Temat: WiFi Survey na nowym Gargoylu

Czy działa wam poprawnie WiFi Survey na Gargoylu 1.5.9.10/11?
Niestety, przestał mi pokazywać okoliczne sieci.
Czy wtyczce może przeszkadzać extroot zrobiony "jednoklikiem" w nowym G? W zasadzie chyba nie, bo bez exta też nic się nie pokazuje.

Gargoyle fanatic user
WR1043ND v2 16MB / WR902AC v3 / MR3020 16MB+64MB / WR703N / WT3020 / E3372

2

Odp: WiFi Survey na nowym Gargoylu

Wifi włącz najpierw.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

3 (edytowany przez mikhnal 2013-05-07 07:50:48)

Odp: WiFi Survey na nowym Gargoylu

Wifi jest włączone, zawsze działa, bo część urządzeń tak się łączy.

Jedyne co mi przychodzi na myśl to:
+ update robiony z zachowaniem ustawień
+ jakaś specyficzna kombinacja ustawień wifi, 40+, 9 kanał, itp.

Gargoyle fanatic user
WR1043ND v2 16MB / WR902AC v3 / MR3020 16MB+64MB / WR703N / WT3020 / E3372

4

Odp: WiFi Survey na nowym Gargoylu

A uruchom z palca /usr/lib/gargoyle/survey.sh i zobacz co wypisze.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

5

Odp: WiFi Survey na nowym Gargoylu

Jest jakiś błąd:

root@WR1043ND:~# /usr/lib/gargoyle/survey.sh
expr: syntax error
sh: invalid number ''
var sdata = new Array();
sdata.push(["00:22:b0:76:fc:44","201305070853","1+","2.412","-93","-78","on","browar",[54,48,150,0],"Station",["WPA1","TKIP","PSK"]]);
sdata.push(["8c:04:ff:02:6f:0a","201305070853","1","2.412","-93","-80","on","UPC0048889",[54,48,150,300],"Station",["WPA1","CCMP,TKIP","PSK"],["WPA2v1","CCMP,TKIP","PSK"]]);
sdata.push(["00:1f:33:26:d7:4a","201305070853","6","2.437","-95","-86","on","OG26PIA",[54,48],"Station"]);
sdata.push(["64:70:02:cf:63:1a","201305070853","6","2.437","-95","-87","on","TP-LINK_CF631A",[18,54],"Station"]);
sdata.push(["fc:94:e3:30:50:aa","201305070853","8","2.447","-95","-86","on","vnet-A1B95C",[54,48,150,300],"Station",["WPA1","CCMP,TKIP","PSK"],["WPA2v1","CCMP,TKIP","PSK"]]);
var chdata = new Array();
var frqdata = new Array();
chdata.push([1,2412]);
chdata.push([2,2417]);
chdata.push([3,2422]);
chdata.push([4,2427]);
chdata.push([5,2432]);
chdata.push([6,2437]);
chdata.push([7,2442]);
chdata.push([8,2447]);
chdata.push([9,2452]);
chdata.push([10,2457]);
chdata.push([11,2462]);
chdata.push([12,2467]);
chdata.push([13,2472]);
frqdata.push([2412,-93]);
frqdata.push([2417,-95]);
frqdata.push([2422,-95]);
frqdata.push([2427,-95]);
frqdata.push([2432,-95]);
frqdata.push([2437,-95]);
frqdata.push([2442,-95]);
frqdata.push([2447,-95]);
frqdata.push([2452,-95]);
frqdata.push([2457,-95]);
frqdata.push([2462,-95]);
frqdata.push([2467,-95]);
frqdata.push([2472,-95]);
root@WR1043ND:~#
Gargoyle fanatic user
WR1043ND v2 16MB / WR902AC v3 / MR3020 16MB+64MB / WR703N / WT3020 / E3372

6

Odp: WiFi Survey na nowym Gargoylu

sh -x /usr/lib/gargoyle/survey.sh i pokaże gdzie on jest.

