Start a business/dispensary off right with our support. Contact us today. Contact Us
images/top9.jpg


Biotrack's #1 Recommended Hardware & Support Solution Provider!

Our techs are on call 24x7 - 365 to ensure dispensaries are provided I.T. Support from Seed to Sale.
Managed IT Services On Call 24x7 - 365 Get our entire staff of dedicated IT support technicians for less than the price of a dedicated employee on payroll. Our managed IT solutions provides; monitored enterprise level antivirus, anti-malware, threat detection and health monitoring. On call Support, AM, PM or Holiday's we're there!
Seed 2 Sale Software Support Support ASAP Biotrack, Cova, Dutchie, MJ Freeway the list goes on and we support them all! If they're support team isn't cutting it, we can help asap! Our Technicians also can loop in our affiliates at any Seed 2 Sale Software company to get issues resolved ASAP!
Security & Surveillance Instant Accessibility Get CCD Compliant and Commercial Grade Security/Surveillance Systems! Daedalus Teks partners not just with Hikvision but Vitek to ensure any investment is secure! We also offer magnetic locks, alarms and more. Contact us to schedule a quote and walk through!
Dispensary Hardware Cultivation, Dispensary, Manufacturer Daedalus teks can tailor hardware packages to suit any companies needs. We carry everything including but not limited to; Computer systems, Cash Registers, Point of Sales systems, Scales, Handscanners, Reciept Printers and more!

Our Services

Apple Repair

Have a bad Apple? Perhaps a broken screen? Or maybe it's just running slow. Our technicians can help with any Apple product. Have an Apple that won't accept the new OS? Install Windows instead of throwing it away and have a backup computer!

In Home/Business

Don't want to deal with those pesky wires? To many peripherals to disconnect? Or maybe you just don't want to carry around a computer. No worries, our technicians offer onsite support in your home or business!

PC/Windows Repair

Have a custom built computer that needs service? Our technicians are experienced with all versions of Windows including Server! Call today for support!

Network Support

Missing network drops in an office? Our staff can help! Need help segregating networks, data shares and assistance with weak WiFi signals? We have you covered! Our technicians can handle network deployments, repairs, security checks and even custom firewalls!

Server Support

Daedalus teks can assist in any server environment. From a new fresh server deployment to an existing domain server. We can assist with Active Directory mananagement, workstaton administration and so much more!

Website Design

Our staff can help design a website to suit your needs and include a content management system that allows clients to update their own sites! We also offer; domain registration, eCommerce site setup, email hosting, SEO management, website hosting and so much more!

About Our Company

Daedalus teks has been providing IT Support services for businesses in the Albuquerque area for the past 10 years. Recently, our staff has opened a public retail location at 4011 Menaul Blvd. NE in Albuquerque, NM to provide the same quality service to the public!.

Finally, any one can get the IT support they deserve. Daedalus Teks offers; Computer Repair, Custom PC Builds, Data Recovery, Laptop Repair, Password removal, Network Support, Server Manangment/Support and even Web Design! Our staff are technicians that have worked for the most popular PC repair shops in town! So come on in and let us help you with any of your IT needs!

Client Testimonials

Dave Turner Organtica Management Group Cesar is my go to guy for all things IT related. He is direct, dependable, knowledgeable, and cost effective. Five Star customer service too!
Brooke D. Natural RX Nothing but quality service coming from Cesar and his company. He helped me set up my remote connect so that I can work from where ever I need. He's always just a call away when my company needs him. Very Thankful for them.
Chris Cecil ABQ Back Neck and Pain Center They have done a great job for me. "All our patient data wasn't viewable after our system crashed, their techs helped recover everything as quick as possible and upgrade everything they could". I recommend them highly..
Cory F. Comfort Dental Cesar has been our Tech Support for about the past two weeks and everything has worked great! He is very knowledgeable and takes the time to explain what work is needed and how it has been fixed. He is always very personable and has taken the time to help us update our computers to make our office run more efficiently. I recommend him to any company or anybody who needs assistance with there computer, website, network and camera systems.

