Portal:AOL-Files/Articles: Difference between revisions
No edit summary |
No edit summary |
||
Line 11: | Line 11: | ||
Understand that all of the screen name exploits as well as the other major exploits and loop holes are inactive unless otherwise stated. All of these are intended to teach you about AOL's flaws and past exploits. | Understand that all of the screen name exploits as well as the other major exploits and loop holes are inactive unless otherwise stated. All of these are intended to teach you about AOL's flaws and past exploits. | ||
== | == Screenname Information == | ||
Creating Fake Accounts by Cam0 | [[Portals:AOL-Files/Articles/Creating Fake Accounts|Creating Fake Accounts]] by Cam0 | ||
: Another method of creating fake accounts using a new feature of AOL. | : Another method of creating fake accounts using a new feature of AOL. | ||
Suspended | [[Portals:AOL-Files/Articles/Suspended Screenname Exploit|Suspended Screenname Exploit]] by Cam0 | ||
: This exploit allows anyone with a suspended account and password can turn that deactivated name into an AOL account. | : This exploit allows anyone with a suspended account and password can turn that deactivated name into an AOL account. | ||
[[Portals:AOL-Files/Articles/Deleted Screenname Exploit|Deleted Screenname Exploit]] by Cam0 | |||
: Learn how to turn deleted AIM accounts into AOL accounts. | |||
[[Portals:AOL-Files/Articles/AIM Jacking on Macintosh Systems|AIM Jacking on Macintosh Systems]] by Tau | |||
: How AIM names are being stolen by a loophole in the AOL 2.7 client on Macintosh systems and Hypah's action with it. | |||
[[Portals:AOL-Files/Articles/Indents and AIM Stealing|Indents and AIM Stealing]] by BMB | |||
: The greatest AIM exploit that there has every been discovered by BMB for use on PCs. In this article he lays out step by step how to make indented screennames and how to steal any AIM screenname. | |||
[[Portals:AOL-Files/Articles/Restricted Screennames|Restricted Screennames]] by Tau | |||
: Also called the r2k exploit, this exploit allowed regular AOL members to make screennames with restricted strings in them like Host, Guide, AOL, etc. This was done via a flaw in free.aol.com. | |||
[[Portals:AOL-Files/Articles/Restricted Screennames via keyword Names|Restricted Screennames via keyword Names]] by Tau | |||
: Hours after AOL added a new feature to its screenname creation process that allowed users to choose words to assemble a screenname, a new exploit was discovered that allowed users to make screennames with restricted strings after the 10th character of a screenname. | |||
Revision as of 02:00, 2 October 2020
AOL-Files | Articles | Downloads | FDO91 | |
All of these articles have been written by members of the AOL underground for this site or have given us permission to post their work here. All of the information is accurate to the best of our knowledge. However, if you notice an error in any of the articles please contact the webmaster (webmaster@fdo-files.com) and let us know.
Submit Your Own
Want to write an article? We would love it! After being reviewed by the staff your article would be posted on the main page and all the site's visitors would see it. If you are just beginning on AOL but you know something interesting or have some special skill and you want to get your reputation started then this is a good way to do it.
Status of the Exploits
Understand that all of the screen name exploits as well as the other major exploits and loop holes are inactive unless otherwise stated. All of these are intended to teach you about AOL's flaws and past exploits.
Screenname Information
Creating Fake Accounts by Cam0
- Another method of creating fake accounts using a new feature of AOL.
Suspended Screenname Exploit by Cam0
- This exploit allows anyone with a suspended account and password can turn that deactivated name into an AOL account.
Deleted Screenname Exploit by Cam0
- Learn how to turn deleted AIM accounts into AOL accounts.
AIM Jacking on Macintosh Systems by Tau
- How AIM names are being stolen by a loophole in the AOL 2.7 client on Macintosh systems and Hypah's action with it.
Indents and AIM Stealing by BMB
- The greatest AIM exploit that there has every been discovered by BMB for use on PCs. In this article he lays out step by step how to make indented screennames and how to steal any AIM screenname.
Restricted Screennames by Tau
- Also called the r2k exploit, this exploit allowed regular AOL members to make screennames with restricted strings in them like Host, Guide, AOL, etc. This was done via a flaw in free.aol.com.
Restricted Screennames via keyword Names by Tau
- Hours after AOL added a new feature to its screenname creation process that allowed users to choose words to assemble a screenname, a new exploit was discovered that allowed users to make screennames with restricted strings after the 10th character of a screenname.