Natrafił pewnie na jakieś dane których nie potrafi przeparsować.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

7

Odp: WiFi Survey na nowym Gargoylu

root@WR1043ND:~# sh -x /usr/lib/gargoyle/survey.sh
+ newSurvey=/tmp/tmp_survey.txt
+ oldSurvey=/tmp/survey_data.txt
+ sta_dir=/tmp/stations
+ iw_out=/tmp/iw_out.txt
+ date +%Y%m%d%H%M
+ now=201305070909
+ + + psgrepgrep
 iwlist -v
 grep
+ iwlps=
+ + grepgrep iwlist -v
 grep
+ ps
+ iwps=
+ awk { gsub(/:/,""); printf (NR>2 ? $1" " : null)} END {printf "\n"} /proc/net/wireless
+ wifs=wlan0
+ memb=1
+ [ ! -z  ]
+ [ ! -z  ]
+ [ -z wlan0  ]
+ [ ! -d /tmp/stations ]
+ mkdir /tmp/stations
+ echo var sdata = new Array();
+ echo var chdata = new Array();
+ echo var frqdata = new Array();
+ [ -e /usr/sbin/iw ]
+ ScanNscrap_iw
+ echo
+ + + iwconfiggrepawk
 IEEE {print $1}

+ iw dev wlan0 scan
+ awk -v freq= /Channel/ {printf "chdata.push([%i,%.0f]);\n", $2, $4*1000}
+ iwlist wlan0 chan
+ awk /frequency/,/noise/ { i++; ORS=i%2?FS:RS; printf i%2 ? "frqdata.push(["$2 : ","$2"]);\n"}
+ iw dev wlan0 survey dump
+ awk -v sdir=/tmp/stations /^BSS/{x=++i;} x{print > sdir"/station_iw"x;} /tmp/iw_out.txt
+ [ -e /tmp/stations/station_iw1 ]
+ ls /tmp/stations
+ Mode=
+ Privacy=
+ sRate=
+ eRate=
+ HTmode=
+ MCSrates=
+ streams=
+ channeloffset=
+ channelwidth=
+ WPA=
+ Gcipher1=
+ Pcipher1=
+ AuthSuites1=
+ WPA2=
+ Gcipher2=
+ Pcipher2=
+ AuthSuites2=
+ awk /^BSS/ {print "MAC="$2} /\tfreq:/ {split($2,c,""); print "Freq="c[1]"."c[2]c[3]c[4]} /\tsignal:/ {printf "Level=%i\n", $2} /\tcapability:/ {for(i=2;i<=NF;++i) if($i=="IBSS") print "Mode=\"Ad Hoc\""; else if ($i=="ESS") print "Mode=Station"; else if ($i=="Privacy") print "Privacy=on"} /\tSSID:/ {printf "SSID=\""; for(i=2;i<=NF;++i) printf("%s%s", $i, i==NF?"\"\n":" ") } /\tSupported rates:/ {printf "sRate=%i\n", $NF} /\tDS Parameter set:/ {print "Channel="$NF} /\tExtended supported rates:/ {printf "eRate=%i\n", $NF} /\tHT capabilities:/,/DSSS/ {for(i=2;i<=NF;++i) if ($i == "HT40") print "HTmode="$i } /rate indexes supported:/ {print "rates="$NF} /spatial streams:/ {print "streams="$NF} /secondary channel offset:/ {print "channeloffset="$NF} /channel width:/ {print "channelwidth="$5} /\tWPA:/,/Authentication suites:/ {for(i=2;i<=NF;++i) if ($i == "Version:") print "WPA=WPA"$i+1 ; else if ($i == "Group") print "Gcipher1="$(i+2); else if ($i == "Pairwise") {printf "Pcipher1="; for(j=4;j<=NF;j++) printf("%s%s", $j, j==NF?"\n":",")} else if ($i == "Authentication") {print "AuthSuites1="$NF}} /\tRSN:/,/Capabilities:/ {for(i=2;i<=NF;++i) if ($i == "Version:") print "WPA2=WPA2v"$i+1 ; else if ($i == "Group") print "Gcipher2="$(i+2); else if ($i == "Pairwise") {printf "Pcipher2="; for(j=4;j<=NF;j++) printf("%s%s", $j, j==NF?"\n":",")} else if ($i == "Authentication") {print "AuthSuites2="$NF}} /tmp/stations/station_iw1
+ shvars=MAC=00:22:b0:76:fc:44
Freq=2.412
Mode=Station
Privacy=on
Level=-78
SSID="browar"
sRate=54
Channel=1
eRate=48
HTmode=HT40
HTmode=HT40
rates=32
channeloffset=above
channelwidth=any
WPA=WPA1
Gcipher1=TKIP
Pcipher1=TKIP
AuthSuites1=PSK
+ eval MAC=00:22:b0:76:fc:44 Freq=2.412 Mode=Station Privacy=on Level=-78 SSID="browar" sRate=54 Channel=1 eRate=48 HTmode=HT40 HTmode=HT40 rates=32 channeloffset=above channelwidth=any WPA=WPA1 Gcipher1=TKIP Pcipher1=TKIP AuthSuites1=PSK
+ MAC=00:22:b0:76:fc:44 Freq=2.412 Mode=Station Privacy=on Level=-78 SSID=browar sRate=54 Channel=1 eRate=48 HTmode=HT40 HTmode=HT40 rates=32 channeloffset=above channelwidth=any WPA=WPA1 Gcipher1=TKIP Pcipher1=TKIP AuthSuites1=PSK
+ awk -F [ -] /rate indexes supported:/ {printf "%i",  ($(NF)+1) * 18.75}