Revealed: NSA targeting domestic computer systems in secret test

by Declan McCullagh CNET

The National Security Agency's Perfect Citizen program hunts for vulnerabilities in "large-scale" utilities, including power grid and gas pipeline controllers, new documents from EPIC show.

Newly released files show a secret National Security Agency program is targeting the computerized systems that control utilities to discover security vulnerabilities, which can be used to defend the United States or disrupt the infrastructure of other nations.

Credit (TVA)The NSA's so-called Perfect Citizen program conducts "vulnerability exploration and research" against the computerized controllers that control "large-scale" utilities including power grids and natural gas pipelines, the documents show. The program is scheduled to continue through at least September 2014.

 

The Perfect Citizen files obtained by the Electronic Privacy Information Center and provided to CNET shed more light on how the agency aims to defend -- and attack -- embedded controllers. The NSA is reported to have developed Stuxnet, which President Obama secretly ordered to be used against Iran's nuclear program, with the help of Israel.

U.S. officials have warned for years, privately and publicly, about the vulnerability of the electrical grid to cyberattacks. Gen. Martin Dempsey, the chairman of the Joint Chiefs of Staff, told a congressional committee in February: "I know what we [the U.S.] can do and therefore I am extraordinarily concerned about the cyber capabilities of other nations." If a nation gave such software to a fringe group, Dempsey said, "the next thing you know could be into our electrical grid."

Discussions about offensive weapons in the U.S. government's electronic arsenal have gradually become more public. One NSA employment posting for a Control System Network Vulnerability Analyst says the job involves "building proof-of concept exploits," and an Air Force announcement in August called for papers discussing "Cyberspace Warfare Attack" capabilities. The Washington Post reported last month that Obama secretly signed a directive in October outlining the rules for offensive "cyber-operations."

"Sabotage or disruption of these industries can have wide-ranging negative effects including loss of life, economic damage, property destruction, or environmental pollution," the NSA concluded in a public report (PDF) discussing industrial control systems and their vulnerabilities.

The 190 pages of the NSA's Perfect Citizen files, which EPIC obtained through the Freedom of Information Act last week, are heavily redacted. At least 98 pages were completely deleted for a number of reasons, including that portions are "classified top secret," and could "cause exceptionally grave damage to the national security" if released, according to an accompanying letter from Pamela Phillips, chief of the NSA's FOIA office.

But the portions that were released show that Raytheon received a contract worth up to $91 million to establish Perfect Citizen, which "enables the government to protect the systems," especially "large-scale distributed utilities," operated by the private sector.

The focus is "sensitive control systems," or SCS, which "provide automation of infrastructure processes." Raytheon is allowed to hire up to 28 hardware and software engineers who are supposed to "investigate and document the results of vulnerability exploration and research against specific SCS and devices."

One job description, for a senior penetration tester, says the position will "identify and demonstrate vulnerabilities," and requires experience using security-related utilities such as Nmap, Tenable's Nessus, Libnet, and Netcat. Raytheon is required not to disclose that this work is being done for the NSA.

The Wall Street Journal disclosed the existence of Perfect Citizen in a 2010 article, which reported the NSA's "surveillance" of such systems relies "on a set of sensors deployed in computer networks for critical infrastructure that would be triggered by unusual activity suggesting an impending cyber attack."

An NSA spokeswoman responded to CNET at the time by saying that Perfect Citizen is "purely a vulnerabilities assessment and capabilities development contract" that "does not involve the monitoring of communications or the placement of sensors on utility company systems."

Marc Rotenberg, EPIC's executive director, said that the newly declassified documents "may help disprove" the NSA's argument that Perfect Citizen doesn't involve monitoring private networks.

The FOIA'd documents say that because the U.S. government relies on commercial utilities for electricity, telecommunications, and other infrastructure requirements, "understanding the technologies utilized in the infrastructure nodes to interoperate on the commercial backbone enables the government to protect the systems."

Neither the NSA nor Raytheon immediately responded to requests to comment from CNET this morning. We'll update this story if we receive a response.

{jcomments on}

Learn More About Us

Let us help you make you make your business a success
Our staff can provide services to help any business succeed in the digital world. Daedalus Teks can provide businesses with; data backup & mangement, inventory and sales systems, network deployment, server deployment, search engine optimization (bing, duckduckgo, google and even yahoo), technical support, third party software support and web design!


