Start a business/dispensary off right with our support. Contact us today. Contact Us
images/top9.jpg


Biotrack's #1 Recommended Hardware & Support Solution Provider!

Our techs are on call 24x7 - 365 to ensure dispensaries are provided I.T. Support from Seed to Sale.
Managed IT Services On Call 24x7 - 365 Get our entire staff of dedicated IT support technicians for less than the price of a dedicated employee on payroll. Our managed IT solutions provides; monitored enterprise level antivirus, anti-malware, threat detection and health monitoring. On call Support, AM, PM or Holiday's we're there!
Seed 2 Sale Software Support Support ASAP Biotrack, Cova, Dutchie, MJ Freeway the list goes on and we support them all! If they're support team isn't cutting it, we can help asap! Our Technicians also can loop in our affiliates at any Seed 2 Sale Software company to get issues resolved ASAP!
Security & Surveillance Instant Accessibility Get CCD Compliant and Commercial Grade Security/Surveillance Systems! Daedalus Teks partners not just with Hikvision but Vitek to ensure any investment is secure! We also offer magnetic locks, alarms and more. Contact us to schedule a quote and walk through!
Dispensary Hardware Cultivation, Dispensary, Manufacturer Daedalus teks can tailor hardware packages to suit any companies needs. We carry everything including but not limited to; Computer systems, Cash Registers, Point of Sales systems, Scales, Handscanners, Reciept Printers and more!

Our Services

Apple Repair

Have a bad Apple? Perhaps a broken screen? Or maybe it's just running slow. Our technicians can help with any Apple product. Have an Apple that won't accept the new OS? Install Windows instead of throwing it away and have a backup computer!

In Home/Business

Don't want to deal with those pesky wires? To many peripherals to disconnect? Or maybe you just don't want to carry around a computer. No worries, our technicians offer onsite support in your home or business!

PC/Windows Repair

Have a custom built computer that needs service? Our technicians are experienced with all versions of Windows including Server! Call today for support!

Network Support

Missing network drops in an office? Our staff can help! Need help segregating networks, data shares and assistance with weak WiFi signals? We have you covered! Our technicians can handle network deployments, repairs, security checks and even custom firewalls!

Server Support

Daedalus teks can assist in any server environment. From a new fresh server deployment to an existing domain server. We can assist with Active Directory mananagement, workstaton administration and so much more!

Website Design

Our staff can help design a website to suit your needs and include a content management system that allows clients to update their own sites! We also offer; domain registration, eCommerce site setup, email hosting, SEO management, website hosting and so much more!

About Our Company

Daedalus teks has been providing IT Support services for businesses in the Albuquerque area for the past 10 years. Recently, our staff has opened a public retail location at 4011 Menaul Blvd. NE in Albuquerque, NM to provide the same quality service to the public!.

Finally, any one can get the IT support they deserve. Daedalus Teks offers; Computer Repair, Custom PC Builds, Data Recovery, Laptop Repair, Password removal, Network Support, Server Manangment/Support and even Web Design! Our staff are technicians that have worked for the most popular PC repair shops in town! So come on in and let us help you with any of your IT needs!

Client Testimonials

Dave Turner Organtica Management Group Cesar is my go to guy for all things IT related. He is direct, dependable, knowledgeable, and cost effective. Five Star customer service too!
Brooke D. Natural RX Nothing but quality service coming from Cesar and his company. He helped me set up my remote connect so that I can work from where ever I need. He's always just a call away when my company needs him. Very Thankful for them.
Chris Cecil ABQ Back Neck and Pain Center They have done a great job for me. "All our patient data wasn't viewable after our system crashed, their techs helped recover everything as quick as possible and upgrade everything they could". I recommend them highly..
Cory F. Comfort Dental Cesar has been our Tech Support for about the past two weeks and everything has worked great! He is very knowledgeable and takes the time to explain what work is needed and how it has been fixed. He is always very personable and has taken the time to help us update our computers to make our office run more efficiently. I recommend him to any company or anybody who needs assistance with there computer, website, network and camera systems.

How to report a computer crime: Fake anti-virus

by Bob Burls  @ Naked Security on December 7, 2012  

Do you know how to report a computer crime? Or even who you would report it to?

