当前位置:网站首页>Another programmer "deleted the library and ran away", deleted the code of the retail platform, and was sentenced to 10 months
Another programmer "deleted the library and ran away", deleted the code of the retail platform, and was sentenced to 10 months
2022-07-02 01:28:00 【Chief prisoner】
Deleting the database and running away happen from time to time , Operation and maintenance 4 Minutes can evaporate the market value of listed companies 6 $ ,6 Annual prison meals average one hundred million per year , This dial operation is really expensive !
The major IT The company must improve the treatment of relevant personnel while carefully employing personnel !
Another programmer “ Delete the library and run away ” Sentenced .
2 month 10 Japan , Red Star capital Bureau learned from Shanghai Yangpu District People's court , a 29 A year old programmer recorded a without the permission of the company , On the day of resignation , Privately delete all the system codes of JD home platform that will be launched soon , Constitute the crime of destroying computer information system , To be sentenced to fixed-term imprisonment 10 Months .
from Red Star News Provide The criminal judgment of Shanghai Yangpu District People's court shows ,2021 year 3 month , Recruit someone to a company in Shanghai , Responsible for the code research and development of JD home platform . Same year 6 month 18 Japan , Record a resignation from the company .
On the day of departure , Log in to the code control platform without permission , The coupons of JD home platform written by him during his tenure 、 Delete codes such as budget system and subsidy rules , As a result, the project originally scheduled to go online by the company was delayed .
After recording a deletion code , To ensure smooth operation of the system , The company spent 3 10000 yuan to hire a third-party company to restore the database .
The court said , The defendant recorded a violation of state regulations , Delete the data stored in the computer information system , The consequences are serious , Its behavior has constituted the crime of destroying computer information system , Later, he was sentenced to 10 months' imprisonment .
from Red Star News Provide It is worth mentioning that , The programmer “ Delete the library and run away ” Sentencing is not uncommon .
2020 year 2 month 23 Japan , Weimeng group, a Hong Kong listed company (02013.HK) a IT Operation and maintenance staff he mouyin “ Life is not good 、 Inability to repay online loans ” Wait for a reason , Connect the company's virtual private network through computers in their personal residence 、 Log in to the company server and execute the deletion task ,4 All data in the wechat server will be deleted in minutes .
He Mou's “ Delete library ” Behavior leads to 300 More than ten thousand users are unable to use wechat SaaS product , The failure time is as long as 8 God 14 Hours . Micro Alliance “ Delete library ” After the event , Opening the next day , The company's market value is more than 6 Million Hong Kong dollars .
2020 year 9 month , He was sentenced to fixed-term imprisonment 6 year , The verdict revealed , He said that he was unhappy after drinking 、 Inability to repay online loans and other personal reasons lead to “ Delete library ” Behavior .
Except for Weimeng , Chain home has also encountered “ Delete library ” The crisis .2018 year 6 month , Han, the database administrator of the chain company, deleted the company's financial data and related applications , The company's financial system cannot log in , Leading to chain companies spending 18 10000 yuan recovery system . Later, he was convicted of the crime of destroying computer information system , Sentenced to seven years in prison .
边栏推荐
- [IVX junior engineer training course 10 papers to get certificates] 0708 news page production
- MySQL application day02
- I Brief introduction of radio energy transmission technology
- Single chip microcomputer -- hlk-w801 transplant NES simulator (III)
- Day 13 of hcip (relevant contents of BGP agreement)
- Data visualization in medical and healthcare applications
- Finally got byte offer, 25-year-old inexperienced experience in software testing, to share with you
- Global and Chinese markets for the application of artificial intelligence in security, public security and national security 2022-2028: Research Report on technology, participants, trends, market size
- Mathematics - feelings -20220215
- 6-2漏洞利用-ftp不可避免的问题
猜你喜欢

ES6 new method of string

The technology boss is ready, and the topic of position C is up to you

Sql--- related transactions

Using tabbar in wechat applet

Design and control of multi rotor aircraft (VII) -- sensor calibration and measurement model

Edge extraction edges based on Halcon learning_ image. Hdev routine
![[rust web rokcet Series 2] connect the database and add, delete, modify and check curd](/img/23/cfa13ad30e45ef7cdda690775964a7.jpg)
[rust web rokcet Series 2] connect the database and add, delete, modify and check curd

Datawhale community blackboard newspaper (issue 1)

ACM教程 - 快速排序(常规 + 尾递归 + 随机基准数)

现货黄金分析的技巧有什么呢?
随机推荐
About asp Net core uses a small detail of datetime date type parameter
6-2漏洞利用-ftp不可避免的问题
KS006基于SSM实现学生成绩管理系统
Global and Chinese markets for food allergens and intolerance tests 2022-2028: Research Report on technology, participants, trends, market size and share
Learning note 24 - multi sensor post fusion technology
GL Studio 5 installation and experience
Mathematics - feelings -20220215
Global and Chinese markets for context and location-based services 2022-2028: Research Report on technology, participants, trends, market size and share
Global and Chinese market of avionics systems 2022-2028: Research Report on technology, participants, trends, market size and share
[image enhancement] vascular image enhancement based on frangi filter with matlab code
Have you stepped on the nine common pits in the e-commerce system?
Daily work and study notes
k线图形态这样记(口诀篇)
[IVX junior engineer training course 10 papers] 06 database and services
II Basic structure of radio energy transmission system
Brief introduction to the development of mobile network
Architecture evolution from MVC to DDD
卷積神經網絡(包含代碼與相應圖解)
6-3漏洞利用-SSH环境搭建
How does schedulerx help users solve the problem of distributed task scheduling?