Cloud Solutions Cloud solutions availble.
Customer Support Is a; call, chat, email or text away.
Onsite Service At home or at work, we can help.
Custom Support For 3rd party applications (MS Office, Quickbooks, Biotrack and etc).
Successful Starts 523
Clients Helped 213
Projects Completed 587
Hours of Work 4715

Australia joins US, Canada to foil major online scams

 

By Amy McNeilage @ The Sydney Morning Herald

Australian, American and Canadian authorities have joined forces to foil a major international phone scam, known as the Microsoft Imposter scam.

The scam, which involves people pretending to be Microsoft employees offering to fix computer viruses, is thought to have ripped off tens of thousands of people in six countries.

US authorities this week won court orders to close down and freeze funds of alleged US-based parties involved in the scheme.

Details of the action were to be revealed this morning in a joint media conference in Washington DC with the Australian Communications and Media Authority (ACMA), the US Federal Trade Commission (FTC) and the Canadian Radio-television and Telecommunications Commission (CRTC).

“With new scams appearing more frequently, our citizens need to be vigilant and not respond to insidious trickery,” ACMA Chairman, Chris Chapman, said in a statement.

“The best way for people to protect themselves from these types of scam calls is to simply hang up and never give an unsolicited caller access to their computer or their credit card details.”

The ACMA first became aware of the scam in 2009 via its Do Not Call complaint line. It generated nearly 10,000 calls to the line over the past two years.

Australia was one of the first targets of the scam, which subsequently spread to other countries. The ACMA had been tracking the scammers for three years, in collaboration with the Australian Competition and Consumer Commission and the FTC.

How the scam works (source: ACMA)

A caller claims to work for Windows or Microsoft and says they have detected a virus or ‘issues’ with your computer.

To confirm the diagnosis, they ask you to open Windows Event viewer to check if it is infected.

Several error messages are listed, even though errors are common and often harmless.

The caller says the errors are of great concern and offers to refer you to a technician for a fee.

The technician asks you to log on to a third-party website so they can remotely access your computer.

The scammer then might:

• Install an antivirus program (often one that you can download for free) for up to $250

• Ask for your credit card details but install nothing

• Install malware so your computer can be controlled remotely

• Access and steal personal and financial details from your computer

 


Posted By: Ces Garcia Original Article by Amy McNeilage @ The Sydney Morning Herald Original article can be found by clicking "Australia joins US, Canada to foil major online scam"

 

Hits: 1340

CISPA, it came back with a vengeance

Original Article By Cesar Garcia

Sources from CNET, ZDnet, etc.

For the past couple years the United States has been attempting to pass the CISPA bill which will authorize sharing of Internet traffic information between the U.S. government and certain technology and manufacturing companies such as; Google, Facebook, Twitter, Microsoft and Myspace. Some individuals saw CISPA as a second attempt at strengthening digital piracy laws after the Stop Online Piracy Act met huge opposition. CISPA will hit the floor either Today or Tomorrow, this bill has been so controversial yet no one understands why? Many Others are unaware of what's going on, So lets break it down:

  1. For those out of touch with current events concerning this, CISPA will allow private sector firms to search personal and sensitive user data of ordinary U.S. residents to identify so-called "threat information". Once identified this information will be shared other firms and the US government — without the need for a court-ordered warrant.

CISPA is controversial because it overrules all existing federal and state laws by saying: "Notwithstanding any other provision 

 

of law," companies may share information "with any other entity, including the federal government." It would not, however, require them to do so.

That language has alarmed dozens of advocacy groups, including the American Library Association, the American Civil Liberties Union, the Electronic Frontier Foundation and Reporters Without Borders. In turn they sent a letter (PDF Provided below) to Congress last month opposing CISPA. It says: "CISPA's information sharing regime allows the transfer of vast amounts of data, including sensitive information like Internet records or the content of e-mails, to any agency in the government."

  1. Under a new amendment voted on earlier today in the U.S. House, U.S. companies would have been able to keep their privacy policies intact and their promises valid, including terms of service, legally enforceable in the future. 

