Start a business/dispensary off right with our support. Contact us today. Contact Us
images/top9.jpg


Biotrack's #1 Recommended Hardware & Support Solution Provider!

Our techs are on call 24x7 - 365 to ensure dispensaries are provided I.T. Support from Seed to Sale.
Managed IT Services On Call 24x7 - 365 Get our entire staff of dedicated IT support technicians for less than the price of a dedicated employee on payroll. Our managed IT solutions provides; monitored enterprise level antivirus, anti-malware, threat detection and health monitoring. On call Support, AM, PM or Holiday's we're there!
Seed 2 Sale Software Support Support ASAP Biotrack, Cova, Dutchie, MJ Freeway the list goes on and we support them all! If they're support team isn't cutting it, we can help asap! Our Technicians also can loop in our affiliates at any Seed 2 Sale Software company to get issues resolved ASAP!
Security & Surveillance Instant Accessibility Get CCD Compliant and Commercial Grade Security/Surveillance Systems! Daedalus Teks partners not just with Hikvision but Vitek to ensure any investment is secure! We also offer magnetic locks, alarms and more. Contact us to schedule a quote and walk through!
Dispensary Hardware Cultivation, Dispensary, Manufacturer Daedalus teks can tailor hardware packages to suit any companies needs. We carry everything including but not limited to; Computer systems, Cash Registers, Point of Sales systems, Scales, Handscanners, Reciept Printers and more!

Our Services

Apple Repair

Have a bad Apple? Perhaps a broken screen? Or maybe it's just running slow. Our technicians can help with any Apple product. Have an Apple that won't accept the new OS? Install Windows instead of throwing it away and have a backup computer!

In Home/Business

Don't want to deal with those pesky wires? To many peripherals to disconnect? Or maybe you just don't want to carry around a computer. No worries, our technicians offer onsite support in your home or business!

PC/Windows Repair

Have a custom built computer that needs service? Our technicians are experienced with all versions of Windows including Server! Call today for support!

Network Support

Missing network drops in an office? Our staff can help! Need help segregating networks, data shares and assistance with weak WiFi signals? We have you covered! Our technicians can handle network deployments, repairs, security checks and even custom firewalls!

Server Support

Daedalus teks can assist in any server environment. From a new fresh server deployment to an existing domain server. We can assist with Active Directory mananagement, workstaton administration and so much more!

Website Design

Our staff can help design a website to suit your needs and include a content management system that allows clients to update their own sites! We also offer; domain registration, eCommerce site setup, email hosting, SEO management, website hosting and so much more!

About Our Company

Daedalus teks has been providing IT Support services for businesses in the Albuquerque area for the past 10 years. Recently, our staff has opened a public retail location at 4011 Menaul Blvd. NE in Albuquerque, NM to provide the same quality service to the public!.

Finally, any one can get the IT support they deserve. Daedalus Teks offers; Computer Repair, Custom PC Builds, Data Recovery, Laptop Repair, Password removal, Network Support, Server Manangment/Support and even Web Design! Our staff are technicians that have worked for the most popular PC repair shops in town! So come on in and let us help you with any of your IT needs!

Client Testimonials

Dave Turner Organtica Management Group Cesar is my go to guy for all things IT related. He is direct, dependable, knowledgeable, and cost effective. Five Star customer service too!
Brooke D. Natural RX Nothing but quality service coming from Cesar and his company. He helped me set up my remote connect so that I can work from where ever I need. He's always just a call away when my company needs him. Very Thankful for them.
Chris Cecil ABQ Back Neck and Pain Center They have done a great job for me. "All our patient data wasn't viewable after our system crashed, their techs helped recover everything as quick as possible and upgrade everything they could". I recommend them highly..
Cory F. Comfort Dental Cesar has been our Tech Support for about the past two weeks and everything has worked great! He is very knowledgeable and takes the time to explain what work is needed and how it has been fixed. He is always very personable and has taken the time to help us update our computers to make our office run more efficiently. I recommend him to any company or anybody who needs assistance with there computer, website, network and camera systems.

by Bob Burls @ Naked Security from Sophos on October 31, 2012

Do you know how to report a computer crime? Or even who you would report it to?

 

Well, there is no one size fits all solution - it depends on the individual circumstances and where you are in the world - but we've drawn up some scenarios that are typical of some of the crimes that any computer user, at home or work, might come across.

 

In the first of our series of articles on how to report a computer crime, we'll look at unauthorised email access, what offences are committed when a crime like this happens and how you should report it.

