12/31/2007

It is good to know when the police will come knocking

Some sick people have exchanged or downloaded porno with kids and they were so many (bored with normal porn or just good sex ?) that they overcharged a server of a German ISP who found all that traffic on its fileserver a bit too much to be normal and had a look at what was happening.

They informed the police and the police came (with the press in their footsteps). The articles were published all over the world and the world knew that

a. there were 12.000 people involved in more than 70 countries

b. the police was still investigating all the logs and material

c. the police will still have to visit each of them for interrogation and probably the confiscation of their computers. In Belgium they will do this next week they say in the newspapers.

So, but how many will have changed address, ISP, computer or have thrown away everything they have that looks like computerdata ? And the interrogation will go a bit like this probably :

Oh, Why did I throw my computer away? It was so infected with viruses and hacked all the time that I just bought a new one and destroyed this one completely. Oh and all that data ? I threw it also away because there would probably be so many viruses on it that I would just infect my new computer and I didn't want to take any risk. You say that I went to a German server ? But I don't speak german ? No, I only read the newspapers on the internet, look at my internetuse now. It must have been viruses or what do they call them, botnets and trojans that kind of stuff....

Ok you can have other evidence and logs but it still will have to stand up in court against any reasonable doubt. And how many prosecutors would take the risk of having one weak case that could blow all even the stronger cases off the table because there is not enough inrefutable evidence ?

Permalink | |  Print |  Facebook | | | | Pin it! |

12/30/2007

CCC (live from Berlin)

*gnar gnar* Been offline for a while, been quite  busy also and I didn't really attend much talks the last day(s). BUT I can confirm the PortBunny tool from Phenoelite works very good from BackTrack 3 BETA, after applying some modifications to the code, a /24 network (yes, I had authorization to scan) was TCP portscanned in 90 seconds with quite satisfying results. Thanks to Fabs for letting me play with the tool before official release.

This is the last funny picture from 24C3 because my flight is leaving in a few hours.

Picture 175Picture 176 
  

I swear that I have nothing to do with this :p 

 

Permalink | |  Print |  Facebook | | | | Pin it! |

Another USA Blocked persons list (treasury) and terrorist financing organisation still in Brussels

http://www.treas.gov/offices/enforcement/ofac/sdn/sdnlist...

On this list we find some individuals with all their aliases

and we find one address in Brussels that is being used by tens of Islamic foundations with all kinds of aliases that are all based on the same address and that seem to be linked to the financing of terrorism since 2003 (sic) and of which the EU has outlawed the Dutch branch (but there is still one operating in the 'capital of Europe ?). It is linked to Hamas and the Al Asqa brigades, one of the most radical military fractions.

We also find two firms

1. NV TRANS AVIATION NETWORK GROUP (a.k.a. TAN GROUP; a.k.a. TRANS AVIATION; a.k.a. TRANSAVIA NETWORK; a.k.a. TRANSAVIA TRAVEL AGENCY; a.k.a. TRANSAVIA TRAVEL CARGO), 1304 Boorj Building, Bank Street, Sharjah, United Arab Emirates; P.O. Box 3962, Sharjah, United Arab Emirates; P.O. Box 2190, Ajman, United Arab Emirates; Ostende Airport, Belgium [LIBERIA]

The presence of firm in this document shows how old this list may be because this firm is not based on Ostend Airport anymore.

But the Ostend Airport has been the center of several arms-trafficking scandals since the 90's. Even to the Taliban. It is a small airport that needs every transport it can get to stay open and so sometimes they probably aren't controlling too much what is being transported.  Some of the last site is in dutch. But quite investigative. The analysis of the current companies that use this small airport is also very interesting.

2. The other firm is   BELS FLOWERS IMPORT EXPORT BVBA, Lange Lobroekstraat 8, Antwerpen 2060, Belgium; C.R. No. 478351540 (Belgium) [SDNTK] who seems to be part of a network or the property of drugsmugglers.

So if you want to keep updated about firms that or persons that can't do any business with the States or any US firm or firm working with or for American government or firms, than you should go to here and subscribe to the rss feeds also.

