Skip to main content

中国人没有永恒的敌人

1.孔子有一句话,叫“成事不说,遂事不谏,既往不咎。”什么意思呢?就是已经做过的事就别再提它了,已经做好的事,就不必再去劝阻别人了,已经成为过往的事,就别再追究了。这段话里面是有中国人独特的思维方式的。

2.首先,没有什么成就是可以躺在上面睡觉的,做完一件事,就该团结一切可以团结的力量做下一件事了。第二,只要是有人掺和的事,就别讲什么绝对的是非对错。优化人际关系环境,比立场清晰更重要。

3.第三,承认现状往前看,永远有具体的未来目标。也就是我们经常说的,放下包袱、轻装前进,团结一致向前看。

4.第四,没有什么永恒的绝对的敌人。所有人都生活在共同体当中,所有人都可以是自己达成目标的助力,至少,都可以不是自己达成目标的阻力。其实,从孔子的这段话当中,可以隐约看到我们这个文化的强韧力量。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec