Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    IPV6    |    The convoluted hot-mess that is IPV6    |    4,612 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 3,752 of 4,612    |
|    Victor Sudakov to Alexey Vissarionov    |
|    A small questionary on ISPs    |
|    23 Oct 21 20:07:02    |
      REPLY: 2:5020/545 6173cb65       MSGID: 2:5005/49 61742c74       CHRS: CP866 2       TZUTC: 0700       TID: hpt/fbsd 1.9.0-cur 2019-12-05       Dear Alexey,              23 Oct 21 11:40, you wrote to Jay Harris:        Mv>>> What can I say? I thought the my ISP provided modem/router was        Mv>>> crap, but this is worse than I ever thought could happen...        JH>> Yeah, I didn't really believe it when my Mom told me that's what        JH>> it does, but sure enough, she was right. While he default SSID is        JH>> gnarly looking, at least the default password isn't insecure.        JH>> To help in that department I made a wifi QR code for her using        JH>> https://qifi.org so that guests can just scan that QR code        JH>> instead of typing in that super long password.               AV> Entering your WiFi prameters on an external resource is a very unwise        AV> idea.              The https://qifi.org site says that everything happens locally in your       browser. Of course it is your right to disbelieve them.               AV> echo 'WIFI:T:WPA;S:Muzenirres;P:ds4tN3oxUzku61WD;;' \        AV> | qrencode -s 50 -l H -8 -d 600 -o my_wifi.png              The site above also suggests piping the string "WIFI:S: |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca