• It is good to know when the police will come knocking

    Some sick people have exchanged or downloaded porno with kids and they were so many (bored with normal porn or just good sex ?) that they overcharged a server of a German ISP who found all that traffic on its fileserver a bit too much to be normal and had a look at what was happening.

    They informed the police and the police came (with the press in their footsteps). The articles were published all over the world and the world knew that

    a. there were 12.000 people involved in more than 70 countries

    b. the police was still investigating all the logs and material

    c. the police will still have to visit each of them for interrogation and probably the confiscation of their computers. In Belgium they will do this next week they say in the newspapers.

    So, but how many will have changed address, ISP, computer or have thrown away everything they have that looks like computerdata ? And the interrogation will go a bit like this probably :

    Oh, Why did I throw my computer away? It was so infected with viruses and hacked all the time that I just bought a new one and destroyed this one completely. Oh and all that data ? I threw it also away because there would probably be so many viruses on it that I would just infect my new computer and I didn't want to take any risk. You say that I went to a German server ? But I don't speak german ? No, I only read the newspapers on the internet, look at my internetuse now. It must have been viruses or what do they call them, botnets and trojans that kind of stuff....

    Ok you can have other evidence and logs but it still will have to stand up in court against any reasonable doubt. And how many prosecutors would take the risk of having one weak case that could blow all even the stronger cases off the table because there is not enough inrefutable evidence ?

  • CCC (live from Berlin)

    *gnar gnar* Been offline for a while, been quite  busy also and I didn't really attend much talks the last day(s). BUT I can confirm the PortBunny tool from Phenoelite works very good from BackTrack 3 BETA, after applying some modifications to the code, a /24 network (yes, I had authorization to scan) was TCP portscanned in 90 seconds with quite satisfying results. Thanks to Fabs for letting me play with the tool before official release.

    This is the last funny picture from 24C3 because my flight is leaving in a few hours.

    Picture 175Picture 176 
      

    I swear that I have nothing to do with this :p 

     

  • Another USA Blocked persons list (treasury) and terrorist financing organisation still in Brussels

    http://www.treas.gov/offices/enforcement/ofac/sdn/sdnlist.txt

    On this list we find some individuals with all their aliases

    and we find one address in Brussels that is being used by tens of Islamic foundations with all kinds of aliases that are all based on the same address and that seem to be linked to the financing of terrorism since 2003 (sic) and of which the EU has outlawed the Dutch branch (but there is still one operating in the 'capital of Europe ?). It is linked to Hamas and the Al Asqa brigades, one of the most radical military fractions.

    We also find two firms

    1. NV TRANS AVIATION NETWORK GROUP (a.k.a. TAN GROUP; a.k.a. TRANS AVIATION; a.k.a. TRANSAVIA NETWORK; a.k.a. TRANSAVIA TRAVEL AGENCY; a.k.a. TRANSAVIA TRAVEL CARGO), 1304 Boorj Building, Bank Street, Sharjah, United Arab Emirates; P.O. Box 3962, Sharjah, United Arab Emirates; P.O. Box 2190, Ajman, United Arab Emirates; Ostende Airport, Belgium [LIBERIA]

    The presence of firm in this document shows how old this list may be because this firm is not based on Ostend Airport anymore.

    But the Ostend Airport has been the center of several arms-trafficking scandals since the 90's. Even to the Taliban. It is a small airport that needs every transport it can get to stay open and so sometimes they probably aren't controlling too much what is being transported.  Some of the last site is in dutch. But quite investigative. The analysis of the current companies that use this small airport is also very interesting.

    2. The other firm is   BELS FLOWERS IMPORT EXPORT BVBA, Lange Lobroekstraat 8, Antwerpen 2060, Belgium; C.R. No. 478351540 (Belgium) [SDNTK] who seems to be part of a network or the property of drugsmugglers.

    So if you want to keep updated about firms that or persons that can't do any business with the States or any US firm or firm working with or for American government or firms, than you should go to here and subscribe to the rss feeds also.

