Welcome to the Holland Computers Support portal.
 
Please register using the register button in the upper right corner, if you haven't done so already.  You may submit a support ticket here or by email.  Email submissions should be sent to support[at]hollandcomputers.com.  All submissions by the portal or via email require a verified email address. 
 
If you have not verified your email address yet, please log on, then click on your name in the upper right corner, then click "My Settings".  You will see a resend email button on the page that will help you get the verification process completed.

Search the Portal

Recent Articles

SEP24
Vawtrak trojan spread through malicious Office macros

Users easily tricked, but plenty of opportunity for the malware to be blocked. Researchers at Trend Micro report that the 'Vawtrak' banking trojan now also spreads through Office macros...

The Virus Bulletin
MAR31
Scammers May Use Paris Terrorist Attack to Solicit Fraudulent Donations

Internet Crime complaint Center (FBI)
MAR31
VB2015 conference programme announced

From drones to elephants: an exciting range of topics will be covered in Prague. In six months' time, security researchers from around the world will gather in Prague for the 25th Virus Bulletin...

The Virus Bulletin
MAR30
Paper: a timeline of mobile botnets

Ruchna Nigam provides an overview of more than 60 mobile malware families. The rise of mobile malware is still a relatively recent thing, with the first actual mobile botnets not appearing until...

The Virus Bulletin
MAR19
Paper: Dylib hijacking on OS X

Patrick Wardle shows how OS X is also vulnerable to once common Windows attacks. A few years ago, DLL hijacking on Windows was really hot, despite the fact that the concept had been discussed by...

The Virus Bulletin
MAR12
Paper: Windows 10 patching process may leave enterprises vulnerable to zero-day attacks

Aryeh Goretsky gives advice on how to adapt to Windows 10's patching strategy. Patching is hard, especially when the code base is old and the bugs are buried deeply. This was highlighted once...

The Virus Bulletin
MAR12
Will DIME eventually replace email?

Protocol has all the advantages of email, yet is orders of magnitude more secure. In the current Internet era sometimes referred to as 'post-Snowden', it is often said that email is broken...

The Virus Bulletin
MAR11
The ghost of Stuxnet past

Microsoft patches .LNK vulnerability after 2010 patch was found to be incomplete. Mention Stuxnet and you'll have many a security researcher's attention. The worm, which was discovered in 2010...

The Virus Bulletin