Permalink | |  Print |  Facebook | | | | Pin it! |

More information about the Belgian firms blacklisted by the USA

If you take a holistic view of security, than the security of your data is also dependent on who uses it or has access to it. And the security of your business or your business reputation can also depend on your partners or business contacts. So some business background checks aren't so bad to do from time to time.

So our background researchers (you won't see them posting here) came up with the following information about the firms and persons that are on the list of businesses/contacts that are denied access to do any business with the US.

raak_1

raak_2

And in both firms we find the same person back

raak_5

 

and

raak_6

 

Permalink | |  Print |  Facebook | | | | Pin it! |

The joke about our super-terrorist in jail ?

He is so well garded and protected and controlled that it now seems - after the razzia's and investigations and panick last week - that he had access to a GSM (mobile phone) that was being exchanged between him and his mates.

How do you expect us to take his 'supersecure' prison regime serious ?

Permalink | |  Print |  Facebook | | | | Pin it! |

12/29/2007

documents of interest nr 3

terrorism and counter-terrorism 

* Reducing the Global Nuclear Danger: International Cooperation – the Indispensable Security Imperative, by Charles B. Curtis, President, Nuclear Threat Initiative, November 2007.  The greatest security threat today – not just for the United States, or for the West, but for the world – is the possibility that a terrorist group could acquire a nuclear weapon and set it off in a major city. The probability of such an event remains low – although it is growing

* history of the US intelligence community 1950 -1955 which is a very interesting period. To download the entire volume in PDF (3.2 MB) click here . For the period between 1945-1950, read the online version here

* The Foreign Intelligence Surveillance Act: A Brief Overview of Selected Issues, Updated December 14, 2007  and how far can you go in spying to protect the national security ?

IT security and architecture

* Federal Enterprise Architecture Program, EA Assessment Framework 2.2, October 2007 This is how the US federal institutions are evaluating their own Enterprise architecture programs.

* US china - economic (and IT security) relations http://www.uscc.gov/ China is for the moment the only country that except for the US has a national coordinated cyberarmy. It is also a country with a totally insecure and hacked egov infrastructure and its internet users and infrastructure an sich is a breeding bed for hackers and botnets.

Permalink | |  Print |  Facebook | | | | Pin it! |

CCC (live from Berlin)

Day 2 - 20h30: Toying with barcodes (FX of Phenoelit)

Barcodes ... you can find them everywhere and typically there are two types: 1d codes (the ones you have been seeing for the last 50 years) and the 2d codes (the new ones). FX gives a great overview of how you can abuse barcodes to earn some money, to circumvent access controls and he even combines barcodes with more common hacking techniques such as XSS, SQL Injection and Buffer Overflows. The simple fact that a barcode scanner is taking input (from the barcode) and puts it into a back-end (database or whatever) makes this technology prone to weaknesses in input filtering. In Belgium, there are also some interesting places where barcodes are used: at the Kinepolis Cinemas your online tickets have a barcode, the bottles you return to your supermarket have a barcode, te sigaretmachines in the supermarket can have barcodes ...

Day 2 - 21h45: Port Scanning Improved (FX of Phenoelit)

As a consultant, the time you spent waiting for the results of your /16 portscan is horrible. Especially when you have a network which is configured to not respond on unauthorized packets (think UDP). These guys present a way to improve and speed-up the port scanning process by building it into the kernel and using a congestion control technique to slow down or speed-up the scan (depending on the bottlenecks of your target network). PortBunny sounds very promising, but it is limited to TCP scans only and I do have some questions on how this thing will perform with load-balancing and Quality-of-Service setups.

 Day 2 - 00h00: Rule 34 Contest

Funny :-). Rule 34 says: "If it exists,  there is porn of it". An amusing contest where participants were presented with a subject and they had to look up some porn pictures of the subject. For example, "Cartoons" .. one participant came up with some pictures of The Simpsons naked.  

