For belgium for the last 5 years the order of belgian sites on the international scene is quite clear
pornoamateurs 365.0 (US and international traffic)
hln.be 355.0 95% belgian
kapaza 195.0 91% belgain
msn.be 195.0 93% belgian
skins.be 165.0 US and international (porn)
2dehands 155.0 90% belgian and dutch
redbox.be 155 93% belgian
zita.be 140 93% belgian
skynetblogs.be 130 38% Belgian
More sites and information can be found here
It is interesting to note that most of our belgian sites don't seem to have an impact on the dutch or french market - or the international market. Of course these are just indicators and there are some methodological questions, but for the moment it is only one of the methods we have so long as we can't compare real visit traffic counts from the servers (if we arrive at having them to tell us exactly the same thing).
It was by looking for the statistics and demographics of the Belgian webspace that I saw that the webcrawlers indexed more than they ought to do and that some webmasters in Belgium have still learned nothing about robot.txt or didn't implement it effectively or didn't check it.
Because this for example shouldn't be seeable for searchengines and bots
dossiermanager.vdab.be and what autoscout24.be does is really inviting(http://data.autoscout24.be/)
site:assets.gva.be if you type that in Google you are in and can look at hundreds of pics and other things they call assets. I presume this wasn't the intention but for the time being this is so.
site:cms.vtm.be gives you the link to see all the different poll questions that are asked here
http://preview.standaard.be/ is where they place the testpages from destandaard, interesting for competitors to know and I hope security is not being forgotten and the financieel economische tijd yesterday can be read here;.
but sometimes this is even very practical like information about trains (so no homepage, just some practical links)
http://plannerint.b-rail.be/ This is an international belgian train time planner in different languages, much easier than on the homepage. Strangely enough it is called <HTML><HEAD><TITLE>HAFAS SITE</TITLE> or you can use this link. Prices you should find one way or another here and more info about it here. Information about incidents and work on the railways in Belgium can be found here directly.
oh yes, it will start again soon, googling the Belgian web space
" So watch out, World Series of Poker card sharks, there's about to be a digital throwdown comin' your way.<p style="clear: both; padding: 8px ...
These downloadforums host also malware that disguises itself as antispyware or pchelpware. You should really stay with the freeware securitystuff that is known to all and has a long history of service. (see in http://freeware.skynetblogs.be )
Spyware Scrapper from spywarescrapper.com description of negative effects (and they expect you to pay for it)
But you can find it on the following downloadforums
and so on.....
BUT NOT ON http://www.DOWNLOAD.COM
They say at least they are trying to test any software for malware and spyware before placing it on their site. If there are toolbars and other installations that come with freeware they will explain so.
The VRT is our flemish family tv station and they have forums where you can chat about programs and other nonsense. Witse is one of the most popular programs about an detective. Only they have no security at all at that forums, so for the moment they are being overwhelmed by spam promoting hardcore porn, viagra and poker. Maybe they should send out Witse to get the bastards that did this or he should wake up the securitypeople and ask them to do the job they are paid to do.
The second problem is that if you don't clean up that stuff it stays in Google and you will receive traffic that is just looking for the links.
the real lesson is that any application on any tool can be compromised if it can go on the web without proper protection and limitations and the more functionalities and code you put on a machine the more vulnerabilities you will create.
Another lesson is that this iphone seems not to have gone through proper security testing as the exploit was written with the help of fuzzing (tools that attack code to find mistakes) that could be used by the securitypeople from Apple. Fuzzing an application or tool before releasing it in the wild should be standard for commercial firms or bigname opensource operations (with social responsabilities).
The last lesson is that this is the first (but not the last one) exploit that gives an active possibility to bring down phone networks (DDOS by SMS), smishing (phishing by SMS), spam in SMS and ID theft. Some have proposed that the phone should be used for identification, payment and authentification for anything from petrol, shopping and access controls. This first hole shows that this would only be acceptable if security tools are installed on phones and phone networks. Or maybe we should just use a small very very stupid phone for that stuff (no java, no music, no games, no internet).
Another date to keep in mind is that the exploit will become public the second of august and that we may hope that Apple will release a patch before and that everybody will have it installed before. But what happens with the iphones that have hacked their way around the ISP lockin ? It are the same questions as with websecurity.