Start a business/dispensary off right with our support. Contact us today. Contact Us
images/top9.jpg


Biotrack's #1 Recommended Hardware & Support Solution Provider!

Our techs are on call 24x7 - 365 to ensure dispensaries are provided I.T. Support from Seed to Sale.
Managed IT Services On Call 24x7 - 365 Get our entire staff of dedicated IT support technicians for less than the price of a dedicated employee on payroll. Our managed IT solutions provides; monitored enterprise level antivirus, anti-malware, threat detection and health monitoring. On call Support, AM, PM or Holiday's we're there!
Seed 2 Sale Software Support Support ASAP Biotrack, Cova, Dutchie, MJ Freeway the list goes on and we support them all! If they're support team isn't cutting it, we can help asap! Our Technicians also can loop in our affiliates at any Seed 2 Sale Software company to get issues resolved ASAP!
Security & Surveillance Instant Accessibility Get CCD Compliant and Commercial Grade Security/Surveillance Systems! Daedalus Teks partners not just with Hikvision but Vitek to ensure any investment is secure! We also offer magnetic locks, alarms and more. Contact us to schedule a quote and walk through!
Dispensary Hardware Cultivation, Dispensary, Manufacturer Daedalus teks can tailor hardware packages to suit any companies needs. We carry everything including but not limited to; Computer systems, Cash Registers, Point of Sales systems, Scales, Handscanners, Reciept Printers and more!

Our Services

Apple Repair

Have a bad Apple? Perhaps a broken screen? Or maybe it's just running slow. Our technicians can help with any Apple product. Have an Apple that won't accept the new OS? Install Windows instead of throwing it away and have a backup computer!

In Home/Business

Don't want to deal with those pesky wires? To many peripherals to disconnect? Or maybe you just don't want to carry around a computer. No worries, our technicians offer onsite support in your home or business!

PC/Windows Repair

Have a custom built computer that needs service? Our technicians are experienced with all versions of Windows including Server! Call today for support!

Network Support

Missing network drops in an office? Our staff can help! Need help segregating networks, data shares and assistance with weak WiFi signals? We have you covered! Our technicians can handle network deployments, repairs, security checks and even custom firewalls!

Server Support

Daedalus teks can assist in any server environment. From a new fresh server deployment to an existing domain server. We can assist with Active Directory mananagement, workstaton administration and so much more!

Website Design

Our staff can help design a website to suit your needs and include a content management system that allows clients to update their own sites! We also offer; domain registration, eCommerce site setup, email hosting, SEO management, website hosting and so much more!

About Our Company

Daedalus teks has been providing IT Support services for businesses in the Albuquerque area for the past 10 years. Recently, our staff has opened a public retail location at 4011 Menaul Blvd. NE in Albuquerque, NM to provide the same quality service to the public!.

Finally, any one can get the IT support they deserve. Daedalus Teks offers; Computer Repair, Custom PC Builds, Data Recovery, Laptop Repair, Password removal, Network Support, Server Manangment/Support and even Web Design! Our staff are technicians that have worked for the most popular PC repair shops in town! So come on in and let us help you with any of your IT needs!

Client Testimonials

Dave Turner Organtica Management Group Cesar is my go to guy for all things IT related. He is direct, dependable, knowledgeable, and cost effective. Five Star customer service too!
Brooke D. Natural RX Nothing but quality service coming from Cesar and his company. He helped me set up my remote connect so that I can work from where ever I need. He's always just a call away when my company needs him. Very Thankful for them.
Chris Cecil ABQ Back Neck and Pain Center They have done a great job for me. "All our patient data wasn't viewable after our system crashed, their techs helped recover everything as quick as possible and upgrade everything they could". I recommend them highly..
Cory F. Comfort Dental Cesar has been our Tech Support for about the past two weeks and everything has worked great! He is very knowledgeable and takes the time to explain what work is needed and how it has been fixed. He is always very personable and has taken the time to help us update our computers to make our office run more efficiently. I recommend him to any company or anybody who needs assistance with there computer, website, network and camera systems.

By: ANGUS KIDMAN GIZMODO AU MAY 9, 2012 1:20 PM

Keeping your computer secure can be confusing, so it’s not surprising that mistaken beliefs often end up taking root. Here are the ten biggest myths about computer security, busted once and for all.

Picture by Niels Heidenreich

 

We’ve run posts in the past covering common virus myths, but viruses are just one small part of the overall security equation. Here are some widespread beliefs that are (for the most part) flat-out wrong.

 

Myth #10. Computers represent the biggest security risk

While many criminals and scammers use email, web sites and other electronic tools, they haven’t abandoned more traditional methods. According to the Australian Competition and Consumer Commission, phone scams remain more common than any other type. That doesn’t mean you shouldn’t take appropriate precautions when you’re online. Rather, it serves as a reminder that a questioning attitude is wise whenever you interact with people in any forum.

 

Myth #9. Security software companies write most viruses

A persistent myth ever since computer viruses first emerged holds that most of the viruses are secretly written by security software companies, who distribute them in order to keep themselves in business. It isn’t hard to see why this is a nonsensical claim. Firstly, it presupposes the existence of some massive conspiracy in which a bunch of rival companies all agree not to dob each other in, and manage to do so in a way which eliminates all traces of evidence and has never been detected by any independent security researchers. Secondly, it relies on the outdated view that viruses are the only thing security software deals with. Given that a large part of security now focuses on analysing the contents of web sites and email, it’s obvious that writing viruses would be a lousy business model.

Myth #8. Personal data is sold for large sums

It’s true that the malware world is a professional one these days: the people writing code aren’t doing it for kicks, they’re doing it to access information with which they can make money. But that doesn’t   mean that your own individual log-in details are worth a fortune. As we’ve noted before, information of this type is generally traded in bulk between criminals, and often barter rather than outright cash   payments are involved.

Myth #7. I should pay for this security software that has just spotted a flaw

In a weird twist on Myth #9, fake security software — often referred to as scareware — has become a growing problem. This software once installed claims to have detected (non-existent) security         problems, but suggests that paying for an upgrade will eliminate the problem. In reality, all it will eliminate is the contents of your wallet. Some ransomware can be very persistent and difficult to          uninstall. Legitimate security software will usually detect it. The bottom line? If a message appears from a security software package you don’t remember installing, you’ve got a problem — but the problem is the fake security software itself.

 

Myth #6. I can trust messages from my friends

One of the most common cash/identity theft scams kicks off when you receive an email (or a Facebook message) from a close friend claiming that they’re overseas and have been injured or robbed, and   need some money transferred urgently. Your natural instinct is to help, but the odds are overwhelming that it’s actually a fake.

If your friend’s system has been hacked (perhaps because they didn’t follow good password practices), then it’s very easy for a fake message of this type to get out. It’s also very easy to check: my  mother got one of these messages recently claiming a good friend was in Spain. Fortunately, she had the sense to ring her friend at home in Tasmania, and quickly realised the message was a fake.  Practice that same good sense yourself.

Myth #5. Windows is full of security holes

If you keep it regularly patched and use the built-in security features, Windows is a secure operating system. While some decisions Microsoft made in the past (such as letting all users install software unheeded) undoubtedly contributed to problems, that isn’t the case with Windows 7. With User Account Control enabled, the chances of something installing itself unbidden are slight.

Unfortunately for Microsoft, many users don’t patch their systems or use security software, so they leave vulnerabilities in place long after they have been resolved. Top 10 lists of malware infections are invariably populated with code that has been identified and patched against long before (often years before). The popularity of Windows means this problem isn’t going to disappear, but it’s a mistake to presume that means Windows itself is permanently or intractably insecure. Like any computer OS, it is ultimately at the mercy of its users.

Myth #4. Online criminals only target big business

The prevalance of phishing messages from big banks and other organisations can give the appearance that security threats are aimed mostly at large businesses. While a big company can make a juicy target, cyber-criminals spread their net far and wide. As we noted recently, any size of business can be a target.

 

Myth #3. Microsoft (or whoever) wants to ring and help fix your security issues

This scam is so common and recurs so frequently we need to single it out specifically. You get a phone call claiming to be from Microsoft (or Telstra, or Australia Post, or Apple), saying that a security problem has been detected but that the support worker can talk you through how to fix Don’t waste time discussing the issue arguing: just hang up. It’s a scam, designed to con you into willingly install software on your computer that will make it remotely accessible to others. From there, it’s an easy step to steal your personal data, use your computer as part of a botnet to distribute spam or launch attacks on others, and (potentially) to ask you to pay for the service.

The simple truth? No-one legitimate will ever ring to tell you a security problem has been detected on your computer. The world does not work like that, and never has.

 

Myth #2. Macs don’t suffer from security issues

We’ve covered this in detail recently, and the swift emergence of two Mac security problems in quick succession underscores the point: no operating system is impervious. Modern code is so complex that flaws emerge everywhere, and you need to be alert whatever platform you use.

Myth #1. You don’t need security software

Keeping your computer secure does require you to be alert. Not everything can be solved by software. If you give permission to a dodgy application to install itself, security software is not going to help much. If you click through web links in search of pirate software, problems are going to arise. Many Lifehacker readers are savvy computer users, and pride themselves on avoiding the obvious pitfalls.

 

However, that doesn’t mean that you, as an individual, are so alert that you’ll be able to detect every possible attack. Modern operating systems are hugely complex. Drive-by downloads delivered via browsers can be virtually invisible when they install. People often let friends or colleagues use their computers, and they may not be as cautious as you are.

 

Being alert is definitely preferable to blithely assuming everything will be OK. But your computer is a powerful tool. Let it share the load of keeping your system secure.

 


Posted by: Ces Garcia, Original Article By ANGUS KIDMAN GIZMODO AU and can be found by clicking "10 Biggest Computer Security Myths Busted"

Learn More About Us

Let us help you make you make your business a success
Our staff can provide services to help any business succeed in the digital world. Daedalus Teks can provide businesses with; data backup & mangement, inventory and sales systems, network deployment, server deployment, search engine optimization (bing, duckduckgo, google and even yahoo), technical support, third party software support and web design!


