Windriver™ USB User's Manual

Total Page:16

File Type:pdf, Size:1020Kb

Windriver™ USB User's Manual WinDriver™ USB User's Manual Version 11.2.0 Jungo Ltd. WinDriver™ USB User's Manual: Version 11.2.0 Copyright © Jungo Ltd. 2005–2013 All Rights Reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license agreement. The software may be used, copied or distributed only in accordance with that agreement. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or any means, electronically or mechanically, including photocopying and recording for any purpose without the written permission of Jungo Ltd. Brand and product names mentioned in this document are trademarks of their respective owners and are used here only for identification purposes. © Jungo Ltd. 2005–2013 ii Table of Contents 1. WinDriver Overview .................................................................................................................. 1 1.1. Introduction to WinDriver .............................................................................................. 1 1.2. Background ..................................................................................................................... 2 1.2.1. The Challenge ...................................................................................................... 2 1.2.2. The WinDriver Solution ...................................................................................... 2 1.3. Conclusion ....................................................................................................................... 3 1.4. WinDriver Benefits ......................................................................................................... 3 1.5. WinDriver Architecture .................................................................................................. 4 1.6. What Platforms Does WinDriver Support? .................................................................... 5 1.7. Limitations of the Different Evaluation Versions ........................................................... 5 1.8. How Do I Develop My Driver with WinDriver? ........................................................... 6 1.8.1. On Windows and Linux ....................................................................................... 6 1.8.2. On Windows CE .................................................................................................. 6 1.9. What Does the WinDriver Toolkit Include? ................................................................... 6 1.9.1. WinDriver Modules ............................................................................................. 7 1.9.2. Utilities ................................................................................................................. 8 1.9.3. WinDriver's Specific Chipset Support ................................................................. 8 1.9.4. Samples ................................................................................................................ 8 1.10. Can I Distribute the Driver Created with WinDriver? .................................................. 8 2. Understanding Device Drivers ................................................................................................... 9 2.1. Device Driver Overview ................................................................................................. 9 2.2. Classification of Drivers According to Functionality ..................................................... 9 2.2.1. Monolithic Drivers ............................................................................................... 9 2.2.2. Layered Drivers .................................................................................................. 10 2.2.3. Miniport Drivers ................................................................................................ 11 2.3. Classification of Drivers According to Operating Systems .......................................... 12 2.3.1. WDM Drivers .................................................................................................... 12 2.3.2. VxD Drivers ....................................................................................................... 13 2.3.3. Unix Device Drivers .......................................................................................... 13 2.3.4. Linux Device Drivers ......................................................................................... 13 2.4. The Entry Point of the Driver ...................................................................................... 14 2.5. Associating the Hardware with the Driver ................................................................... 14 2.6. Communicating with Drivers ........................................................................................ 14 3. WinDriver USB Overview ....................................................................................................... 15 3.1. Introduction to USB ...................................................................................................... 15 3.2. WinDriver USB Benefits .............................................................................................. 16 3.3. USB Components .......................................................................................................... 16 3.4. Data Flow in USB Devices .......................................................................................... 17 3.5. USB Data Exchange ..................................................................................................... 18 3.6. USB Data Transfer Types ............................................................................................. 19 3.6.1. Control Transfer ................................................................................................. 20 3.6.2. Isochronous Transfer .......................................................................................... 20 3.6.3. Interrupt Transfer ............................................................................................... 20 3.6.4. Bulk Transfer ..................................................................................................... 21 3.7. USB Configuration ....................................................................................................... 21 3.8. WinDriver USB ............................................................................................................ 23 © Jungo Ltd. 2005–2013 iii Table of Contents 3.9. WinDriver USB Architecture ....................................................................................... 24 4. Installing WinDriver ................................................................................................................ 26 4.1. System Requirements .................................................................................................... 26 4.1.1. Windows System Requirements ........................................................................ 26 4.1.2. Windows CE System Requirements .................................................................. 26 4.1.3. Linux System Requirements .............................................................................. 27 4.2. WinDriver Installation Process ..................................................................................... 27 4.2.1. Windows WinDriver Installation Instructions ................................................... 27 4.2.2. Windows CE WinDriver Installation Instructions ............................................. 28 4.2.2.1. Installing WinDriver CE when Building New CE-Based Platforms ........ 28 4.2.2.2. Installing WinDriver CE when Developing Applications for Windows CE Computers ...................................................................................................... 30 4.2.2.3. Windows CE Installation Note ............................................................... 31 4.2.3. Linux WinDriver Installation Instructions ......................................................... 31 4.2.3.1. Preparing the System for Installation ...................................................... 31 4.2.3.2. Installation ............................................................................................... 33 4.2.3.2.1. Installation using a Debian or RPM Installation Package ............. 33 4.2.3.2.2. Manual Installation ....................................................................... 33 4.2.3.2.3. Registering Your WinDriver License ........................................... 35 4.2.3.3. Restricting Hardware Access on Linux ................................................... 36 4.3. Upgrading Your Installation ......................................................................................... 36 4.4. Checking Your Installation ........................................................................................... 36 4.4.1. Windows and Linux Installation Check ............................................................. 36 4.4.2. Windows CE Installation Check ........................................................................ 37 4.5. Uninstalling WinDriver ................................................................................................. 37 4.5.1. Windows WinDriver Uninstall Instructions ....................................................... 37 4.5.2. Linux WinDriver Uninstall Instructions ............................................................ 39 5. Using DriverWizard ................................................................................................................
Recommended publications
  • TK Backman, Jason Yang, SW Development at MS
    T.K. Backman Jason Yang [email protected] [email protected] Principal Development Lead Principal Development Lead Debugging and Tools Group Analysis Technologies Team Windows Engineering Desktop Windows Engineering Desktop Microsoft Corporation Microsoft Corporationnnn Code on a massive scale Developers on a massive scale Tight constraints on schedules University of Washington 3/2/2011 2 ◦ Company structure Why the world is not just about developers ☺ ◦ Innovation strategy How we actually improve software over time ◦ Dynamic tension When people are involved, everything changes ◦ Development cycles How we build software products in cycles ◦ Program analysis How we push quality upstream ◦ Windows engineering system How we build large-scale products University of Washington 3/2/2011 3 ◦ Total size: ~89,000 employees ◦ Windows & Office – “perfect org structure” PM – program managers Dev – software developers Test – software developers in test ◦ Around 1000 PM+Dev+Test feature teams on 100s of products University of Washington 3/2/2011 4 ◦ Team size: ~10,000 employees ◦ Sales & marketing ◦ Project managers / product managers ◦ 30 feature teams 1500 Devs 1500 Testers 1000 PMs ◦ Customer support engineers ◦ Build engineers University of Washington 3/2/2011 5 “I often say that when you can measure what you are speaking about, and express it in numbers, you know something about it; but when you cannot measure it, when you cannot express it in numbers, your knowledge is of a meager and unsatisfactory kind; it may be the beginning
    [Show full text]
  • Softwindows™ 95 for UNIX Administrator's Guide (Version 5 of Softwindows
    SoftWindows™ 95 for UNIX Administrator’s Guide (Version 5 of SoftWindows 95) Document Number 007-3221-006 CONTRIBUTORS Edited by Karin Borda and Douglas B. O’Morain Production by Carlos Miqueo © 1998, Silicon Graphics, Inc.— All Rights Reserved The contents of this document may not be copied or duplicated in any form, in whole or in part, without the prior written permission of Silicon Graphics, Inc. RESTRICTED RIGHTS LEGEND Use, duplication, or disclosure of the technical data contained in this document by the Government is subject to restrictions as set forth in subdivision (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS 52.227-7013 and/or in similar or successor clauses in the FAR, or in the DOD or NASA FAR Supplement. Unpublished rights reserved under the Copyright Laws of the United States. Contractor/manufacturer is Silicon Graphics, Inc., 2011 N. Shoreline Blvd., Mountain View, CA 94043-1389. TurboStart and SoftNode are registered trademarks of Insignia Solutions. SoftWindows is a trademark used under license. Silicon Graphics, the Silicon Graphics logo and IRIX are registered trademarks, and Indy, O2, and IRIS InSight are trademarks of Silicon Graphics, Inc. R5000 and R10000 are registered trademarks of MIPS Technologies, Inc. Apple and Macintosh are registered trademarks of Apple Computer, Inc. DEC is a trademark of Digital Equipment Corporation. WinPost is a trademark of Eastern Mountain Software. FLEXlm is a trademark of Globetrotter Software Inc. IBM is a registered trademark and IBM PC and IBM PC/AT are trademarks of International Business Machines Corp. Intel and Pentium are registered trademarks of Intel Corporation.
    [Show full text]
  • Scheduling, Thread Context, and IRQL
    Scheduling, Thread Context, and IRQL December 31, 2020 Abstract This paper presents information about how thread scheduling, thread context, and a processor’s current interrupt request level (IRQL) affect the operation of kernel- mode drivers for the Microsoft® Windows® family of operating systems. It is intended to provide driver writers with a greater understanding of the environment in which their code runs. A companion paper, “Locks, Deadlocks, and Synchronization” at http://www.microsoft.com/whdc/hwdev/driver/LOCKS.mspx, builds on these fundamental concepts to address synchronization issues in drivers. Contents Introduction ....................................................................................................................... 3 Thread Scheduling ............................................................................................................ 3 Thread Context and Driver Routines .................................................................................. 4 Driver Threads .................................................................................................................. 5 Interrupt Request Levels .................................................................................................... 6 Processor-Specific and Thread-Specific IRQLs .............................................................. 8 IRQL PASSIVE_LEVEL ............................................................................................ 8 IRQL PASSIVE_LEVEL, in a critical region ..............................................................
    [Show full text]
  • Run-Commands-Windows-10.Pdf
    Run Commands Windows 10 by Bettertechtips.com Command Action Command Action documents Open Documents Folder devicepairingwizard Device Pairing Wizard videos Open Videos Folder msdt Diagnostics Troubleshooting Wizard downloads Open Downloads Folder tabcal Digitizer Calibration Tool favorites Open Favorites Folder dxdiag DirectX Diagnostic Tool recent Open Recent Folder cleanmgr Disk Cleanup pictures Open Pictures Folder dfrgui Optimie Drive devicepairingwizard Add a new Device diskmgmt.msc Disk Management winver About Windows dialog dpiscaling Display Setting hdwwiz Add Hardware Wizard dccw Display Color Calibration netplwiz User Accounts verifier Driver Verifier Manager azman.msc Authorization Manager utilman Ease of Access Center sdclt Backup and Restore rekeywiz Encryption File System Wizard fsquirt fsquirt eventvwr.msc Event Viewer calc Calculator fxscover Fax Cover Page Editor certmgr.msc Certificates sigverif File Signature Verification systempropertiesperformance Performance Options joy.cpl Game Controllers printui Printer User Interface iexpress IExpress Wizard charmap Character Map iexplore Internet Explorer cttune ClearType text Tuner inetcpl.cpl Internet Properties colorcpl Color Management iscsicpl iSCSI Initiator Configuration Tool cmd Command Prompt lpksetup Language Pack Installer comexp.msc Component Services gpedit.msc Local Group Policy Editor compmgmt.msc Computer Management secpol.msc Local Security Policy: displayswitch Connect to a Projector lusrmgr.msc Local Users and Groups control Control Panel magnify Magnifier
    [Show full text]
  • Hard Configurator - Manual Version 4.1.1.1 (July 2019)
