当前位置:网站首页>The programmer resigned and was sentenced to 10 months for deleting the code. Jingdong came home and said that it took 30000 to restore the database. Netizen: This is really a revenge
The programmer resigned and was sentenced to 10 months for deleting the code. Jingdong came home and said that it took 30000 to restore the database. Netizen: This is really a revenge
2022-07-07 00:13:00 【QbitAl】
Dream morning Xiao Xiao From the Aofei temple
qubits | official account QbitAI
The programmer “ Delete the library and run away ” The topic of is on the hot search again , More than 100 million views .
however , This time, the database is not deleted , But myself Code written by yourself !
The client is a 29 Year old programmer , Developed for JD home platform 3 Month code .
The day of leaving , He deleted a series of codes written by himself , Including platform coupons 、 Budget system and subsidy rules .
Take a closer look. , The programmer's departure time happens to be 6 month 18 Japan On the day of jd.com promotion .
In recent days, , The programmer was sentenced to imprisonment ten months .
In addition to these dramatic details , Many onlookers also expressed concern about the extreme behavior when leaving 、 Code permission management and other topics are discussed .
Let's see what's going on .
Private login control platform delete code
According to the criminal judgment of Shanghai Yangpu District People's court ,2021 year 3 month ,29 A year old programmer was recruited Beijing An information technology Co., Ltd , Responsible for the code research and development of JD home platform .
2021 year 6 month 18 Japan , Record a resignation .
On the day of leaving , He has no permission , Log in to the code control platform with your own account ( The server is located in Shanghai ), Send the coupons of jd.com home platform that you wrote during your employment 、 Codes such as budget system and subsidy rules Delete , As a result, relevant projects were forced to postpone .
2021 year 9 month 23 Japan , Lu was caught by the police .
After the incident , In order to ensure the smooth operation of the system , Hire a third-party company to restore the database The total expenditure is about 3 Ten thousand yuan .
And with the help of his family members , compensate for 3.5 Ten thousand yuan and get understanding .
The verdict shows , The defendant recorded a violation of state regulations , Delete the data stored in the computer information system , The consequences are serious , His behavior has constituted Crime of destroying computer information system .
However, after recording someone to the case, he truthfully confessed his crime and voluntarily pleaded guilty , A lighter punishment can be given according to law .
at present , Lu was sentenced to fixed-term imprisonment ten months , The sentence starts with 2021 year 9 month 23 From to 2022 year 7 month 22 Japan .
According to the enterprise investigation , Shanghai Jingdong jiayuanxin Information Technology Co., Ltd. does have a wholly-owned subsidiary in Beijing , Its name is Beijing Daguan Information Technology Co., Ltd .
△ Figure source enterprise check
You can see from Liepin , This company is recruiting JD home's back-end development engineers , Responsible for fast iteration of coupon and other systems .
△ Tuyuan Liepin
This case has also triggered a lot of heated discussion among netizens .
Hot discussion among netizens : There are still doubts
It can be seen that , Compared with the previous database deletion and running , This case is somewhat different .
What the defendant recorded was not the production data in the database , It's the code you write during your work .
I understand IT Netizens in the industry found problems from the details , I think there are still some unclear explanations based on the existing information .
such as , What code is deleted .
If it is the code of the production environment , Reasonably speaking, large companies will have strict management methods for code launching , It needs to be reviewed by the same level and superior before it can be merged into the main branch .
Why does this person have so much authority to record someone ?
If it is the code of the development environment , An important function of the code control platform is version management , Whether it's Git It's still a little older SVN Have backup function , You can rollback the deletion .
So why does the company spend 3 Ten thousand yuan, please ask a third party to recover the data ?
in any case , This case reminds you again , The labor achievements during the work period belong to the company according to the contract .
Even the code written by yourself cannot be deleted on impulse , Otherwise, it will only make life more and more critical .
10 Months in prison plus compensation , Leaving a record will have an impact on finding a job in the future , It's not worth .
in addition , There is also an account in the judgment , The defendant can truthfully confess his crime after recording someone in the case , Compensate the victims and obtain understanding , A lighter punishment can be given according to law .
10 Six months in prison , Compared with similar cases that caused a sensation before , It's really light .
Say, say, make, make , Criminal law is no joke
Delete the library and run away , In the early years, it was more a joke of the programmer circle .
The joke is that after deleting the database due to operational errors and other reasons, you can only run away .
Every time “rm -rf /*” As soon as this mysterious code appears , Old drivers will smile .
But in recent years , The same story as this kind of story , It often happens in reality .
The most influential , is 2020 E-commerce at the beginning of the year SaaS Micro League programmers delete libraries , Cause the company's server to fail for as long as 8 God , exceed 300 Merchants were affected , The market value evaporated in just one day 10 $ .
The defendant he in this case finally committed the crime of destroying computer information system , Sentenced to fixed-term imprisonment 6 year .
After this , And then there is 40 Year old chain home program delete their own 9TB The database was judged 7 year , It is also the crime of destroying computer information system .
Crime of destroying computer information system , It is stipulated in Article 286 of our criminal law , Including three crimes .
The first paragraph is about the regulation of destroying the system itself .