 

So far, we have looked at phishing and SQL injection attacks, trolling, unauthorised email account access and malware in our series of articles on how to report a computer crime. In this article, we'll look at fake anti-virus.

We'll look at what offences are committed in different countries when a crime like this happens, how you should report the crime,
and what evidence you can preserve that might help in the subsequent investigation.

Take this scenario: 

Peter is browsing the internet at home using his PC and lands on an adult content web portal. He sees a hyperlink offering to download an X-rated movie. Peter downloads the file.

 Peter has the option “Hide extensions for known file types” selected in the folder option of his user account settings, so he is not aware of the fact that the file he has downloaded is in fact an executable file and not the AVI file it is masquerading as.

Peter runs the file and nothing appears to happen. He attempts to access Windows Task Manager but he finds he is unable to. After about two minutes, the icons on Peter's desktop disappear and he is presented with a scrolling window that appears to be scanning the contents of his hard drive. Once the scan has finished, Peter is told that his computer is infected with over twenty pieces of malware.

This, of course, isn't the case; Peter is infected with Trojan/FakeAV-GCK which he had downloaded from the web portal.

Peter has an anti-virus application installed, but received no alert at the time of the download because the fake anti-virus malware was a new variant.

Peter telephones the customer support number displayed by the fake anti-virus application and reads out his credit card number to pay for the 'license fee' of 85 pounds. He is given a 'license key' and enters it into the fake anti-virus which then completes its quarantine and cleaning cycles and declares that Peter’s PC is clear of malware. Of course, the real malware is still on his computer.

A day later, the malware is detected by Peter's anti-virus software following a signature update.

The fake anti-virus operation, including the call centre processing the fraudulent payments, is part of the activity of an online criminal group. The cybercriminals' intention is to infect as many computers as possible in order to generate money by tricking their victims into believing they were infected with multiple instances of malware.

 

What are the offences?

 

In this scenario, two primary offences have taken place which can be broken down like this:

Firstly, the cybercriminals performed an unauthorised modification in relation to a computer.Image Provided by Naked Security

It is unauthorised because they did not have permission to install the malware on Peter’s computer. He believed he was running a movie file and had he known the full circumstances he would not have consented to the cybercriminal’s action.

The cybercriminals knew that this activity was unauthorised. They intended to impair his computer by preventing access to the Task Manager, and then falsely reporting the PC was infected.

Secondly, the cybercriminals committed a fraud by false representation.

Peter has been tricked into believing his computer is riddled with malware. As a result of that deception, he made a payment unwittingly to the cybercriminals in the belief it would resolve the malware infections. 

 

The legal bit

 

We've focused on the UK, USA, Canada and Australia, but each country has its own legislation, though the relevant statute often exists to accommodate the same offences in each country. 

 

UK

 

In the UK, most computer crime falls under offences covered by one of three pieces of law:

·         Computer Misuse Act 1990

·         Communications Act 2003

·         Fraud Act 2006

Other associated crimes could include Conspiracy or Money Laundering offences, but victims of computer crime are more often than not affected by at least one of the three acts listed above.

In this case, the cybercriminals commit two offences. The first, Unauthorised Acts with Intent to Impair, contrary to Section 3 of the Computer Misuse Act 1990, is committed when an offender modifies a computer with intent to impair the functionality of that computer.

The second, Fraud by False Representation, contrary to Section 2 of the Fraud Act 2006, is committed when Peter is tricked into believing his computer is infected.

Image Provided by Naked Security

In this instance, false representation is made both with and without human intervention. The call centre operator takes part in
the deception and the malware falsely indicates that the computer is infected. The false representation may be express or implied.

 

USA

 

In the USA, most cybercrime offences are covered by Title 18, United States Code (USC) Section 1030 – Fraud and related activity in connection with computers.

This is what the cybercriminals contravened when they disseminated the malware.

 

Canada

 

The Criminal Code of Canada contains sections that specifically cater for cybercrime, including:

·         Unauthorised Use of Computer

·         Possession of Device to Obtain Computer

·         Mischief in Relation to Data

·         Identity Theft and Identity Fraud

In this case, both Section 342.1 Canadian Criminal Code (CCC) - Unauthorised Use of a Computer - and Section 430(1.1) CCC - Mischief in Relation to Data (damaging data) - were contravened.