  • More information about the Belgian firms blacklisted by the USA

    If you take a holistic view of security, than the security of your data is also dependent on who uses it or has access to it. And the security of your business or your business reputation can also depend on your partners or business contacts. So some business background checks aren't so bad to do from time to time.

    So our background researchers (you won't see them posting here) came up with the following information about the firms and persons that are on the list of businesses/contacts that are denied access to do any business with the US.

    raak_1

    raak_2

    And in both firms we find the same person back

    raak_5

     

    and

    raak_6

     

  • The joke about our super-terrorist in jail ?

    He is so well garded and protected and controlled that it now seems - after the razzia's and investigations and panick last week - that he had access to a GSM (mobile phone) that was being exchanged between him and his mates.

    How do you expect us to take his 'supersecure' prison regime serious ?

  • documents of interest nr 3

    terrorism and counter-terrorism 

    * Reducing the Global Nuclear Danger: International Cooperation – the Indispensable Security Imperative, by Charles B. Curtis, President, Nuclear Threat Initiative, November 2007.  The greatest security threat today – not just for the United States, or for the West, but for the world – is the possibility that a terrorist group could acquire a nuclear weapon and set it off in a major city. The probability of such an event remains low – although it is growing

    * history of the US intelligence community 1950 -1955 which is a very interesting period. To download the entire volume in PDF (3.2 MB) click here . For the period between 1945-1950, read the online version here

    * The Foreign Intelligence Surveillance Act: A Brief Overview of Selected Issues, Updated December 14, 2007  and how far can you go in spying to protect the national security ?

    IT security and architecture

    * Federal Enterprise Architecture Program, EA Assessment Framework 2.2, October 2007 This is how the US federal institutions are evaluating their own Enterprise architecture programs.

    * US china - economic (and IT security) relations http://www.uscc.gov/ China is for the moment the only country that except for the US has a national coordinated cyberarmy. It is also a country with a totally insecure and hacked egov infrastructure and its internet users and infrastructure an sich is a breeding bed for hackers and botnets.

  • CCC (live from Berlin)

    Day 2 - 20h30: Toying with barcodes (FX of Phenoelit)

    Barcodes ... you can find them everywhere and typically there are two types: 1d codes (the ones you have been seeing for the last 50 years) and the 2d codes (the new ones). FX gives a great overview of how you can abuse barcodes to earn some money, to circumvent access controls and he even combines barcodes with more common hacking techniques such as XSS, SQL Injection and Buffer Overflows. The simple fact that a barcode scanner is taking input (from the barcode) and puts it into a back-end (database or whatever) makes this technology prone to weaknesses in input filtering. In Belgium, there are also some interesting places where barcodes are used: at the Kinepolis Cinemas your online tickets have a barcode, the bottles you return to your supermarket have a barcode, te sigaretmachines in the supermarket can have barcodes ...

    Day 2 - 21h45: Port Scanning Improved (FX of Phenoelit)

    As a consultant, the time you spent waiting for the results of your /16 portscan is horrible. Especially when you have a network which is configured to not respond on unauthorized packets (think UDP). These guys present a way to improve and speed-up the port scanning process by building it into the kernel and using a congestion control technique to slow down or speed-up the scan (depending on the bottlenecks of your target network). PortBunny sounds very promising, but it is limited to TCP scans only and I do have some questions on how this thing will perform with load-balancing and Quality-of-Service setups.

     Day 2 - 00h00: Rule 34 Contest

    Funny :-). Rule 34 says: "If it exists,  there is porn of it". An amusing contest where participants were presented with a subject and they had to look up some porn pictures of the subject. For example, "Cartoons" .. one participant came up with some pictures of The Simpsons naked.  

     

     

     

  • Perimeter and deperimetering the security question

    As you have seen we have been blogging a bit more about terrorism and physical security lately because there is a terroralert around here and so we thought to give a bit more attention to that part of security in our holistic view of security we need to have as professionals.

    One of the axioma's of physical security is to put up perimeters and according to the security situation, put one up after each other so that the attacker needs to pass several controls before reaching the target and can be stopped at each of one. Each perimeter has to be a totally new one and not trust the controls of the others. Each perimeter has to be a totally new obstacle for the intruder. And there should be some distance between the perimeters so that the persons between the perimeters can be observed as they move from perimeter to perimeter. Bhutto had too few perimeters around here.

    This is not different in ITsecurity as perimeters are put up outside (firewalls and other security-checking appliances) and inside the networks themselves (compartments, DMZ, access lists and internal firewalls). There is some hype about deperimeterization because the external perimeters can't protect against all the attacks all the time. But this ideotology negates the fact that a good security architecture is like an onion. If a virus gets through the firewall, it will have to get through the server security checks and if it gets through these it will have to get through those of the desktop itself. And each perimeter is totally different because each perimeter defense is customized to the environment and the threats, to what is normal and what shouldn't be allowed or isn't necessary at that level. Each level and perimeter has also its logging and analyzing tools that can send out instant information and alerts. Destroying perimeters is putting more pressure and risk on fewer perimeters.

  • The US banned from export-import list

    The US publishes a list of firms and persons that are banned from any import or export with or to the US. The only list that is correct (we found many other links that are in fact very outdated) can be found here

    http://www.bis.doc.gov/dpl/thedeniallist.asp

    These are the Belgians that we found on the list

    D'HAENS, JOSEPH P.M.
    AMERIKALEI 96, ANTWERP, BE 04/25/1988 04/25/2008 standard Appropriate Federal Register Citations: 53 F.R. 15582 5/2/88 and 60 F.R. 14725 3/20/95

    DEGEYTER, MARC ANDRE
    ST. HUBERSTUSLAAN 15, SCHILDE, BE 06/16/1986 06/16/2016 standard Appropriate Federal Register Citations: 51 F.R. 22959 6/24/86

    DISCOM NV
    LIERSESTEENWEG 96, RANST, BE 03/13/1995 04/25/2008 standard Appropriate Federal Register Citations: 53 F.R. 15582 5/2/88 and 60 F.R. 14725 3/20/95

    ENDYMION NV
    LIERSESTEENWEG 96, RANST, BE 03/13/1995 04/25/2008 standard Appropriate Federal Register Citations: 53 F.R. 15582 5/2/88 and 60 F.R. 14725 3/20/95

    KRONATECH NV
    AMERIKALEI 96, ANTWERP, BE 03/13/1995 04/25/2008 standard Appropriate Federal Register Citations: 53 F.R. 15582 5/2/88 and 60 F.R. 14725 3/20/95

    But we didn't find more info on Google about them so as they are old. There are otherwise a list of interesting firms and persons on it for any other country on the world you could do business with.

  • Blocklist of fraudulent paying mp3 websites

    These websites ask for money and say they have a very large catalogue of downloadable (paying) music, but don't pay a penny to the artists themselves according to the US administration.

    allcoolmusic.com

    allmusicdownloads.com

    e-mp3now.com

    easymusicdownload.com

    ezmp3s.com

    free-music-downloads.cc

    freeaccessmp3.com

    freemusicnow.cc

    howdoiwin.com

    imp3download.com

    imusicaccess.com/index.asp

    imusicsearch.com

    klitetk.com

    mimusicamp3.com

    mp3-all-free.com

    mp3-download-lyrics.com

    mp3-freebie.com

    mp3-freedom.com

    mp3downloadhq.com

    mp3downloadnet.com

    mp3downloadsnow.com

    mp3favorites.com

    mp3musichq.com

    mp3rocket.com

    musicjustfree.com

    my-free-songs.com

    my-music-now.com

    myipodaccess.com

    mymusicinc.com

    netmusicaccess.com

    netmusicsite.com

    realmusicnow.com

    unlimiteddownloadcenter.com

    This list is based upon this list (watch there for updates)

  • CCC (live from Berlin)

    Day 1- 16h: It was a bad idea anyway (Rop Gonggrijp)

    As usual, Rop gave a presentation about the status of the electronic voting (NEDAP) machines i n the Netherlands. It seems that since this year, the government decided not to use electronic voting anymore.


