MediaWiki API result

This is the HTML representation of the JSON format. HTML is good for debugging, but is unsuitable for application use.

Specify the format parameter to change the output format. To see the non-HTML representation of the JSON format, set format=json.

See the complete documentation, or the API help for more information.

{
    "batchcomplete": "",
    "continue": {
        "gapcontinue": "TN3",
        "continue": "gapcontinue||"
    },
    "warnings": {
        "main": {
            "*": "Subscribe to the mediawiki-api-announce mailing list at <https://lists.wikimedia.org/mailman/listinfo/mediawiki-api-announce> for notice of API deprecations and breaking changes."
        },
        "revisions": {
            "*": "Because \"rvslots\" was not specified, a legacy format has been used for the output. This format is deprecated, and in the future the new format will always be used."
        }
    },
    "query": {
        "pages": {
            "16": {
                "pageid": 16,
                "ns": 0,
                "title": "TN1",
                "revisions": [
                    {
                        "contentformat": "text/x-wiki",
                        "contentmodel": "wikitext",
                        "*": "= Configuring a Cisco SPA504g for use with IP-Phone-C =\n\n[https://asahi-net.jp/en/service/ipphone-c/ IP-Phone-C] is a VOIP service provided by [https://asahi-net.jp AsahiNet]. It is a rebranding of NTT's [https://ja.wikipedia.org/wiki/%E3%83%95%E3%83%AC%E3%83%83%E3%83%84#%E3%81%B2%E3%81%8B%E3%82%8A%E9%9B%BB%E8%A9%B1 Hikari] VOIP service, so these notes may be applicable to similar services from other resellers.\n\nThis note describes how to configure a [https://www.cisco.com/c/en/us/products/collateral/collaboration-endpoints/small-business-spa500-series-ip-phones/data_sheet_c78-548564.html SPA504g] VOIP handset with the IP-Phone-C service. This information should be applicable to other VOIP handsets, although their configuration details will vary.\n\n== Subscriber Information ==\nConfigure an extension on the handset as follows:\n EXT > Display Name = <Your 050 Phone Number>\n EXT > User Id = <Your 050 Phone Number>\n EXT > Password = <Your Password>\n EXT > Use Auth Id = Yes\n EXT > Auth Id = <Your User Id>\n\n== Audio Configuration ==\nThe IP-Phone-C SIP server only supports the G711u codec. Other codecs, or too many proposed codecs, may trigger a \"488 Not Acceptable Here\" response. Therefore configuration with just G711u is recommended.\n EXT > Preferred Codec = G711u\n EXT > Use Pref Codec Only = Yes\n\n== NAT Configuration ==\nIf you are using NAT, enable keepalives:\n EXT > NAT Keep Alive Enable = Yes\n\n== RTP Packet Size ==\nThe IP-Phone-C SIP server only accepts a SDP attribute a=ptime with the value 20. Any other value will result in a \"488 Not Acceptable Here\" response, incorporating a \"307 Session description parameter not understood\" warning. This is an extremely difficult issue to debug without a priori knowledge, and the engineer involved should be ashamed of themselves for not providing a more meaningful error response.\n\nThe SPA504g emits the correct value with the following configuration:\n SIP > RTP Packet Size = 0.02"
                    }
                ]
            },
            "17": {
                "pageid": 17,
                "ns": 0,
                "title": "TN2",
                "revisions": [
                    {
                        "contentformat": "text/x-wiki",
                        "contentmodel": "wikitext",
                        "*": "= Email Scams =\n\nBeware! There are many [https://en.wikipedia.org/wiki/List_of_email_scams email scams] and they are always evolving. The major reasons that email is attractive to scammers are:\n* it is insanely cheap to [https://en.wikipedia.org/wiki/Email_spam spam] millions or even billions of accounts,\n* it is easy to [https://en.wikipedia.org/wiki/Email_spoofing pretend to be someone else] (although [https://en.wikipedia.org/wiki/DMARC this is getting harder]), and\n* it is easy to hide your tracks by using burner or subverted email infrastructure.\n\n== How Do I Recognise a Scam? ==\n\nScams are the same online and offline. The scammer wants to take something valuable from you. Some key tells are:\n* demanding money (including virtual currencies),\n* creating a sense of urgency or panic,\n* attempting to embarrass or blackmail you,\n* asking for or using your personal information (including passwords!), and\n* making promises too good to be true.\n\nNote that sophisicated scams try to convince you they know everything about you. They use your email address. They may know a password from some other site that has been breached.\n\n== What Should I Do? ==\n\nIn most cases, the best thing to do is ignore the email. Your address was probably mass generated by the spammer, or leaked from some other site. Don't worry. Your email address is not a secret and there is no security implication to it being public.\n\nDon't try and reply to the scam. The sender's address is probably fake or misappropriated. If you somehow succeed, you are just [https://www.ted.com/talks/james_veitch_this_is_what_happens_when_you_reply_to_spam_email guaranteeing more spam].\n\n== Thinking About Passwords ==\nYou really don't want a scammer breaking into your email account. For one, they will use your account to hurt others. Worse still, they may use information in your account against you in a targeted attack. These are not nice people.\n\nThe most effective things you can do are:\n* Choose hard to guess passwords. Random and long is good.\n* Only generate passwords locally. Don't trust online services that offer to this.\n* Use a different password for each account. You don't want to lose everything becuase some lousy social networking site got breached.\n\nModern browsers can generate and remember passwords so you don't have to."
                    }
                ]
            }
        }
    }
}