Violation of state regulations , Delete the function of computer information system 、 modify 、 increase 、 interfere , Causes the computer information system to be unable to operate normally , With serious consequences , He shall be sentenced to fixed-term imprisonment of not more than five years or criminal detention ; Especially serious , Sentenced to more than five years' imprisonment .
The second paragraph is for data .
Violation of state regulations , Storage in computer information system 、 Delete data and applications processed or transferred 、 modify 、 Added operations , With serious consequences , Punishment in accordance with the provisions of the preceding paragraph .
The last one is destructive programs such as viruses .
Make deliberately 、 Spread computer viruses and other destructive programs , Affect the normal operation of the computer system , With serious consequences , To punish according to the first paragraph .
Besides deleting the code 、 Except for cases such as database deletion , Recently, a developer, Zhang Mou, and his gang were sentenced for remotely punching cards on nails, which also attracted a lot of attention .
Daniel assistant developed by Zhang APP It can destroy the function of the nailing system to obtain the user's real geographical location , And it's paid software , Monthly subscription 25 element , Baonian 89 element .
As of the crime, there are 10 Million users , Benefit about Five million yuan .
The court ruled that Zhang's behavior was in line with the crime of destroying computer information systems “ Make deliberately 、 Spread computer viruses and other destructive programs ”, And the consequences are serious , The First Instance sentenced him to fixed-term imprisonment 5 year 6 Months .
The court of second instance held that “ Daniel's assistant ” Not in criminal law “ destructive program ”, But Zhang still constitutes the crime of destroying computer information system , Change the sentence to fixed-term imprisonment Four years .
in addition , Develop with Daniel's assistant “ plugin ” Similar game plug-ins , You will also get the crime of destroying computer information system .
last year 12 End of month , The defendant Zhou 、 Mr. Sun 、 Yao provided 《 Protogod 》 Game plug-in profit 199.488 Ten thousand yuan , Sentenced separately 4 year 、3 year 10 Months 、1 year 6 Months .
These examples can be seen , Destroy the computer information system , The consequences are quite serious .
As the netizen said , Don't be impulsive , Take the ridicule seriously .
First instance verdict :
http://www.hshfy.sh.cn/shfy/gweb2017/flws_view.jsp?pa=adGFoPaOoMjAyMqOpu6YwMTEw0Myz9TI3usUmd3N4aD0xz
Reference link :
[1]http://www.hshfy.sh.cn/shfy/gweb2017/flws_view.jsp?pa=adGFoPaOoMjAyMaOpu6YwMTA00Myz9TcwObrFJndzeGg9MgPdcssPdcssz
[2]https://weibo.com/7399555658/LeQChtDkM
[3]https://s.weibo.com/weibo?q=%23%E4%BA%AC%E4%B8%9C%E5%88%B0%E5%AE%B6%E7%A8%8B%E5%BA%8F%E5%91%98%E7%A6%BB%E8%81%8C%E5%BD%93%E5%A4%A9%E5%88%A0%E5%BA%93%E8%B7%91%E8%B7%AF%23&Refer=top
[4]https://www.liepin.com/job/1939418135.shtml
边栏推荐
- C language input / output stream and file operation [II]
- Compilation of kickstart file
- Pdf document signature Guide
- Three application characteristics of immersive projection in offline display
- Use package FY in Oracle_ Recover_ Data. PCK to recover the table of truncate misoperation
- Leecode brushes questions and records interview questions 01.02 Determine whether it is character rearrangement for each other
- 数据运营平台-数据采集[通俗易懂]
- What is a responsive object? How to create a responsive object?
- web渗透测试是什么_渗透实战
- Sword finger offer 26 Substructure of tree
猜你喜欢
Gradle knowledge generalization
Devops can help reduce technology debt in ten ways
[2022 the finest in the whole network] how to test the interface test generally? Process and steps of interface test
17、 MySQL - high availability + read / write separation + gtid + semi synchronous master-slave replication cluster
MVC and MVVM
Asset security issues or constraints on the development of the encryption industry, risk control + compliance has become the key to breaking the platform
Hydrogen future industry accelerates | the registration channel of 2022 hydrogen energy specialty special new entrepreneurship competition is opened!
What is AVL tree?
Core knowledge of distributed cache
DAY FOUR
随机推荐
What is web penetration testing_ Infiltration practice
在docker中快速使用各个版本的PostgreSQL数据库
【2022全网最细】接口测试一般怎么测?接口测试的流程和步骤
Leecode brushes questions to record interview questions 17.16 massagist
GPIO简介
[2022 the finest in the whole network] how to test the interface test generally? Process and steps of interface test
Compile logisim
Quickly use various versions of PostgreSQL database in docker
Geo data mining (III) enrichment analysis of go and KEGG using David database
Gradle knowledge generalization
【CVPR 2022】目标检测SOTA:DINO: DETR with Improved DeNoising Anchor Boxes for End-to-End Object Detection
沉浸式投影在线下展示中的三大应用特点
The largest single investment in the history of Dachen was IPO today
2022/2/10 summary
【CVPR 2022】半监督目标检测:Dense Learning based Semi-Supervised Object Detection
PDF文档签名指南
Racher integrates LDAP to realize unified account login
DevOps可以帮助减少技术债务的十种方式
华为mate8电池价格_华为mate8换电池后充电巨慢
Wind chime card issuing network source code latest version - commercially available