    Day 1- 20h30: Crouching Powerpoint, Hidden Trojan (Maarten Van Horenbeeck)

    Targetted attacks through the use of exploits hidden in Microsoft Word files, WinRar files, ... A very intriging presentation, insinuating some conspiracy theorie by some "dark art" master. It could be true, or it could be complete bullshit. The fact is that Maarten did a great job showing us some facts while not taking the risk of pointing to an attacker, attacking organisation or attacking government. Since 2005 the Falung Gong received specially crafted emails with innocent-looking attachements.
     
    Picture 007
     
    Although this doesn't seem like a new attack method, it proves to be very effective when specifically crafting the email and attached document (read: pull the attention of the reader, not by mentioning penis or viagra, but by mentioning subjects or people that our readers know ... linkedin.com and google are great sources for that). Few  file-based virus scanners seem to detect the malicious code analyzed by Maarten. Most of the shellcode included in the documents, created a control channel back to some compromised hosts through HTTP or HTTPS.


    Club Mate

    No, it's not Redbull or Burn. The high-energy drink which is used here is Clube Mate (and for some reason, the Germans pronounce it KLUP MATEE). It looks like Redbull on Steroids (20mg / 100ml of Caffeine)

    Picture 005 Picture 006

  • Uptime for week 50 Belgian Internet

    The most remarkable fact this week is that the website of Delijn.be had 48 drops this week.

    The DNS services had also some problems last week as some of them slowed down to higher responses to pings

    193.191.1.138  (907) - 195.66.241.90 (807) - 195.238.3.19 (774) and this is over the whole line of DNS services because the best responsive dns server 217.29.76.10 needs 441 milliseconds.

    The same can also be said from the mailservers that also need more time to respond.

    We can also confirm this week that msn.be and ebay.be respond much faster than their .com counterparts.

  • CCC (live from Berlin)

     

    Picture 003

    On the first day of the CCC Congress in Berlin, I arrived in a Siberian-like environment (negative temperature) and of course I was not foreseen for this kind of weather. Being a CCC-visitor for the last 4 years, I should have know this. My first impression of the congress was very weird. This was actually the first picture taken and it shows how nerds can deter female species in only a few seconds.


    Picture 001

    This clearly shows which kind of people are coming here (my Belgian friends and myself are exceptions though ... :-). Although, this year, I saw an increase of nerds with female forms AND an uterus. (I didn't check the latter... I only assumed these were women). 

    Day 1- 14h: Building a Hacker Space

    An amusing presentation about the German CCC Hacking Culture. It seems there are local hacking groups (affialiates of CCC) in Germany who have created permanent infrastructures for geeks. Places were hackers can hang-out one night a week and where there is a kitchen (for heating their pizza's), showers (no idea why they had this), stereo's, internet connection... The two co-founders of these local CCC chapters presented some hints and tricks on how to create Hacker Space and how to maintain order and personal hygiene in these places.
     
    Picture 004
     
    (live from Berlin ... be back when connectivity and bandwidth allows it :-) ) 
  • Security people of Bhutto wanted jammers but never got them

    Today as Bhutto is killed in a suicide attack and the world is a bit more insecure and we all hope that Pakistan or parts of it won't become what Afghanistan once was in the hands of Al Qaida, there is technological part of the story.

    In the AFP story the security people said they wanted more protection for here and stuff like jammers but never got them. Jammers are used in many conflict zones (Israel, Iraq,...) to disable mobile phones to set off bombs from a distance.

    They aren't allowed in Belgium....... 

    Maybe during this terroralert we should think again.

  • US federal government to shut down internet links

    Most of what really happens in the US on the security front nowadays isn't written on the frontpages of articles or even online magazines. It is hidden in speeches, budgets and internal memorandums. Some of them are picked up by specialised researchers who try to put them into context.

    Of the plans is the one to limit all the internet connections of the federal administration to a strict minimum. They say 50 but that is just the announcement, everybody knows they will never reach that goal. The first protests are already published. How do you do telework like that, what about research, won't people try to get around it with wifi and modems ?

