♥A Zero-Day attack, is also known as hour attack,takes advantage of computer
vulnerabilities that do not currently have a solution. Typically, a software company
will discover a bug or problem with a piece of software after it has been released
and will a patch - another piece of software meant to fix the original issue.
A zero day attack will take advantage of that problem before a patch has been created.
It is named zero day because it occurs before the first day the vulnerability is known.
A zero day attack will take advantage of a bug that neither the software
creators nor users are aware of. In fact, this is precisely what malicious programmers
hope to find. By finding software vulnerability before the software's makers find them.
A programmer can create a virus or worm that exploits that vulnerability and harms
computer systems in a variety of ways.
-->>About Me<<--
My page yeah!!
1/11/2010
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment