MR Tokens

The following numbers are MR tokens for use with AOL. If you have the right equipment (which many don’t), you can use these to go directly to a conference room. Some of these tokens lead to staff-only rooms, however, these can STILL be accessed by non-staff.

1    Town Hall

3    Classroom

4    The OGF Commons

5    Writers Workshop

6-8  Classroom

9    Geoworks Chat Room

10   Classroom

11   The Schoolroom

12   Chat Room

13   PC Multimedia

14   The Work Room

15   Educ Technology

16   PC Applications

17   PC Games

18   Questions n Answers

19   PC Graphics

20   The Dungeon

21   Cybersalon

22   Travel Cafe

23   BACKPACKER Chat (more…)

Read More

MASTER.AOL – Promo Numbers

MASTER.AOL – Promo Numbers

—————————-

4773 – American Association of Retired Persons

7468 – National Education Association

8073 – Scholastic (Credit Card/Checking only)

8082 – Scholastic (Invoice Only)

9356 – American Federation of Teachers

11393 get on a VLA mailing list

11562 AOL95 beta

20542 beta central

13927 ARC

13945 Megaweb Beta center

20165 Keyword Mark (kinda stupid)

20178 Greenhouse (goto Vauhn’s coll. for AOL sales search)

11801 Hal’s cool collection (has ARC)

10874 Search for software orders (no access) (more…)

Read More

Updated Invoke Token List

There are a TON of duplicates in this….. if you have a shitload of tokens and invokes that arent mixed up and no duplicates then send em to [email protected]

invokes

————————————

32-324       – Brings you to Programmers University

32-301       – Adds another mailbox to your toolz

32-987       – Software upgrade for master aol. (OH)

32-5046     –  chat room stuff

32-2327     – An Easter Egg.  Only 1 of many on AOL

32-2342     – NEA on-line

32-2405     – Test Internet Style Mail

32-2411     – Set your version of AOL

32-25         – DL manager window

32-252       – Create a screen name

32-253       – Create alternate screen name

32-254       – Delete a screen name (more…)

Read More

Chat Exploit, By Cam0 chat_form.fdo

uni_start_stream_wait_on
man_start_object <ind_group, “Chat Exploit, By Cam0”>
mat_orientation <vff>
mat_precise_width <296>
mat_precise_height <64>
mat_bool_precise <yes>
mat_bool_resize_vertical <no>
mat_bool_resize_horizontal <no>
mat_art_id <1-0-3382>
mat_bool_background_tile <yes>
man_start_object <trigger, “”>
mat_relative_tag <109>
mat_context_help <“Send”>
act_replace_select_action
<
uni_start_stream_wait_on (more…)

Read More

Tokenscan.fdo

uni_start_stream
hfs_attr_flags <64>
uni_next_atom_typed <260>
man_start_object <ind_group, “Dime’s Token Form”>
mat_orientation <hfc>
mat_precise_width <124>
mat_precise_height <60>
mat_bool_precise <yes>
mat_bool_resize_vertical <no>
mat_bool_resize_horizontal <no>
mat_horizontal_spacing <0>
mat_vertical_spacing <0>
mat_color_face <51, 102, 102>
mat_bool_background_flood <yes>
mat_position <top_left>
mat_object_index <666>
man_start_object <ornament, “token”>
mat_precise_width <40>
mat_precise_height <16>
mat_precise_x <5>
mat_precise_y <2>
mat_horizontal_spacing <0>
mat_vertical_spacing <0>
mat_font_sis <arial, 7, normal>
mat_color_text <255, 255, 255>
man_end_object
man_start_object <ornament, “arg/str”>
mat_precise_width <40>
mat_precise_height <16>
mat_precise_x <42>
mat_precise_y <2>
mat_horizontal_spacing <0>
mat_vertical_spacing <0>
mat_font_sis <arial, 7, normal>
mat_color_text <255, 255, 255>
man_end_object
man_start_object <edit_view, “”>
mat_bool_importable <yes>
mat_precise_width <29>
mat_precise_height <17>
mat_precise_x <4>
mat_precise_y <14>
mat_color_text <255, 255, 255>
mat_font_sis <arial, 7, normal>
mat_horizontal_spacing <2>
mat_vertical_spacing <0>
mat_bool_resize_vertical <no>
mat_bool_resize_horizontal <no>
mat_title_pos <1>
mat_bool_vertical_scroll <no>
mat_capacity <2>
mat_relative_tag <1>
mat_height <1>
man_start_sibling <edit_view, “”>
mat_bool_importable <yes>
mat_precise_width <75>
mat_precise_height <17>
mat_precise_x <42>
mat_precise_y <14>
mat_color_text <255, 255, 255>
mat_font_sis <arial, 7, normal>
mat_vertical_spacing <0>
mat_bool_resize_vertical <no>
mat_bool_resize_horizontal <no>
mat_title_pos <1>
mat_bool_vertical_scroll <no>
mat_capacity <15>
mat_relative_tag <2>
mat_height <1>
man_start_sibling <trigger, “gid”> (more…)

