Stealing digital currency is defined as illegal computer intrusi
A: filter some common database operation keywords,
select, insert, update, delete, and, * etc., or filter the content through the system function addslashes
register in PHP configuration file_ globals=off; Set to off state. (the function will close the registered global variables); If receiving the value of post form, use$_ POST[' user'], If it is set to on, the value will be received by $user.
when writing SQL statements, try not to omit small quotation marks (the one above tab) and single quotation marks.
improve the skills of database naming, and name some important fields according to the characteristics of the program, so that they are not easy to be guessed.
encapsulate common methods to avoid directly exposing SQL statements.
Open PHP safe mode_ Mode = on
Open magic_ quotes_ GPC is used to prevent SQL injection. It is turned off by default. When it is turned on, it automatically converts the SQL query statement submitted by the user to & quot 39;& quot; Convert to & quot 92; 39;& quot;
control the output of error message, close the error message prompt, and write the error message to the system log
preprocess with mysqli or PDO
Whoever, in violation of state regulations, intrudes into a computer information system other than the one mentioned in the preceding paragraph, or uses other technical means to obtain data stored, processed or transmitted in the computer information system, or exercises illegal control over the computer information system, if the circumstances are serious, shall be sentenced to fixed-term imprisonment of not more than three years or criminal detention and shall also, or shall only, be fined; If the circumstances are especially serious, he shall be sentenced to fixed-term imprisonment of not less than three years but not more than seven years and shall also be fined
those who provide special programs or tools for intruding into or illegally controlling computer information systems, or who provide programs or tools for others knowing that they have committed an illegal or criminal act of intruding into or illegally controlling computer information systems, if the circumstances are serious, shall be punished in accordance with the provisions of the preceding paragraph.
According to the criminal law of the people's Republic of China, the punishment for illegally invading others' computers is as follows:
the criminal law of the people's Republic of China stipulates:
Article 285 [crime of illegally invading computer information system; Crime of illegally obtaining data of computer information system and illegally controlling computer information system; Whoever, in violation of state regulations, intrudes into a computer information system in the fields of state affairs, national defense construction or cutting-edge science and technology shall be sentenced to fixed-term imprisonment of not more than three years or criminal detention
Those who, in violation of state regulations, intrude into a computer information system other than the provisions of the preceding paragraph, or use other technical means to obtain data stored, processed or transmitted in the computer information system, or illegally control the computer information system, if the circumstances are serious, shall be sentenced to fixed-term imprisonment of not more than three years or criminal detention and shall also, or shall only, be fined; If the circumstances are especially serious, he shall be sentenced to fixed-term imprisonment of not less than three years but not more than seven years and shall also be fined Those who deliberately make or spread destructive programs such as computer viruses, which affect the normal operation of the computer system, and have serious consequences, shall be punished in accordance with the provisions of the first paragraph It is stipulated in the{rrrrrrr}
extended materials
"explanation on Several Issues concerning the application of law in handling criminal cases endangering the security of computer information system":
article 1: illegal acquisition of computer information system data or illegal control of computer information system has one of the following circumstances, It should be recognized as "serious circumstances" as stipulated in the second paragraph of article 285 of the criminal law: (1) obtaining more than 10 groups of identity authentication information of payment and settlement, securities trading, futures trading and other online financial services
(2) obtaining more than 500 groups of identity authentication information other than those in Item (1); and
(3) illegally controlling more than 20 computer information systemsArticle 8 if a crime of endangering the security of computer information system is committed in the name or form of a unit and meets the standard of conviction and sentencing as stipulated in this interpretation, the person in charge who is directly responsible and other persons who are directly responsible shall be investigated for criminal responsibility in accordance with articles 285 and 286 of the criminal law
sentencing: it depends on which instry the company is and how much impact it has on the company. Generally, crimes committed by state-owned companies (such as military, media, finance, etc.) will be very serious, no matter whether they have impact or not
before the court convicts a general company, as long as the company does not investigate, it is basically OK. If the company is investigated, it is generally more than three years and less than seven years
Yes
because they violate other people's system privacy, they will face punishment. So I think hackers will certainly cause some damage if they invade other people's computer systems. If the circumstances are serious, they will face some forms of punishment
First, this kind of illegal intrusion, whether other people's computers are illegal< p> This kind of illegal intrusion into other people's computer system is definitely an illegal act, because according to the criminal law of the people's Republic of China, it is pointed out that if there is illegal access to computer information system data, there is a provision of fixed-term imprisonment. Therefore, if we are not close to people, we should try not to let others invade our computer system, and the invasion of other people's computer system will lead to the disclosure of our personal privacy, so it is very dangerous