 

 

 

Permalink | |  Print |  Facebook | | | | Pin it! |

Perimeter and deperimetering the security question

As you have seen we have been blogging a bit more about terrorism and physical security lately because there is a terroralert around here and so we thought to give a bit more attention to that part of security in our holistic view of security we need to have as professionals.

One of the axioma's of physical security is to put up perimeters and according to the security situation, put one up after each other so that the attacker needs to pass several controls before reaching the target and can be stopped at each of one. Each perimeter has to be a totally new one and not trust the controls of the others. Each perimeter has to be a totally new obstacle for the intruder. And there should be some distance between the perimeters so that the persons between the perimeters can be observed as they move from perimeter to perimeter. Bhutto had too few perimeters around here.

This is not different in ITsecurity as perimeters are put up outside (firewalls and other security-checking appliances) and inside the networks themselves (compartments, DMZ, access lists and internal firewalls). There is some hype about deperimeterization because the external perimeters can't protect against all the attacks all the time. But this ideotology negates the fact that a good security architecture is like an onion. If a virus gets through the firewall, it will have to get through the server security checks and if it gets through these it will have to get through those of the desktop itself. And each perimeter is totally different because each perimeter defense is customized to the environment and the threats, to what is normal and what shouldn't be allowed or isn't necessary at that level. Each level and perimeter has also its logging and analyzing tools that can send out instant information and alerts. Destroying perimeters is putting more pressure and risk on fewer perimeters.

Permalink | |  Print |  Facebook | | | | Pin it! |

12/28/2007

The US banned from export-import list

The US publishes a list of firms and persons that are banned from any import or export with or to the US. The only list that is correct (we found many other links that are in fact very outdated) can be found here

http://www.bis.doc.gov/dpl/thedeniallist.asp

These are the Belgians that we found on the list

D'HAENS, JOSEPH P.M.
AMERIKALEI 96, ANTWERP, BE 04/25/1988 04/25/2008 standard Appropriate Federal Register Citations: 53 F.R. 15582 5/2/88 and 60 F.R. 14725 3/20/95

DEGEYTER, MARC ANDRE
ST. HUBERSTUSLAAN 15, SCHILDE, BE 06/16/1986 06/16/2016 standard Appropriate Federal Register Citations: 51 F.R. 22959 6/24/86

DISCOM NV
LIERSESTEENWEG 96, RANST, BE 03/13/1995 04/25/2008 standard Appropriate Federal Register Citations: 53 F.R. 15582 5/2/88 and 60 F.R. 14725 3/20/95

ENDYMION NV
LIERSESTEENWEG 96, RANST, BE 03/13/1995 04/25/2008 standard Appropriate Federal Register Citations: 53 F.R. 15582 5/2/88 and 60 F.R. 14725 3/20/95

KRONATECH NV
AMERIKALEI 96, ANTWERP, BE 03/13/1995 04/25/2008 standard Appropriate Federal Register Citations: 53 F.R. 15582 5/2/88 and 60 F.R. 14725 3/20/95

But we didn't find more info on Google about them so as they are old. There are otherwise a list of interesting firms and persons on it for any other country on the world you could do business with.

Permalink | |  Print |  Facebook | | | | Pin it! |

Blocklist of fraudulent paying mp3 websites

These websites ask for money and say they have a very large catalogue of downloadable (paying) music, but don't pay a penny to the artists themselves according to the US administration.

allcoolmusic.com

allmusicdownloads.com

e-mp3now.com

easymusicdownload.com

ezmp3s.com

free-music-downloads.cc

freeaccessmp3.com

freemusicnow.cc

howdoiwin.com

imp3download.com

imusicaccess.com/index.asp

imusicsearch.com

klitetk.com

mimusicamp3.com

mp3-all-free.com

mp3-download-lyrics.com

mp3-freebie.com

mp3-freedom.com

mp3downloadhq.com

mp3downloadnet.com

mp3downloadsnow.com

mp3favorites.com

mp3musichq.com

mp3rocket.com

musicjustfree.com

my-free-songs.com

my-music-now.com

myipodaccess.com

mymusicinc.com

netmusicaccess.com

netmusicsite.com

realmusicnow.com

unlimiteddownloadcenter.com

This list is based upon this list (watch there for updates)

Permalink | |  Print |  Facebook | | | | Pin it! |

CCC (live from Berlin)

Day 1- 16h: It was a bad idea anyway (Rop Gonggrijp)

As usual, Rop gave a presentation about the status of the electronic voting (NEDAP) machines i n the Netherlands. It seems that since this year, the government decided not to use electronic voting anymore.