    In fact, you don't need unlimited internetconnections on the workfloor. You can have internetconnections but there is no reason that you go to certain dangerous webzones or use certain connections during your working hours. There is no reason to download films and music during working hours. And there is no reason that administrators shouldn't block mails that are dangerous or just take to much time or processing. But cutting it all off is just another matter. There is enough technology on the market to manage your internet connection in a safe way if you have the guts and internal memos and the person to work with filters and whitelists. (there are some countries I would cut off all internet connections to if I didn't need them or limit them to only the few I really need).

    Another thing that is more interesting is that the NSA (a spy agency) will be responsable for helping and coordinating the securing-operation of the internetconnections of the US federal administration. I don't know but a spy agency controlling logs to look for dangereous internetconnections - something they have to do in a time of targeted attacks, is maybe a bit too much. Big brother is watching you ain't too far away in that case.

  • Brussels under terroralert : this is Tintin, your reporter

    Reporters are sometimes having a really difficult time. At one side they want to report anything they see or hear or know and at another side they know best they shouldn't or at least should try to keep information that would help terrorists out of the article. It is a situation that is known by many security researchers.

    So when you read articles about an anti-bomb sweep on the Grand Place of Brussels after there was a false bomb-alert (which we like, it is part of the exercise) we can read in the newspapers where they didn't look...... Is this necessary. This should have been communicated to the parliament, not to every reader of the newspapers.

    It is also very disturbing to read that our police forces have more legal powers to tap communications and infiltrate than our national intelligence services. Shouldn't it be otherwise ? Policemen aren't spies and spies aren't policemen, even if each would sometimes like to play the other role (also). There are very professional and democratic reasons for this situation.

    One theory going around is that the terroralert is the result of a 'war' between our antiterrorism police forces and the antiterrorism services of our secret service. We already had several of these in Belgium before and they all had catastrophic consequences. If such is the case again it is up for the parliament to step in and stop another such disasterous game that could destabilize our intelligence capabilities (police and secret services) for months or years to come. A country hosting so many international institutions can't afford this. Let's hope this is not the case and some people haven't forgotten that the security battle is not about them personally, but about stopping the terrorists together.

  • Belgian high Justice official wants stricter cyber antiterrorism laws

    The argument goes that the Belgian police forces should have the power to hack terrorist sites or sites used by terrorists to intercept the communications.

    First it can't be about Belgian sites - or most European - because the ISP's can be asked to intercept all communications and transfer them - and this soon for up to 2 years.

    Secondly the argument is a bit strange. Or you allow them to hack socalled terrorist websites (of which some are in the hands of secret police services anyway) and than you have access to memberfiles and administrator actions or you infiltrate those sites and pose as a would-be terrorist and talk to other terrorists - or other infiltrators.

    Thirdly it is a bit strange to have a high official of Justice ask for such rights because it would be going against many laws in other countries if our policemen would be doing that to other sites. The question is also if we would allow other policeforces to hack or infiltrate "terrorist" websites in our country (for example ETA or PKK)

    Fourth the question is what should be done with the information of the innocent passers-by and readers ? Would they also be blacklisted because 'you never know' ? And what should you do with this information ? Exchange it with all concerned (but not necessary democratic) members of Interpol ?

    It is a fact that terrorists use the internet to communicate - like many people for many reasons do every day. But one should think twice before jumping to panic-actions that won't bring any useful information.

    It is more important to have first the translators,  the code crackers and the analysts that can give you the depth and context of the information so that the case-handlers can decide to get someone in action before it is too late. If you have that kind of intelligence and human backoffice, it is a good investment to have a futureproof technological frontwar office. If you don't have that human backoffice, there is no technology that will prevent you from doing nothing while you should act or do the wrong things that you shouldn't have done.

  • More and more questions about Belgian Terroralert

    At one side we have to respect the terroralert and so we can only call your attention to the fact that there is a serious terroralert for the city of Brussels.

    At the other side this doesn't look like a terroralert at all and it looks like nobody that should have to take it serious is doing what should be done if this was a serious terror alert. Walked around in the international train station of Brussels and there were no new controls or added security perimeters. In fact no added police at all ?

