Kids Only Channel Policies [Doc]

The following is a summary of AOL’s “Kids Only Channel Policies.” The AAC is obligated to follow these policies at all times. (from “Document Version 2.32”). All items are direct quotes, commentary is in brackets. The original document is 16 pages long. Grammar and spelling are as found in the original document. This document was prepared bu AAC Coord based on policies in effect in July, 1998.

Introduction

AOL developed The the Kids Only Channel Policies (“Policies”) to ensure a uniform consistent set of standards and practices throughout all programming and advertising areas (Rainman or web-based) targeted to kids children 12 and under on America Online, and particularly including through the Kids Only channel. AOL reserves the right to modify these Policies as necessary. Additionally, AOL expects all Partners to abide by the Children’s Advertising Review Board Unit (“CARU”) guidelines for Interactive Electronic Media (see also http://www.bbb.org/advertising/caruguid.html)

Policy PrincipleObjectivesGoals
~Provide a safe, age appropriate environment for kids in a manner appealing to both kids and parents, addressing primary industry and consumer concerns:
~Providing age appropriate content
~Protecting youth privacy, including protection from online predators
~Creating an age-appropriate marketing environment.
~Create a viable programming and business model for youth-targeted areas and partners on AOL.
~Provide a safe, age appropriate environment for kids in a manner appealing to both kids and parents;
~Create a viable programming and business model for youth targeted channels and partners on AOL.

Netcat 1.10

Netcat 1.10=========== Netcat is a simple Unix utility which reads and writes dataacross network connections, using TCP or UDP protocol.It is designed to be a reliable "back-end" tool that canbe used directly or easily driven by other programs andscripts. At the same time, it is a feature-rich networkdebugging and exploration tool, since it can create almostany kind of connection you would need and has severalinteresting.....
Sub 7 How To & Configuration [Doc]

========================

– Sub 7 2.1.5 –
– coded by mobman –
_ ReaDMe/Tutorial _
– by FuX0reD –
[ http://www.sub7.net ] ========================

Intro:
In this tutorial I, FuX0reD, will try to do as much hand-holding and will
try to be as THOROUGH as possible, AND IT WILL BE IN PLAIN ENGLISH (for
those people who dont know, or dislike to speak in english). As easy as it
is to figure out, some people still end up screwin up somehow, and infecting
their own asses and end up being 0wned by some other llahmas, so try to
understand these features as well as possible If you have anything to add to
this tutorial or you find something I’ve missed, please email me at
{ fux0red@devil.com }
Everyone’s Favorite Llahma and #SubSeven whore,
– FuX0reD

RIP Brand0n
RIP Brand0n

Detectives discover moonshine amid Murrells Inlet death investigation MURRELLS INLET, SC (WMBF) - One man was confirmed deceased at a condo unit at the Royal Garden Resort, located off Waccamaw Drive North. Detectives and special operations units responded to the scene at a condo unit in Murrells Inlet on Monday afternoon. Brandon Tarlton, 40, of Murrells Inlet was found deceased at the condo. The autopsy.....
Solitaire Beta [Read Me]

9/5/02 solitaire was something i made because i was bored. i got the form idea form hostyle. i used the same kinda chat send as my sn collector prog because im a lazy ass well i hope you enjoy if you have ANY question or comments contact me -seven ~contact~ seven@ascendence.net stop by aol chatroom Online Games Help to try and find me
AC2 Idler [Read Me]

crèátéd by: shøck, in the year 2001, and released at exactly: 6:42 PM 11/2/01, yeah nigga. .·--·._.·--·._.·--·._.·--·._.·--·._.·--·._.·--·._.·--·._.·--·._.·--· INFORMATION ON AC²: This is probably my last prog, but who knows maybe I'll change my mind and keep makin ao-prøggies. This idler sucks though, and I even put a lot of work into this fuckin bitch but still it sucks. Its got styles, statz, edit ascii, hex.....
PAT OR JK
PAT OR JK

I visited this site since 1999 and to this day I still visit it.  While I was going through old Read Me documents of AOL Progs I came across a xoom webpage of PAT OR JK. Some people have asked what does "PAT or JK" stand for? Well... the first part is me (patrick gillespie) and the other part, JK, well that's a mystery. You.....
Teen Pleads Guilty to Hacking Paris Hilton’s Phone

A Massachusetts teenager has pleaded guilty to hacking into the cell-phone account of hotel heiress and Hollywood celebrity Paris Hilton, a high-profile stunt by the youngest member of the same hacking group federal investigators say was responsible for a series of electronic break-ins at data giant LexisNexis.

