Security on the internet

More and more people are surfing the net and buying products and services online. As a result, it is vital for us to be aware of the dangers that the internet brings with it.

There are certain governmental services in our country that protect citizens against e-crime, such as the FCCU and the RCCUWhat are the FCCU and the RCCU and what is their task?

Security issues on the internet are caused by various forms of technical manipulation that we subdivide into four major groups:

Manipulation without access to the computer

Fraudsters try to obtain information from you without having access to your PC. They do this, for example, by sending misleading e-mails. This can result in theft or the manipulation of confidential information, as well as cause an overload or blockage of the internet system.

Manipulation with access to the computer

By hacking your computer a hacker is able to do things in your name via your computer, such as carry out bank transactions or see exactly what you are doing on your computer.

Blocking of the computer

Fraudsters try to jam the internet by overloading machines or internet links.


Finally, internet users can be blackmailed via ransomware. These are programs than lock a computer (or the data on it) and then demand money from the user to release the computer and enable them to use it again. In most cases, paying the ransom does not result in the computer being unlocked and making payment is never recommended.

Often, these techniques are also used as a combination. For example, internet fraudsters try to manipulate online usage habits by making vary small changes to the software on someone else’s computer that are very hard to detect, or they use the same computer of an unsuspecting user to overload servers.


Tricksters lure you to a fake website that is a copy of a real one. They then get you to log in with your user name, password and credit card number. Once you’ve done that, the fraudster has your details.


A computer program or hardware device that provides services to other computer programs or users.


Is a place where data is stored temporarily. 


Organisation that handles the registration of domain names. A registry maintains the data base containing information about one (or more) domain name extension(s) as .be, .com, .org, .vlaanderen, etc.


Harmful practice where a cybersquatter registers domain names that are identical to well known and registered brand names or trade names, merely with the aim of harming the brand name holder or the trader or to sell the domain name at an inflated price.


Collective term used for unwanted e-mail messages.


Collective name for harmful or damaging software. Root kits and backdoors come under the heading of malware, as do viruses, Trojan horses, worms and spyware.

Name server

server translating a domain name into an IP address. If you insert a domain name (ex. in your browser for the first time, your computer will ask the name server, linked to the webpage you search, to which IP address he has to navigate.


the Federal Computer Crime Unit. Part of the federal police department which deals with cybercrimes.


the stealing of a computer’s identity. By making some technical adjustments, a computer is able to intercept all traffic from and to another computer. In this way the computer 'in the middle' is able to "eavesdrop on" the communication between two computers.


Domain Name System or Domain Name Server. The global DNS is the system and protocol used on the internet to translate domain names into IP addresses and vice versa. 


The Belgian Centre for Arbitration and Mediation. Working in conjunction with CEPINA, DNS Belgium has developed an Alternative Dispute Resolution procedure (ADR) to deal with disputes relating to .be domain names.


The regional computer crime unit performs forensic ICT research of PC equipment, other data carriers and small networks. The RCCUs investigate the traces of cybercrime and identify the perpetrators.


Be sure to check out our FAQ pages!

Total domain names