I understand that time(0) is commonly using for seeding random number generators and that it only becomes a problem when the program is being run more than once per second.
On unix systems, you could take a few bytes from /dev/random as a seed for your RNG. /dev/random is supposed to be very good random, using the different entropy sources available on a PC. Of course, this is completely implementation-dependent.
One case in which this could be useful is for cryptographic applications, since time(0) is relatively easy to guess.