 

Australia

 

Both state laws and commonwealth laws exist in Australia. In South Australia, the investigation of cybercrime by police is classified under three tiers and is spread across the organisation depending, mainly, on severity.

The primary legislation for computer offences is the Summary Offences Act, 1953 (SOA) and the Criminal Law Consolidation Act, 1935 (CLCA).

In this scenario offences falling within Section 86 CLCA were committed.

 

Reporting the crime

 

UK

 

In the UK, when a crime has taken place it should be reported to the police, so Peter should immediately report it at the local police station.

A crime allegation may be investigated by a police force or may be referred to the Police Central e-Crime Unit (PCeU) which provides the UK's investigative response to the most serious incidents of cybercrime. The PCeU requests that the routine reporting of computer crime offences are not made directly to them.

There is also an alternative reporting body for internet-enabled crime: Action Fraud.

Action Fraud records and passes on crime reports to the National Fraud Intelligence Bureau, who then decides whether the incident requires further investigation, as not all computer crimes are investigated.

 

USAImage Provided by Naked Security

 

The Department of Justice website contains a Computer Crime and Intellectual Property Section with a contact page for reporting incidents to local, state or Federal Law Enforcement Agencies (LEA).

Two Federal LEAs have a remit to investigate some computer crimes:

·         The Federal Bureau of Investigation (FBI)

·         The United States Secret Service (USSS)

In this case the crime should be reported at the FBI Local Office, or US Secret Service or Internet Crime Complaint Centre.

 

Canada

 

The Royal Canadian Mounted Police (RCMP) are the main agency with regard to the investigation of federal statutes, but they also have policing responsibility for a number of the Canadian provinces and all 3 territories, as well as some local police services in towns and cities.

A computer crime victim, like Peter, should report the incident to their local police service. If appropriate, it will be escalated for the attention of the agency with federal responsibility, the RCMP.

 

Australia

 

Peter should report the crime to the Australian State or Territory Police.

Investigation policy differs from state to state but the Australian Federal Police website offers a guide on whether the crime should be reported to either Australian State or Territory Police.

 

Preserving the evidence

 

Peter may want to consider preserving the fake anti-virus alert by taking a screenshot of the PC. If the malware is preventing Peter from doing this, he could take a photograph of the screen. Peter should also write down the telephone number he dialled to make the payment.

Any subsequent genuine anti-virus alerts should also be recorded.

Important: Peter should also immediately inform his bank of the fraudulent activity. The bank may recommend he changes his bank card as he has passed its details over to criminals.

Peter should also ask his bank to preserve all account information relating to the fraudulent transaction, and tell them that the matter has been reported to the authorities.

Finally, Peter should keep all of his own personal bank correspondence connected to the incident.

 

Remediation

 

Peter should run a malware removal tool to identify and clean up the infection. (Sophos has a free Virus Removal Tool which does just this.)

As the effects of different kinds of malware vary considerably, Peter should also talk to his anti-virus vendor for advice on any other remediation he should perform which is particular to the kind of malware he has.

In future, Peter should always exercise caution when running programs downloaded from the internet, verifying by comparing checksums if they are available.

He should make sure his anti-virus signatures are kept up to date, and that his operating system and applications are patched.

Peter should also modify the folder options on his computer to display file suffixes. Malware authors often take advantage of the fact that hidden file extensions can cloak the true nature of the file displayed. Below are two screen shots of genuine fake anti-virus - one shows the file with its extension hidden and the other shows the file with the extension displayed, revealing the file is in fact an executable.

Image Provided by Naked Security

To make sure file extensions aren't hidden, Peter will need to make a change to his Folder Options. How you do this varies by system, but in general the “Hide extensions for known file types” box should be unchecked.

 

You can do this in XP like this: 

 

 

 

Or Windows 7 like this:

 

 

Conclusion

 

In general, it's important that all computer crime is reported. Even if no investigation follows, crime report intelligence can be built up and an accurate picture of the levels of computer crime can be produced. 

If victims of a particular crime do not come forward to report incidents, then the number stated in crime reporting statistics will be not be a true reflection of the number of crimes taking place.

The scenario above is given as an example to help you in understanding when and what offences have taken place. Please be reminded that no two situations are the same and we have not catered for the “what if” situation.

