Welcome to the Holland Computers Support portal.
 
Please register using the register button in the upper right corner, if you haven't done so already.  You may submit a support ticket here or by email.  Email submissions should be sent to support[at]hollandcomputers.com.  All submissions by the portal or via email require a verified email address. 
 
If you have not verified your email address yet, please log on, then click on your name in the upper right corner, then click "My Settings".  You will see a resend email button on the page that will help you get the verification process completed.

Search the Portal

Recent Articles

OCT31
Fraudulent Websites Posing as Green Dot MoneyPak Customer Support

Internet Crime complaint Center (FBI)
OCT30
Paper: Invading the core: iWorm's infection vector and persistence mechanism

Malware spreads through infected torrent, then maintains persistence on the system. A month ago, security firm Dr.Web reported it had discovered a new malware variant targeting Mac OS X, that...

The Virus Bulletin
OCT29
New IcoScript variant uses Gmail drafts for C&C communication

Switch likely to make modular malware even stealthier. Researchers at Shape Security have found a new variant of the IcoScript RAT that makes use of draft emails stored in Gmail, Wired writes. ...

The Virus Bulletin
OCT28
VB2014 paper: Hiding the network behind the network. Botnet proxy business model

Cristina Vatamanu and her colleagues describe how botherders keep their C&C servers hidden. Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of...

The Virus Bulletin
OCT24
VB2014 paper: Methods of malware persistence on Mac OS X

'KnockKnock' tool made available to the public. Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added...

The Virus Bulletin
OCT24
Tor exit node found to turn downloaded binaries into malware

Tor provides anonymity, not security, hence using HTTPS is essential. A security researcher has discovered a Tor exit node that was modifying binaries downloaded through it on the fly. The...

The Virus Bulletin
OCT22
VB2014 paper: Exposing Android white collar criminals

Luis Corrons dives into the world of shady Android apps. Over the next few months, we will be sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have...

The Virus Bulletin
OCT20
Black Hat Europe - day 2

IPv6 versus IDPS, XSS in WYSIWYG editors, and reflected file downloads. After a busy first day, I was somewhat glad that the talks on the second day of Black Hat Europe appealed slightly less to...

The Virus Bulletin