+ awk /HT capabilities:/ {txt=1;next} /HT operation:/{txt=0} txt{print} /tmp/stations/station_iw1
+ Nspeed=618
+ awk -v frq=2.412 BEGIN{FS="[],[]"} {f=frq*10*10*10} /frqdata/ {if (f == $2) print $3} /tmp/chfrq.txt
+ noise=-94
+ [ -z -94 ]
+ [ -z on ]
+ [ -94 -gt -78 ]
+ [ ! -z above ]
+ grep 40
+ echo any
+ [ ! -z ]
+ grep ^any
+ echo any
+ [ ! -z any ]
+ [ above == above ]
+ Channel=1+
+ [ above == below ]
+ [ above == - ]
+ printf sdata.push(["%s","%s","%s","%.3f","%s","%i","%s","%s",[ 00:22:b0:76:fc:44 201305070909 1+ 2.412 -94 -78 on browar
+ [ ! -z 54 ]
+ [ 54 -gt 0 ]
+ printf %i 54
+ [ ! -z 48 ]
+ [ 48 -gt 0 ]
+ printf ,%i 48
+ [ ! -z HT40 ]
+ printf ,150
+ [ ! -z 618 ]
+ [ 618 -gt 0 ]
+ [ 618 -gt 600 ]
+ expr * 150
expr: syntax error
+ Nspeed=
+ printf ,%i
sh: invalid number ''
+ printf ],"%s" Station
+ [ ! -z WPA1 ]
+ printf ,["%s","%s","%s"] WPA1 TKIP PSK
+ [ ! -z  ]
+ printf ]);\n
+ Mode=
+ Privacy=
+ sRate=
+ eRate=
+ HTmode=
+ MCSrates=
+ streams=
+ channeloffset=
+ channelwidth=
+ WPA=
+ Gcipher1=
+ Pcipher1=
+ AuthSuites1=
+ WPA2=
+ Gcipher2=
+ Pcipher2=
+ AuthSuites2=
+ awk /^BSS/ {print "MAC="$2} /\tfreq:/ {split($2,c,""); print "Freq="c[1]"."c[2]c[3]c[4]} /\tsignal:/ {printf "Level=%i\n", $2} /\tcapability:/ {for(i=2;i<=NF;++i) if($i=="IBSS") print "Mode=\"Ad Hoc\""; else if ($i=="ESS") print "Mode=Station"; else if ($i=="Privacy") print "Privacy=on"} /\tSSID:/ {printf "SSID=\""; for(i=2;i<=NF;++i) printf("%s%s", $i, i==NF?"\"\n":" ") } /\tSupported rates:/ {printf "sRate=%i\n", $NF} /\tDS Parameter set:/ {print "Channel="$NF} /\tExtended supported rates:/ {printf "eRate=%i\n", $NF} /\tHT capabilities:/,/DSSS/ {for(i=2;i<=NF;++i) if ($i == "HT40") print "HTmode="$i } /rate indexes supported:/ {print "rates="$NF} /spatial streams:/ {print "streams="$NF} /secondary channel offset:/ {print "channeloffset="$NF} /channel width:/ {print "channelwidth="$5} /\tWPA:/,/Authentication suites:/ {for(i=2;i<=NF;++i) if ($i == "Version:") print "WPA=WPA"$i+1 ; else if ($i == "Group") print "Gcipher1="$(i+2); else if ($i == "Pairwise") {printf "Pcipher1="; for(j=4;j<=NF;j++) printf("%s%s", $j, j==NF?"\n":",")} else if ($i == "Authentication") {print "AuthSuites1="$NF}} /\tRSN:/,/Capabilities:/ {for(i=2;i<=NF;++i) if ($i == "Version:") print "WPA2=WPA2v"$i+1 ; else if ($i == "Group") print "Gcipher2="$(i+2); else if ($i == "Pairwise") {printf "Pcipher2="; for(j=4;j<=NF;j++) printf("%s%s", $j, j==NF?"\n":",")} else if ($i == "Authentication") {print "AuthSuites2="$NF}} /tmp/stations/station_iw2
+ shvars=MAC=8c:04:ff:02:6f:0a
Freq=2.412
Mode=Station
Privacy=on
Level=-81
SSID="UPC0048889"
sRate=54
Channel=1
WPA2=WPA2v1
Gcipher2=TKIP
Pcipher2=CCMP,TKIP
AuthSuites2=PSK
eRate=48
HTmode=HT40
HTmode=HT40
rates=0-15
channeloffset=secondary
channelwidth=20
WPA=WPA1
Gcipher1=TKIP
Pcipher1=CCMP,TKIP
AuthSuites1=PSK
+ eval MAC=8c:04:ff:02:6f:0a Freq=2.412 Mode=Station Privacy=on Level=-81 SSID="UPC0048889" sRate=54 Channel=1 WPA2=WPA2v1 Gcipher2=TKIP Pcipher2=CCMP,TKIP AuthSuites2=PSK eRate=48 HTmode=HT40 HTmode=HT40 rates=0-15 channeloffset=secondary channelwidth=20 WPA=WPA1 Gcipher1=TKIP Pcipher1=CCMP,TKIP AuthSuites1=PSK
+ MAC=8c:04:ff:02:6f:0a Freq=2.412 Mode=Station Privacy=on Level=-81 SSID=UPC0048889 sRate=54 Channel=1 WPA2=WPA2v1 Gcipher2=TKIP Pcipher2=CCMP,TKIP AuthSuites2=PSK eRate=48 HTmode=HT40 HTmode=HT40 rates=0-15 channeloffset=secondary channelwidth=20 WPA=WPA1 Gcipher1=TKIP Pcipher1=CCMP,TKIP AuthSuites1=PSK
+ + awkawk  -F/HT capabilities:/ {txt=1;next} /HT operation:/{txt=0} txt{print} [ -] /tmp/stations/station_iw2 /rate indexes supported:/ {printf "%i",  ($(NF)+1) * 18.75}