We have also not included any corporation’s AUP (Acceptable Use Policy) that may be in place and may have been breached.

All of the scenarios are made up and the characters depicted bear no resemblance to any person.

 

Acknowledgements

 

Daedalus wants every reader to know that most of these articles are written by 3rd party sites/entities. We select these articles in hopes to bring awareness to the general public about the I.T. World. We gratefully appreciate these sits for providing this information and Daedalus does not claim publishing rights or claim to be authors of these articles. We hope you enjoy. 

  • This article was provided by Naked Security gratefully acknowledges the assistance of the following organisations in preparation of this series of articles:
  • UK Police Central e-Crime Unit
  • Action Fraud
  • United States Federal Bureau of Investigation
  • United States Secret Service
  • Royal Canadian Mounted Police
  • South Australia Police

Learn More About Us

Let us help you make you make your business a success
Our staff can provide services to help any business succeed in the digital world. Daedalus Teks can provide businesses with; data backup & mangement, inventory and sales systems, network deployment, server deployment, search engine optimization (bing, duckduckgo, google and even yahoo), technical support, third party software support and web design!


Cloud Solutions Cloud solutions availble.
Customer Support Is a; call, chat, email or text away.
Onsite Service At home or at work, we can help.
Custom Support For 3rd party applications (MS Office, Quickbooks, Biotrack and etc).
Successful Starts 523
Clients Helped 213
Projects Completed 587
Hours of Work 4715

How to report a computer crime: malware by email

by Bob Burls @ Naked Security By Sophos

Do you know how to report a computer crime? Or even who you would report it to?

We looked at unauthorised email account access in the first of our series of articles on how to report a computer crime. Now we turn our heads to malware by email.

We'll look at what offences are committed in different countries when a crime like this happens, how you should report the crime, and what evidence you can preserve.

 

Hits: 2135

Read More

How to report a computer crime: Fake anti-virus

How to report a computer crime: Fake anti-virus

by Bob Burls  @ Naked Security on December 7, 2012  

Do you know how to report a computer crime? Or even who you would report it to?

 

So far, we have looked at phishing and SQL injection attacks, trolling, unauthorised email account access and malware in our series of articles on how to report a computer crime. In this article, we'll look at fake anti-virus.

We'll look at what offences are committed in different countries when a crime like this happens, how you should report the crime,
and what evidence you can preserve that might help in the subsequent investigation.

Take this scenario: 

Peter is browsing the internet at home using his PC and lands on an adult content web portal. He sees a hyperlink offering to download an X-rated movie. Peter downloads the file.

Hits: 2206

Read More

What is Thermal Paste/Grease/Heatsink Compound etc? And what does it do?

Thermal grease (also called thermal gel, thermal compound, thermal paste, heat paste, heat sink paste or heat sink compound) is a viscous fluid substance, originally with properties akin to grease, which increases the thermal conductivity of a thermal interface by filling microscopic air-gaps present due to the imperfectly flat and smooth surfaces of the components; the compound has far greater thermal conductivity than air (but far less than metal). In electronics, it is often used to aid a component's thermal dissipation via a heat sink.

Hits: 4678

Read More

What is a Motherboard

A motherboard (sometimes alternatively known as the; mainboard, system board, planar board, logic board, or colloquially a
mobo) is a printed circuit board (PCB) found in all modern computers which holds many of the crucial components of the system, such as the central processing unit (CPU) and memory, and provides connectors for other peripherals.

Motherboard specifically refers to a PCB with expansion capability - the board is the "mother" of all components attached to it which often include; sound cards, video cards, network cards, hard drives, other forms of persistent storage, TV tuner cards, USB expansion cards, Firewire expansion cards and a variety of other custom components. (The term mainboard is applied to devices with a single board and no additional expansions or capability - in modern terms this would include controlling boards in televisions, washing machines and other embedded systems, which are not true motherboards.

CPU socket

A CPU socket or slot is an electrical component that attaches to a printed circuit board (PCB) and is designed to house a CPU (also called a microprocessor). It is a special type of integrated circuit socket designed for very high pin counts. A CPU socket provides many functions, including a physical structure to support the CPU, support for a heat sink, facilitating replacement (as well as reducing cost), and most importantly, forming an electrical interface both with the CPU and the PCB. CPU sockets on the motherboard can most often be found in most desktop and server computers (laptops typically use surface mount CPUs), particularly those based on the Intel x86 architecture. A CPU socket type and motherboard chipset must support the CPU series and speed.

