Start a business/dispensary off right with our support. Contact us today. Contact Us
images/top9.jpg


Biotrack's #1 Recommended Hardware & Support Solution Provider!

Our techs are on call 24x7 - 365 to ensure dispensaries are provided I.T. Support from Seed to Sale.
Managed IT Services On Call 24x7 - 365 Get our entire staff of dedicated IT support technicians for less than the price of a dedicated employee on payroll. Our managed IT solutions provides; monitored enterprise level antivirus, anti-malware, threat detection and health monitoring. On call Support, AM, PM or Holiday's we're there!
Seed 2 Sale Software Support Support ASAP Biotrack, Cova, Dutchie, MJ Freeway the list goes on and we support them all! If they're support team isn't cutting it, we can help asap! Our Technicians also can loop in our affiliates at any Seed 2 Sale Software company to get issues resolved ASAP!
Security & Surveillance Instant Accessibility Get CCD Compliant and Commercial Grade Security/Surveillance Systems! Daedalus Teks partners not just with Hikvision but Vitek to ensure any investment is secure! We also offer magnetic locks, alarms and more. Contact us to schedule a quote and walk through!
Dispensary Hardware Cultivation, Dispensary, Manufacturer Daedalus teks can tailor hardware packages to suit any companies needs. We carry everything including but not limited to; Computer systems, Cash Registers, Point of Sales systems, Scales, Handscanners, Reciept Printers and more!

Our Services

Apple Repair

Have a bad Apple? Perhaps a broken screen? Or maybe it's just running slow. Our technicians can help with any Apple product. Have an Apple that won't accept the new OS? Install Windows instead of throwing it away and have a backup computer!

In Home/Business

Don't want to deal with those pesky wires? To many peripherals to disconnect? Or maybe you just don't want to carry around a computer. No worries, our technicians offer onsite support in your home or business!

PC/Windows Repair

Have a custom built computer that needs service? Our technicians are experienced with all versions of Windows including Server! Call today for support!

Network Support

Missing network drops in an office? Our staff can help! Need help segregating networks, data shares and assistance with weak WiFi signals? We have you covered! Our technicians can handle network deployments, repairs, security checks and even custom firewalls!

Server Support

Daedalus teks can assist in any server environment. From a new fresh server deployment to an existing domain server. We can assist with Active Directory mananagement, workstaton administration and so much more!

Website Design

Our staff can help design a website to suit your needs and include a content management system that allows clients to update their own sites! We also offer; domain registration, eCommerce site setup, email hosting, SEO management, website hosting and so much more!

About Our Company

Daedalus teks has been providing IT Support services for businesses in the Albuquerque area for the past 10 years. Recently, our staff has opened a public retail location at 4011 Menaul Blvd. NE in Albuquerque, NM to provide the same quality service to the public!.

Finally, any one can get the IT support they deserve. Daedalus Teks offers; Computer Repair, Custom PC Builds, Data Recovery, Laptop Repair, Password removal, Network Support, Server Manangment/Support and even Web Design! Our staff are technicians that have worked for the most popular PC repair shops in town! So come on in and let us help you with any of your IT needs!

Client Testimonials

Dave Turner Organtica Management Group Cesar is my go to guy for all things IT related. He is direct, dependable, knowledgeable, and cost effective. Five Star customer service too!
Brooke D. Natural RX Nothing but quality service coming from Cesar and his company. He helped me set up my remote connect so that I can work from where ever I need. He's always just a call away when my company needs him. Very Thankful for them.
Chris Cecil ABQ Back Neck and Pain Center They have done a great job for me. "All our patient data wasn't viewable after our system crashed, their techs helped recover everything as quick as possible and upgrade everything they could". I recommend them highly..
Cory F. Comfort Dental Cesar has been our Tech Support for about the past two weeks and everything has worked great! He is very knowledgeable and takes the time to explain what work is needed and how it has been fixed. He is always very personable and has taken the time to help us update our computers to make our office run more efficiently. I recommend him to any company or anybody who needs assistance with there computer, website, network and camera systems.

Facebook Home is now available for (some) Android devices, aside from its launch device, the HTC First. It is easy to understand this direction that Facebook has chosen to take. There are many users who would find something like Facebook Home useful and would like it: people who use their mobile devices primarily to connect with their Friends and share likes, updates, photos, and other such social activities.

 

However, people are becoming genuinely concerned about how much of our data is ending up in the hands of Internet companies. Facebook Home doesn’t collect new types of information that existing apps already don’t, as their officials went at some length to explain. The concern though is that they said nothing about the quantity of data that will be gathered. This in and of itself is of great value to Facebook; increasing the amount of data to correlate can only “improve” what Facebook knows about its users.

What we would suggest is for people to be genuinely mindful and thoughtful about what they do share online. Do you really have to share that photo? Do you really want to send this status update out into the public, where future friends, partners, and employers will be able to find it down the road? A good way to moderate the sharing of information is through privacy scanners, (which is offered for free in Google Play, and is a built-in feature in Trend Micro™ Titanium™ Security) but of course the users’ mindset would play a crucial part.

 

One more thing to consider is how companies will treat our data if it’s no longer in use. Google recently released the Inactive Account Manager, which lets Google know what to do with your data if you’re no longer accessing Google. While the advertised use is for someone’s death, it could easily be used for less morbid uses. In this case, if you want Google to forget about you, just stay away for at least three months. Google deserves kudos for steps like these, and other companies would be well encouraged to follow suit.

In the end, users should remember one thing: nothing ever goes away on the Internet.

Learn More About Us

Let us help you make you make your business a success
Our staff can provide services to help any business succeed in the digital world. Daedalus Teks can provide businesses with; data backup & mangement, inventory and sales systems, network deployment, server deployment, search engine optimization (bing, duckduckgo, google and even yahoo), technical support, third party software support and web design!


Cloud Solutions Cloud solutions availble.
Customer Support Is a; call, chat, email or text away.
Onsite Service At home or at work, we can help.
Custom Support For 3rd party applications (MS Office, Quickbooks, Biotrack and etc).
Successful Starts 523
Clients Helped 213
Projects Completed 587
Hours of Work 4715

Security Shield, Made out of BS!

What this infection does:

Security Shield is a rogue spyware infection that is a variant of Security Tool. This rogue is installed through; other malware, fake online programs claiming that they are anti-malware scanners or prompt that your system is infected. Once installed, on your system Security Shield will be configured to start automatically when Windows starts. Once started, it will perform a scan of your computer and state that there are numerous infections present on your computer. If you attempt, though, to remove any of these so-called infections the program will state that you first need to purchase it. In reality, all of the files it states are infections are legitimate Windows files. Therefore, do not manually delete any of the files it states are infections as you may cause Windows to not operate correctly. The following images will have indicators pointing out how far the creators of this virus went to make it seem real.

 In order to protect itself, Security Shield will terminate almost all processes that you start. It does this so that you cannot launch any security programs that may have the ability to remove the infection. The message that you will see when you attempt run a program is similar to the one below:

Security Shield "cmd.exe" is infected with "Worm.Win32.Autorun.bnb". Do you want to register your copy and remove all threats now?

Just like the scan results, this infection warning is fake and should be ignored.

Hits: 1460

Read More

Atom Split Into Two And Then Put Back Together Using Quantum Mechanics

On a topic unrelated to computers, I figured that everyone should know that this has happened.

An atom has been split into halves, separated, and then put back together, in new research from the University of Bonn. The word “atom” literally means “indivisible,” yet quantum mechanics allows an atom to be split and put back together in a way similar to rays of light.

The researchers are doing this work because they want to build quantum mechanics bridges, by letting the the atom being pulled apart touch adjacent atoms, forming a bridge between them.


In this experiment, the researchers succeeded in keeping a single atom in two places more than 10 micrometers apart, that’s a one-hundredth of a millimeter. That is an enormous distance for an atom. Afterwords, the atom was put back together undamaged.Dividing atoms brings to mind things like nuclear fission and radiation. However, this is a completely different process. The laws of quantum mechanics allow something to exist in several different states at once. This is what the “double-slit” experiment is based on, an object going to two separate slits at once.

