What is an attack on zero day?
Attack zero day, also known as zero clock attack, uses the vulnerability of a computer that currently does not have a solution. Once it has been released, a software company usually discovers an error or a problem with a piece of software and offers a fix - another piece of software designed to solve the original problem. The attack with the zero day will use this problem before creating a patch. It is named Zero Day because this happens before the first day when the vulnerability is known. In fact, this is exactly what harmful programmers hope. By finding the vulnerability of the software before they find software manufacturers, the programmer can create a virus or a worm that uses that vulnerability and damages computer systems in different ways. They are aware of vulnerability. Sometimes manufacturers learn about vulnerability, but the development of patch can take time. Alternatively, software manufacturers can sometimes withstand repair because they do not want to flood customers with a number of individual updates and unless they doThe vulnerability is not particularly dangerous, more updates can be collected and released as a package. However, this approach can potentially expose users of the attack.
zero -day attack can be harmful to specific computers long after the patch is created and the vulnerability has been closed. This is because many computer owners do not regularly update their software using patches available to software manufacturers. Software companies recommend that users regularly check their pages for software patches or Error fix .
Many computer experts recommend two techniques to a computer system against zero day attack. The first is to allow the heuristic scanning of the virus, the possibility in the antivirus software to block currently unknown viruses and worms, because the typical attack is not known until a large number of computers are infected. The second is to use firewAll to protect your computer from online exploits.