当前位置:网站首页>The real situation of programmers
The real situation of programmers
2022-07-05 21:52:00 【Blue bridge cloud class】
lately , I saw such a question in brush :
Why do programmers write all the time bug , Can't you write it all at once ?
I have question marks all over my face , Why is there such a problem ? See this problem , I just want to ask these questions ( I'm sorry , etc Automatically raise the bar ):
- Why should I always write with the wrong eraser / Transparent adhesive , Can't it be one-time ?
- Why should people often eat , Can't you eat enough at one time ?
- Why do lovers break up , Can't you fall in love and get married directly ?
- ……
In fact, people write bug It is inevitable , After all, no one is perfect , There will always be times when you don't pay attention , Even high-level programmers can't avoid , For example, the loophole that has been highly discussed before ——Apache Log4j 2 Remote code execution vulnerability .
It's just that there are bug deadly , yes , we have bug The harm is small !
here , I can't help but want to share this programmer part “ Ruin the future ” The story of ( As a Entertainment , Do not imitate ! The content comes from : Brush bearded guest ).
Accident one
After graduation, I went directly to work for an operator , One day I took a task , Ask to write a code for sending group notification messages . The brain short circuit didn't change the code that day , Connected to the production environment, directly roll , Code cycle all mobile phone numbers within the operator to send the latest promotional activities .
code → test → Be finished , It's written in a dead cycle . Stop the program in time after finding the problem , Sent a thousand text messages to the first number in the database .
The next day I lost my job .
Accident two
Entered a smart card business company to develop canteen smart card , Code tests are normal
That is, the concurrent bearing capacity is general , But it's OK to brush four or five strokes at the same time .
In the spirit of pragmatism 、 Performance doesn't matter. Just use it , And consulted the canteen , Full of confidence, it was distributed to a university canteen for direct use .
The next day I lost my job , Because the students found that after eating in the canteen and brushing a certain number of pens , Eating suddenly cost nothing .
After watching these two accidents , Are you eating melons ? therefore ,bug Although danger requires caution , But not necessarily 100% Avoided , Let alone just out of society 、 Fresh graduates without practical project experience .
We see bug Will be angry , Some people will complain “ Who wrote this ”, What a coincidence , Write this bug People are themselves , A clown is himself .

These pictures , It also perfectly demonstrates the programmer's discovery bug The state of mind ( Scalp tingling ):







Now , I have to mention it again Apache Log4j 2 Remote code execution vulnerability .
The hole in 2021 year 12 month 10 It was made public , Let many safety engineers 、 Safety manufacturer 、 The security personnel of all enterprises can't sleep , Enter at once “ Combat Defense status ”.
Blue bridge cloud class has reproduced this vulnerability for free , Introduce the principle of this vulnerability 、 Utilization mode 、 Excavation method and repair method . This experiment provides a hands-on online experimental environment , Understand the loopholes more deeply .
If you want to understand Apache Log4j 2 Remote code execution vulnerability , Study for free ~
Apache Log4j 2 Detailed explanation of Remote Code Execution Vulnerability
边栏推荐
- Zhang Lijun: penetrating uncertainty depends on four "invariants"
- 场景化面试:关于分布式锁的十问十答
- EBS Oracle 11g cloning steps (single node)
- Ad637 notes d'utilisation
- Poj3414 extensive search
- 华为游戏多媒体服务调用屏蔽指定玩家语音方法,返回错误码3010
- PIP install beatifulsoup4 installation failed
- datagrid直接编辑保存“设计缺陷”
- Li Kou ----- the maximum profit of operating Ferris wheel
- Codeforces 12D Ball 树形阵列模拟3排序元素
猜你喜欢

Recursive query of multi-level menu data

Teach yourself to train pytorch model to Caffe (I)

How to view Apache log4j 2 remote code execution vulnerability?

AD637使用筆記

How to use tensorflow2 for cat and dog classification and recognition

MMAP learning

Interviewer: will concurrent programming practice meet? (detailed explanation of thread control operation)

Teach yourself to train pytorch model to Caffe (III)

DBeaver同时执行多条insert into报错处理

华为快游戏调用登录接口失败,返回错误码 -1
随机推荐
Shell script, awk condition judgment and logic comparison &||
Cross end solutions to improve development efficiency
QML reported an error expected token ";", expected a qualified name ID
Parker驱动器维修COMPAX控制器维修CPX0200H
Codeforces 12D Ball 树形阵列模拟3排序元素
Interviewer: will concurrent programming practice meet? (detailed explanation of thread control operation)
The Blue Bridge Cup web application development simulation competition is open for the first time! Contestants fast forward!
Codeforces 12D ball tree array simulation 3 sorting elements
张丽俊:穿透不确定性要靠四个“不变”
R language learning notes
Pointer parameter passing vs reference parameter passing vs value parameter passing
MMAP learning
POJ 3237 tree (tree chain splitting)
poj 3237 Tree(樹鏈拆分)
Huawei cloud modelarts text classification - takeout comments
EL与JSTL注意事项汇总
SQL knowledge leak detection
场景化面试:关于分布式锁的十问十答
2.2.3 output of documents
[daily training] 729 My schedule I