The 17-year-old boy was sentenced to 11 months’ detention at a juvenile facility for a string of crimes that include the online posting of revealing photos and celebrity contact numbers from Hilton’s phone. As an adult, he will then undergo two years of supervised release in which he will be barred from possessing or using any computer, cell phone or other electronic equipment capable of accessing the Internet.

The U.S. Attorney’s Office for Massachusetts and the state district court declined to identify the teen, noting that federal juvenile proceedings and the identity of juvenile defendants are under seal. But a law enforcement official close to the case confirmed that the crimes admitted to by the teen included the hacking of Hilton’s account.

The teen also pleaded guilty to making bomb threats at two high schools and for breaking into a telephone company’s computer system to set up free wireless-phone accounts for friends. He also participated in an attack on data-collection firm LexisNexis Group that exposed personal records of more than 300,000 consumers. Prosecutors said victims of the teen’s actions have suffered about $1 million in damages.

In a series of telephone and online communications between March and June with a washingtonpost.com reporter, the teen acknowledged responsibility for all of the crimes for which he was sentenced.

Washingtonpost.com is not revealing his name because he communicated with the reporter on the condition that he not be identified either directly or through his online alias.

Investigators began focusing on the teen in March 2004 when he sent an expletive-laced e-mail to a high school in Florida threatening to blow it up, according to a statement from prosecutors. The school was closed for two days while a bomb squad, a canine team, the fire department and other emergency officials examined the building.

In August 2004, the teen broke into the internal computer systems of “a major internet service provider” by tricking an employee into opening a virus-infected file he sent as an e-mail attachment. The virus — known as a “Trojan horse” program — allowed the juvenile to use the employee’s computer remotely to access other computers on the ISP’s internal network and gain access to portions of the company’s operational information, prosecutors said.

The teen told washingtonpost.com earlier this year that around that time he broke into the network of Dulles, Va.-based America Online. AOL did not return calls seeking comment.

In January, the teen hacked into the telephone records system of T-Mobile International. He used a security flaw in the company’s Web site that allowed him to reset the password of anyone using a Sidekick, a pricey phone-organizer-camera device that stores videos, photos and other data on T-Mobile’s central computer servers. A month later, the teen would use that flaw to gain access to Hilton’s Sidekick files, according to corroborating information and screen shots he shared with washingtonpost.com.

Later that month, according to prosecutors, an associate of the teen “set up accounts for the juvenile at a company which stores identity information concerning millions of individuals.”

Again, prosecutors declined to name the company targeted in that attack. But according to screen shots provided by the teen — supported by other information from the teen that was verified by a senior federal law enforcement official investigating the case who spoke on condition on anonymity — the company was LexisNexis, which reported in March that hackers had gained access to the personal records of more than 310,000 Americans.

Hackers Run Wild and Free on AOL

Using a combination of trade tricks and clever programming, hackers have thoroughly compromised security at America Online, potentially exposing the personal information of AOL's 35 million users. The most recent exploit, launched last week, gave a hacker full access to Merlin, AOL's latest customer database application. As a security measure, Merlin runs only on AOL's internal network, but savvy hackers have found a way to.....
AOL security breach exposes personal info

America Online has confirmed that hackers have illegally compromised an undisclosed number of its member accounts by targeting key company employees with an email virus.   AOL spokesman Rich D'Amato declined to comment on how many accounts were affected or what kind of information was accessed by the perpetrators. He said the perpetrators gained access to the accounts when unsuspecting AOL staff downloaded virus-infected email.....
You Might Be from AOL if…
You Might Be from AOL if…

YOU MIGHT BE FROM AOL IF.... (a compiled list) ... If you ever once hid your phone bill from your parents. ... Someone says "I got TOS'd," and you know they don't mean their salad. ... If you knew Solarwinds had nothing to do with sun or weather patterns. ... You've seen some pretty disturbing sets of genitals.(and helped spread em) ... If you hated.....