黑人奥巴马当了美国总统,手提美国核按钮,指挥世界头号超级大国。奥巴马一句话,那些对中国一贯蛮横的日本财阀、军阀就吓得打摆子。美国黑人的成功当然不是一蹴而就。二战之后,美国黑人开始作为一个种族觉醒,开始了反对种族隔离,争取平等权利。 美国黑人为什么在二战后突然挺起来了、开始强烈要求人权、直到黑人成为美国总统?因为在二战期间,美国黑人大兵跟着白种美军一起横扫欧洲,打得轴心国没饭吃,意大利、德国的白种女人往往为了一块面包,向黑兵投怀送抱。即使在英国,当地白人女子也往往为分得一些军品,与黑人士兵交往。黑人民族自尊陡然复苏。 须知,当时在美国,黑男与白女交往经常是要受到私刑虐待(lynching)的,只要一个白人女子指控黑人男子,后者必死无疑。但在欧洲,美国白人士兵眼睁睁看着当地白人女子跟黑人士兵交往,虽然气恼、痛恨,却无计可施。因此,黑人在欧洲可以怀抱白种女人作乐。 根据这个网页 http://www.atlantic-times.com/archive_detail.php?recordID=1706, 【 10 percent of the documented cases it was supposedly the parents who compelled their daughters to have intercourse with the occupying Allied soldiers, according to the Geneva study. The goal was always the same: "The black soldiers were particularly sought-after as a source of food, candy and tobacco products“】。 (欧洲白人迫使其女儿与盟军士兵性交。而黑人士兵被特别追捧,作为食物、糖果与烟草的来源)。白女自动送上门都多的是,黑兵找白女自然容易的很,而且以德国的教育水平,白女大多算是书香之家,而美国黑人绝大多数来自贫穷的、低教育程度的社会底层。 处于饥饿状态的德意志民族意志被摧毁了。 尽管只是跟着美国白人作战, 作为征服者,原本底层的美国黑人第一次得到了自由与解放。 到1951年,黑人美军在德国生了约3000名混血婴儿, 这就是军事征服的直接结果 。 一位美国黑兵说道: "You know what the hell I learned? That a nigger ain't no different from nobody else." ("你知道我学到了什么吗?黑鬼不跟没什么其他人没有区别!“)。在欧洲如此,占领日本的黑人士兵更是自由了,日本人自己对此也很有体会,还拍过电影。 黑人回到美国却仍然要种族隔离,连坐车都得黑白分开。但欧洲的征服性经历已经唤醒了黑人的民族自尊。有部美国电影有个镜头,一群黑兵在美国进入一个路边酒吧,结果白人店主说老子不接待黑鬼,这些黑兵乖乖地、悻悻地离去,出去之后,突然醒悟到什么,拿着枪重新回来,枪指着白店主,后者虽然不情愿,还是提供了服务。二战后,美国黑人们终于从世代奴隶的心态走了出来,开始要求废除种族隔离,获得与白人平等的权利,直到黑人当选总统。 要知道,中国在被日本侵略(甲午)破坏之前, 人民生活水平几乎世界第一,连当时的英国人都自叹不如 (点击看图)。 被日本人三光之后,中国人首先看到的是家园被毁,但这些中国人的后代看到的只是自家出身贫寒、凄惨,不但没钱读书,还得为抢夺粮食互斗、互殴。由此,不免产生自卑心理,而看到其他中国人也是如此,则产生民族自卑。看了看倭寇靠抢来的财富营造的实力(包括教育程度等软实力),更觉得自己不如日本人,民族自卑心态更深。 这正是需要剿灭日本军国主义的重要原因。 如果你在日本看到的到处是烽火连天、残垣断壁,人们为抢夺粮食互相殴打,你的民族自豪感就会油然而生。 【我们中间有的人也许淡忘了日本对 中国犯下的罪行,甚至羡慕日本人的钱。这些人忘了,日本人今天吃的喝的用的,都只是他 们从我们祖先那抢走的黄金白银的利息的一个零头。 日本就好比是一个强盗与罪犯的家庭,它的儿子们在外面放火打劫杀人越货,用抢的财 宝建造了高楼大厦,个个穿得衣冠楚楚。 而被抢的中国,被洗劫一空,家破人亡,那些活下来的,身无分文,衣履破烂,食不果 腹,被强盗和强盗的朋友们鄙夷和践踏。珍珠湾全球网: 平倭策-珍珠湾全球网-岳东晓 - http://www.zhenzhubay.com/blog-2 ... -YtBM#ixzz2J78YPicr 】 不消灭日本军国主义,中国民族素质、民族自尊提不上去。中华民族这个富有创造力的优秀民族就无法为世界文明做出更大的贡献,这对人类的进化将是极大的损失。 珍珠湾全球网: 钓鱼岛上中日美谁渴望开战?-珍珠湾全球网 - http://www.zhenzhubay.com/forum.php?mod=viewthreadtid=4961#ixzz2J7ENQUNH
一位年薪六位数(美元)的美国程序员雇佣了中国沈阳的程序员替自己上班干活,自己天天逍遥自在,上班就是看视频、非死不可。。 每天中国程序员登陆该美国程序员的系统,替其编写程序。该美国程序员因“工作”质量优秀、交活及时经常得到好评,被尊为最佳程序员。 后来公司发现有人从中国登陆,以为遭到黑客入侵,雇佣安全公司进行调查。安全公司大为震惊,因为这个公司登陆必须有一个随身携带的密码产生装置,而这个装置一直由美国员工带着,他人就坐在那里,对着屏幕。这怎么可能呢?经过各种分析也无法解释。 直到从这个美国程序员计算里发现了中国发来的账单。 这才发现了其中的奥妙。 此人每年收入几十万美金,却只要付给中国人5万。 总的来说,这份工作给美国创造了几十万美金的GDP,给中国创造了5万的GDP。 美国网友们对此人纷纷表示赞赏,呵呵呵。 Outsourced: Employee Sends Own Job To China; Surfs Web by Bill Chappell January 16, 2013 3:00 PM What began as a company's suspicion that its infrastructure was being hacked turned into a case of a worker outsourcing his own job to a Chinese consulting firm, according to reports that cite an investigation by Verizon's security team. The man was earning a six-figure salary. The anonymous company, identified only as a critical infrastructure firm, asked Verizon's Web security personnel to look into data that showed its virtual private network was being accessed from China — even as the employee whose credentials were used to log in from overseas was sitting in the company's offices, using his computer. As Emil Protalinski writes at The Next Web, the company's security measures included a coded fob which, the investigating team learned, a code developer had shipped to Shenyang, China, so that a company there could perform his