    In the parliament elected officials are asking questions about the opportunity of this terror alert because it is maybe not called on the basis of good information or because it has hindered an ongoing investigation before it could be successfully rounded up. All terror suspects have been freed without inculpation....

    At the least it is a waste of taxpayers money because it should have been used to train the police and intervention services in situations like blocking off a station, a street, controlling access to a shopping mall and so on.... What is more doctors in Brussels are telling me that they don't know what to do if there is a disaster called by the governor of Brussels because there are no official procedures they know about. It maybe different for hospitals but the other medical professions aren't even on standby in case disaster hits the capital.

  • Documents of interest Nr 2

    * http://www.itpolicycompliance.com  If you register for free there are here a lot of documents that you can download about compliance, risk and control

    * The Deemed Export Rule In The Era Of Globalization, December 20, 2007 (153 pages, PDF): final report of the Deemed Export Advisory Committee, a distinguished group of Americans commissioned by the Secretary in September 2006 to examine the complex issue of deemed exports. Deemed exports are the transfer of sensitive dual-use technology to foreign nationals working or studying in the United States."

    * CDT has created a list to alert consumers about music download Web sites that charge fees and claim a large selection, but do not appear to have obtained licenses to ensure that users' downloads from the site are legal.

    * Ponemon 2007 Annual Study: U.S. Cost of a Data Breach - Understanding Financial Impact, Customer Turnover, and Preventitive Solutions: This study "was derived from a detailed analysis of 35 data breach incidents. According to the study, the cost per compromised customer record increased in 2007, compared to 2006. Lost business opportunity, including losses associated with customer churn and acquisition, represented the most significant component of the cost increase. Companies analyzed were from 16 different industries, including communications, consumer goods, education, entertainment, financial services, gaming, health care, hospitality, internet, manufacturing, marketing, media, retail, services, technology, and transportation."

    * Rand Corporation - Developing Robust Border Security Technologies to Protect Against Diverse and Adaptive Threats: Addendum - December 24, 2007 - Brian Jackson. Document submitted on December 17, 2007 as an addendum to testimony before the House Science and Technology Committee, Subcommittee on Technology and Innovation on November 15, 2007.

    Meanwhile the battle of the year is taking place in the US

    Des Moines Register Iowa Caucus Coverage, including an interactive graphic of How the Caucuses Work: Find candidate bios, the latest news, analysis, events, photos, videos, blogs, caucus history, candidate visits map, top Iowa caucuses links, latest Iowa poll results, FEC - money raised from Iowa donors, campaign cartoons

     

  • Response time and outages for 2007 week 51

    After 51 weeks  

     