 

 

Take this scenario:

 

  • Abigail is at work. She logs into her personal webmail account during her lunch-break, which she is allowed to do according to her company's computer policy.
  • A friend had advised her to use a complex password for her personal webmail, but she finds it difficult to remember so she has it written down in her diary.
  • Abigail logs out of her personal webmail account and leaves the building to make a private phone call, but doesn't take her diary with her.
  • Barry sits opposite Abigail; he has a secret crush on her. Barry goes to Abigail's desk, searches her diary, finds the webmail account name and password and logs into her webmail account from his smartphone at the office.
  • Barry reads a number of Abigail's previously read personal emails using his mobile, but does not read any unread mail in case Abigail notices someone has accessed her account.
  • Abigail later discovers that someone has read her emails after she checks her email account activity and notices the account has been accessed by a mobile web browser. She suspects it was Barry after he made a comment regarding something she had written in a personal email.

 

What was the offence?

 

We can break it down like this:Image Courtesy of Naked Security From Sophos

  1. Barry deliberately gained access to Abigail’s web-based email account
  2. Barry did not have permission to access the account, nor would he have been given it if Abigail, the genuine account holder, knew what he was doing.
  3. Although Barry did not delete or deliberately alter any data, he has still committed an offence because the access was not authorised

 

The legal bit

We've focused on the UK, USA, Canada and Australia, but each country has its own legislation, though the relevant statute often exists to accommodate the same offences in each country.

 

UK

In the UK, most computer crime falls under offences covered by one of three pieces of law:

  • Computer Misuse Act 1990
  • Communications Act 2003
  • Fraud Act 2006

Other associated crimes could include Conspiracy or Money Laundering offences, but victims of crime are more often than not affected by at least one of the three Acts listed above.

 

In this case, Barry committed an offence of "Unauthorised Access" in contravention of S1 Computer Misuse Act 1990, committed when the offender causes a computer to perform a function intending to secure access (which Barry did when he gained authentication to Abigail's account).

 

Image Courtesy of Naked Security From Sophos

USA

In the USA, most cybercrime offences are covered by Title 18, United States Code (USC) Section 1030 – Fraud and related activity in connection with computers. This is what Barry contravened when he logged into Abigail's account.

 

Canada

The Criminal Code of Canada contains sections that specifically cater for cybercrime, including:

  • Unauthorised Use of Computer
  • Possession of Device to Obtain Computer
  • Mischief in Relation to Data
  • Identity Theft and Identity Fraud

In this case, Barry contravened Section 342.1 Canadian Criminal Code (CCC) - Unauthorised Use of Computer.

 

Australia

Both state laws and commonwealth laws exist in Australia. In South Australia, the investigation of cybercrime by police is classified under three tiers and is spread across the organisation depending, mainly, on severity.

 

The primary legislation for computer offences is the Summary Offences Act, 1953 (SOA) and the Criminal Law Consolidation Act, 1935 (CLCA).

 

In this case, Barry has contravened Section 44, Summary Offences Act.

 

Reporting the crime

 

UKImage Courtesy Of Naked Security From Sophos

 

In the UK, when a crime has taken place it should be reported to the police, so Abigail should go to her local police station to report it.

 

A crime allegation may be investigated by a police force or may be referred to the Police Central e-Crime Unit (PCeU) which provides the UK's investigative response to the most serious incidents of cybercrime. The PCeU requests that the routine reporting of computer crime offences are not made directly to them.

 

There is also an alternative reporting body for internet-enabled crime: Action Fraud.

 

Action Fraud records and passes on crime reports to the National Fraud Intelligence Bureau, who then decides whether the incident requires further investigation, as not all computer crimes are investigated.

 

USA

 

The Department of Justice website contains a Computer Crime and Intellectual Property Section with a contact page for reporting incidents to local, state or Federal Law Enforcement Agencies (LEA).

 

Two Federal LEAs have a remit to investigate some computer crimes:

  • The Federal Bureau of Investigation (FBI)
  • The United States Secret Service (USSS)

In this case Abigail should report the crime at her FBI Local Office, or US Secret Service or Internet Crime Complaint Centre.

 

Canada

The Royal Canadian Mounted Police (RCMP) are the main agency with regard to the investigation of federal statutes but also have policing responsibility for a number of the Canadian provinces and all 3 territories, as well as some local police services in towns and cities.

 

A computer crime victim, like Abigail, should report their incident to their local police service. If appropriate, it will be escalated for the attention of the agency with federal responsibility, the RCMP.

 

Australia

Abigail should report the crime to the Australian State or Territory Police.

 

Investigation policy differs from state to state but the Australian Federal Police website offers a guide on whether the crime should be reported to either Australian State or Territory Police.

 

Preserving the evidence

Image Courtesy Of Naked Security From Sophos

Abigail may want to consider informing her webmail service provider that she has reported the incident to the authorities.

She should also request that they preserve the web access logs so they can be looked at during the investigations.

 

Remediation

Abigail should change her webmail password immediately and use a robust password that she can memorise rather than one which she has to write down. She could also consider using password management software (examples include 1Password, LastPass or KeePass) where she only will need to remember one complicated master password.

 

Conclusion

In general, it's important that all computer crime is reported. Even if no investigation follows, crime report intelligence can be built up and an accurate picture of the levels of computer crime can be produced.

