Start a business/dispensary off right with our support. Contact us today. Contact Us
images/top9.jpg


Biotrack's #1 Recommended Hardware & Support Solution Provider!

Our techs are on call 24x7 - 365 to ensure dispensaries are provided I.T. Support from Seed to Sale.
Managed IT Services On Call 24x7 - 365 Get our entire staff of dedicated IT support technicians for less than the price of a dedicated employee on payroll. Our managed IT solutions provides; monitored enterprise level antivirus, anti-malware, threat detection and health monitoring. On call Support, AM, PM or Holiday's we're there!
Seed 2 Sale Software Support Support ASAP Biotrack, Cova, Dutchie, MJ Freeway the list goes on and we support them all! If they're support team isn't cutting it, we can help asap! Our Technicians also can loop in our affiliates at any Seed 2 Sale Software company to get issues resolved ASAP!
Security & Surveillance Instant Accessibility Get CCD Compliant and Commercial Grade Security/Surveillance Systems! Daedalus Teks partners not just with Hikvision but Vitek to ensure any investment is secure! We also offer magnetic locks, alarms and more. Contact us to schedule a quote and walk through!
Dispensary Hardware Cultivation, Dispensary, Manufacturer Daedalus teks can tailor hardware packages to suit any companies needs. We carry everything including but not limited to; Computer systems, Cash Registers, Point of Sales systems, Scales, Handscanners, Reciept Printers and more!

Our Services

Apple Repair

Have a bad Apple? Perhaps a broken screen? Or maybe it's just running slow. Our technicians can help with any Apple product. Have an Apple that won't accept the new OS? Install Windows instead of throwing it away and have a backup computer!

In Home/Business

Don't want to deal with those pesky wires? To many peripherals to disconnect? Or maybe you just don't want to carry around a computer. No worries, our technicians offer onsite support in your home or business!

PC/Windows Repair

Have a custom built computer that needs service? Our technicians are experienced with all versions of Windows including Server! Call today for support!

Network Support

Missing network drops in an office? Our staff can help! Need help segregating networks, data shares and assistance with weak WiFi signals? We have you covered! Our technicians can handle network deployments, repairs, security checks and even custom firewalls!

Server Support

Daedalus teks can assist in any server environment. From a new fresh server deployment to an existing domain server. We can assist with Active Directory mananagement, workstaton administration and so much more!

Website Design

Our staff can help design a website to suit your needs and include a content management system that allows clients to update their own sites! We also offer; domain registration, eCommerce site setup, email hosting, SEO management, website hosting and so much more!

About Our Company

Daedalus teks has been providing IT Support services for businesses in the Albuquerque area for the past 10 years. Recently, our staff has opened a public retail location at 4011 Menaul Blvd. NE in Albuquerque, NM to provide the same quality service to the public!.

Finally, any one can get the IT support they deserve. Daedalus Teks offers; Computer Repair, Custom PC Builds, Data Recovery, Laptop Repair, Password removal, Network Support, Server Manangment/Support and even Web Design! Our staff are technicians that have worked for the most popular PC repair shops in town! So come on in and let us help you with any of your IT needs!

Client Testimonials

Dave Turner Organtica Management Group Cesar is my go to guy for all things IT related. He is direct, dependable, knowledgeable, and cost effective. Five Star customer service too!
Brooke D. Natural RX Nothing but quality service coming from Cesar and his company. He helped me set up my remote connect so that I can work from where ever I need. He's always just a call away when my company needs him. Very Thankful for them.
Chris Cecil ABQ Back Neck and Pain Center They have done a great job for me. "All our patient data wasn't viewable after our system crashed, their techs helped recover everything as quick as possible and upgrade everything they could". I recommend them highly..
Cory F. Comfort Dental Cesar has been our Tech Support for about the past two weeks and everything has worked great! He is very knowledgeable and takes the time to explain what work is needed and how it has been fixed. He is always very personable and has taken the time to help us update our computers to make our office run more efficiently. I recommend him to any company or anybody who needs assistance with there computer, website, network and camera systems.

Security Inspector 2010 is a rogue anti-spyware program that is installed via malware without your permission or knowledge. So be careful people because once it is installed it will be configured to start whenever you login to Windows.  With your Startup Infected this virus could cause multiple issues with your operating system if not treated immediately. When the Virus starts it will scan your system, prompted that the scan is finished it will state that your computer has numerous amount of virus/malware infections. It will not, though, allow you to remove any of these so-called infections until you first purchase the program. As the detected infections are all fake, you should not purchase the program.  Security Inspector 2010 is constantly running and it will also display numerous nag screens and alerts that are designed to make you think your system has a major security issue. These alerts will be shown quite often and will require you to navigate with full attention and all other programs inaccessible through numerous screens before finally closing. Examples of some of the fake security alerts you will encounter while Antivirus Studio is running are:

Warning!

Your computer is being used as spamming machine. You can get sued for spam.

Your computer WILL BE DISCONNECTED FORM INTERNET BECAUSE SPAMMING OTHER PCs

Antivirus Studio Agent

The antivirus database has become outdated and should be updated now. Click on this message to receive the latest antivirus updates.

Program <insert filename here> is infected with virus Generic Dropper.js. Continue running this program may be dangerous to your system and personal data. Running this program can lead to permanent data loss and program instability. Would you like to disinfect this program with antivirus?

 

Your system might be at risk

Antivirus detects viruses, worms, and Trojan horses. They can (and do) destroy data, format your hard disk or can destroy the BIOS. By destroying the BIOS many times you end up buying a new motherboard or if the bios chip is removable then that chip would need replacing.

 

Just like the fake alerts, scans, virus, and scan results, these security alerts are all fake and should be completely ignored.

 

When infected with Security Inspector 2010 your Internet Explorer web browser will also be hijacked to randomly display warnings and infection messages instead the actual web page that you requested. The text of the message is:

 

Reported Insecure Browsing: Navigation Blocked

Insecure Internet Activity. Threat of virus attack

Due to insecure Internet browsing your PC can easily get infected with viruses, worms, and trojans without your knowledge, and that can lead to system slowdown, freezes and crashes. Also insecure Internet activity can result in revealing your personal information.

This is just another scare tactic being used by the virus program in question and can be completely ignored.

 

Obviously, Security Inspector 2010 uses scare tactics to get a general computer user into thinking that they have a critical system security problem so that you will purchase the fake program. It goes without having to elaborate any further that you should definitely not purchase Security Inspector 2010 and if you already have, please contact your credit card company and state that the program is a system infection and a scam and hat you would like to dispute the charge. Once the important things are done take a picture of your infected system for our site so we can post it on the wall of shame. 

 

Associated Security Inspector 2010 Files:

%Temp%\_2.tmp

%UserProfile%\Application Data\Microsoft\Internet Explorer\Quick Launch\Security Inspector 2010.lnk

%UserProfile%\Application Data\Security Inspector 2010\

%UserProfile%\Application Data\Security Inspector 2010\Security_Inspector_2010.exe

%UserProfile%\Application Data\Security Inspector 2010\securitycenter.exe

%UserProfile%\Application Data\Security Inspector 2010\securityhelper.exe

%UserProfile%\Application Data\Security Inspector 2010\taskmgr.dll

%UserProfile%\Start Menu\Programs\Security Inspector 2010.lnk

%UserProfile%\Start Menu\Programs\Security Inspector 2010\

%UserProfile%\Start Menu\Programs\Security Inspector 2010\Activate Security Inspector 2010.lnk

%UserProfile%\Start Menu\Programs\Security Inspector 2010\Help Security Inspector 2010.lnk

%UserProfile%\Start Menu\Programs\Security Inspector 2010\How to Activate Security Inspector 2010.lnk

%UserProfile%\Start Menu\Programs\Security Inspector 2010\Security Inspector 2010.lnk

File Location Notes:

 

%UserProfile% refers to the current user's profile folder. By default, this is C:\Documents and Settings\ for Windows 2000/XP, C:\Users\ for Windows Vista/7, and c:\winnt\profiles\ for Windows NT.

