Welcome to the Holland Computers Support portal.
Please register using the register button in the upper right corner, if you haven't done so already.  You may submit a support ticket here or by email.  Email submissions should be sent to support[at]hollandcomputers.com.  All submissions by the portal or via email require a verified email address. 
If you have not verified your email address yet, please log on, then click on your name in the upper right corner, then click "My Settings".  You will see a resend email button on the page that will help you get the verification process completed.

Search the Portal

Recent Articles

Hacktivists Threaten to Target Law Enforcement Personnel and Public Officials

Internet Crime complaint Center (FBI)
Paper: On the beat

Kevin Williams looks back at UK law enforcement successes at combating cybercrime. In a recent Throwback Thursday article, we looked back at the sentencing of self-confessed virus writer Christopher Pile almost 20 years ago. Pile was the first...

The Virus Bulletin
Throwback Thursday: Research and Other Hobbies

This Throwback Thursday we reflect on the life of one of industry's greats, who sadly passed away this week: Prof. Klaus Brunnstein. Professor Klaus Brunnstein was one of the biggest names in anti-virus resarch, a pioneer in the field, and a man whose career was never short of either controversy or success. We were greatly saddened to learn of his death yesterday, and in honour of a man who contributed so much to the industry, we decided to take another look at an interview with Prof...

The Virus Bulletin
Weak keys and prime reuse make Diffie-Hellman implementations vulnerable

'Logjam' attack possibly used by the NSA to decrypt VPN traffic. A group of researchers have discovered a number of vulnerabilities in the way the Diffie-Hellman key exchange protocol is deployed and have demonstrated an attack (dubbed 'Logjam') that exploits these vulnerabilities. Diffie-Hellman is used by two entities (typically referred to as Alice and Bob) to agree on a secret key over a public channel. This key can then be used to encrypt and decrypt data using a much faster...

The Virus Bulletin
Virus Bulletin announces student tickets for VB2015

87% discount for students and the option to give a lightning talk. A few weeks ago, we opened registration for VB2015, which will take place in Prague from 30 September to 2 October. Today, we are pleased to announce a generous offer for students: those in full-time education can attend the 25th Virus Bulletin Conference for just $250 (+21% Czech VAT). That's a discount of almost 87%! Attending the Virus Bulletin conference is an excellent way to learn about the threats that matter...

The Virus Bulletin
Throwback Thursday: Double Trouble / The Perfect Couple

Once again this Throwback Thursday, we bring you not one but two (related) pieces from the archives as VB heads back to the mid-90s when a new era of viruses was believed to be dawning. In general, the experts of the anti-malware industry get things more or less right. Predictions may take longer to come to fruition than expected, or may not be quite as game-changing as expected, but by and large, the experts in this industry have a good feel for the way things will go — whether a new...

The Virus Bulletin
Book review: The Florentine Deception, by Carey Nachenberg

John Hawes reviews Carey Nachenberg's debut novel. There's a rather serious problem with fiction involving computers, and computer security in particular. It seems like any time a computer appears in a work of fiction, especially in a Hollywood movie or a TV show, any attempt to adhere to reality goes out the window. The ubiquitous super-hacker of fiction can break in anywhere he or she wants, within minutes, with no research or preparation, and quite often using only a phone or a...

The Virus Bulletin
Book review: Data and Goliath, by Bruce Schneier

Paul Baccas reviews Data and Goliath 'The Hidden Battles to Collect You Data and Control Your World', by Bruce Schneier. This book has been difficult to review. It has proved tricky not because I didn't enjoy the book or because it was boring or badly written, but because it was so pertinent. Every time I went to write about it, a news story would emerge referencing the subject and I would find that my opinions of the news were influenced by the book and my opinions of the book were...

The Virus Bulletin