+ Nspeed=300
+ awk -v frq=2.412 BEGIN{FS="[],[]"} {f=frq*10*10*10} /frqdata/ {if (f == $2) print $3} /tmp/chfrq.txt
+ noise=-94
+ [ -z -94 ]
+ [ -z on ]
+ [ -94 -gt -81 ]
+ [ ! -z secondary ]
+ + echogrep 20 40

+ [ ! -z ]
+ grep ^any
+ echo 20
+ [ ! -z ]
+ printf sdata.push(["%s","%s","%s","%.3f","%s","%i","%s","%s",[ 8c:04:ff:02:6f:0a 201305070909 1 2.412 -94 -81 on UPC0048889
+ [ ! -z 54 ]
+ [ 54 -gt 0 ]
+ printf %i 54
+ [ ! -z 48 ]
+ [ 48 -gt 0 ]
+ printf ,%i 48
+ [ ! -z HT40 ]
+ printf ,150
+ [ ! -z 300 ]
+ [ 300 -gt 0 ]
+ [ 300 -gt 600 ]
+ printf ,%i 300
+ printf ],"%s" Station
+ [ ! -z WPA1 ]
+ printf ,["%s","%s","%s"] WPA1 CCMP,TKIP PSK
+ [ ! -z WPA2v1 ]
+ printf ,["%s","%s","%s"] WPA2v1 CCMP,TKIP PSK
+ printf ]);\n
+ Mode=
+ Privacy=
+ sRate=
+ eRate=
+ HTmode=
+ MCSrates=
+ streams=
+ channeloffset=
+ channelwidth=
+ WPA=
+ Gcipher1=
+ Pcipher1=
+ AuthSuites1=
+ WPA2=
+ Gcipher2=
+ Pcipher2=
+ AuthSuites2=
+ awk /^BSS/ {print "MAC="$2} /\tfreq:/ {split($2,c,""); print "Freq="c[1]"."c[2]c[3]c[4]} /\tsignal:/ {printf "Level=%i\n", $2} /\tcapability:/ {for(i=2;i<=NF;++i) if($i=="IBSS") print "Mode=\"Ad Hoc\""; else if ($i=="ESS") print "Mode=Station"; else if ($i=="Privacy") print "Privacy=on"} /\tSSID:/ {printf "SSID=\""; for(i=2;i<=NF;++i) printf("%s%s", $i, i==NF?"\"\n":" ") } /\tSupported rates:/ {printf "sRate=%i\n", $NF} /\tDS Parameter set:/ {print "Channel="$NF} /\tExtended supported rates:/ {printf "eRate=%i\n", $NF} /\tHT capabilities:/,/DSSS/ {for(i=2;i<=NF;++i) if ($i == "HT40") print "HTmode="$i } /rate indexes supported:/ {print "rates="$NF} /spatial streams:/ {print "streams="$NF} /secondary channel offset:/ {print "channeloffset="$NF} /channel width:/ {print "channelwidth="$5} /\tWPA:/,/Authentication suites:/ {for(i=2;i<=NF;++i) if ($i == "Version:") print "WPA=WPA"$i+1 ; else if ($i == "Group") print "Gcipher1="$(i+2); else if ($i == "Pairwise") {printf "Pcipher1="; for(j=4;j<=NF;j++) printf("%s%s", $j, j==NF?"\n":",")} else if ($i == "Authentication") {print "AuthSuites1="$NF}} /\tRSN:/,/Capabilities:/ {for(i=2;i<=NF;++i) if ($i == "Version:") print "WPA2=WPA2v"$i+1 ; else if ($i == "Group") print "Gcipher2="$(i+2); else if ($i == "Pairwise") {printf "Pcipher2="; for(j=4;j<=NF;j++) printf("%s%s", $j, j==NF?"\n":",")} else if ($i == "Authentication") {print "AuthSuites2="$NF}} /tmp/stations/station_iw3
+ shvars=MAC=64:70:02:cf:63:1a
Freq=2.437
Mode=Station
Privacy=on
Level=-87
SSID="TP-LINK_CF631A"
