The primary defense against "Zero Hour" exploits is the implementation of robust, kernel-level or server-side detection systems.
: High-speed "rage hacking" is easily spotted by manual reporting.
: Information about enemy locations is often withheld by the server until they are within a certain distance.