Difference between pages "Upcoming events" and "Google Chrome"

From Forensics Wiki
(Difference between pages)
Jump to: navigation, search
(Scheduled Training Courses)
 
(Example queries)
 
Line 1: Line 1:
Here is a BY DATE listing of '''upcoming conferences and training events''' that pertain to [[digital forensics]]. Some of these duplicate the generic [[conferences]], but have specific dates/locations for the upcoming conference/training event.
+
Google Chrome is a [[Web Browser|web browser]] developed by Google Inc.
  
<b> The Conference and Training List is provided by the American Academy of Forensic Sciences (AAFS) Digital and Multi-media Listserv</b>
+
== Configuration ==
<i> (Subscribe by sending an email to listserv@lists.mitre.org with message body containing SUBSCRIBE AAFS-DIGITAL-MULTIMEDIA-LIST)</i>
+
The Google Chrome configuration can be found in the '''Preferences''' file.
<b> Any requests for additions, deletions or corrections to this list should be sent by email to David Baker <i>(bakerd AT mitre.org)</i>. </b>
+
  
== Calls For Papers ==
+
On Linux
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
<pre>
|- style="background:#bfbfbf; font-weight: bold"
+
/home/$USER/.config/google-chrome/Default/Preferences
! Title
+
</pre>
! Due Date
+
! Website
+
|-
+
|Black and White Ball
+
|Apr 30, 2007
+
|http://www.theblackandwhiteball.co.uk/cfp.php
+
|-
+
|BlackHat USA 2007
+
|May 01, 2007
+
|http://www.blackhat.com/html/bh-usa-07/bh-usa-07-cfp.html
+
|-
+
|International Conference on Incident Management and IT-Forensics
+
|May 14, 2007
+
|http://www.gi-ev.de/fachbereiche/sicherheit/fg/sidar/imf/imf2007/cfp_en.html
+
|-
+
|First Annual European DeepSec In-Depth Security Conference
+
|Jun 10, 2007
+
|http://deepsec.net/cfp/
+
|-
+
|DFRWS 2007 File Carving Challenge
+
|Jul 09, 2007
+
|http://www.dfrws.org/2007/challenge/submission.html
+
|-
+
|}
+
  
