August 20, 2004 at 5:01 am #45573
Can you explain how its not longer an issue?August 20, 2004 at 2:26 pm #45582CronusParticipant
In June, AOL changed many of the server-side rules governing AIM (same stuff that took DoorManBot down for a month). One of the items was with warnings. In order to warn somebody (in a short conversation), they must be the person who started the conversation. Therefore, if you send a message to somebody who is away, even if they respond via away message, you still started the conversation, so you cannot warn them. Test it out and see for yourself. Personally, I think it was a great change, as it got rid of most warning abuse.September 21, 2004 at 1:42 am #45591123123Participant
yea I hate those gay program
i have been aimboted by alot of people
wat should I do?September 21, 2004 at 11:05 pm #45585PimpskaterMemberOctober 6, 2004 at 12:21 am #45571JerkyChewMemberQuote:quote:Originally posted by CoxsackieVirus
AOL is mostly for the people like Windows XP. Windows XP can be hacked easly. Theres no use for a password at startup. Theres a way to hack into it and I will not be telling. Its extreamly complicated and dangereouse to the computer. You should only do it if you lock yourself out of the computer.
No, it's not complicated, and no, it's not all that dangerous. The thing is, you have to be sitting at the machine to do it. I use it all the time at work.October 11, 2004 at 9:00 pm #45592Hassen_MichMember
Is this the one where I love my CloneCD and my old computer teacher/highschool admin?October 14, 2004 at 3:56 pm #45593LoftonMember
To be honest, I got some of that **** on my computer. Punters and IP Sniffers, and all that good stuff, but I rarely use it anymore. Those programs are nothin compared to hacking. Hacking requires skills, not programs.October 19, 2004 at 8:43 pm #45594Random_KidMember
How can you “block” warnings in the first place? I heard you can use ICQ or something but I'm not sure how to use it. It gets annoying too.
And is it true that someone can hack in and modify your block list?October 26, 2004 at 6:03 am #45574
Random kid, I didn't notice your post -.-, but if your still there.
1. You can't.
2. Thankfully its not true. Unless they have your password they can't.December 13, 2004 at 4:59 am #45595phatsoul7Member
but how do you truly avoid uccom?December 25, 2004 at 11:05 am #45596electroMember
To clear a few things up, right off the bat; “Hacking” has nothing to do with cracking or exploiting your way into an AIM account, and subsequently causing malicious damage, or otherwise, by the intended slang definition. Cracking and exploiting are exactly that – cracking and exploiting. ‘Hacking' is a term used to define a sly programmer whom is well-versed in the art of problem solving, when running into constant errata within his coding, or the coding of others, and being able to recognize and repair these errata; not cracking your password, nor devising elaborate exploitation methods, in order to gain passwords, etcetera. Most AOL/AIM programmers use Visual Basic 6 to program and compile. If they're a decent enough programmer, their programs have the ability to generate random characters, (if ccoms can generate random numbers to choose a song from a playlist at random by reading data from within a label control, a cracker can, by theory, randomly generate passwords, as well as read from loaded PWL's). I have found that VB programs bug out when revolving through a list when it reaches a password beginning with an exclamation mark, (for example: !bigblueball). Visual Basic recognizes this as part of the actual code, and causes a run-time error, because it realizes a nanosecond too late that it's NOT part of any subs contained within the BAS or form(s) coding. That's a good solution to the password cracking. Another solution would be to stay as far away from AOL lobby rooms as possible, as you can guarantee that there's someone in there that knows a cracking meth, and is running a SN collector. I used to be an avid cracker, when Winsock didn't rate, and finally gave up, because I realized that it was basically pointless, once the FTP method died as well. I wasn't spamming, nor was I at a loss for screennames on AOL, so therefore, I was wasting time. AIM cracking and exploitation is an even larger waste of time, as AIM is a free service, and you can make another with no difficulty whatsoever, in the event that you do lose one. As for punting, using /null/null and /aux/aux, and other “boot codes”, they're usually dead within a week, tops. Exploits require no skill at all. The only thing that exploits require is the gullability of your victims, and that can be easily solved by trusting nothing whatsoever, not EVEN AOL/AIM uri's, for the simple fact that if, in the event, your account is somehow in danger, the first thing you should do is physically CALL AOL. Tell them your displeasure, and watch the free minutes pile up, as AOL is infamous for going well out of their way to make it seem as though they're making you happy with their services.February 23, 2005 at 3:05 am #45597MellieJellieMember
Question: If someone is using their cell phone to IM you, how can you look up their screen name to verify who they are? Is there a member directory somewhere?February 23, 2005 at 5:03 am #45575
There's is no way to look them up or find out who they are based on their screename, sorry.November 19, 2005 at 1:16 am #45600RuvcaMember
I was wondering if anyone could help me with a problem I had…. I signed on to my Aim on someone's computer and they happened to have a keylog on there comp and they signed on my sn and changed my pw and the email address on file…..is there anyway I can get my sn back?November 19, 2005 at 2:05 am #45598DragonSlayerzMember
Nope, Make a new one.
- You must be logged in to reply to this topic.