Monday, January 11, 2010

ZERO-DAY ATTACK☻☻☻♥♥♥


Zero -Day Attack as it is defines as:♥♥♥♥♥♥♥♥

A zero day attack, also known as a zero hour attack, takes advantage of computer vulnerabilities that do not currently have a solution. Typically, a software company will discover a bug or problem with a piece of software after it has been released and will offer a patch another piece of software meant to fix the original issue. A zero day attack will take advantage of that problem before a patch has been created. It is named zero day because it occurs before the first day the vulnerability is known.♣♣♣♣♦♦♦♦

This Zero day attack taking advantage to those computer vulnerabilities. So if your computer has no wall or I mean if you have no fire walls to protect your computer. For example in not a particular situation in the computer but in our life aspect. Say for instance if you have a store then in your side you have a competent of course your product will not totally "bibilhin" of the consumer unless if you will not make the price low. So in that case you are taking advantage to your competent.•••◘◘♠♠♠♠

No comments:

Post a Comment