    Hard_Configurator - Manual Version 4.1.1.1 (July 2019) Copyright: Andrzej Pluta, @Andy Ful Developer Web Page: https://github.com/AndyFul/Hard_Configurator/ @askalan website about Hard_Configurator: https://hard-configurator.com/ Malwaretips forum thread: https://malwaretips.com/threads/hard_configurator-windows-hardening-con- figurator.66416/ Distribution This software may be freely distributed as long as no modification is made to it. Disclaimer of Warranty THIS SOFTWARE IS DISTRIBUTED "AS IS". NO WARRANTY OF ANY KIND IS EXPRESSED OR IMPLIED. YOU USE IT AT YOUR OWN RISK. THE AUTHOR WILL NOT BE LIABLE FOR DATA LOSS, DAMAGES, LOSS OF PROFITS OR ANY OTHER KIND OF LOSS WHILE USING THIS SOFTWARE. TABLE OF CONTENTS INTRODUCTION ...................................................................... 3 INSTALLATION / DEINSTALLATION ................................... 6 SOFTWARE RESTRICTION POLICIES (SRP) ..................... 8 HOW SRP CAN CONTROL FILE EXECUTION/OPENING.. 10 WHITELISTING BY HASH ................................................... 15 WHITELISTING BY PATH .................................................... 16 WHITELIST PROFILES .......................................................... 17 DESIGNATED FILE TYPES .................................................... 19 DEFAULT SECURITY LEVELS ............................................ 20 ENFORCEMENT ...................................................................... 21 BLOCKING SPONSORS ......................................................... 23 PROTECTING ‘WINDOWS’ FOLDER ................................
    [Show full text]
  • United States Patent (19) 11 Patent Number: 5,987,611 Freund (45) Date of Patent: Nov
    USOO5987611A United States Patent (19) 11 Patent Number: 5,987,611 Freund (45) Date of Patent: Nov. 16, 1999 54 SYSTEM AND METHODOLOGY FOR Postel, J., “RFC 821-Simple Mail Transfer Protocol.” MANAGING INTERNET ACCESS ON A PER Information Science Institute, University of Southern Cali APPLICATION BASIS FOR CLIENT fornia, Aug. 1982, pp. 1-68. COMPUTERS CONNECTED TO THE INTERNET (List continued on next page.) 75 Inventor: Gregor Freund, San Francisco, Calif. Primary Examiner Robert W. BeauSoliel, Jr. Assistant Examiner Stephen C. Elmore 73 Assignee: Zone Labs, Inc., San Francisco, Calif. Attorney, Agent, or Firm John A. Smart 21 Appl. No.: 08/851,777 57 ABSTRACT 22 Filed: May 6, 1997 A computing environment with methods for monitoring access to an open network, Such as a WAN or the Internet, Related U.S. Application Data is described. The System includes one or more clients, each 60 Provisional application No. 60/033,975, Dec. 31, 1996. operating applications or processes (e.g., Netscape Naviga torTM or Microsoft Internet ExplorerTM browser software) (51) Int. Cl." ...................................................... G06F 13/00 requiring Internet (or other open network) access (e.g., an 52 U.S. Cl. .............................................................. 713/201 Internet connection to one or more Web servers). Client 58 Field of Search ............................... 395/18701, 186; based monitoring and filtering of access is provided in 364/222.5, 286.4, 286.5; 711/163; 707/9, conjunction with a centralized enforcement Supervisor. The 10, 203; 713/200, 201 Supervisor maintains access rules for the client-based filter ing and verifies the existence and proper operation of the 56) References Cited client-based filter application.
    [Show full text]
  • Unit OS6: Device Management
    Lab Manual - OS6 Device Management Unit OS6: Device Management 6.4. Lab Manual Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze 1 Lab Manual - OS6 Device Management Copyright Notice © 2000-2005 David A. Solomon and Mark Russinovich These materials are part of the Windows Operating System Internals Curriculum Development Kit, developed by David A. Solomon and Mark E. Russinovich with Andreas Polze Microsoft has licensed these materials from David Solomon Expert Seminars, Inc. for distribution to academic organizations solely for use in academic environments (and not for commercial use) 2 2 Lab Manual - OS6 Device Management Roadmap for Section 6.4. Lab experiments investigating: Viewing Security Processes Looking at the SAM Viewing Access Tokens Looking at Security Identifiers (SIDs) Viewing a Security Descriptor structure Investigating ordering of Access Control Entries (ACEs) Investigating Privileges 3 This Lab Manual includes experiments investigating the the I/O system mechanisms and concepts implemented inside the Windows operating system. Students are expected to carry out Labs in addition to studying the learning materials in Unit OS6. A thorough understanding of the concepts presented in Unit OS6: Device Management is a prerequisite for these Labs. 3 Lab Manual - OS6 Device Management Lab: Viewing the Installed Driver List View the list of System Drivers in the Software Environment section of the Windows Information utility (Msinfo32.exe) Note: the distinction between File System Drivers and Kernel Drivers is from the Type value in the driver’s Registry key. This distinction is meaningless. 4 Lab objective: Viewing the Loaded Driver List You can see a list of registered drivers on a Windows 2000 system by going to the Drivers section of the Computer Management Microsoft Management Console (MMC) snapin or by right-clicking the My Computer icon on the desktop and selecting Manage from the context menu.
    [Show full text]
  • The Sunpc 4.2 User's Guide
    SunPC™ 4.2 User’s Guide A Sun Microsystems, Inc. Business 901 San Antonio Road Palo Alto, CA 94303 USA 415 960-1300 fax 415 969-9131 Part No.: 805-2933-10 Revision A, November 1997 Copyright 1997 Sun Microsystems, Inc., 901 San Antonio Road, Palo Alto, California 94303-4900 U.S.A. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. OpenDOS is a trademark of Cadera, Inc. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd. Sun, Sun Microsystems, the Sun logo, AnswerBook, SunDocs, Solaris, OpenWindows, PC-NFS, PC-NFSpro, SunLink, and SunPC are trademarks, registered trademarks, or service marks of Sun Microsystems, Inc. in the U.S. and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. The OPEN LOOK and Sun™ Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledges the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry.
    [Show full text]
  • Windows Kernel Internals II Windows Driver Model University of Tokyo – July 2004*
    Windows Kernel Internals II Windows Driver Model University of Tokyo – July 2004* Dave Probert, Ph.D. Advanced Operating Systems Group Windows Core Operating Systems Division Microsoft Corporation © Microsoft Corporation 2004 1 Windows I/O Model Asychronous, Packet-based, Extensible Device discovery supports plug-and-play — volumes automatically detected and mounted — power management support (ACPI) Drivers attach to per device driver stacks — Drivers can filter actions of other drivers in each stack Integrated kernel support — memory Manager provides DMA support — HAL provides device access, PnP manages device resources — Cache manager provides file-level caching via MM file-mapping Multiple I/O completion mechanisms: —synchronous —update user-mode memory status —signal events —callbacks within initiating thread —reaped by threads waiting on an I/O Completion Port © Microsoft Corporation 2004 2 IO Request Packet (IRP) IO operations encapsulated in IRPs IO requests travel down a driver stack in an IRP Each driver gets an IRP stack location which contains parameters for that IO request IRP has major and minor codes to describe IO operations Major codes include create, read, write, PNP, devioctl, cleanup and close Irps are associated with the thread that made the IO request © Microsoft Corporation 2004 3 Object Relationships Driver Object Device Object Device Device Device Object Object Object Volume Device Object Driver Object File Object File Object © Microsoft Corporation 2004 4 Layering Drivers Device objects attach one on top of another
    [Show full text]
  • Windows Internals, Sixth Edition, Part 2
    spine = 1.2” Part 2 About the Authors Mark Russinovich is a Technical Fellow in ® the Windows Azure™ group at Microsoft. Windows Internals He is coauthor of Windows Sysinternals SIXTH EDITION Administrator’s Reference, co-creator of the Sysinternals tools available from Microsoft Windows ® The definitive guide—fully updated for Windows 7 TechNet, and coauthor of the Windows Internals and Windows Server 2008 R2 book series. Delve inside Windows architecture and internals—and see how core David A. Solomon is coauthor of the Windows Internals book series and has taught components work behind the scenes. Led by a team of internationally his Windows internals class to thousands of renowned internals experts, this classic guide has been fully updated Windows developers and IT professionals worldwide, SIXTH for Windows 7 and Windows Server® 2008 R2—and now presents its including Microsoft staff. He is a regular speaker 6EDITION coverage in two volumes. at Microsoft conferences, including TechNet As always, you get critical, insider perspectives on how Windows and PDC. operates. And through hands-on experiments, you’ll experience its Alex Ionescu is a chief software architect and internal behavior firsthand—knowledge you can apply to improve consultant expert in low-level system software, application design, debugging, system performance, and support. kernel development, security training, and Internals reverse engineering. He teaches Windows internals courses with David Solomon, and is ® In Part 2, you will: active in the security research community.