Read More

AOL Instant Messenger is hacked

Three 17-year-olds take credit for inserting pornographic images into America Online’s widely used chat service.

Users of the latest version of AOL’s Instant Messenger (AIM) software started encountering an unpleasant surprise on Saturday morning: At least three crackers — malicious hackers — began inserting pornographic images into “AIM Today” and vandalizing content on at least four screens of the chat software.
Since last August, users who launched the latest versions of AIM also launched an informational “AIM Today” window — but as late as 4 pm PST Saturday, if users clicked on the “entertainment” link on AIM Today, followed by a click on any of the following three links advertising the chance to “Meet New People” who wanted to discuss the categories of “Celebrities,” “Soap Operas” or “Comedy,” they would pull up pages displaying pornography, as well as sound files apparently containing messages from the two crackers (“Yeah, fuck you, Sirk owns this shit” — “This is Neon, fuck you Sirk”).
No matter which of the top three “Meet New People” categories are chosen, the content appears to have gone haywire. At the Celebrities link, a series of four pornographic images cycles in an animated GIF. On the Soap Operas link, a Prodigy song plays in the background as a MIDI file. On the Comedy link, below a fifth pornographic image, are pointers to the Aryan group National Alliance.
The chatter and X-rated images appeared next to ads for TV shows broadcast on the AOL-owned Warner Brothers network, including “Charmed” and “Felicity.” AOL officials did not return phone calls over the weekend, but the incident occurred at the same time as the AIM home page was boasting: “Potential AIM Security Issue Resolved.”
An online chat interview with one of the crackers, who identified himself as Sirk, gave some clues as to the methodology. When new members join the AIM service, they can apparently include HTML code in their screen names. That code can include tags that call off-site images and sound files or display text — material that appears where the screen name should appear listed under “Meet New People.”
Sirk — whose name appears throughout the cracked pages — identified himself as one of three 17-year-olds from Connecticut who had been studying AIM for security holes. “I’m surprised somebody hadn’t thought of doing it sooner,” he messaged, “knowing that the AIM Today ‘meet new people’ section is all done through [HTML] links.” He says he hopes to write computer programs that will automatically generate the code to insert images and text into AIM Today — or even re-route AIM Today visitors to a Web page fishing for their password and screen name.
This is not the first time AIM has experienced security holes. Two years ago users discovered that their AIM accounts could be hijacked if the corresponding AOL screen name was not already taken. Sirk taunted AOL for their apparent security holes and their restrictive Terms of Services, but his motives appeared simple: “I’m doing it because I can, and I will.” But he did offer a bombastic message for AOL.
“I’m only hoping that they are upset, and realize that they can’t just program everything like 7th graders.”
He also had a message for AIM users worried about security: “Before using AIM, they should do a little research and find out that this is all part of the territory,” said Sirk. “If you are using a program that’s got as many loopholes and gaps as Swiss cheese, then prepare for the consequences.”