The AOL Privacy Policy
The AOL Privacy Policy

The AOL Privacy Policy Here at AOL, we regard our members' privacy as one of our most important values.  We want our members to know how we protect their information and what choices they have about its use.  We believe AOL's Privacy Policy should give members confidence whenever they use AOL -- 24 hours a day, seven days a week, 365 days of the year. .....
Bored
Bored

You ever get sick of the internet anymore? Back in 1998-2003 I could literally just stay online for days. Pulling all nighters was easy. Jolt cola, hackers movie playing on the tube TV behind me. Log into any chat iXa, vb, phishy, cerver, island55, darkside, etc. You never knew what was going to happen that night. Were you getting pws'd? and spending your entire night.....
YTCracker.com
YTCracker.com

represent the almighty whitey cracker high ponce family history i was born on august 23, 1982 in the pimpin' socal town of la mirada, california (where, coincidentally, they made teenage mutant ninja turtle toys). i didn't hang around there for too long because my pops hated the area and wanted to head back to his home state, colorado. when i was 4, we moved from.....
2 Char “C4”
2 Char “C4”

cam0 on 2 character screen name C4 Submitted by Koin
How It All Started
How It All Started

I hear ya on this one... Remember getting PWS'd on my permie AOL account that had several 3character accounts (t0y, b0x, r0b, h4k) Had to check the startup line on msconfig, system.ini, win.ini Remember hex editing PWS's to find the @ email .com https://twitter.com/r0wdy_/status/874747312022540290
Rant | 1999
Rant | 1999

So now its 1999 after web I dove into visual basic to learn to code my own progs.  I cant remember the person that helped me add bas files, and how to call the different subs in that module such as ChatSend. Programming in VB was different then coding websites but wasnt to far off. There was actually a ton of sources and content available......
The AOL Protocol
The AOL Protocol

The AOL Protocol

When you hear the phrase “The AOL Protocol”, I bet most of you immediately think of FDO, right?
Although FDO is a part of the AOL protocol, it in no way encompasses the big picture. When I use
the term “The AOL protocol”, I refer to how the AOL client and server interact with each other,
how data is prepared, how it is sent, and how it can be manipulated.

There currently exists no formal documentation of the AOL protocol, or at least one that is
publicly available. For this reason, I have taken it upon myself to strip the bits of
information from my feeble mind and write a document with at least basic information about
the AOL protocol. The information included in this document is what I have learned, from
exploration, help from others, and just stumbling upon it. I in no way guarantee the accuracy
of the information contained herein. That said, here is what I know.

TCP\IP: A Mammoth Description

_________________________________________________________________________ TCP\IP: A Mammoth Description By Ankit Fadia ankit@bol.net.in_________________________________________________________________________ TCP\IP or Transmission Control Protocol \ Internet Protocol is a stack or collection of various protocols. Aprotocol is basically the commands or instructions using which two computers within a local network or theInternet can exchange data or information and resources. Transmission Control Protocol \ Internet Protocol or the TCP\IP was developed around the time of theARPAnet......
Word for Windows Password Cracker [Read Me]

Word for Windows Password Cracker (R8)
Copyright by Fauzan Mirza, 1995

This program attempts to recover the password for Word for Windows encrypted
documents.

Usage: WFWCD <DocumentPath>

The Hackers Handbook [Read Me]

T H E H A C K E R ‘ S H A N D B O O K
Copyright (c) Hugo Cornwall

All rights reserved

First published in Great Britain in 1985 by Century Communications Ltd

Portland House, 12-13 Greek Street, London W1V 5LE.

Early Phishing
Early Phishing

Koceilah Rekouche krekouche@pushstart.info

The history of phishing traces back in important ways to the mid-1990s when hacking
software facilitated the mass targeting of people in password stealing scams on America
Online (AOL). The first of these software programs was mine, called AOHell, and it was
where the word phishing was coined. The software provided an automated password
and credit card-stealing mechanism starting in January 1995. Though the practice of
tricking users in order to steal passwords or information possibly goes back to the
earliest days of computer networking, AOHell’s phishing system was the first automated
tool made publicly available for this purpose. 1 The program influenced the creation of
many other automated phishing systems that were made over a number of years. These
tools were available to amateurs who used them to engage in a countless number of
phishing attacks. By the later part of the decade, the activity moved from AOL to other
networks and eventually grew to involve professional criminals on the internet. What
began as a scheme by rebellious teenagers to steal passwords evolved into one of the
top computer security threats affecting people, corporations, and governments.