These quantum effects can only occur at the lowest temperatures and with very careful handling. One method is to cool a cesium atom using lasers just slightly above absolute zero and then using another laser to move it. The laser is the key to this method because atoms have a spin that can go in two directions. Using the spin, the atom can move to the left of the right like a conveyer belt. The key to this is that the atom’s spin can be in both directions at once.

–>You may also like: Quantum Computers Will Be Capable Of Simulating Particle Collisions

“The atom has kind of a split personality, half of it is to the right, and half to the left, and yet, it is still whole,” explained Andreas Steffen, the publication’s lead author.

This isn’t visible directly, though. If you shine a light on the atom, the split will collapse. If imaged, the atom sometimes shows on the left, the right, or in the center, but the split can be proved by putting the atom back together.

Hits: 3053

Read More

Australia joins US, Canada to foil major online scams

 

By Amy McNeilage @ The Sydney Morning Herald

Australian, American and Canadian authorities have joined forces to foil a major international phone scam, known as the Microsoft Imposter scam.

The scam, which involves people pretending to be Microsoft employees offering to fix computer viruses, is thought to have ripped off tens of thousands of people in six countries.

US authorities this week won court orders to close down and freeze funds of alleged US-based parties involved in the scheme.

Details of the action were to be revealed this morning in a joint media conference in Washington DC with the Australian Communications and Media Authority (ACMA), the US Federal Trade Commission (FTC) and the Canadian Radio-television and Telecommunications Commission (CRTC).

“With new scams appearing more frequently, our citizens need to be vigilant and not respond to insidious trickery,” ACMA Chairman, Chris Chapman, said in a statement.

“The best way for people to protect themselves from these types of scam calls is to simply hang up and never give an unsolicited caller access to their computer or their credit card details.”

The ACMA first became aware of the scam in 2009 via its Do Not Call complaint line. It generated nearly 10,000 calls to the line over the past two years.

Australia was one of the first targets of the scam, which subsequently spread to other countries. The ACMA had been tracking the scammers for three years, in collaboration with the Australian Competition and Consumer Commission and the FTC.

How the scam works (source: ACMA)

A caller claims to work for Windows or Microsoft and says they have detected a virus or ‘issues’ with your computer.

To confirm the diagnosis, they ask you to open Windows Event viewer to check if it is infected.

Several error messages are listed, even though errors are common and often harmless.

The caller says the errors are of great concern and offers to refer you to a technician for a fee.

The technician asks you to log on to a third-party website so they can remotely access your computer.

The scammer then might:

• Install an antivirus program (often one that you can download for free) for up to $250

• Ask for your credit card details but install nothing

• Install malware so your computer can be controlled remotely

• Access and steal personal and financial details from your computer

 


Posted By: Ces Garcia Original Article by Amy McNeilage @ The Sydney Morning Herald Original article can be found by clicking "Australia joins US, Canada to foil major online scam"

 

Hits: 1376

10 Biggest Computer Security Myths Busted

By: ANGUS KIDMAN GIZMODO AU MAY 9, 2012 1:20 PM

Keeping your computer secure can be confusing, so it’s not surprising that mistaken beliefs often end up taking root. Here are the ten biggest myths about computer security, busted once and for all.

Picture by Niels Heidenreich

 

We’ve run posts in the past covering common virus myths, but viruses are just one small part of the overall security equation. Here are some widespread beliefs that are (for the most part) flat-out wrong.

 

Myth #10. Computers represent the biggest security risk

While many criminals and scammers use email, web sites and other electronic tools, they haven’t abandoned more traditional methods. According to the Australian Competition and Consumer Commission, phone scams remain more common than any other type. That doesn’t mean you shouldn’t take appropriate precautions when you’re online. Rather, it serves as a reminder that a questioning attitude is wise whenever you interact with people in any forum.

Hits: 1597

Read More

Our Location

Daedalus Teks is conveniently located on Menaul, right next door to Organtica. Our normal business hours are; Mon - Fri: 9:30A.M - 5:30P.M & weekends are onsite appointment day's only.

Contact Us Today
Daedalus Teks 4011 Menaul Blvd. NE
Albuquerque, NM 87110
USA 505-289-0522