assigned work. And it turns out that the job done in China was above par — the employee's "code was clean, well written, and submitted in a timely fashion. Quarter after quarter, his performance review noted him as the best developer in the building," according to the Verizon Security Blog. It seems that Verizon has removed the page publishing this "case study" — either that, or it has merely become unavailable for some other reason. But a cached version of the story offers more details. The report, which assigns the inventive employee the fictitious name of "Bob," described him as a family guy in his 40s, with extensive software knowledge. After they were called in to look for rogue software that allowed hackers to perfectly mimic an employee's log-in, and maintain an active and secure connection, the investigators instead found "hundreds of .pdf notices from a third party contractor/developer in (you guessed it) Shenyang, China." The Verizon team even found that "Bob" kept a regular schedule at his office: 9:00 a.m. – Arrive and surf Reddit for a couple of hours. Watch cat videos 11:30 a.m. – Take lunch 1:00 p.m. – Ebay time. 2:00 – ish p.m Facebook updates – LinkedIn 4:30 p.m. – End of day update e-mail to management. 5:00 p.m. – Go home And as they learned, his schedule also included sending less than one-fifth of his salary to the Chinese firm. Verizon's investigators say the evidence they uncovered suggests "Bob" might have had similar arrangements at several companies. "All told, it looked like he earned several hundred thousand dollars a year, and only had to pay the Chinese consulting firm about fifty grand annually," according to the Security Blog. It is not yet clear whether "Bob" has read former kickboxer Tim Ferriss's book The 4-Hour Workweek, which explores ideas that include "Outsourcing Life" and "Disappearing Act: How to Escape the Office." http://www.npr.org/blogs/thetwo-way/2013/01/16/169528579/outsourced-employee-sends-own-job-to-china-surfs-web Case Study: Pro-active Log Review Might Be A Good Idea Andrew Valentine January 14th, 2013 With the New Year having arrived, it’s difficult not to reflect back on last year’s caseload. While the large-scale data breaches make the headlines and are widely discussed among security professionals, often the small and unknown cases are the ones that are remembered as being the most interesting from the investigators point of view. Every now and again a case comes along that, albeit small, still involves some unique attack vector – some clever and creative way that an attacker victimized an organization. It’s the unique one-offs, the ones that are different that often become the most memorable and most talked about amongst the investigators. Such a case came about in 2012. The scenario was as follows. We received a request from a US-based company asking for our help in understanding some anomalous activity that they were witnessing in their VPN logs. This organization had been slowly moving toward a more telecommuting oriented workforce, and they had therefore started to allow their developers to work from home on certain days. In order to accomplish this, they’d set up a fairly standard VPN concentrator approximately two years prior to our receiving their call. In early May 2012, after reading the 2012 DBIR, their IT security department decided that they should start actively monitoring