The document contains logs from a wireless network monitoring system. It lists access points seen over time and shows the system taking actions by connecting to access point with MAC address 25:64, obtaining both good and poor links to it. It then continues listing access points and repeating the connection process to 25:64 over the given time period.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
3 views
Iwc Dump
The document contains logs from a wireless network monitoring system. It lists access points seen over time and shows the system taking actions by connecting to access point with MAC address 25:64, obtaining both good and poor links to it. It then continues listing access points and repeating the connection process to 25:64 over the given time period.