Kids Only Channel Policies [Doc]

The following is a summary of AOL’s “Kids Only Channel Policies.” The AAC is obligated to follow these policies at all times. (from “Document Version 2.32”). All items are direct quotes, commentary is in brackets. The original document is 16 pages long. Grammar and spelling are as found in the original document. This document was prepared bu AAC Coord based on policies in effect in July, 1998.

Introduction

AOL developed The the Kids Only Channel Policies (“Policies”) to ensure a uniform consistent set of standards and practices throughout all programming and advertising areas (Rainman or web-based) targeted to kids children 12 and under on America Online, and particularly including through the Kids Only channel. AOL reserves the right to modify these Policies as necessary. Additionally, AOL expects all Partners to abide by the Children’s Advertising Review Board Unit (“CARU”) guidelines for Interactive Electronic Media (see also http://www.bbb.org/advertising/caruguid.html)

Policy PrincipleObjectivesGoals
~Provide a safe, age appropriate environment for kids in a manner appealing to both kids and parents, addressing primary industry and consumer concerns:
~Providing age appropriate content
~Protecting youth privacy, including protection from online predators
~Creating an age-appropriate marketing environment.
~Create a viable programming and business model for youth-targeted areas and partners on AOL.
~Provide a safe, age appropriate environment for kids in a manner appealing to both kids and parents;
~Create a viable programming and business model for youth targeted channels and partners on AOL.

FEDERATION GREETER’S GUIDE [Doc]

**>> FEDERATION GREETER'S GUIDE 96.09.30 TOS SECTION

HOW TO DEAL WITH TOS PROBLEMS

It's a sad fact that part of your job is to act as a Fed Cop and stop people
from offending against TOS or the Federation Policy. Greeters are the first
line of action when someone starts misbehaving, and, except in very serious
cases or when you are very busy, generally Hosts won't intervene until you
ask them to bump or lock someone.

Please do not be afraid to pass a problem player to a Host to deal with. If
you give someone a TOS warning, and they ignore it, there's usually not much
point giving them another warning - they need to be bumped out of the game as
a wake-up call, or locked out completely.
Mini Oblivion

AppName: Mini Oblivion
Versin: 0.1
Coder: Stan
Group: The Ratpack
Website: http://oblivionrat.cjb.net

–=Disclaimer=–

Mini Oblivion is meant to be used for legal purposes only. Since it is beyond the author’s control of what Mini Oblivion is used for, the author of Mini Oblivion can not be held accountable for anything you do with this program.

–=About Mini Oblivion=–

Mini Oblivion is a RAT(Remote Administraton Tool) coded in C by Stan.

Stealth Proxy

Stealth Proxy for Windows 95/98/NT/2000
—————————————

OK. Neccesity is the mother of invention and this was something I needed a while back and finally got around to making. Basically, it’s a SOCKS 4/5 proxy server that runs in the background with no obvious signs that it’s doing so. The idea is, if you have access to a machine and want do ‘stuff’ anonymously and don’t trust public ‘anonymous’ proxy servers this might be for you.

Program: RA (Remote-Anything)

Program: RA (Remote-Anything)

Editor: TWD Industries
<http://twd-industries.com>
<info@twd-industries.com>

Reference Manual: <http://www.remote-anything.com/archives/ra_manual.pdf>
FAQ: <http://www.remote-anything.com/prod_remote_faq.htm>

PURPOSE
=======

TWD Industries proudly presents Remote-Anything (RA) v3.6.4, the last version of
its Remote-Control Administration Tool which allows to use a distant PC as if
you were there.

ACK Tunneling Trojans

ACK Tunneling Trojans

– Arne Vidstrom, arne.vidstrom@ntsecurity.nu
Summary

Trojans normally use ordinary TCP or UDP communication between their client and server parts. Any firewall between the attacker and the victim that blocks incoming traffic will usually stop all trojans from working. ICMP tunneling has existed for quite some time now, but if you block ICMP in the firewall you’ll be safe from that. This paper describes another concept, that I call ACK Tunneling. ACK Tunneling works through firewalls that don’t apply their rule sets on TCP ACK segments (ordinary packet filters belong to this class of firewalls).

WinShell v5.0

WinShell v5.0 £­ A finished telnet server for windows

Author : janker
Homepage: http://www.janker.org

About
=====
WinShell was a telnet server for windows platform. Main program was just a 5k bytes stand-alone executable file, Could run stably without any third dll, Although it was so thin, it had many of functions, such as custom port, password protect, muti-user logon, NT Service mode, download file£¬user-defined message, special anti-ddos and etc. Detail to see the following:

farm9

farm9 README.txt for cryptcat
09-22-2000

Thanks for downloading cryptcat

This is a simple modification to netcat to add twofish encryption.
netcat was origianally written by the l0pht (hobbit and weld pond).

The portion of the code written by farm9 is being released as Open Source.

See the file ‘farm9 Public License Agreement.txt’ for info on Open Source licensing.

Netcat 1.10

Netcat 1.10=========== Netcat is a simple Unix utility which reads and writes dataacross network connections, using TCP or UDP protocol.It is designed to be a reliable "back-end" tool that canbe used directly or easily driven by other programs andscripts. At the same time, it is a feature-rich networkdebugging and exploration tool, since it can create almostany kind of connection you would need and has severalinteresting.....
sdbot 0.5b

sdbot 0.5b (test release) by [sd] =================================== web site: http://sdbot.n3.net/ e-mail: sdbot@mail.ru sonork id: 100.2600 icq: 21381594 irc: irc.lcirc.net, #sdbot how to edit the source file ----------------------------- extract the files from the zip into a folder, and look for a file called 'sdbot05b.c' (LCC/mingw) or 'sdbot05b.cpp' (MSVC++). these are source files for sdbot. the contents of both files are exactly the same, they are seperate.....
Hacker defender v0.7.3

Hacker defender v0.7.3====================== Main---- Hacker defender v0.7.3 byHoly_Father <holy_father@phreaker.net> & Ratter/29A <ratter@atlas.cz>Copyright (c) 2000,forever ExEwORxbirthday: 10.01.2003home: http://rootkit.host.skBetatesters:ch0pper <THEMASKDEMON@flashmail.com>phj34r (sandstorm99@ziplip.com)ierdna (ierdna@go.ro)UnixDied Hacker defender is rootkit for Windows NT 4.0, Windows 2000 and Windows XP.Main code was written in Delphi 6. New functions are written in assembler.Backdoor and redirector clients are coded mostly in Delphi 6. program uses adapted LDE32LDE32, Length-Disassembler Engine, 32-bit, (x) 1999-2000 Z0MBiEspecial edition.....