== Conferences ==
+
On MacOS-X
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
<pre>
|- style="background:#bfbfbf; font-weight: bold"
+
/Users/$USER/Library/Application Support/Google/Chrome/Default/Preferences
! Title
+
</pre>
! Date/Location
+
! Website
+
|-
+
|CanSecWest 2007
+
|Apr 16-20, Vancouver, BC, Canada
+
|http://cansecwest.com/
+
|-
+
|Conference on Digital Forensics, Security and Law
+
|Apr 18-20, Washington, DC
+
|http://www.digitalforensics-conference.org/
+
|-
+
|IACIS Computer Forensic Training Event 2007
+
|Apr 23-May 04, Orlando, FL
+
|http://www.iacis.com/iacisv2/pages/training.php
+
|-
+
|Computer and Enterprise Investigations Conference (CEIC)
+
|May 06-09, Las Vegas, NV
+
|http://www.ceic2007.com/
+
|-
+
|CONFidence 2007
+
|May 13-14, Cracow, Poland
+
|http://2007.confidence.org.pl/
+
|-
+
|22nd IFIP International Information Security Conference
+
|May 14-16, Sandton, South Africa
+
|http://www.sbs.co.za/ifipsec2007/
+
|-
+
|Texas Regional Infrastructure Security Conference (TRISC)
+
|May 15-17, Austin, TX
+
|http://www.trisc.org/
+
|-
+
|2007 Techno-Security Conference
+
|Jun 03-06, Myrtle Beach, SC
+
|http://www.techsec.com/html/Techno2007.html
+
|-
+
|Computer Security Institute NetSec '07
+
|Jun 11-13, Scottsdale, AZ
+
|http://www.gocsi.com/netsec/
+
|-
+
|2007 USENIX Annual Technical Conference
+
|Jun 17-22, Santa Clara, CA
+
|http://www.usenix.org/events/
+
|-
+
|Third Government Forum of Incident Response and Security Teams Conference
+
|Jun 25-29, Orlando, FL
+
|http://www.us-cert.gov/GFIRST/index.html
+
|-
+
|First International Workshop on Cyber-Fraud
+
|Jul 01-06, San Jose, CA
+
|http://www.iaria.org/conferences2007/CYBERFRAUD.html
+
|-
+
|Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) 2007
+
|Jul 12-13, Lucerne, Switzerland
+
|http://www.gi-ev.de/fachbereiche/sicherheit/fg/sidar/dimva/
+
|-
+
|16th USENIX Security Symposium
+
|Aug 06-10, Boston, MA
+
|http://www.usenix.org/events/
+
|-
+
|GMU 2007 Symposium
+
|Aug 06-10, George Mason University, Fairfax, VA
+
|http://www.rcfg.org
+
|-
+
|Digital Forensic Research Workshop 2007
+
|Aug 13-15, Pittsburgh, PA
+
|http://www.dfrws.org/2007/index.html
+
|-
+
|HTCIA 2007 International Training Conference & Exposition
+
|Aug 27-29, San Diego, CA
+
|http://www.htcia-sd.org/htcia2007.html
+
|-
+
|Recent Advances in Intrusion Detection (RAID) 2007
+
|Sep 05-07, Gold Coast, Queensland, Australia
+
|http://www.isi.qut.edu.au/events/conferences/raid07
+
|-
+
|14th International Conference on Image Analysis and Processing (ICIAP 2007)
+
|Sep 10-14, Modena, Italy
+
|http://www.iciap2007.org
+
|-
+
|3rd International Conference on IT-Incident Management & IT-Forensics
+
|Sep 11-12, Stuttgart, Germany
+
|http://www.imf-conference.org/
+
|-
+
|Black and White Ball
+
|Sep 25-28, London, UK
+
|http://www.theblackandwhiteball.co.uk/
+
|-
+
|Techno-Forensics Conference
+
|Oct 29 - 31, Rockville, MD
+
|http://www.techsec.com/html/TechnoForensics2007.html
+
|-
+
|DeepSec IDSC
+
|Nov 22-24, Vienna, Austria
+
|http://deepsec.net/
+
|-
+
|}
+
  
== On-going / Continuous Training ==
+
On Windows XP
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
<pre>
|- style="background:#bfbfbf; font-weight: bold"
+
C:\Documents and Settings\%USERNAME%\Local Settings\Application Data\Google\Chrome\User Data\Default\Preferences
! Title
+
</pre>
! Date/Location or Venue
+
! Website
+
|-
+
|Basic Computer Examiner Course
+
|Computer Forensic Training Online
+
|http://www.cftco.com
+
|-
+
|MaresWare Suite Training
+
|First full week every month, Atlanta, GA
+
|http://www.maresware.com/maresware/training/maresware.htm
+
|-
+
|Linux Data Forensics Training
+
|Distance Learning Format
+
|http://www.crazytrain.com/training.html
+
|-
+
|}
+
  
== Scheduled Training Courses ==
+
On Windows Vista and later
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
<pre>
|- style="background:#bfbfbf; font-weight: bold"
+
C:\Users\%USERNAME%\AppData\Local\Google\Chrome\User Data\Default\Preferences
! Title
+
</pre>
! Date/Location
+
 
! Website
+
Or for '''Chromium'''
! Limitation
+
 
|-
+
On Linux
|SMART for Linux
+
<pre>
|May 07-10, Austin, TX
+
/home/$USER/.config/chromium/Default/Preferences
|http://asrdata.com/training/training2.html
+
</pre>
|-
+
 
|AccessData Internet Forensics
+
On MacOS-X
|May 08-10, Albuquerque, NM
+
<pre>
|http://www.accessdata.com/training
+
/Users/$USER/Library/Application Support/Chromium/Default/Preferences
|-
+
</pre>
|EnCase v5 Advanced Computer Forensics
+
 