logs being generated at the VPN concentrator. (As illustrated within our DBIR statistics, continual and pro-active log review happens basically never – only about 8% of breaches in 2011 were discovered by internal log review). So, they began scrutinizing daily VPN connections into their environment. What they found startled and surprised them: an open and active VPN connection from Shenyang, China! As in, this connection was LIVE when they discovered it. Besides the obvious, this discovery greatly unnerved security personnel for three main reasons: They’re a U.S. critical infrastructure company, and it was an unauthorized VPN connection from CHINA. The implications were severe and could not be overstated. The company implemented two-factor authentication for these VPN connection. The second factor being a rotating token RSA key fob. If this security mechanism had been negotiated by an attacker, again, the implications were alarming. The developer whose credentials were being used was sitting at his desk in the office. Plainly stated, the VPN logs showed him logged in from China, yet the employee is right there, sitting at his desk, staring into his monitor. Shortly after making this discovery, they contacted our group for assistance. Based on what information they had obtained, the company initially suspected some kind of unknown malware that was able route traffic from a trusted internal connection to China, and then back. This was the only way they could intellectually resolve the authentication issue. What other explanation could there be? Our investigators spent the initial hours with the victim working to facilitate a thorough understanding of their network topology, segmentation, authentication, log collection and correlation and so on. One red flag that was immediately apparent to investigators was that this odd VPN connection from Shenyang was not new by any means. Unfortunately, available VPN logs only went back 6 months, but they showed almost daily connections from Shenyang, and occasionally these connections spanned the entire workday. In other words, not only were the intruders in the company’s environment on a frequent basis, but such had been the case for some time. Central to the investigation was the employee himself, the person whose credentials had been used to initiate and maintain a VPN connection from China. Employee profile –mid-40’s software developer versed in C, C++, perl, java, Ruby, php, python, etc. Relatively long tenure with the company, family man, inoffensive and quiet. Someone you wouldn’t look at twice in an elevator. For the sake of case study, let’s call him “Bob.” The company’s IT personnel were sure that the issue had to do with some kind of zero day malware that was able to initiate VPN connections from Bob’s desktop workstation via external proxy and then route that VPN traffic to China, only to be routed back to their concentrator. Yes, it is a bit of a convoluted theory, and like most convoluted theories, an incorrect one. As just a very basic investigative measure, once investigators acquired a forensic image of Bob’s desktop workstation, we worked to carve as many recoverable files out of unallocated disk space as possible. This would help to identify whether there had been malicious software on the system that may have been deleted. It would also serve to illustrate Bob’s work habits and