    Rank By Response        

    Response IndexUSAEuropeGoogle Rank
    www.coolbox.be
    110
    9
    61
    2
    208
    23
    4
    www.looknmeet.be
    110
    6
    62
    5
    207
    9
    3
    www.redbox.be
    110
    6
    61
    3
    210
    12
    4
    www.telenet.be
    115
    50
    71
    70
    204
    8
    6
    www.baby.be
    118
    3
    68
    4
    220
    0
    4
    www.koopjeskrant.be
    118
    46
    74
    67
    207
    4
    4
    www.vacature.be
    119
    7
    75
    12
    208
    0
    6
    www.yezzz.be
    119
    2
    73
    2
    210
    4
    4
    www.rtl.be
    121
    1
    68
    3
    228
    0
    5
    www.brugge.be
    124
    1
    67
    2
    241
    1
    6
    www.vrt.be
    124
    74
    76
    106
    220
    9
    6
    www.donna.be
    128
    45
    85
    65
    214
    7
    5
    www.groen.be
    129
    29
    82
    48
    225
    8
    5
    www.vroom.be
    129
    1
    89
    10
    209
    23
    4
    www.msn.be
    131
    11
    94
    2
    207
    37
    6
    www.rendez-vous.be
    131
    1
    89
    5
    215
    5
    5
    www.demorgen.be
    132
    8
    88
    9
    219
    7
    6
    www.fgov.be
    133
    0
    76
    0
    249
    1
    7
    www.canvas.be
    134
    73
    85
    117
    231
    14
    6
    www.hetvolk.be
    134
    43
    92
    36
    218
    59
    6
    www.destandaard.be
    135
    26
    89
    24
    226
    31
    6
    www.hasselt.be
    135
    9
    90
    13
    226
    2
    5
    www.hebbes.be
    136
    13
    91
    8
    226
    25
    5
    www.vtm.be
    137
    8
    94
    11
    223
    3
    5
    www.s-p-a.be
    138
    6
    97
    4
    218
    12
    5
    www.vlaanderen.be
    139
    4
    82
    1
    256
    12
    7
    www.nmbs.be
    140
    3
    83
    0
    254
    10
    6
    www.een.be
    141
    18
    80
    14
    264
    27
    5
    www.hln.be
    144
    1
    104
    3
    223
    1
    6
    www.leuven.be
    145
    3
    106
    0
    222
    10
    7
    www.autozone.be
    146
    7
    104
    5
    232
    11
    4
    www.brussel.irisnet.be
    147
    0
    91
    0
    261
    0
    6
    www.gva.be
    147
    2
    103
    1
    232
    6
    6
    www.autoscout24.be
    151
    5
    90
    3
    272
    9
    6
    www.immoweb.be
    157
    4
    110
    1
    252
    13
    5
    www.zattevrienden.be
    160
    8
    115
    25
    249
    25
    6
    www.lesoir.be
    162
    4
    123
    6
    241
    23
    7
    www.antwerpen.be
    163
    23
    112
    18
    267
    35
    6
    www.delijn.be
    165
    120
    109
    117
    279
    127
    6
    www.trends.be
    167
    23
    121
    26
    260
    18
    6
    www.goudengids.be
    170
    32
    100
    43
    310
    10
    6
    www.knack.be
    171
    21
    132
    8
    251
    48
    6
    www.gent.be
    172
    40
    121
    58
    273
    5
    6
    www.rtbf.be
    173
    0
    125
    3
    270
    10
    7
    www.vdab.be
    179
    11
    133
    10
    271
    16
    6
    Average
    184
    17
    148
    18
    258
    15
     
    www.2dehands.be
    184
    0
    137
    0
    278
    0
    5
    www.mil.be
    185
    6
    128
    11
    300
    0
    6
    www.belgacom.be
    189
    8
    153
    8
    263
    10
    6
    www.wallonie.be
    189
    6
    145
    1
    281
    20
    6
    www.monster.be
    200
    17
    270
    25
    58
    2
    7
    www.kapaza.be
    233
    10
    173
    11
    354
    9
    5
    www.zita.be
    237
    123
    195
    104
    317
    163
    6
    www.scarlet.be
    253
    17
    204
    6
    349
    39
    5
    www.tijd.be
    283
    0
    248
    18
    355
    33
    6
    www.apple.be
    288
    3
    368
    5
    129
    2
    6
    www.microsoft.be
    288
    1
    382
    0
    98
    6
    6
    www.cdenv.be
    304
    195
    264
    194
    388
    195
    6
    www.vlaamsbelang.be
    313
    29
    396
    40
    144
    10
    5
    www.ebay.be
    345
    2
    424
    2
    188
    10
    7
    www.vld.be
    376
    14
    328
    11
    473
    22
    5
    www.easy.be
    415
    33
    361
    8
    523
    117
    6
    www.skynetblogs.be
    430
    134
    423
    180
    449
    48
    5
    www.advalvas.be
    582
    256
    547
    253
    653
    262
    6

     

    the time is the response time followed by the number of outages, there are 2  test points from Europe (germany and Austria) and one from US that test every 15 minutes. So form example advalvas has a general response time of 582 milliseconds and had in general 256 outages. The response time from the USA is better 547 than the one from Europe 653 which also gave more outages (262).

    Next year tens of other .be sites will be added. We only use .be sites because this way our dns infrastructure is also tested. The better the dns infrastructure for .be, the better the response time can be.

    source http://mon.itor.us  the free monitor