Day 1- 20h30: Crouching Powerpoint, Hidden Trojan (Maarten Van Horenbeeck)

Targetted attacks through the use of exploits hidden in Microsoft Word files, WinRar files, ... A very intriging presentation, insinuating some conspiracy theorie by some "dark art" master. It could be true, or it could be complete bullshit. The fact is that Maarten did a great job showing us some facts while not taking the risk of pointing to an attacker, attacking organisation or attacking government. Since 2005 the Falung Gong received specially crafted emails with innocent-looking attachements.
 
Picture 007
 
Although this doesn't seem like a new attack method, it proves to be very effective when specifically crafting the email and attached document (read: pull the attention of the reader, not by mentioning penis or viagra, but by mentioning subjects or people that our readers know ... linkedin.com and google are great sources for that). Few  file-based virus scanners seem to detect the malicious code analyzed by Maarten. Most of the shellcode included in the documents, created a control channel back to some compromised hosts through HTTP or HTTPS.


Club Mate

No, it's not Redbull or Burn. The high-energy drink which is used here is Clube Mate (and for some reason, the Germans pronounce it KLUP MATEE). It looks like Redbull on Steroids (20mg / 100ml of Caffeine)

Picture 005 Picture 006

Permalink | |  Print |  Facebook | | | | Pin it! |

12/27/2007

Uptime for week 50 Belgian Internet

The most remarkable fact this week is that the website of Delijn.be had 48 drops this week.

The DNS services had also some problems last week as some of them slowed down to higher responses to pings

193.191.1.138  (907) - 195.66.241.90 (807) - 195.238.3.19 (774) and this is over the whole line of DNS services because the best responsive dns server 217.29.76.10 needs 441 milliseconds.

The same can also be said from the mailservers that also need more time to respond.

We can also confirm this week that msn.be and ebay.be respond much faster than their .com counterparts.

Permalink | |  Print |  Facebook | | | | Pin it! |

CCC (live from Berlin)

 

Picture 003

On the first day of the CCC Congress in Berlin, I arrived in a Siberian-like environment (negative temperature) and of course I was not foreseen for this kind of weather. Being a CCC-visitor for the last 4 years, I should have know this. My first impression of the congress was very weird. This was actually the first picture taken and it shows how nerds can deter female species in only a few seconds.


Picture 001

This clearly shows which kind of people are coming here (my Belgian friends and myself are exceptions though ... :-). Although, this year, I saw an increase of nerds with female forms AND an uterus. (I didn't check the latter... I only assumed these were women). 

Day 1- 14h: Building a Hacker Space

An amusing presentation about the German CCC Hacking Culture. It seems there are local hacking groups (affialiates of CCC) in Germany who have created permanent infrastructures for geeks. Places were hackers can hang-out one night a week and where there is a kitchen (for heating their pizza's), showers (no idea why they had this), stereo's, internet connection... The two co-founders of these local CCC chapters presented some hints and tricks on how to create Hacker Space and how to maintain order and personal hygiene in these places.
 
Picture 004
 
(live from Berlin ... be back when connectivity and bandwidth allows it :-) ) 

Permalink | |  Print |  Facebook | | | | Pin it! |

Security people of Bhutto wanted jammers but never got them

Today as Bhutto is killed in a suicide attack and the world is a bit more insecure and we all hope that Pakistan or parts of it won't become what Afghanistan once was in the hands of Al Qaida, there is technological part of the story.

