Skip to main content

二毛三招找死,最终得偿所愿

 发信人: V123 (文成武德日月神教教主-正在301治脚气), 信区: Military
标  题: 二毛三招找死,最终得偿所愿
发信站: BBS 未名空间站 (Tue Mar  1 10:47:54 2022, 美东)

1. 坚定地追求加入北约 -- 其实北约大多数成员国是不愿意的, 因为它首先违反北约
加入的条件,怕被蠢驴拖入对俄战争。 但是我帝故意给予这头蠢驴无限的希望,诱惑
它拼命反俄。

2.试图收复克里米亚和乌东俄罗斯族独立区域 -- 这个心情可以理解,但是纯属自不量
力 -- 如果你鳖想收复海参威,也是如出一辙的蠢逼。

3. 有关天然气管道-- 大毛被耍了一把,北溪二号吭哧吭哧建好了,然后被封闭; 经
过二毛的管道二毛坐地截留涨价,甚至威胁关闭, 大毛怒火攻心。


俺分析过, 北溪二号被关, 二毛必然挨揍,这是压垮骆驼的最后一跟稻草 (这个不
全是二毛的缘故,主要是我帝的功劳)

以上三条,其实都是我帝在背后布局, 一步一步用二毛这个诱饵把大毛带入陷阱中,
当然二毛也入了死地。

可以说我帝是下棋的,二毛是旗子,诱饵,大毛如愿以偿地掉进了坑里。

从今往后地球才是最危险的时刻, 恐怕我们这辈子能看到原子弹在天空爆炸

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...