当前位置:网站首页>The real situation of programmers
The real situation of programmers
2022-07-05 21:52:00 【Blue bridge cloud class】
lately , I saw such a question in brush :
Why do programmers write all the time bug , Can't you write it all at once ?
I have question marks all over my face , Why is there such a problem ? See this problem , I just want to ask these questions ( I'm sorry , etc Automatically raise the bar ):
- Why should I always write with the wrong eraser / Transparent adhesive , Can't it be one-time ?
- Why should people often eat , Can't you eat enough at one time ?
- Why do lovers break up , Can't you fall in love and get married directly ?
- ……
In fact, people write bug It is inevitable , After all, no one is perfect , There will always be times when you don't pay attention , Even high-level programmers can't avoid , For example, the loophole that has been highly discussed before ——Apache Log4j 2 Remote code execution vulnerability .
It's just that there are bug deadly , yes , we have bug The harm is small !
here , I can't help but want to share this programmer part “ Ruin the future ” The story of ( As a Entertainment , Do not imitate ! The content comes from : Brush bearded guest ).
Accident one
After graduation, I went directly to work for an operator , One day I took a task , Ask to write a code for sending group notification messages . The brain short circuit didn't change the code that day , Connected to the production environment, directly roll , Code cycle all mobile phone numbers within the operator to send the latest promotional activities .
code → test → Be finished , It's written in a dead cycle . Stop the program in time after finding the problem , Sent a thousand text messages to the first number in the database .
The next day I lost my job .
Accident two
Entered a smart card business company to develop canteen smart card , Code tests are normal
That is, the concurrent bearing capacity is general , But it's OK to brush four or five strokes at the same time .
In the spirit of pragmatism 、 Performance doesn't matter. Just use it , And consulted the canteen , Full of confidence, it was distributed to a university canteen for direct use .
The next day I lost my job , Because the students found that after eating in the canteen and brushing a certain number of pens , Eating suddenly cost nothing .
After watching these two accidents , Are you eating melons ? therefore ,bug Although danger requires caution , But not necessarily 100% Avoided , Let alone just out of society 、 Fresh graduates without practical project experience .
We see bug Will be angry , Some people will complain “ Who wrote this ”, What a coincidence , Write this bug People are themselves , A clown is himself .

These pictures , It also perfectly demonstrates the programmer's discovery bug The state of mind ( Scalp tingling ):







Now , I have to mention it again Apache Log4j 2 Remote code execution vulnerability .
The hole in 2021 year 12 month 10 It was made public , Let many safety engineers 、 Safety manufacturer 、 The security personnel of all enterprises can't sleep , Enter at once “ Combat Defense status ”.
Blue bridge cloud class has reproduced this vulnerability for free , Introduce the principle of this vulnerability 、 Utilization mode 、 Excavation method and repair method . This experiment provides a hands-on online experimental environment , Understand the loopholes more deeply .
If you want to understand Apache Log4j 2 Remote code execution vulnerability , Study for free ~
Apache Log4j 2 Detailed explanation of Remote Code Execution Vulnerability
边栏推荐
- What should I do to prepare for the interview algorithm position during school recruitment?
- SecureCRT使用提示
- 初级软件测试必问面试题
- Exercise 1 simple training of R language drawing
- 力扣------经营摩天轮的最大利润
- Deeply convinced plan X - network protocol basic DNS
- Objects in the list, sorted by a field
- MMAP
- SQL knowledge leak detection
- 854. 相似度为 K 的字符串 BFS
猜你喜欢

AD637使用筆記

PIP install beatifulsoup4 installation failed

怎么利用Tensorflow2进行猫狗分类识别

Implementing Lmax disruptor queue from scratch (IV) principle analysis of multithreaded producer multiproducersequencer

Uni app Bluetooth communication

Making global exception handling classes with aspect

Exercise 1 simple training of R language drawing

Shell script, awk condition judgment and logic comparison &||

华为游戏多媒体服务调用屏蔽指定玩家语音方法,返回错误码3010

KingbaseES V8R3集群维护案例之---在线添加备库管理节点
随机推荐
ICMP introduction
poj 3237 Tree(树链拆分)
PyGame practical project: write Snake games with 300 lines of code
阿里云有奖体验:用PolarDB-X搭建一个高可用系统
MATLAB | App Designer·我用MATLAB制作了一款LATEX公式实时编辑器
HDU 4391 Paint The Wall 段树(水
Cross end solution to improve development efficiency rapidly
How to view Apache log4j 2 remote code execution vulnerability?
How can Huawei online match improve the success rate of player matching
初级软件测试必问面试题
Teach yourself to train pytorch model to Caffe (III)
Matlab | app designer · I used Matlab to make a real-time editor of latex formula
Drawing HSV color wheel with MATLAB
MySQL InnoDB Architecture Principle
EL与JSTL注意事项汇总
Chap2 steps into the palace of R language
Interview questions for basic software testing
Code bug correction, char is converted to int high-order symbol extension, resulting in changes in positivity and negativity and values. Int num = (int) (unsigned int) a, which will occur in older com
POJ 3237 tree (tree chain splitting)
SQL knowledge leak detection