potentially reveal anything he inadvertently downloaded onto his system. What we found surprised us – hundreds of .pdf invoices from a third party contractor/developer in (you guessed it) Shenyang, China. As it turns out, Bob had simply outsourced his own job to a Chinese consulting firm. Bob spent less that one fifth of his six-figure salary for a Chinese firm to do his job for him. Authentication was no problem, he physically FedExed his RSA token to China so that the third-party contractor could log-in under his credentials during the workday. It would appear that he was working an average 9 to 5 work day. Investigators checked his web browsing history, and that told the whole story. A typical ‘work day’ for Bob looked like this: 9:00 a.m. – Arrive and surf Reddit for a couple of hours. Watch cat videos 11:30 a.m. – Take lunch 1:00 p.m. – Ebay time. 2:00 – ish p.m Facebook updates – LinkedIn 4:30 p.m. – End of day update e-mail to management. 5:00 p.m. – Go home Evidence even suggested he had the same scam going across multiple companies in the area. All told, it looked like he earned several hundred thousand dollars a year, and only had to pay the Chinese consulting firm about fifty grand annually. The best part? Investigators had the opportunity to read through his performance reviews while working alongside HR. For the last several years in a row he received excellent remarks. His code was clean, well written, and submitted in a timely fashion. Quarter after quarter, his performance review noted him as the best developer in the building. This entry was posted on Monday, January 14th, 2013 at 2:46 pm and is filed under Editorial. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed. Comments This is nearly unbelievable. Is he overpayed or are the chinese underpayed? Crazy story indeed. Posted by: Stephan Schielke on January 15th, 2013 at 9:39 pm “Quarter after quarter, his performance review noted him as the best developer in the building.” Elvis has left the building. Posted by: JoeThePimpernel on January 15th, 2013 at 9:45 pm So, we’re saying Bob’s activity here was frowned upon? Cause I’m betting no one explicitly mentioned this to him in the interview. Posted by: James on January 15th, 2013 at 10:09 pm Pretty cool idea apart from the whole scary critical infrastructure component. Would this be more acceptable (and maybe even encouraged) if there were an NDA in place and the company dealt with comicbooks instead of critical infrastructure? Posted by: Bob on January 15th, 2013 at 10:26 pm Sounds like someone read “The 4 Hour Work Week” and decided to try it out… Posted by: Tony on January 15th, 2013 at 11:25 pm Sounds like a “4-Hour Workweek” success story. Posted by: mark zero on January 15th, 2013 at 11:39 pm Sooo… where’s the problem? He improved his personal profit and the quality and efficiency of his work, obviously. And all that by using standard business practices – get money to do the job, then pay someone else less to actually do it. This guy is an american hero and deserves a medal. I’d even go so far to call him a modern times Tom Sawyer, but since the chinese didn’t pay HIM to do his work, that’s just a little bit too far off. Posted by: Unterdosis on January 15th, 2013 at 11:47 pm ha ha ha smart guy hope they gave him a raise Posted by: emk on January 16th, 2013 at 12:23 am The worst part is his job meant something to