I've read the following threads and found them very interesting.
Start thread: http://forums.dlink.com/index.php?topic=53373.0
Follow-up: http://forums.dlink.com/index.php?topic=56464.0
I've read the preceeding threads (links above) and found them very interesting. This is a continuation from there as I want to add my comment from my experiences.
This type of problem concerns me, too, and the situation described by DennisOlof1 is very similar to mine including the number of DAP-1360 involved (3). My model is hardware version C1 as well as firmware version 3.04, two were upgraded from 3.02 to 3.04 using the same source as DennisOlof1 said. I have also tried to get it to work in repeater mode, it is hard and I have replaced it with wired cables.
On the 2,4 GHz band there is in my envirionment not much free space to use, I used the inSSIDer (recently licensed version 4) to locate suitable channel selection.
I have been active in the WiFi area since 1998 when Netgear presented their first wireless AP, a simple one capable to run 802.11a and 40 bit WEP encryption, the stronger variants were not eligible for export outside the USA/Canada before January, 1st, 2000 (64 bit WEP was relased for international usage) and by July, 1st, strong crypto (128 bit WEP like 3DES, 168 bit) was released for international usage.
Like DennisOlof1 I also live in Sweden!

I am running with almost all equipment at Cat 6, 1000 Mbps including cable connectors, switch and router. There are deviations on two points only, 1) Internet connection is a fibre channel one running at 100 Mbps (from ISP), and 2) the network adapter in the DAP-1360, which is a 10/100 Mbps one (should have been a 1000/100/10 Mbps one for completeness), this is not a functional problem, it concerns the homogenity of the overall structure. Wifi is running at 802.11n (300 Mbps).
So my problems were similar to the ones presentet by DennisOlof1. Firstly, I don't understand some messages in the log:
Aug 8 20:46:50 rlx-linux user.warn kernel: D3 hot -> L1
Aug 8 20:46:58 rlx-linux user.warn kernel: Err!!! w16:42a,1010 in L1
Aug 8 20:47:11 rlx-linux user.warn kernel: D3 hot -> L1
Like DennisOlof1 I got lots of the "D3 hot -> L1" message, but I don't understad what it means nor what action (if any) I am expected to perform. The same thing applies to the "Err!!! w16:42a,1010 in L1" message. Something wrong in the Linux kernel?
This problem I cannot resolve as I don't know what it concerns. Also, I don't restart the DAP-1360 daily (cycling the power) to have "unknown problems" resolved.
In general, a program will not fail without reason, if a failure occurd this depends on the circumstances when it executes and in a complex environment these circumstances are not always foreseen by the programmer. To identify these unforeseen circumstances it is essential to find out what they concerns to be able to manage them properly in the software.
I have also noticed some unstability in the DAP-1360 and also got it automatically restarted without any visible explanation. But to me it seems that the restarts are caused by overloading the RAM memory - it is a recovery action - and why I make this conclusion has been clarifyed by Jeroen Pluimers at his site "The Weirt Corner" in a thread regardin problems caused by the SWL (Samsung Wireless Link).
Link to this very interesting thread; http://wiert.me/2011/07/04/sec_linkshare-ssid-is-from-your-samsung-tv-swl-samsung-wireless-link/
I ran also in the same problem, obviously caused by some neighborhood to me. I don't know who, still unidentified. If not being a trojan horse faking its appearance it would probably really be a Samsung SMART TV behind and there are more reports on thi Internet about it, but the Pluimers discussion thread was the most interesting I found and it made me capable to solve the matter.
What happened was that I ran into difficulties enabling the DAP-1360 to replace my old, worn-out DWL-G710 (Range Extender) installed around 10 years ago. Funny enough, I had 3 such ones, too, running with WEP 128 bit (I never changed to WPA).
After investigating the matter I finally decided to decrease my engagement in the WiFi area due to too many mysterious distorsions appearing irregularly in the close environment (when I started I was alone) and replace the repeater usage with wired connections. Here the Cat 6 equipment was entered for this purpuse as well as a decision to leave the outdoor environment as far as possible to limit the wireless signal coverage to work well indoors, possibly cöntinuing to use some outdoor antennas for minor applications (I have 3).
So what happened? I found that the SEC_LinkShare_###### SSID was actively trying to make intrusions by trying lo log on to my repeaters (now all are changed to AP:s after installation of cat 6 wired connections instead) with logon failures due to wrong password.
It is one remarkable thing with this. The logon retries were made with a relatively high intensity, the AP reported around 450 retries per five minutes interval - and the DAP-1360 restarted surprisingly often! I don't see any other realistic reason than that RAM memory was overflowed and therefore the DAP-1360 repelled it by trying a reset through rebooting. Of course, it disturbed regular WiFi traffic.
This is similar to a DoS (Denial of Service) attack although on the WiFi net and not on the Ethernet (IP, TCP, ICMP are generally used) but on the 802.11x based WiFi net.
Obviously, if not masked like a trojan, this would imply that the Samsung wireless AP has serious malfunctions in its implementation. I understand tha idea, to connect several Samsung wireless equipments to a central (for exampe a Samsung SMART TV) controlling them (the Samsung SMART principle). It could be mobile phones, music equipment, different playes as well as Internet access. But all wireless equipment is from Samsung and not all wants to be controlled by the Samsung SMART central.
What happens is that the central is automatically polling all wireless equipment within a reachable distance and with a reasonable RSSI signal strength and tries to connect them. This is done in an endless loop arunning as fast as possible, in my case obviously almost two laps per second. But it is not MY Samsung and therefore the connection is undesired - it should be rejected as the DAP-1360 did.
The problem is that the intensity is too high, which caused overload (RAM is a limited resource) and a logon is a resource-comsuming action.
So what to do? I noticed the intruder's MAC address and blocked it! So session request was immediately rejected on the MAC address condition and not via the far more complex logon procedure. It worked fine, but the logs got overfilled with "access denied" notices, moreover, the throughput in my WLAN was affected negatively about 5-10% (checked with PING response times). It is worth to note that the "attack" frequency increased from about 450 to 594-597 retries per five minutes interval, so some frustrations remained.
Was the "intruder" completely passive and did nothing?
No, he noticed that his Samsung SMART central AP (probably a TV) not worked well so he changed the state of his SEC_LinkShare_###### SSID from open mode to hidden mode!!!! It's a curious action to repeal with, it seems that he maybe belived that his Samsung SMART central was attacked. But as I blocked on MAC level and not SSID level this action had no effect.
He got obviously confused and tried to turn off and on his SWL equipment, the last restart was two days ago and then it has been quiet. Maybe the Samsung WiFi function has been turned off as Jeroen Pluimers recommended in the reference link given above, I don't know.
But this case shows to a possibly upcoming big problem to the WiFi world. There are lots of equipment enabled for wireless communication in different ways and the WiFi is no longer an area reserved for computer specialists. Lots of other equipments wants to participate on the wireless radio channels. And many equipments are depending on the wireless net, they cannot even be attached to a standard cable as they don't have any RJ45 port.
And we are extending the 2,4GHz band with the 5GHz band and discussions regarding the next extension to the 60GHz band are ongoing.
I know that the throughput of these very high frequency is very sad, for example, they would work only in free air, not through walls. The range is restricted which maybe could be a good thing to give place to everyone.
But this is the story about how I solved a specific case and successfully could repeal an unwanted wireless intruder. Hopefully, he will not get back.