The document discusses vulnerabilities in the automatic wireless network selection implementations of Windows XP and Mac OS X that could allow an attacker to cause clients to associate with their rogue wireless network without user interaction or notification. It describes how these operating systems implement known network discovery and preferred network lists, and how custom base station software could exploit weaknesses in these algorithms to force association even if the user has never connected to the network before. The paper aims to describe these vulnerabilities, their implementation, and potential impacts.