Skip to main content

亚麻被pip的那个哥们没有掌握亚麻换部门的方法


本人曾和博主有过一些交集,这个博主在我们local小圈子里非常有名的,多了不想说
,只能说你不想和这样的人做同事或朋友的。

看到原帖评论里有说: “你看清楚点……这博主把Yisong说“有可能是mentor的问题
,祝今后good luck”的评论给删了然后反手只把说他commit有问题的部分发到网上让
Yisong被网暴……” ,这确实非常符合我对博主的一贯印象 - 心计多端,毫无道德感
可言。

我还看了他所谓的5.1w行代码,简直搞笑,大家都是程序员,自己鉴别。

我当然也不喜欢亚麻的pip,只是希望大家不要被带了节奏,论坛里大家都太善良。

补充内容 (2022-02-05 01:54 +8:00):

下面有说要补充事实的,那我就补充些有证据的事实吧:

1. 本人认识博主的研究生室友,朋友曾complain说博主偷冰箱里的吃的,20几刀的牛
排直接趁朋友不在家的时候吃掉,导致他们大夏天啥都不敢买,报警没用因为金额小;
然后精彩的地方来了,我朋友在厨房里安装了amazon blink电池版本,收集了完整证据
录像 =》朋友从超市买来食物,放到冰箱里,藏到最里面hard to reach的地方,然后
博主出现了,偷偷摸摸东张西望把吃的拿出来,偷偷摸摸的吃掉,那样子简直笑死。(
视频还在)

2. 这件偷食物的事情传开之后博主曾经发了个对他室友不可见的朋友圈吐槽室友欺负
他,里面大致说他室友(我朋友)不让他出房间门,不让他用厨房等一些列无须有的事
情,反正我笑到肚子疼,这是什么导演天赋啊 (截图还在)

所以楼下说什么不支持发声的,你们太天真了。那个LinkedIn post多少是真的呢?我
不喜欢pip,但是反正如果我和博主在一个组我是会崩溃的

补充内容 (2022-02-05 01:56 +8:00):

我发上面的已经得到我朋友(博主室友)的同意了,没有强行把朋友卷进来

补充内容 (2022-02-05 02:40 +8:00):

我是赞同博主这个post至少是对亚麻pip是一个反制的,毕竟我也总担心被p,但是大家
在deal with evil的时候不要变得evil,发声还是要真实的发声,一开始我发这个帖子
就是看不惯博主select comment让YS被网暴,这才牵出了人品问题,anyway大家吃瓜开
心就好
 

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...