summary. By analyzing whether this kind of illegal intrusion into computer is illegal behavior and how to prevent the intrusion of hackers, we have a deep discussion. So when we have such a thing, we should analyze how to solve it. If you have any good ideas and opinions, please leave a message below
1. According to Article 285 of the criminal law, "the crime of illegally intruding into computer information system" refers to the act of intruding into computer information system in the fields of state affairs, national defense construction and cutting-edge science and technology in violation of state regulations
the object of this crime is the security of the important national computer information system, and the object of the crime is the computer information system in the fields of national affairs, national defense construction and cutting-edge science and technology
in the objective aspect, it is shown that it violates the national regulations and invades the above three kinds of computer information systems. The subjective aspect can only be intentional, that is, knowingly intrude into such system. Those who commit this crime shall be sentenced to fixed-term imprisonment of not more than three years or criminal detention
According to Article 286 of the criminal law, the crime of destroying the computer information system refers to the operation of deleting, modifying, adding or interfering with the functions of the computer information system in violation of the state regulations, resulting in the abnormal operation of the computer information system or deleting, modifying or adding the data and Application programs stored, processed or transmitted in the computer information system, Or deliberately making and spreading destructive programs such as computer viruses, which affect the normal operation of the computer system and have serious consequences The object of this crime is the state's management system of computer information system. The objective aspect is that the actor violates the national regulations, destroys the computer information system, and has serious consequences. The subjective aspect can only be intentional. Whoever commits the crime shall be sentenced to fixed-term imprisonment of not more than five years or criminal detention; if the consequences are especially serious, he shall be sentenced to fixed-term imprisonment of not less than five years
to distinguish between crime and non crime, it should be noted that the establishment of this crime is for the special protection of computer information system security in the fields of national affairs, national defense construction and cutting-edge science and technology. Only by intruding into the computer information system in these fields can it constitute a crime
the invasion of computer information system in other fields shall not be regarded as this crime. Although this crime is an act crime, if the circumstances are obviously minor and the harm is not great, it can not be punished as a crime
The important departments of the country have generally established their own computer information systems. The normal operation of these computer information systems plays a very important role in ensuring national security, economic development and protecting people's lives and propertyhowever, once these important computer information systems are illegally intruded, it may lead to the destruction of important data or the leakage of some important and sensitive information, which may not only proce a disastrous chain reaction in the system, but also cause serious political and economic losses, and even endanger the safety of people's lives and property
It is necessary to crack down on this kind of illegal intrusion into national important computer information systemSecond, the classification and motivation of computer crimes
hacker originally refers to a computer fan who is very familiar with computer programming technology and is keen on compiling new programs in the field of computer programming, but now it has graally evolved into a person who "invades" the computer program system without permission, or maliciously destroys the computer program system To compile the pronoun of computer virus. Computer hackers are the main source of computer crimes. Generally speaking, the behaviors of hackers entering computer system can be divided into the following categories: one is "hacker's illegal invasion" to destroy computer information system; Second, making, ing, spreading and consulting harmful information on the Internet, such as spreading computer viruses and pornographic images; Third, the use of computers to implement financial fraud, theft, corruption, misappropriation of public funds; The fourth is the illegal use of computer resources, such as embezzling accounts, stealing state secrets or business secrets; Fifth, the use of the Internet to intimidate, blackmail and other crimes. With the increasing novelty and concealment of computer crime, there will be many other forms of crime in the future. From the current computer crime cases in China, the suspect is generally young student who is proficient in computers. The author believes that there are two criminal motives: first, the actor is not out of malice, but with fun or show their own computer technology expertise, the invasion of other people's computer system as a challenge to their own ability, after the invasion of the system does not implement destructive action and exit, can be called a non malicious intruder. Second, the purpose of the actor's intrusion into the computer system is to steal business intelligence, data or state secrets in intentional violation of state regulations; Or to show their ability and make, spread computer viruses and other destructive programs, resulting in system paralysis, such hackers can be called malicious intruders< Third, China's "criminal law" on computer crime
