区: USANews
标  题: 谁都逃不过新冠
发信站: BBS 未名空间站 (Mon Jan  3 10:37:20 2022, 美东)

叔把话放这
不管你生活在哪里
不管你防御措施如何
只要你还食人间烟火
你这辈子必然要得新冠,至少一次

大概率你可能自己都不知道
更大概率就是感冒症状
如果你碰上重症住院,那是命不好,或者说基因不好

目前人类每年的季节性感冒病毒里
已经有4种是冠状病毒
新冠将会成为第5种,当然以后也就不是“新”冠了
就是其中一种的上呼吸道冠壮病毒而已

叔全家都打过2针疫苗
但是照样不耽误得omicron
当然全家只有一个人有微症(咳了2天,低烧一天)
其它人毫无知觉,如果不是好奇去测试
根本不知道

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...