Welcome to the Holland Computers Support portal.
 
Please register using the register button in the upper right corner, if you haven't done so already.  You may submit a support ticket here or by email.  Email submissions should be sent to support[at]hollandcomputers.com.  All submissions by the portal or via email require a verified email address. 
 
If you have not verified your email address yet, please log on, then click on your name in the upper right corner, then click "My Settings".  You will see a resend email button on the page that will help you get the verification process completed.

Search the Portal

Recent Articles

SEP17
African Cyber Criminal Enterprise Members Using "School Impersonation" Scheme to Defraud Retailers

Internet Crime complaint Center (FBI)
SEP17
VB2014 preview: two papers on Linux server malware

Researchers from ESET, Yandex and Symantec look at emerging malware trend. In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we are looking at some of the...

The Virus Bulletin
SEP16
VB2014 preview: keynote and closing panel

Vulnerability disclosure one of the hottest issues in security. In the proceedings of the 24th Virus Bulletin conference, the words 'vulnerabilty' and 'vulnerabilities' occur more than 200...

The Virus Bulletin
SEP12
VB2014 preview: Apple without a shell - iOS under targeted attack

FireEye researchers show a large attack vector for Apple's mobile operating system. In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we are looking at some...

The Virus Bulletin
SEP11
DNS cache poisoning used to steal emails

Call to use end-to-end encryption and to deploy DNSSEC. DNS is sometimes called 'the phone book of the Internet'. If true, then it is a phone book that makes it relatively easy to be tricked...

The Virus Bulletin
SEP11
Paper: Prosecting the Citadel botnet - revealing the dominance of the Zeus descendent: part two

Aditya K. Sood and Rohit Bansal study the malware's behaviour when ran on a physical machine. Last week, we published the first part of the paper 'Prosecting the Citadel botnet - revealing the...

The Virus Bulletin
SEP11
Left-to-right override makes a return in spam

Trick shows that spammers still try to beat content-based filters. A decade ago, when spam had become a serious issue, most spam filters tried to block the unwanted emails based on their...

The Virus Bulletin
SEP10
Crypto blunder makes TorrentLocker easy to crack

Use of single XOR key leaves ransomware open to known-plaintext attack. It has been said many times before: cryptography is hard. Earlier this year, the authors of the 'Bitcrypt' ransomware...

The Virus Bulletin