Portal:AOL-Files/Articles
AOL-Files | Articles | Downloads | FDO91 | |
All of these articles have been written by members of the AOL underground for this site or have given us permission to post their work here. All of the information is accurate to the best of our knowledge. However, if you notice an error in any of the articles please contact the webmaster (webmaster@fdo-files.com) and let us know.
Submit Your Own
Want to write an article? We would love it! After being reviewed by the staff your article would be posted on the main page and all the site's visitors would see it. If you are just beginning on AOL but you know something interesting or have some special skill and you want to get your reputation started then this is a good way to do it.
Status of the Exploits
Understand that all of the screen name exploits as well as the other major exploits and loop holes are inactive unless otherwise stated. All of these are intended to teach you about AOL's flaws and past exploits.
Screenname Information
Creating Fake Accounts by Cam0
- Another method of creating fake accounts using a new feature of AOL.
Suspended Screenname Exploit by Cam0
- This exploit allows anyone with a suspended account and password can turn that deactivated name into an AOL account.
Deleted Screenname Exploit by Cam0
- Learn how to turn deleted AIM accounts into AOL accounts.
AIM Jacking on Macintosh Systems by Tau
- How AIM names are being stolen by a loophole in the AOL 2.7 client on Macintosh systems and Hypah's action with it.
Indents and AIM Stealing by BMB
- The greatest AIM exploit that there has every been discovered by BMB for use on PCs. In this article he lays out step by step how to make indented screennames and how to steal any AIM screenname.
Restricted Screennames by Tau
- Also called the r2k exploit, this exploit allowed regular AOL members to make screennames with restricted strings in them like Host, Guide, AOL, etc. This was done via a flaw in free.aol.com.
Restricted Screennames via keyword Names by Tau
- Hours after AOL added a new feature to its screenname creation process that allowed users to choose words to assemble a screenname, a new exploit was discovered that allowed users to make screennames with restricted strings after the 10th character of a screenname.