    [Show full text]
  • Metadefender Core V4.17.3
    MetaDefender Core v4.17.3 © 2020 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of MetaDefender Core 14 1. Quick Start with MetaDefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Process Files with MetaDefender Core 21 2. Installing or Upgrading MetaDefender Core 22 2.1. Recommended System Configuration 22 Microsoft Windows Deployments 22 Unix Based Deployments 24 Data Retention 26 Custom Engines 27 Browser Requirements for the Metadefender Core Management Console 27 2.2. Installing MetaDefender 27 Installation 27 Installation notes 27 2.2.1. Installing Metadefender Core using command line 28 2.2.2. Installing Metadefender Core using the Install Wizard 31 2.3. Upgrading MetaDefender Core 31 Upgrading from MetaDefender Core 3.x 31 Upgrading from MetaDefender Core 4.x 31 2.4. MetaDefender Core Licensing 32 2.4.1. Activating Metadefender Licenses 32 2.4.2. Checking Your Metadefender Core License 37 2.5. Performance and Load Estimation 38 What to know before reading the results: Some factors that affect performance 38 How test results are calculated 39 Test Reports 39 Performance Report - Multi-Scanning On Linux 39 Performance Report - Multi-Scanning On Windows 43 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3.
    [Show full text]
  • Automated Malware Analysis Report for X4xy5j1gwc.Exe
    ID: 453837 Sample Name: X4xY5J1GWc.exe Cookbook: default.jbs Time: 08:27:20 Date: 25/07/2021 Version: 33.0.0 White Diamond Table of Contents Table of Contents 2 Windows Analysis Report X4xY5J1GWc.exe 4 Overview 4 General Information 4 Detection 4 Signatures 4 Classification 4 Process Tree 4 Malware Configuration 4 Threatname: DanaBot 4 Yara Overview 4 Dropped Files 4 Sigma Overview 5 System Summary: 5 Jbx Signature Overview 5 AV Detection: 5 Compliance: 5 Networking: 5 E-Banking Fraud: 5 Spam, unwanted Advertisements and Ransom Demands: 5 System Summary: 5 Data Obfuscation: 5 Malware Analysis System Evasion: 5 HIPS / PFW / Operating System Protection Evasion: 6 Stealing of Sensitive Information: 6 Remote Access Functionality: 6 Mitre Att&ck Matrix 6 Behavior Graph 6 Screenshots 7 Thumbnails 7 Antivirus, Machine Learning and Genetic Malware Detection 8 Initial Sample 8 Dropped Files 8 Unpacked PE Files 8 Domains 8 URLs 8 Domains and IPs 9 Contacted Domains 9 Contacted URLs 9 URLs from Memory and Binaries 9 Contacted IPs 9 Public 9 Private 9 General Information 9 Simulations 10 Behavior and APIs 10 Joe Sandbox View / Context 10 IPs 10 Domains 10 ASN 10 JA3 Fingerprints 11 Dropped Files 11 Created / dropped Files 11 Static File Info 14 General 14 File Icon 14 Static PE Info 14 General 14 Entrypoint Preview 14 Data Directories 14 Sections 15 Resources 15 Imports 15 Version Infos 15 Possible Origin 15 Network Behavior 15 Network Port Distribution 15 TCP Packets 15 UDP Packets 15 DNS Queries 15 DNS Answers 15 Code Manipulations 15 Statistics
    [Show full text]