sRate=18
Channel=6
eRate=54
+ eval MAC=64:70:02:cf:63:1a Freq=2.437 Mode=Station Privacy=on Level=-87 SSID="TP-LINK_CF631A" sRate=18 Channel=6 eRate=54
+ MAC=64:70:02:cf:63:1a Freq=2.437 Mode=Station Privacy=on Level=-87 SSID=TP-LINK_CF631A sRate=18 Channel=6 eRate=54
+ awk -F [ -] /rate indexes supported:/ {printf "%i",  ($(NF)+1) * 18.75}
+ awk /HT capabilities:/ {txt=1;next} /HT operation:/{txt=0} txt{print} /tmp/stations/station_iw3
+ Nspeed=
+ awk -v frq=2.437 BEGIN{FS="[],[]"} {f=frq*10*10*10} /frqdata/ {if (f == $2) print $3} /tmp/chfrq.txt
+ noise=-95
+ [ -z -95 ]
+ [ -z on ]
+ [ -95 -gt -87 ]
+ [ ! -z  ]
+ printf sdata.push(["%s","%s","%s","%.3f","%s","%i","%s","%s",[ 64:70:02:cf:63:1a 201305070909 6 2.437 -95 -87 on TP-LINK_CF631A
+ [ ! -z 18 ]
+ [ 18 -gt 0 ]
+ printf %i 18
+ [ ! -z 54 ]
+ [ 54 -gt 0 ]
+ printf ,%i 54
+ [ ! -z  ]
+ [ ! -z  ]
+ printf ],"%s" Station
+ [ ! -z  ]
+ [ ! -z  ]
+ printf ]);\n
+ true
+ [ ! -e /tmp/survey_data.txt ]
+ break
+ rm -rf
+ rm /tmp/iw_out.txt
+ mv -f /tmp/tmp_survey.txt /tmp/survey_data.txt
+ printANDexit
+ [ -e /tmp/survey_data.txt ]
+ cat /tmp/survey_data.txt
var sdata = new Array();
sdata.push(["00:22:b0:76:fc:44","201305070909","1+","2.412","-94","-78","on","browar",[54,48,150,0],"Station",["WPA1","TKIP","PSK"]]);
sdata.push(["8c:04:ff:02:6f:0a","201305070909","1","2.412","-94","-81","on","UPC0048889",[54,48,150,300],"Station",["WPA1","CCMP,TKIP","PSK"],["WPA2v1","CCMP,TKIP","PSK"]]);
sdata.push(["64:70:02:cf:63:1a","201305070909","6","2.437","-95","-87","on","TP-LINK_CF631A",[18,54],"Station"]);
+ [ -e /tmp/chfrq.txt ]
+ cat /tmp/chfrq.txt
var chdata = new Array();
var frqdata = new Array();
chdata.push([1,2412]);
chdata.push([2,2417]);
chdata.push([3,2422]);
chdata.push([4,2427]);
chdata.push([5,2432]);
chdata.push([6,2437]);
chdata.push([7,2442]);
chdata.push([8,2447]);
chdata.push([9,2452]);
chdata.push([10,2457]);
chdata.push([11,2462]);
chdata.push([12,2467]);
chdata.push([13,2472]);
frqdata.push([2412,-94]);
frqdata.push([2417,-95]);
frqdata.push([2422,-95]);
frqdata.push([2427,-95]);
frqdata.push([2432,-95]);
frqdata.push([2437,-95]);
frqdata.push([2442,-95]);
frqdata.push([2447,-95]);
frqdata.push([2452,-95]);
frqdata.push([2457,-95]);
frqdata.push([2462,-95]);
frqdata.push([2467,-95]);
frqdata.push([2472,-95]);
+ rm -rf /tmp/stations
+ [ -e /tmp/iw_out.txt ]
+ exit
Gargoyle fanatic user
WR1043ND v2 16MB / WR902AC v3 / MR3020 16MB+64MB / WR703N / WT3020 / E3372