 

%Temp% refers to the Windows Temp folder. By default, this is C:\Windows\Temp for Windows 95/98/ME, C:\DOCUMENTS AND SETTINGS\ProfileName\LOCAL SETTINGS\Temp for Windows 2000/XP, and C:\Users\ProfileName\AppData\Local\Temp for Windows Vista and Windows 7. 

 

 

 

Associated Security Inspector 2010 Windows Registry Information:

 

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Security Inspector 2010

HKEY_CURRENT_USER\Software\Security Inspector 2010

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "2kowmeuswvw3"

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "Security Inspector 2010"

HKCU\..\Run: [2kowmeuswvw3] C:\Documents and Settings\Bleeping\Desktop\securetystudio\securetystudio.exe

HKCU\..\Run: [Security Inspector 2010] "C:\Documents and Settings\Bleeping\Application Data\Security Inspector 2010\Security_Inspector_2010.exe" /STARTUP

 

 

 

Learn More About Us

Let us help you make you make your business a success
Our staff can provide services to help any business succeed in the digital world. Daedalus Teks can provide businesses with; data backup & mangement, inventory and sales systems, network deployment, server deployment, search engine optimization (bing, duckduckgo, google and even yahoo), technical support, third party software support and web design!


Cloud Solutions Cloud solutions availble.
Customer Support Is a; call, chat, email or text away.
Onsite Service At home or at work, we can help.
Custom Support For 3rd party applications (MS Office, Quickbooks, Biotrack and etc).
Successful Starts 523
Clients Helped 213
Projects Completed 587
Hours of Work 4715

CISPA, it came back with a vengeance

Original Article By Cesar Garcia

Sources from CNET, ZDnet, etc.

For the past couple years the United States has been attempting to pass the CISPA bill which will authorize sharing of Internet traffic information between the U.S. government and certain technology and manufacturing companies such as; Google, Facebook, Twitter, Microsoft and Myspace. Some individuals saw CISPA as a second attempt at strengthening digital piracy laws after the Stop Online Piracy Act met huge opposition. CISPA will hit the floor either Today or Tomorrow, this bill has been so controversial yet no one understands why? Many Others are unaware of what's going on, So lets break it down:

  1. For those out of touch with current events concerning this, CISPA will allow private sector firms to search personal and sensitive user data of ordinary U.S. residents to identify so-called "threat information". Once identified this information will be shared other firms and the US government — without the need for a court-ordered warrant.

CISPA is controversial because it overrules all existing federal and state laws by saying: "Notwithstanding any other provision 

 

of law," companies may share information "with any other entity, including the federal government." It would not, however, require them to do so.

That language has alarmed dozens of advocacy groups, including the American Library Association, the American Civil Liberties Union, the Electronic Frontier Foundation and Reporters Without Borders. In turn they sent a letter (PDF Provided below) to Congress last month opposing CISPA. It says: "CISPA's information sharing regime allows the transfer of vast amounts of data, including sensitive information like Internet records or the content of e-mails, to any agency in the government."

  1. Under a new amendment voted on earlier today in the U.S. House, U.S. companies would have been able to keep their privacy policies intact and their promises valid, including terms of service, legally enforceable in the future. 

Rep. Pete Sessions (R-TX), who chairs the House Rules Committee, urged his colleagues to reject the amendment and in turn his colleagues did. All Republican members of the committee voted against the amendment despite a unanimous show of support from the Democratic membership.

Yet Republicans failed to get the amendment through by a 5-8 vote. This amendment would have weakened CISPA's position. Now it allows these private firms watertight legal immunity under CISPA to share their customer and user data with other firms as well as the U.S. government, by being "completely exonerated from any risk of liability," according to Rep. Jared Polis (D-CO). Now private sector firms have the right to hand over private user data, while circumventing existing privacy laws. Data such as; emails, text messages, cloud-stored documents and files, with the U.S. government, its law enforcement and intelligence agencies.

