Welcome to the Holland Computers Support portal.
 
Please register using the register button in the upper right corner, if you haven't done so already.  You may submit a support ticket here or by email.  Email submissions should be sent to support[at]hollandcomputers.com.  All submissions by the portal or via email require a verified email address. 
 
If you have not verified your email address yet, please log on, then click on your name in the upper right corner, then click "My Settings".  You will see a resend email button on the page that will help you get the verification process completed.

Search the Portal

Recent Articles

SEP1
IC3 Scam Alerts (June 27, 2014)

Internet Crime complaint Center (FBI)
AUG29
VB2014 preview: Design to discover: security analytics with 3D visualization engine

Thibault Reuille and Dhia Mahjoub use particle physics to shows clusters of malicious domains. In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look...

The Virus Bulletin
AUG28
Malicious ads served on java.com

If you do need to run plug-ins, make sure you enable click-to-play. Last week, we published a blog previewing the VB2014 paper 'Optimized mal-ops. Hack the ad network like a boss' by Bromium ...

The Virus Bulletin
AUG28
Srizbi kernel-mode spambot reappears as Pitou

Malware possibly still in the 'brewing' stage. In November 2007, we published an article by Kimmo Kasslin (F-Secure) and Elia Florio (Symantec), in which they analysed the 'Srizbi' trojan...

The Virus Bulletin
AUG27
VB2014 preview: Methods of malware persistence on Mac OS X

Patrick Wardle shows that OS X users really have something to worry about. In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the...

The Virus Bulletin
AUG26
More than two million home routers have 'wide open backdoor'

Default password makes vulnerability easy to exploit. Researchers at Trend Micro have discovered an easy-to-exploit backdoor in routers from Chinese manufacturer Netcore, that allows an...

The Virus Bulletin
AUG22
VB2014 preview: Duping the machine - malware strategies, post sandbox detection

James Wyke looks at four difference decoy methods. In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that will be...

The Virus Bulletin
AUG21
Paper: Bird's nest

Raul Alvarez studies the Neshta prepending file infector. File infectors can be categorized by how they attach themselves to the host file. A cavity virus attaches itself to the available spaces...

The Virus Bulletin