|May 08-11, Washington DC
+
On Windows XP
|http://www.guidancesoftware.com/training/schedule.asp
+
<pre>
|-
+
C:\Documents and Settings\%USERNAME%\Local Settings\Application Data\Chromium\User Data\Default\Preferences
|SMART Windows Data Forensics
+
</pre>
|May 14-16, Austin, TX
+
 
|http://asrdata.com/training/training2.html
+
On Windows Vista and later
|-
+
<pre>
|EnCase v5 Intermediate Analysis and Reporting
+
C:\Users\%USERNAME%\AppData\Local\Chromium\User Data\Default\Preferences
|May 15-18, United Kingdom
+
</pre>
|http://www.guidancesoftware.com/training/schedule.asp
+
 
|-
+
=== Plugins ===
|Computer Network Investigations Training Program (CNITP)
+
 
|May 15-25, FLETC, Glynco, GA
+
Information about plugins can be found under the "plugins section" of the Preferences file.
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
 
|Limited to Law Enforcement
+
=== DNS Prefetching ===
|-
+
 
|AccessData Internet Forensics
+
DNS is prefetched for related sites, e.g. links on the page.
|May 22-24 , Solna, Sweden
+
This behavior is controlled by the setting "Predict network actions to improve page load performance", which is enabled by default.
|http://www.accessdata.com/training
+
 
|-
+
If enabled the Preferences file contains:
|EnCase v5 Advanced Computer Forensics
+
<pre>
|May 22-25, United Kingdom
+
  "dns_prefetching": {
|http://www.guidancesoftware.com/training/schedule.asp
+
      "enabled": true,
|-
+
</pre>
|SARC Steganography Examiner Training
+
 
|May 23 - 24, Orlando, FL (National Center for Forensic Science)
+
If disabled the Preferences file contains:
|http://www.sarc-wv.com/training.aspx
+
<pre>
|-
+
  "dns_prefetching": {
|First Responder to Digital Evidence Program (FRDE)
+
      "enabled": false,
|May 30-Jun 01, FLETC, Glynco, GA
+
</pre>
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
 
|Limited to Law Enforcement
+
== Start-up DNS queries ==
|-
+
 
|Computer Forensics First Responder
+
When Chrome starts it queries for several non-existing hostnames that consists of a 10 random characters, E.g.
|May 31, Indianapolis, IN
+
<pre>
|http://www.ifi-indy.org/ifi%20training/train.html
+
ttrgoiknff.mydomain.com
|-
+
bxjhgftsyu.mydomain.com
|AccessData BootCamp
+
yokjbjiagd.mydomain.com
|May 31-Jun 02, Myrtle Beach, SC
+
</pre>
|http://www.accessdata.com/training
+
 
|-
+
This is used to determine if your ISP is hijacking NXDOMAIN results [http://www.google.com/support/forum/p/Chrome/thread?tid=3511015c72a7b314&hl=en].
|AccessData Windows Forensics
+
 
|May 31-Jun 02, Myrtle Beach, SC
+
== Disk Cache ==
|http://www.accessdata.com/training
+
The Google Chrome disk cache can be found in:
|-
+
 
|SMART for Linux
+
On Linux
|Jun 04-07, Austin, TX
+
<pre>
|http://asrdata.com/training/training2.html
+
/home/$USER/.config/google-chrome/Default/Application Cache/Cache/
|-
+
</pre>
|AccessData BootCamp
+
 
|Jun 05-07, Albuquerque, NM
+
On MacOS-X
|http://www.accessdata.com/training
+
<pre>
|-
+
/Users/$USER/Caches/Google/Chrome/Default/Cache/
|Advanced Data Forensics Topics
+
</pre>
|Jun 11-13, Austin, TX
+
 
|http://asrdata.com/training/training2.html
+
On Windows XP
|-
+
<pre>
|Digital Evidence Acquisition Specialist Training Program (DEASTP)
+
C:\Documents and Settings\%USERNAME%\Local Settings\Application Data\Google\Chrome\User Data\Cache\
|Jun 11-22, FLETC, Glynco, GA
+
</pre>
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
 