8

Odp: WiFi Survey na nowym Gargoylu

Tak, dokładnie. Trzeba by to autorowi zgłosić. Wrzuć to na https://github.com/BashfulBladder/gargo … ins/issues

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

9

Odp: WiFi Survey na nowym Gargoylu

Działają wam wykresy na Operze?

Netgear WNDR3800 => Gargoyle 1.9.0.3 (r49208) by obsy
https://github.com/Mari00/gargoyle-plugins

10

Odp: WiFi Survey na nowym Gargoylu

A normalne Ci działają? One też są w svg.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

11

Odp: WiFi Survey na nowym Gargoylu

Zużycie pasma działa.

Netgear WNDR3800 => Gargoyle 1.9.0.3 (r49208) by obsy
https://github.com/Mari00/gargoyle-plugins

12

Odp: WiFi Survey na nowym Gargoylu

Cezary, dostałem odpowiedź:
https://github.com/BashfulBladder/gargo … t-17548119

Po wprowadzeniu zaproponowanej zmiany i wywołaniu komendy

/usr/lib/gargoyle/survey.sh

w oknie konsoli błąd się już nie pojawia (wkleiłem do następnego komentarza), ale nadal w interfejsie www nic sie nie pokazuje.

Co zmienić lub co pokazać z konsoli?

Gargoyle fanatic user
WR1043ND v2 16MB / WR902AC v3 / MR3020 16MB+64MB / WR703N / WT3020 / E3372

13

Odp: WiFi Survey na nowym Gargoylu

Do autora z tym. Zresztą zrobiłeś to i pokazałeś mu.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

14

Odp: WiFi Survey na nowym Gargoylu

Poprawiane są błędy. Coraz ich mniej.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.

15 (edytowany przez redi 2013-05-09 09:37:56)

Odp: WiFi Survey na nowym Gargoylu

U mnie nie pokazywał graficzny wykres sieci. Później próbowałem odinstalować i ponownie zainstalować. Mam teraz niby zainstalowany, ale brak go w menu. Po restarcie jest to samo a próba odinstalowania obciąża procesor w 100%.
Pomogło zabicie procesu i ponowna instalacja. Tylko brak nadal wykresu. Tylko kilkanaście napisów "updating".

16

Odp: WiFi Survey na nowym Gargoylu

Teraz jeszcze SĄ błędy - w js, więc kończy skrypt i tyle. Poczekaj, zgłaszamy to cyklicznie, autor poprawia.

Masz niepotrzebny router, uszkodzony czy nie - chętnie przygarnę go.