In the AFP story the security people said they wanted more protection for here and stuff like jammers but never got them. Jammers are used in many conflict zones (Israel, Iraq,...) to disable mobile phones to set off bombs from a distance.

They aren't allowed in Belgium....... 

Maybe during this terroralert we should think again.

Permalink | |  Print |  Facebook | | | | Pin it! |

US federal government to shut down internet links

Most of what really happens in the US on the security front nowadays isn't written on the frontpages of articles or even online magazines. It is hidden in speeches, budgets and internal memorandums. Some of them are picked up by specialised researchers who try to put them into context.

Of the plans is the one to limit all the internet connections of the federal administration to a strict minimum. They say 50 but that is just the announcement, everybody knows they will never reach that goal. The first protests are already published. How do you do telework like that, what about research, won't people try to get around it with wifi and modems ?

In fact, you don't need unlimited internetconnections on the workfloor. You can have internetconnections but there is no reason that you go to certain dangerous webzones or use certain connections during your working hours. There is no reason to download films and music during working hours. And there is no reason that administrators shouldn't block mails that are dangerous or just take to much time or processing. But cutting it all off is just another matter. There is enough technology on the market to manage your internet connection in a safe way if you have the guts and internal memos and the person to work with filters and whitelists. (there are some countries I would cut off all internet connections to if I didn't need them or limit them to only the few I really need).

Another thing that is more interesting is that the NSA (a spy agency) will be responsable for helping and coordinating the securing-operation of the internetconnections of the US federal administration. I don't know but a spy agency controlling logs to look for dangereous internetconnections - something they have to do in a time of targeted attacks, is maybe a bit too much. Big brother is watching you ain't too far away in that case.

Permalink | |  Print |  Facebook | | | | Pin it! |

Brussels under terroralert : this is Tintin, your reporter

Reporters are sometimes having a really difficult time. At one side they want to report anything they see or hear or know and at another side they know best they shouldn't or at least should try to keep information that would help terrorists out of the article. It is a situation that is known by many security researchers.

So when you read articles about an anti-bomb sweep on the Grand Place of Brussels after there was a false bomb-alert (which we like, it is part of the exercise) we can read in the newspapers where they didn't look...... Is this necessary. This should have been communicated to the parliament, not to every reader of the newspapers.

It is also very disturbing to read that our police forces have more legal powers to tap communications and infiltrate than our national intelligence services. Shouldn't it be otherwise ? Policemen aren't spies and spies aren't policemen, even if each would sometimes like to play the other role (also). There are very professional and democratic reasons for this situation.

One theory going around is that the terroralert is the result of a 'war' between our antiterrorism police forces and the antiterrorism services of our secret service. We already had several of these in Belgium before and they all had catastrophic consequences. If such is the case again it is up for the parliament to step in and stop another such disasterous game that could destabilize our intelligence capabilities (police and secret services) for months or years to come. A country hosting so many international institutions can't afford this. Let's hope this is not the case and some people haven't forgotten that the security battle is not about them personally, but about stopping the terrorists together.

Permalink | |  Print |  Facebook | | | | Pin it! |

Belgian high Justice official wants stricter cyber antiterrorism laws

The argument goes that the Belgian police forces should have the power to hack terrorist sites or sites used by terrorists to intercept the communications.

First it can't be about Belgian sites - or most European - because the ISP's can be asked to intercept all communications and transfer them - and this soon for up to 2 years.

Secondly the argument is a bit strange. Or you allow them to hack socalled terrorist websites (of which some are in the hands of secret police services anyway) and than you have access to memberfiles and administrator actions or you infiltrate those sites and pose as a would-be terrorist and talk to other terrorists - or other infiltrators.

Thirdly it is a bit strange to have a high official of Justice ask for such rights because it would be going against many laws in other countries if our policemen would be doing that to other sites. The question is also if we would allow other policeforces to hack or infiltrate "terrorist" websites in our country (for example ETA or PKK)

Fourth the question is what should be done with the information of the innocent passers-by and readers ? Would they also be blacklisted because 'you never know' ? And what should you do with this information ? Exchange it with all concerned (but not necessary democratic) members of Interpol ?