|Limited to Law Enforcement
+
On Windows Vista and later
|-
+
<pre>
|Helix Live Forensics and Incident Response Course
+
C:\Users\%USERNAME%\AppData\Local\Google\Chrome\User Data\Default\Cache\
|Jun 12-14, SEARCH - Sacramento, CA
+
</pre>
|https://www.e-fense.com/register.php
+
 
|-
+
The Chrome Cache contains different files with the following file names:
|AccessData Internet Forensics
+
* index
|Jun 12-14 , Boise, ID
+
* data_#; where # contains a decimal digit.
|http://www.accessdata.com/training
+
* f_######; where # contains a hexadecimal digit.
|-
+
 
|AccessData Windows Forensics
+
For more info see Chrome developers site [http://www.chromium.org/developers/design-documents/network-stack/disk-cache].
|Jun 19-21, Dallas, TX
+
 
|http://www.accessdata.com/training
+
== History ==
|-
+
Chrome stores the history of visited sites in a file named '''History'''. This file uses the [[SQLite database format]].
|SMART for Linux
+
 
|Jul 09-12, Austin, TX
+
The '''History''' file can be found in same location as the '''Preferences''' file.
|http://asrdata.com/training/training2.html
+
 
|-
+
There is also '''Archived History''' that predates information in the '''History''' file.
|Cyber Counterterrorism Investigations Training Program (CCITP)
+
Note that the '''Archived History''' only contains visits.
|Jul 09-13, FLETC, Glynco, GA
+
 
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
=== Timestamps ===
|Limited to Law Enforcement
+
The '''History''' file uses the different timestamps.
|-
+
 
|SMART Windows Data Forensics
+
==== visits.visit_time ====
|Jul 16-18, Austin, TX
+
 
|http://asrdata.com/training/training2.html
+
The '''visits.visit_time''' is in (the number of) microseconds since January 1, 1601 UTC
|-
+
 
|Seized Computer Evidence Recovery Specialist (SCERS)
+
Some Python code to do the conversion into human readable format:
|Jul 16-27, FLETC, Glynco, GA
+
<pre>
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
date_string = datetime.datetime( 1601, 1, 1 )
|Limited to Law Enforcement
+
            + datetime.timedelta( microseconds=timestamp )
|-
+
</pre>
|AccessData BootCamp
+
 
|Jul 17-19, Boise, ID
+
Note that this timestamp is not the same as a Windows filetime which is (the number of) 100 nanoseconds since January 1, 1601 UTC
|http://www.accessdata.com/training
+
 
|-
+
==== downloads.start_time ====
|AccessData Windows Forensics
+
 
|Jul 24-26, Albuquerque, NM
+
The '''downloads.start_time''' is in (the number of) seconds since January 1, 1970 UTC
|http://www.accessdata.com/training
+
 
|-
+
Some Python code to do the conversion into human readable format:
|First Responder to Digital Evidence Program (FRDE)
+
<pre>
|Jul 31-Aug 02, FLETC, Glynco, GA
+
date_string = datetime.datetime( 1970, 1, 1 )
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
            + datetime.timedelta( seconds=timestamp )
|Limited to Law Enforcement
+
</pre>
|-
+
 
|SMART for Linux
+
=== Example queries ===
|Aug 06-09, Austin, TX
+
Some example queries:
|http://asrdata.com/training/training2.html
+
 
|-
+
To get an overview of the visited sites:
|Computer Network Investigations Training Program (CNITP)
+
<pre>
|Aug 14-24, FLETC, Glynco, GA
+
SELECT datetime(((visits.visit_time/1000000)-11644473600), "unixepoch"), urls.url, urls.title FROM urls, visits WHERE urls.id = visits.url;
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
</pre>
|Limited to Law Enforcement
+
 
|-
+
Note that the visit_time conversion looses precision.
|SMART Linux Data Forensics
+
 
|Aug 13-15, Austin, TX
+
To get an overview of the downloaded files:
|http://asrdata.com/training/training2.html
+
<pre>
|-
+
SELECT datetime(downloads.start_time, "unixepoch"), downloads.url, downloads.full_path, downloads.received_bytes, downloads.total_bytes FROM downloads;
|Macintosh Forensic Survival Course
+
</pre>
|Aug 13-17, Fredricksburg, VA
+
 