Cloud Solutions Cloud solutions availble.
Customer Support Is a; call, chat, email or text away.
Onsite Service At home or at work, we can help.
Custom Support For 3rd party applications (MS Office, Quickbooks, Biotrack and etc).
Successful Starts 523
Clients Helped 213
Projects Completed 587
Hours of Work 4715

Be Careful of what you share, especially with Facebook Home Coming around.

Facebook Home is now available for (some) Android devices, aside from its launch device, the HTC First. It is easy to understand this direction that Facebook has chosen to take. There are many users who would find something like Facebook Home useful and would like it: people who use their mobile devices primarily to connect with their Friends and share likes, updates, photos, and other such social activities.

 

However, people are becoming genuinely concerned about how much of our data is ending up in the hands of Internet companies. Facebook Home doesn’t collect new types of information that existing apps already don’t, as their officials went at some length to explain. The concern though is that they said nothing about the quantity of data that will be gathered. This in and of itself is of great value to Facebook; increasing the amount of data to correlate can only “improve” what Facebook knows about its users.

What we would suggest is for people to be genuinely mindful and thoughtful about what they do share online. Do you really have to share that photo? Do you really want to send this status update out into the public, where future friends, partners, and employers will be able to find it down the road? A good way to moderate the sharing of information is through privacy scanners, (which is offered for free in Google Play, and is a built-in feature in Trend Micro™ Titanium™ Security) but of course the users’ mindset would play a crucial part.

Hits: 1652

Read More

Lolita City, and other alleged child porn websites, attacked by Anonymous

Lolita City, and other alleged child porn websites, attacked by Anonymous

by Graham Cluley at Naked Security

The hacktivist collective Anonymous has declared war on internet paedophiles, attacking websites it accuses of carrying child abuse images and videos, and declaring that anyone who hosts, promotes or supports child pornography is a target.

In an operation dubbed "Operation DarkNet" or "OpDarkNet", the loosely-knit group has claimed responsibility for taking
offline over 40 websites accused of sharing child abuse material, and has published details of 1589 alleged paedophiles that had been using the websites.

In particular the hackers targeted a site called "Lolita City", and crashed the servers of its web hosting service Freedom Hosting. In a statement, Anonymous called "Lolita City" one of the "largest child pornography websites to date containing more than 100GB of child pornography".

Hits: 10912

Read More

MBR Ransomware! This is one of the worst...

 

A new infection is making its rounds that makes it so you cannot boot your computer unless you pay a ransom of $100 USD. This malware will modify the Master Boot Record of your computer so that it displays a message stating that your computer's hard drives were encrypted and that unless you pay the ransom you will not be able to access your files.

The reality is that the infected hard drives are not actually encrypted, but just not being made available until you enter a password. When this infection is installed on your computer it will move the infected hard drives Master Boot Record, or MBR, to another location and install a new MBR that displays a message stating that the hard drives were encrypted and that you need to visit www.safe-data.ru in order to receive help. (An MBR is a Master Boot Record which in laymen terms is a file dictates how the Operating System boots)  The message that you will see is:

Your PC is blocked.

All the hard drives were encrypted.

Browse www.safe-data.ru to get an access to your system and files.

Hits: 1523

Read More

Atom-Sized Transistor Foretells Quantum Computer, Scientists Say

Atom-Sized Transistor Foretells Quantum Computer, Scientists Say

By Ian Paul, PCWorld    Feb 20, 2012 9:48 AM

Scientists say they have created the first transistor from a single phosphorous atom using near-atomic precision, which could keep development of processors on track with Moore's law until at least 2020 and offers the possibility of a general-purpose quantum computer that processes data significantly faster than current devices.

To create the transistor, scientists at the University of New South Wales, Australia used a scanning tunneling microscope (STM) to manipulate atoms on the surface of a crystal inside an ultra-high vacuum chamber. The newly created transistor was then covered with a non-reactive layer of hydrogen and encased in silicon.

Tiny atom-sized transistors have been created before, but were often built by chance, according to the researchers. “This is the first time anyone has shown control of a single atom in a substrate with this level of precise accuracy," says Professor Michelle Simmons, a group leader and director of the ARC Centre for Quantum Computation and Communication Technology at the University of New South Wales.

Moore's Law Upheld

Moore's law, first postulated by Intel co-founder Gordon Moore, says the number of transistors -- the main component of a microchip -- that can fit on a chip doubles about every 24 months. To keep pace with Moore's law, transistors would have to reach the atomic level by 2020.

Hits: 1333

Read More

Our Location

Daedalus Teks is conveniently located on Menaul, right next door to Organtica. Our normal business hours are; Mon - Fri: 9:30A.M - 5:30P.M & weekends are onsite appointment day's only.

Contact Us Today
Daedalus Teks 4011 Menaul Blvd. NE
Albuquerque, NM 87110
USA 505-289-0522