Welcome to the Holland Computers Support portal.
 
Please register using the register button in the upper right corner, if you haven't done so already.  You may submit a support ticket here or by email.  Email submissions should be sent to support[at]hollandcomputers.com.  All submissions by the portal or via email require a verified email address. 
 
If you have not verified your email address yet, please log on, then click on your name in the upper right corner, then click "My Settings".  You will see a resend email button on the page that will help you get the verification process completed.
 
Our ticket system is monitored during normal business hours.  For after hours business down emergencies, you should still submit a ticket then follow up that ticket with a call to our after hours answering service who will page the technician on call.  The answering service can be reached by dialing our main office number, 440-365-9906 and selecting option 8 for after hours support.  After hours support is billed at a rate of $150 per hour and is not included as part of any managed services agreement you may have with us.
 
All requests are evaluated by a member of our technical staff as soon as they are received. All non-emergency requests (move/add/change) and general questions will be completed during normal business hours, Monday through Friday, from 8:00 a.m.-5:00 p.m.
(After hours technical support is available for existing customers only)

Search the Portal

Recent Articles

DEC16
Fraudsters Capitalize on Natural Disasters

Internet Crime complaint Center (FBI)
DEC15
VB2017 paper: Nine circles of Cerber

Cerber is one of the major names in the world of ransomware, and last year, Check Point released a decryption service for the malware. Today, we publish a VB2017 paper by Check Point's Stanislav Skuratovich describing how the Cerber decryption tool worked; we have also uploaded the video of the presentation of this paper, by Or Eshed and Yaniv Balmas. Read more

The Virus Bulletin
DEC14
Attack on Fox-IT shows how a DNS hijack can break multiple layers of security

Dutch security firm Fox-IT deserves praise for being open about an attack on its client network. There are some important lessons to be learned about DNS security from its post-mortem. Read more

The Virus Bulletin
DEC14
Throwback Thursday: BGP - from route hijacking to RPKI: how vulnerable is the Internet?

For this week's Throwback Thursday, we look back at the video of a talk Level 3's Mike Benjamin gave at VB2016 in Denver, on BGP and BGP hijacks. Read more

The Virus Bulletin
DEC13
Security Planner gives security advice based on your threat model

Citizen Lab's Security Planner helps you improve your online safety, based on the specific threats you are facing. Read more

The Virus Bulletin
DEC11
VB2017 video: Spora: the saga continues a.k.a. how to ruin your research in a week

Today, we publish the video of the VB2017 presentation by Avast researcher Jakub Kroustek and his former colleague Előd Kironský, now at ESET, who told the story of Spora, one of of the most prominent ransomware families of 2017. Read more

The Virus Bulletin
DEC7
VB2017 paper: Modern reconnaissance phase on APT – protection layer

During recent research, Cisco Talos researchers observed the ways in which APT actors are evolving and how a reconnaissance phase is included in the infection vector in order to protect valuable zero-day exploits or malware frameworks. At VB2017 in Madrid, two of those researchers, Paul Rascagneres and Warren Mercer, presented a paper detailing five case studies that demonstrate how the infection vector is evolving. Today we publish both Paul and Warren's paper and the recording of their...

The Virus Bulletin
DEC1
VB2017 paper: Peering into spam botnets

At VB2017 in Madrid, CERT Poland researchers Maciej Kotowicz and Jarosław Jedynak presented a paper detailing their low-level analysis of five spam botnets. Today we publish their full paper. Read more

The Virus Bulletin