|http://www.phoenixdatagroup.com/cart/index.php
+
How the information of the downloaded files is stored in the database can vary per version of Chrome a newer variant of the previous query is:
|-
+
<pre>
|AccessData Internet Forensics
+
SELECT datetime(((downloads.start_time/1000000)-11644473600), "unixepoch"), downloads.target_path, downloads_url_chains.url, downloads.received_bytes, downloads.total_bytes \
|Aug 14-16 , Austin, TX
+
FROM downloads, downloads_url_chains WHERE downloads.id = downloads_url_chains.id;
|http://www.accessdata.com/training
+
</pre>
|-
+
 
|Helix Live Forensics and Incident Response Course
+
== See Also ==
|Aug 28-30, Tennessee Bureau of Investigations - Nashville, TN
+
 
|https://www.e-fense.com/register.php
+
* [[SQLite database format]]
|-
+
 
|SMART for Linux
+
== External Links ==
|Sep 03-06, Austin, TX
+
* [http://en.wikipedia.org/wiki/Google_Chrome Wikipedia article on Google Chrome]
|http://asrdata.com/training/training2.html
+
* [http://www.chromium.org/user-experience/user-data-directory The Chromium Projects - User Data Directory]
|-
+
* [http://www.chromium.org/developers/design-documents/network-stack/disk-cache Chrome Disk Cache]
|First Responder to Digital Evidence Program (FRDE)
+
* [http://www.google.com/support/forum/p/Chrome/thread?tid=3511015c72a7b314&hl=en Chrome support forum article random 10 character hostnames on startup]
|Sep 11-13, FLETC, Glynco, GA
+
* [http://computer-forensics.sans.org/blog/2010/01/21/google-chrome-forensics/ Google Chrome Forensics] by [[Kristinn Guðjónsson]]
|http://www.fletc.gov/training/programs/computer-financial-investigations/technology-investigation/
+
* [http://www.useragentstring.com/pages/Chrome/ Chrome User Agent strings]
|Limited to Law Enforcement
+
* [http://linuxsleuthing.blogspot.ch/2013/02/cashing-in-on-google-chrome-cache.html?m=1 Cashing in on the Google Chrome Cache], [[John Lehr]], February 24, 2013
|-
+
 
|AccessData Applied Decryption
+
[[Category:Applications]]
|Sep 11-13, Dallas, TX
+
[[Category:Web Browsers]]
|http://www.accessdata.com/training
+
|-
+
|Enterprise Data Forensics
+
|Sep 17-19, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|Macintosh Forensic Survival Course
+
|Sep 24-28, Santa Ana, CA
+
|http://www.phoenixdatagroup.com/cart/index.php
+
|-
+
|AccessData Applied Decryption
+
|Sep 25-27, Chicago, IL
+
|http://www.accessdata.com/training
+
|-
+
|AccessData BootCamp
+
|Sep 25-27, Solna, SE
+
|http://www.accessdata.com/training
+
|-
+
|SMART for Linux
+
|Oct 01-04, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|SMART Windows Data Forensics
+
|Oct 08-10, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|SMART for Linux
+
|Nov 05-08, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|AccessData BootCamp
+
|Nov 06-08, Austin, TX
+
|http://www.accessdata.com/training
+
|-
+
|AccessData Windows Forensics
+
|Nov 06-08, Solna, Sweden
+
|http://www.accessdata.com/training
+
|-
+
|SMART Linux Data Forensics
+
|Nov 12-14, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|SMART for Linux
+
|Dec 03-06, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|AccessData Internet Forensics
+
|Dec 04-06 , Solna, Sweden
+
|http://www.accessdata.com/training
+
|-
+
|Enterprise Data Forensics
+
|Dec 10-12, Austin, TX
+
|http://asrdata.com/training/training2.html
+
|-
+
|}
+

Revision as of 00:51, 20 April 2013

Google Chrome is a web browser developed by Google Inc.

Contents

Configuration

The Google Chrome configuration can be found in the Preferences file.