It is a fact that terrorists use the internet to communicate - like many people for many reasons do every day. But one should think twice before jumping to panic-actions that won't bring any useful information.

It is more important to have first the translators,  the code crackers and the analysts that can give you the depth and context of the information so that the case-handlers can decide to get someone in action before it is too late. If you have that kind of intelligence and human backoffice, it is a good investment to have a futureproof technological frontwar office. If you don't have that human backoffice, there is no technology that will prevent you from doing nothing while you should act or do the wrong things that you shouldn't have done.

Permalink | |  Print |  Facebook | | | | Pin it! |

More and more questions about Belgian Terroralert

At one side we have to respect the terroralert and so we can only call your attention to the fact that there is a serious terroralert for the city of Brussels.

At the other side this doesn't look like a terroralert at all and it looks like nobody that should have to take it serious is doing what should be done if this was a serious terror alert. Walked around in the international train station of Brussels and there were no new controls or added security perimeters. In fact no added police at all ?

In the parliament elected officials are asking questions about the opportunity of this terror alert because it is maybe not called on the basis of good information or because it has hindered an ongoing investigation before it could be successfully rounded up. All terror suspects have been freed without inculpation....

At the least it is a waste of taxpayers money because it should have been used to train the police and intervention services in situations like blocking off a station, a street, controlling access to a shopping mall and so on.... What is more doctors in Brussels are telling me that they don't know what to do if there is a disaster called by the governor of Brussels because there are no official procedures they know about. It maybe different for hospitals but the other medical professions aren't even on standby in case disaster hits the capital.

Permalink | |  Print |  Facebook | | | | Pin it! |

12/25/2007

Documents of interest Nr 2

* http://www.itpolicycompliance.com  If you register for free there are here a lot of documents that you can download about compliance, risk and control

* The Deemed Export Rule In The Era Of Globalization, December 20, 2007 (153 pages, PDF): final report of the Deemed Export Advisory Committee, a distinguished group of Americans commissioned by the Secretary in September 2006 to examine the complex issue of deemed exports. Deemed exports are the transfer of sensitive dual-use technology to foreign nationals working or studying in the United States."

* CDT has created a list to alert consumers about music download Web sites that charge fees and claim a large selection, but do not appear to have obtained licenses to ensure that users' downloads from the site are legal.

* Ponemon 2007 Annual Study: U.S. Cost of a Data Breach - Understanding Financial Impact, Customer Turnover, and Preventitive Solutions: This study "was derived from a detailed analysis of 35 data breach incidents. According to the study, the cost per compromised customer record increased in 2007, compared to 2006. Lost business opportunity, including losses associated with customer churn and acquisition, represented the most significant component of the cost increase. Companies analyzed were from 16 different industries, including communications, consumer goods, education, entertainment, financial services, gaming, health care, hospitality, internet, manufacturing, marketing, media, retail, services, technology, and transportation."

* Rand Corporation - Developing Robust Border Security Technologies to Protect Against Diverse and Adaptive Threats: Addendum - December 24, 2007 - Brian Jackson. Document submitted on December 17, 2007 as an addendum to testimony before the House Science and Technology Committee, Subcommittee on Technology and Innovation on November 15, 2007.

Meanwhile the battle of the year is taking place in the US

Des Moines Register Iowa Caucus Coverage, including an interactive graphic of How the Caucuses Work: Find candidate bios, the latest news, analysis, events, photos, videos, blogs, caucus history, candidate visits map, top Iowa caucuses links, latest Iowa poll results, FEC - money raised from Iowa donors, campaign cartoons

 

Permalink | |  Print |  Facebook | | | | Pin it! |

12/24/2007

Response time and outages for 2007 week 51

After 51 weeks  

 