Rep. Pete Sessions (R-TX), who chairs the House Rules Committee, urged his colleagues to reject the amendment and in turn his colleagues did. All Republican members of the committee voted against the amendment despite a unanimous show of support from the Democratic membership.

Yet Republicans failed to get the amendment through by a 5-8 vote. This amendment would have weakened CISPA's position. Now it allows these private firms watertight legal immunity under CISPA to share their customer and user data with other firms as well as the U.S. government, by being "completely exonerated from any risk of liability," according to Rep. Jared Polis (D-CO). Now private sector firms have the right to hand over private user data, while circumventing existing privacy laws. Data such as; emails, text messages, cloud-stored documents and files, with the U.S. government, its law enforcement and intelligence agencies.

"We're disappointed that such a commonsense reform won't even get a vote, When Americans sign up for service with their phone company or their Internet provider they should be entitled to the privacy protections that the companies promise them. Giving companies legal cover to break their contracts with consumers is bad policy and a disservice to the American people." Will Adams, a spokesman for Rep. Justin Amash, a Michigan Republican who co-sponsored the amendment, told CNET earlier this evening. 

Hits: 1763

Read More

MBR Ransomware! This is one of the worst...

 

A new infection is making its rounds that makes it so you cannot boot your computer unless you pay a ransom of $100 USD. This malware will modify the Master Boot Record of your computer so that it displays a message stating that your computer's hard drives were encrypted and that unless you pay the ransom you will not be able to access your files.

The reality is that the infected hard drives are not actually encrypted, but just not being made available until you enter a password. When this infection is installed on your computer it will move the infected hard drives Master Boot Record, or MBR, to another location and install a new MBR that displays a message stating that the hard drives were encrypted and that you need to visit www.safe-data.ru in order to receive help. (An MBR is a Master Boot Record which in laymen terms is a file dictates how the Operating System boots)  The message that you will see is:

Your PC is blocked.

All the hard drives were encrypted.

Browse www.safe-data.ru to get an access to your system and files.

Hits: 1524

Read More

Atom Split Into Two And Then Put Back Together Using Quantum Mechanics

On a topic unrelated to computers, I figured that everyone should know that this has happened.

An atom has been split into halves, separated, and then put back together, in new research from the University of Bonn. The word “atom” literally means “indivisible,” yet quantum mechanics allows an atom to be split and put back together in a way similar to rays of light.

The researchers are doing this work because they want to build quantum mechanics bridges, by letting the the atom being pulled apart touch adjacent atoms, forming a bridge between them.


In this experiment, the researchers succeeded in keeping a single atom in two places more than 10 micrometers apart, that’s a one-hundredth of a millimeter. That is an enormous distance for an atom. Afterwords, the atom was put back together undamaged.Dividing atoms brings to mind things like nuclear fission and radiation. However, this is a completely different process. The laws of quantum mechanics allow something to exist in several different states at once. This is what the “double-slit” experiment is based on, an object going to two separate slits at once.

These quantum effects can only occur at the lowest temperatures and with very careful handling. One method is to cool a cesium atom using lasers just slightly above absolute zero and then using another laser to move it. The laser is the key to this method because atoms have a spin that can go in two directions. Using the spin, the atom can move to the left of the right like a conveyer belt. The key to this is that the atom’s spin can be in both directions at once.

–>You may also like: Quantum Computers Will Be Capable Of Simulating Particle Collisions

“The atom has kind of a split personality, half of it is to the right, and half to the left, and yet, it is still whole,” explained Andreas Steffen, the publication’s lead author.

This isn’t visible directly, though. If you shine a light on the atom, the split will collapse. If imaged, the atom sometimes shows on the left, the right, or in the center, but the split can be proved by putting the atom back together.

Hits: 2973

Read More

Our Location

Daedalus Teks is conveniently located on Menaul, right next door to Organtica. Our normal business hours are; Mon - Fri: 9:30A.M - 5:30P.M & weekends are onsite appointment day's only.

Contact Us Today
Daedalus Teks 4011 Menaul Blvd. NE
Albuquerque, NM 87110
USA 505-289-0522