On Linux

/home/$USER/.config/google-chrome/Default/Preferences

On MacOS-X

/Users/$USER/Library/Application Support/Google/Chrome/Default/Preferences

On Windows XP

C:\Documents and Settings\%USERNAME%\Local Settings\Application Data\Google\Chrome\User Data\Default\Preferences

On Windows Vista and later

C:\Users\%USERNAME%\AppData\Local\Google\Chrome\User Data\Default\Preferences

Or for Chromium

On Linux

/home/$USER/.config/chromium/Default/Preferences

On MacOS-X

/Users/$USER/Library/Application Support/Chromium/Default/Preferences

On Windows XP

C:\Documents and Settings\%USERNAME%\Local Settings\Application Data\Chromium\User Data\Default\Preferences

On Windows Vista and later

C:\Users\%USERNAME%\AppData\Local\Chromium\User Data\Default\Preferences

Plugins

Information about plugins can be found under the "plugins section" of the Preferences file.

DNS Prefetching

DNS is prefetched for related sites, e.g. links on the page. This behavior is controlled by the setting "Predict network actions to improve page load performance", which is enabled by default.

If enabled the Preferences file contains:

   "dns_prefetching": {
      "enabled": true,

If disabled the Preferences file contains:

   "dns_prefetching": {
      "enabled": false,

Start-up DNS queries

When Chrome starts it queries for several non-existing hostnames that consists of a 10 random characters, E.g.

ttrgoiknff.mydomain.com
bxjhgftsyu.mydomain.com
yokjbjiagd.mydomain.com

This is used to determine if your ISP is hijacking NXDOMAIN results [1].

Disk Cache

The Google Chrome disk cache can be found in:

On Linux

/home/$USER/.config/google-chrome/Default/Application Cache/Cache/

On MacOS-X

/Users/$USER/Caches/Google/Chrome/Default/Cache/

On Windows XP

C:\Documents and Settings\%USERNAME%\Local Settings\Application Data\Google\Chrome\User Data\Cache\

On Windows Vista and later

C:\Users\%USERNAME%\AppData\Local\Google\Chrome\User Data\Default\Cache\

The Chrome Cache contains different files with the following file names:

  • index
  • data_#; where # contains a decimal digit.
  • f_######; where # contains a hexadecimal digit.

For more info see Chrome developers site [2].

History

Chrome stores the history of visited sites in a file named History. This file uses the SQLite database format.

The History file can be found in same location as the Preferences file.

There is also Archived History that predates information in the History file. Note that the Archived History only contains visits.

Timestamps

The History file uses the different timestamps.

visits.visit_time

The visits.visit_time is in (the number of) microseconds since January 1, 1601 UTC

Some Python code to do the conversion into human readable format:

date_string = datetime.datetime( 1601, 1, 1 )
            + datetime.timedelta( microseconds=timestamp )

Note that this timestamp is not the same as a Windows filetime which is (the number of) 100 nanoseconds since January 1, 1601 UTC

downloads.start_time

The downloads.start_time is in (the number of) seconds since January 1, 1970 UTC

Some Python code to do the conversion into human readable format:

date_string = datetime.datetime( 1970, 1, 1 )
            + datetime.timedelta( seconds=timestamp )

Example queries

Some example queries:

To get an overview of the visited sites:

SELECT datetime(((visits.visit_time/1000000)-11644473600), "unixepoch"), urls.url, urls.title FROM urls, visits WHERE urls.id = visits.url;

Note that the visit_time conversion looses precision.

To get an overview of the downloaded files:

SELECT datetime(downloads.start_time, "unixepoch"), downloads.url, downloads.full_path, downloads.received_bytes, downloads.total_bytes FROM downloads;

How the information of the downloaded files is stored in the database can vary per version of Chrome a newer variant of the previous query is:

SELECT datetime(((downloads.start_time/1000000)-11644473600), "unixepoch"), downloads.target_path, downloads_url_chains.url, downloads.received_bytes, downloads.total_bytes \
FROM downloads, downloads_url_chains WHERE downloads.id = downloads_url_chains.id;

See Also

External Links