"We're disappointed that such a commonsense reform won't even get a vote, When Americans sign up for service with their phone company or their Internet provider they should be entitled to the privacy protections that the companies promise them. Giving companies legal cover to break their contracts with consumers is bad policy and a disservice to the American people." Will Adams, a spokesman for Rep. Justin Amash, a Michigan Republican who co-sponsored the amendment, told CNET earlier this evening. 

Hits: 1794

Read More

Security Shield, Made out of BS!

What this infection does:

Security Shield is a rogue spyware infection that is a variant of Security Tool. This rogue is installed through; other malware, fake online programs claiming that they are anti-malware scanners or prompt that your system is infected. Once installed, on your system Security Shield will be configured to start automatically when Windows starts. Once started, it will perform a scan of your computer and state that there are numerous infections present on your computer. If you attempt, though, to remove any of these so-called infections the program will state that you first need to purchase it. In reality, all of the files it states are infections are legitimate Windows files. Therefore, do not manually delete any of the files it states are infections as you may cause Windows to not operate correctly. The following images will have indicators pointing out how far the creators of this virus went to make it seem real.

 In order to protect itself, Security Shield will terminate almost all processes that you start. It does this so that you cannot launch any security programs that may have the ability to remove the infection. The message that you will see when you attempt run a program is similar to the one below:

Security Shield "cmd.exe" is infected with "Worm.Win32.Autorun.bnb". Do you want to register your copy and remove all threats now?

Just like the scan results, this infection warning is fake and should be ignored.

Hits: 1460

Read More

A Laptop Infected With A Virus Before You've Even Turned It On

 

WASHINGTON (AP) — A customer in Shenzhen, China, took a brand new laptop out of its box and booted it up for the first time. But as the screen lit up, the computer began taking on a life of its own. The machine, triggered by a virus hidden in its hard drive, began searching across the Internet for another computer.

The laptop, supposedly in pristine, super-fast, direct-from-the-factory condition, had instantly become part of an illegal, global network capable of attacking websites, looting bank accounts and stealing personal data.

For years, online investigators have warned consumers about the dangers of opening or downloading files emailed to them from unknown or suspicious sources. Now, they say malicious software and 
computer code could be lurking on computers before the bubble wrap even comes off.

The shopper in this case was part of a team of Microsoft researchers in China investigating the sale of counterfeit software. They suddenly had been introduced to a malware called Nitol. The incident was revealed in court documents unsealed Thursday in a federal court in Virginia. The records describe a new front in a legal campaign against cybercrime being waged by the maker of the Windows operating system, which is the biggest target for viruses.

Hits: 1241

Read More

Be Careful of what you share, especially with Facebook Home Coming around.

Facebook Home is now available for (some) Android devices, aside from its launch device, the HTC First. It is easy to understand this direction that Facebook has chosen to take. There are many users who would find something like Facebook Home useful and would like it: people who use their mobile devices primarily to connect with their Friends and share likes, updates, photos, and other such social activities.

 

However, people are becoming genuinely concerned about how much of our data is ending up in the hands of Internet companies. Facebook Home doesn’t collect new types of information that existing apps already don’t, as their officials went at some length to explain. The concern though is that they said nothing about the quantity of data that will be gathered. This in and of itself is of great value to Facebook; increasing the amount of data to correlate can only “improve” what Facebook knows about its users.

What we would suggest is for people to be genuinely mindful and thoughtful about what they do share online. Do you really have to share that photo? Do you really want to send this status update out into the public, where future friends, partners, and employers will be able to find it down the road? A good way to moderate the sharing of information is through privacy scanners, (which is offered for free in Google Play, and is a built-in feature in Trend Micro™ Titanium™ Security) but of course the users’ mindset would play a crucial part.

Hits: 1685

Read More

Our Location

Daedalus Teks is conveniently located on Menaul, right next door to Organtica. Our normal business hours are; Mon - Fri: 9:30A.M - 5:30P.M & weekends are onsite appointment day's only.

Contact Us Today
Daedalus Teks 4011 Menaul Blvd. NE
Albuquerque, NM 87110
USA 505-289-0522