1. Article 285 of the criminal law stipulates the "crime of illegally invading computer information system", which refers to the violation of state regulations, invading the computer information system in the fields of state affairs, national defense construction and cutting-edge science and technology. The object of this crime is the security of the important national computer information system, and the object of the crime is the computer information system in the fields of national affairs, national defense construction and cutting-edge science and technology. The objective aspect is to violate the national regulations and invade the above three kinds of computer information systems. The subjective aspect can only be intentional, that is, knowingly intrude into such system. Those who commit this crime shall be sentenced to fixed-term imprisonment of not more than three years or criminal detention< According to Article 286 of the criminal law, "the crime of destroying computer information system" refers to the operation of deleting, modifying, adding or interfering with the functions of computer information system in violation of state regulations, resulting in the abnormal operation of computer information system, or deleting, modifying or adding the data and application programs stored, processed or transmitted in computer information system, Or deliberately making and spreading destructive programs such as computer viruses, which affect the normal operation of the computer system and have serious consequences. The object of this crime is the state's management system of computer information system. The objective aspect is that the actor violates the national regulations, destroys the computer information system, and has serious consequences. The subjective aspect can only be intentional. Whoever commits the crime shall be sentenced to fixed-term imprisonment of not more than five years or criminal detention; if the consequences are especially serious, he shall be sentenced to fixed-term imprisonment of not less than five years< In modern life, computer has become a very important tool for people in information exchange and daily work. To ensure the normal operation of computer information system is of great significance to the stability of normal social order and the development of social economy. Our country has raised the punishment of computer crime to the height of punishment. From the above two crimes, the punishment is not heavy, but also shows the punishment strength and determination of computer crime in our country. However, e to the lag of the formulation of the law, there are certain one sidedness and limitations in the punishment of this kind of crime in judicial practice
1. The two crimes cannot cover all the behaviors of computer crimes. For example, in the case of the Shanghai Hotline, Yang was arrested by the public security organ for illegally using the "Shanghai Hotline" for more than 2000 hours because he broke into eight servers of the "Shanghai Hotline" and cracked the accounts and passwords of most of the staff and more than 500 legitimate users, including the super user accounts and passwords of two servers, He was arrested for the crime of destroying computer information system. Later, the public security organs changed the compulsory measures from arrest to l. The case is a typical "three dissimilarities" case. The reasons are as follows: (1) Yang does not constitute "the crime of illegally invading the computing information system". According to the criminal law, what Yang invades is the information system of the network service provider, not the fields of state affairs, national defense construction and cutting-edge science and technology. The object of the crime is different from that of the crime, Therefore, it does not constitute the crime 2) Yang does not constitute a "crime of destroying computer information system.". According to the provisions of the crime, although the actor has the ability to delete, modify and cause network paralysis, he has not implemented the behavior. Even if he has implemented the behavior, he must achieve the "serious consequences" stipulated in the criminal law before he can be investigated for responsibility 3) Yang does not constitute theft. According to article 287 of the criminal law, Yang's behavior is essentially the same as stealing long-distance telephone and mobile number. However, in judicial practice, it is generally believed that the object of such illegal behavior is communication users, not communication service providers, namely Internet service providers (ISPs), If the interpretation is expanded, there is no clear legal provisions or judicial interpretation. According to the principle of no crime without explicit provisions in the law, we can only draw the conclusion that Yang does not constitute theft
2. There is no accurate standard to define the term "serious consequences". For example, what is the accurate definition standard of "serious consequences" in the crime of destroying computer information system?, What kind of consequences are serious? For another example, in the first case of hacking into the securities network, Zhang illegally intruded into the computer system of the securities company in order to help his friends speculate in stocks and obtain insider information, ing the detailed information of the customer's account number and fund balance. After Zhang was arrested, the judicial department found Zhang "innocent" after examination. As far as this case is concerned, there are some similarities with the previous case. Does Zhang constitute the crime of stealing trade secrets? The focus of the debate is that according to the criminal law, the crime of stealing trade secrets should be constituted only by causing heavy losses. How to define the meaning of "serious consequences" and whether the serious consequences are based on the actual property losses. The author agrees with the judicial organ's determination of "not guilty" because Zhang has used computer to steal business secrets