Skip to main content

乌克兰形势分析

 
美女Tulsi Gabbard分析乌克兰局势:

1. 根源就是乌克兰加入北约,俄罗斯当然不干了,那相当于北约军队直接驻扎在国境
线外。所以美国只要承诺不会吸收乌克兰进北约,基本就能缓解目前局势,但是它们不
会。

2. 实际上乌克兰加入北约的可能性几乎没有,那么为什么欧美不会明确说出来?因为
它们看起来更希望挑起战争。

3. 一旦开战,Military Industrial Complex又能开始大赚特赚,而它们显然控制着拜
登和两党建制派。

4. 损失的是美国人民,乌克兰人民,俄罗斯人民。

5. 从来没有一个政客能解释,乌克兰加入北约对美国到底有什么好处。拜登之流的一
贯说法是为了保卫民主,但是拜登自己在国内干的事,抓捕异议人士,言论审查等等,
很难让人相信他相信什么民主。

Tulsi Gabbard是前民主党国会议员,曾加参加2020总统大选。

@CallVoter

https://www.youtube.com/watch?v=12t9sBQR7Og

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...