See also: Security | Exploit | Warez
Short form: 0-day
0-day is hackerspeak for the very latest cracks, warez and exploits.
Table of contents 1 Software Cracks
2 Remote Exploits
2.1 Defending against a Zero Day Attack
2.2 Related Links
Originally, among there were “14-day” groups and then “7-day” groups who would rush to release the latest cracked warez within 14 or 7 days of the products appearing in store. 0-day goes even further and is considered elite, because it involves the crackers having contacts in the development, production, distribution or retail sectors who have access to pre-release software.
0-day is also used to describe exploits for bugs that have not yet been published and therefore do not have a fix yet. 0-day means the Bad Guys are a step ahead of the Good Guys.
Defending against a Zero Day Attack
There is no defense against a Zero Day attack, apart from chosing an operating system with a very low instance of bugs, disconnecting your server, or not having a public Web site.
If you discover a bug that no one else knows about, please behave like a White Hat Hacker and give that bug to the project leader of whatever software program that belongs to. If you have a software company or work for one and you discover a bug, please see “Security Through Obscurity” for some possible insight on what to do and what not to do.
TakeDown.NET -> “Zero-Day”