Rank By Response        

Response IndexUSAEuropeGoogle Rank
www.coolbox.be
110
9
61
2
208
23
4
www.looknmeet.be
110
6
62
5
207
9
3
www.redbox.be
110
6
61
3
210
12
4
www.telenet.be
115
50
71
70
204
8
6
www.baby.be
118
3
68
4
220
0
4
www.koopjeskrant.be
118
46
74
67
207
4
4
www.vacature.be
119
7
75
12
208
0
6
www.yezzz.be
119
2
73
2
210
4
4
www.rtl.be
121
1
68
3
228
0
5
www.brugge.be
124
1
67
2
241
1
6
www.vrt.be
124
74
76
106
220
9
6
www.donna.be
128
45
85
65
214
7
5
www.groen.be
129
29
82
48
225
8
5
www.vroom.be
129
1
89
10
209
23
4
www.msn.be
131
11
94
2
207
37
6
www.rendez-vous.be
131
1
89
5
215
5
5
www.demorgen.be
132
8
88
9
219
7
6
www.fgov.be
133
0
76
0
249
1
7
www.canvas.be
134
73
85
117
231
14
6
www.hetvolk.be
134
43
92
36
218
59
6
www.destandaard.be
135
26
89
24
226
31
6
www.hasselt.be
135
9
90
13
226
2
5
www.hebbes.be
136
13
91
8
226
25
5
www.vtm.be
137
8
94
11
223
3
5
www.s-p-a.be
138
6
97
4
218
12
5
www.vlaanderen.be
139
4
82
1
256
12
7
www.nmbs.be
140
3
83
0
254
10
6
www.een.be
141
18
80
14
264
27
5
www.hln.be
144
1
104
3
223
1
6
www.leuven.be
145
3
106
0
222
10
7
www.autozone.be
146
7
104
5
232
11
4
www.brussel.irisnet.be
147
0
91
0
261
0
6
www.gva.be
147
2
103
1
232
6
6
www.autoscout24.be
151
5
90
3
272
9
6
www.immoweb.be
157
4
110
1
252
13
5
www.zattevrienden.be
160
8
115
25
249
25
6
www.lesoir.be
162
4
123
6
241
23
7
www.antwerpen.be
163
23
112
18
267
35
6
www.delijn.be
165
120
109
117
279
127
6
www.trends.be
167
23
121
26
260
18
6
www.goudengids.be
170
32
100
43
310
10
6
www.knack.be
171
21
132
8
251
48
6
www.gent.be
172
40
121
58
273
5
6
www.rtbf.be
173
0
125
3
270
10
7
www.vdab.be
179
11
133
10
271
16
6
Average
184
17
148
18
258
15
 
www.2dehands.be
184
0
137
0
278
0
5
www.mil.be
185
6
128
11
300
0
6
www.belgacom.be
189
8
153
8
263
10
6
www.wallonie.be
189
6
145
1
281
20
6
www.monster.be
200
17
270
25
58
2
7
www.kapaza.be
233
10
173
11
354
9
5
www.zita.be
237
123
195
104
317
163
6
www.scarlet.be
253
17
204
6
349
39
5
www.tijd.be
283
0
248
18
355
33
6
www.apple.be
288
3
368
5
129
2
6
www.microsoft.be
288
1
382
0
98
6
6
www.cdenv.be
304
195
264
194
388
195
6
www.vlaamsbelang.be
313
29
396
40
144
10
5
www.ebay.be
345
2
424
2
188
10
7
www.vld.be
376
14
328
11
473
22
5
www.easy.be
415
33
361
8
523
117
6
www.skynetblogs.be
430
134
423
180
449
48
5
www.advalvas.be
582
256
547
253
653
262
6

 

the time is the response time followed by the number of outages, there are 2  test points from Europe (germany and Austria) and one from US that test every 15 minutes. So form example advalvas has a general response time of 582 milliseconds and had in general 256 outages. The response time from the USA is better 547 than the one from Europe 653 which also gave more outages (262).

Next year tens of other .be sites will be added. We only use .be sites because this way our dns infrastructure is also tested. The better the dns infrastructure for .be, the better the response time can be.

source http://mon.itor.us  the free monitor

Permalink | |  Print |  Facebook | | | | Pin it! |

1 2 3 4 5 Next