 

If victims of a particular crime do not come forward to report incidents, then the number stated in crime reporting statistics will be not be a true reflection of the number of crimes taking place.

 

The scenario above is given as an example to help you in understanding when and what offences have taken place. Please be reminded that no two situations are the same and we have not catered for the “what if” situation.

 

We have also not included any corporation’s AUP (Acceptable Use Policy) that may be in place and may have been breached.

 

All of the scenarios are made up and the characters depicted bear no resemblance to any person.

Acknowledgements

Daedalus Teks does not take credit for this article, Daedalus Teks shares articles like these in order to make clients more aware of the I.T. Field.  Daedalus Teks gratefully acknowledges the assistance of Naked Security and the following organisations in preparation of this series of articles:

 

  1. UK Police Central e-Crime Unit
  2. Action Fraud
  3. United States Federal Bureau of Investigation
  4. United States Secret Service
  5. Royal Canadian Mounted Police
  6. South Australia Police

Learn More About Us

Let us help you make you make your business a success
Our staff can provide services to help any business succeed in the digital world. Daedalus Teks can provide businesses with; data backup & mangement, inventory and sales systems, network deployment, server deployment, search engine optimization (bing, duckduckgo, google and even yahoo), technical support, third party software support and web design!


Cloud Solutions Cloud solutions availble.
Customer Support Is a; call, chat, email or text away.
Onsite Service At home or at work, we can help.
Custom Support For 3rd party applications (MS Office, Quickbooks, Biotrack and etc).
Successful Starts 523
Clients Helped 213
Projects Completed 587
Hours of Work 4715

How to report a computer crime: Fake anti-virus

How to report a computer crime: Fake anti-virus

by Bob Burls  @ Naked Security on December 7, 2012  

Do you know how to report a computer crime? Or even who you would report it to?

 

So far, we have looked at phishing and SQL injection attacks, trolling, unauthorised email account access and malware in our series of articles on how to report a computer crime. In this article, we'll look at fake anti-virus.

We'll look at what offences are committed in different countries when a crime like this happens, how you should report the crime,
and what evidence you can preserve that might help in the subsequent investigation.

Take this scenario: 

Peter is browsing the internet at home using his PC and lands on an adult content web portal. He sees a hyperlink offering to download an X-rated movie. Peter downloads the file.

Hits: 2205

Read More

How to report a computer crime: SQL injection website attack

 by Bob Burls @ Naked Security from Sophos

Do you know how to report a computer crime? Or even who you would report it
to?

So far, we've looked at unauthorised email account access and malware in our series of articles on how to report a computer crime. In this article, we'll look at an SQL injection attack.

We'll look at what offences are committed in different countries when a crime like this happens, how you should report the crime, and what evidence you can preserve.

Take this scenario:

A company has a web server and associated database configured to serve dynamic content. The company has set up its website insecurely, leaving it vulnerable to input validation attacks.

A cybercriminal has been hired by a competitor of the company to "take the company offline”. The cybercriminal has identified that the company website is susceptible to SQL injection, so performs a series of SQL injection attacks.

This results in the deletion of a number of tables from the database, rendering the company website inoperable.

Hits: 2219

Read More

How to safely browse left handed

Oi, Cesar here and today I’m going to explain how to safely browse through adult material. I’m sure many of you reading are giggling or asking yourself “Who in the heck would write an article like this and much less read it?” Well considering we’re human beings and it’s in our nature to seek and view erotic material I took it upon myself to provide some tips to browse safely. I’d also like to mention that in over 70% of virus infections on a system is due to unsafe browsing. Yes, it seems to be a high number but deep down inside we all know that virtually everyone browses adult sites. I couldn’t count the number of times an individual returned with another virus claiming that it’s our technician’s fault, until a technician analyzes the index.dat file and internet temp directory. Save yourself an embarrassing moment and learn a little something that could help minimize the chance of a virus infection. Trust me if you think its embarrassing reading this or admitting you view adult material imagine how I feel writing an article about it and jumping right into it. This also helps with just browsing in general as well.

Hits: 6772

Read More

What is Thermal Paste/Grease/Heatsink Compound etc? And what does it do?

Thermal grease (also called thermal gel, thermal compound, thermal paste, heat paste, heat sink paste or heat sink compound) is a viscous fluid substance, originally with properties akin to grease, which increases the thermal conductivity of a thermal interface by filling microscopic air-gaps present due to the imperfectly flat and smooth surfaces of the components; the compound has far greater thermal conductivity than air (but far less than metal). In electronics, it is often used to aid a component's thermal dissipation via a heat sink.

Hits: 4678

Read More

Our Location

Daedalus Teks is conveniently located on Menaul, right next door to Organtica. Our normal business hours are; Mon - Fri: 9:30A.M - 5:30P.M & weekends are onsite appointment day's only.

Contact Us Today
Daedalus Teks 4011 Menaul Blvd. NE
Albuquerque, NM 87110
USA 505-289-0522