the country. The best part we actuallu got the best out of China for cheap! Posted by: neil m on January 16th, 2013 at 12:41 am So this may have gone unnoticed for longer if the Chinese had come through a locally hosted VPS instead of making a direct connection? Posted by: Paul on January 16th, 2013 at 1:49 am Bob should have proxied the contractor’s connection through his home’s network. Posted by: Djilali on January 16th, 2013 at 1:52 am Gerät Job Bob! Posted by: Peter Schmitz on January 16th, 2013 at 1:58 am Surely that guy has to be promoted to manage a division that outsources sw dev to China. It’s the thing he is obviously very good at. Posted by: Alice on January 16th, 2013 at 3:13 am Sounds like they hired a lazy person to do a tech job. Perfect job because, according to Bill Gates, that is exactly what you want to do. “http://www.goodreads.com/quotes/568877-i-choose-a-lazy-person-to-do-a-hard-job” In typical fashion for tech people, he figured out the easiest way to do his job(s). Why is this news? It’s innovative, I’ll give him that. Sounds like he should be a high level manager instead of coding for a living. Maybe this is a clear example why most average people don’t understand tech people. Posted by: anon coward on January 16th, 2013 at 3:22 am So…. what was the name of the Chinese firm he was contracting with? They didn’t happen to list a phone number? Posted by: Tyler on January 16th, 2013 at 3:41 am So he managed a multi project setup, are able to communicate the requirements to remote “team members”, deals with different time zone, deliver in time, with good quality … Sounds like he was just in the wrong position. Posted by: ThoMo on January 16th, 2013 at 3:43 am http://webcache.googleusercontent.com/search?q=cache:http://securityblog.verizonbusiness.com/2013/01/14/case-study-pro-active-log-review-might-be-a-good-idea/
一个人的世界观以及对其他人的看法受其经历影响,尤其是成长阶段的经历。奥巴马身居美国总统高位,作为美军最高指挥,其对中国人与日本人的了解显然相当重要。 其简历如下:1961年出生于夏威夷,父亲为肯尼亚留学生、学者,黑人,母亲为白人;1964年,父母离异;1963年,其母亲认识了在夏威夷大学读研究生的印尼留学生LOLO,1965年结婚;1967年,随母亲来到印尼,与继父生活在一起;1971年,回到夏威夷。奥巴马自身的定位是被压迫的种族,而且他继承了其生父的部分思想,具有反殖民主义特征,具有同情被压迫人民的心态。 奥巴马写过至少两本书:《Dreams From My Father: A Story of Race and Inheritance》(来自父亲的梦:一个种族与继承的故事),《AUDACITY OF HOPE: Thoughts on Reclaiming the American Dream》(无畏的希望:思考重新美国梦)。第一本书是讲奥巴马的成长经历,第二本书讲奥巴马的政治、外交理念。我从这两本书里搜索“Jap”以及“China”或者“Chinese"。以下是我的总结。 在第一本书里,关于日本人,奥巴马主要提到两件事:(1)其母亲在去印尼之前,仔细研究了当地的历史,包括日本人对当地的占领与掠夺;(2)提到日本人在二战期间被美国关入集中营。关于中国人,奥巴马提到(1)中国人在印尼挣扎在社会边缘;(2)一次在飞机上遇到一个中国人家庭,但在海关被扣住搜查,一家老小很可怜的样子。 第二本书里,关于日本,奥巴马主要提到: (1) 日本汽车工业对美国汽车工业的冲击;(2) 二战期间美国将日本人关入集中营;(3)二战日本加入轴心国,为了实现对荷属东印度(印尼等)的扩张与石油的掠夺,偷袭珍珠港;(4)指责一战后,美国采取孤立政策,坐视德国、日本扩军;(5)二战后,美国的核保护伞阻止了日本进入军备扩张。关于中国,奥巴马往往是与印度一起提到(China and India),主要是(1)美国市场使中印大量减少贫困;(2)美国公司正在中国(与印度)快速参与;(3)美国不可能与中印在劳力成本上竞争;(4)美国仍远强于中印;(5)中国教育系统强大;(6)中国某些政策先进;(7)中国购买大量美国债务;(8)面对俄国与中国,美国有时必须充当世界警察;(9)中国是潜在的对手。 由此可见,奥巴马从小即清楚日本侵略的历史,对日本人没有深层次的好感。在对待轴心国的策略上,奥巴马正确理解了美国的国策,通过提供安全承诺阻止日本及德国军事化。这与尼克松当年对周恩来所阐述的一致。 对中国人,奥巴马表现出一定的同情。奥巴马视未来的中国为美国的竞争对手,但强调的重点是在经济与教育。
“中国制造”伴随我们成长了几十年,该是提出“中国质量”( Made in Zhongguo ) 的时候了。 如果我们继续山寨下去,世界已经没有“山”可“寨”了。这不,世界经济危机了,先进国家的制造业也因你的廉价劳动力,给你弄跨得差不多了,确实只剩一些不能让你山寨的东东了。 美国和欧洲对中国限制技术性出口,是对的,如果放开,反而会害了我们中国人。你想,因为山寨惯了,中国已经变得没有创造力了,军事上,说不定哪一天可以控制核战争了,或者来一个生物战争,那中国自然就死定了,这就应了一句古话:成也萧何,败也萧何。 中国是一个缺乏创造力的民族吗?不!也许有人说我们有四大发明,其实那不算什么,我们真正拥有的是东方神秘文化,这一点,尽管我们大多数中国人还生在福中不知福,拿着金饭碗讨饭,那也没有关系,东方文明复兴的一天,我们就全明白了。 既然不缺乏创造,那还犹豫什么呢?赶紧做“中国质量”吧。