Peripheral card slots

A standard ATX motherboard will typically have; two or three PCI-E 16x connection for a graphics card, one to two legacy PCI slots for various expansion cards and one or two PCI-E 1x (which has superseded PCI). A standard EATX motherboard will have two to four PCI-Express 16x connection for graphics cards, and a varying number of PCI and PCI-E 1x slots. It can sometimes also have a PCI-E 4x slot. (This varies between brands and models.)

Some motherboards have two or more PCI-E 16x slots, to allow more than 2 monitors without special hardware, or use a special graphics technology called SLI (for Nvidia) and Crossfire (for ATI). These allow 2 to 4 graphics cards to be linked together, to allow better performance in intensive graphical computing tasks, such as gaming, video editing, etc.

Temperature and reliability

A microATX motherboard with some faulty capacitors

Motherboards are generally air cooled with heat sinks often mounted on larger chips, such as the Northbridge, in modern motherboards. Insufficient or improper cooling can cause damage to the internal components of the computer and cause it to crash. Passive cooling, or a single fan mounted on the power supply, was sufficient for many desktop computer CPUs until the late 1990s; since then, most have required CPU fans mounted on their heat sinks, due to rising clock speeds and power consumption. Most motherboards have connectors for additional case fans as well. Newer motherboards have integrated temperature sensors to detect motherboard and CPU temperatures, and controllable fan connectors which the BIOS or operating system can use to regulate fan speed. Some computers (which typically have high-performance microprocessors, large amounts of RAM, and high-performance video cards) use a water-cooling system instead of many fans.

Some small form factor computers and home theater PCs designed for quiet and energy-efficient operation boast fan-less designs. This typically requires the use of a low-power CPU, as well as careful layout of the motherboard and other components to allow for heat sink placement.

Blown Capacitor/Capacitor Plague

A 2003 study found that some spurious computer crashes and general reliability issues, ranging from screen image distortions to I/O read/write errors, can be attributed not to software or peripheral hardware but to aging capacitors on PC motherboards. Ultimately this was shown to be the result of a faulty electrolyte formulation and the issue was named the capacitor plague.

Motherboards use electrolytic capacitors to filter the DC power distributed around the board. These capacitors age at a temperature-dependent rate, as their water based electrolytes slowly evaporate. This can lead to loss of capacitance and subsequent motherboard malfunctions due to voltage instabilities. While most capacitors are rated for 2000 hours of operation at 105 °C (221 °F), their expected design life roughly doubles for every 10 °C (50 °F) below this. At 45 °C (113 °F) a lifetime of 15 years can be expected. This appears reasonable for a computer motherboard. However, many manufacturers have delivered substandard capacitors, which significantly reduce life expectancy. Inadequate case cooling and elevated temperatures easily exacerbate this problem. It is possible, but tedious and time-consuming, to find and replace failed capacitors on Personal Computer (PC) motherboards.

Form factor

Motherboards are produced in a variety of sizes and shapes called computer form factor, some of which are specific to individual computer manufacturers. However, the motherboards used in IBM-compatible systems are designed to fit various case sizes. As of 2007, most desktop computer motherboards use the ATX standard form factor — even those found in Macintosh and Sun computers, which have not been built from commodity components. A case's motherboard and PSU form factor must all match, though some smaller form factor motherboards of the same family will fit larger cases. For example, an ATX case will usually accommodate a microATX motherboard.

Laptop computers generally use highly integrated, miniaturized and customized motherboards. This is one of the reasons that laptop computers are difficult to upgrade and expensive to repair. Often the failure of one laptop component requires the replacement of the entire motherboard, which is usually more expensive than a desktop motherboard due to the large number of integrated components.

Hits: 3576

Our Location

Daedalus Teks is conveniently located on Menaul, right next door to Organtica. Our normal business hours are; Mon - Fri: 9:30A.M - 5:30P.M & weekends are onsite appointment day's only.

Contact Us Today
Daedalus Teks 4011 Menaul Blvd. NE
Albuquerque, NM 87110
USA 505-289-0522