MITE RADIO 0492 906 469
  • MITE RADIO
  • Volunteer
  • Thank You
  • Blog
  • Programs
    • Making IT Easy with Tony & Kay
    • The Blues Hotel ​with Kelvin Huggins
    • Jazz Fusion with Brett C
    • Pheez Feels
    • Able & Unfiltered
    • Glenn & Tracy's Timeless Tracks
    • Cort In The Morning
    • Hits, Quizzes & Stuff with Harley Buckner
    • Solid Gold Sounds - Chris Pitchford
    • Gordon Cooper (multiple programs)
    • The Vinyl Countdown with Jonathan Charles
    • 50 Years and Rolling with Leo Kirby
    • Soul Vaults with David Southway
    • The Best Disco In Town with Jonathan Charles
    • ABC Oldies - JP McCartney
    • 50 Years of Pop with Peter Kirkpatrick
    • All About The 80s with Rob Charles
    • No More Heroes with Magnus Shaw
    • Classic Chart Rundowns with Dave Marley (multiple programs)
    • US UK Rock Soul Connection
    • Decades Breakfast with Mark Gale
    • Flashback to the 60s with Jim Barrington
    • The Time of Our Musical Life with Geoff Wood
    • Steve Bishops Old Record Club
    • Steve Algar ​(multiple programs)
    • Chris Palin ​(multiple programs)
    • The Peter Nightingale Show
    • Deeper Dimensions with David Dyke
    • Choice Cuts with Kevin Butcher
    • Ken Anton (Multiple Programs)
    • Gary Hopkins (Multiple Programs)
  • WAYS TO LISTEN
Picture
​

click here to listen
​to Mite radio (then click the red play arrow)
An initiative of ​The Stairway Project Inc
Picture

Basic Battery Checker

12/6/2025

0 Comments

 
Few things are more frustrating than a device going dead when you least expect it, especially when you're rummaging through a bag of old batteries, unsure which ones still hold a charge. But what if there was a simple, instant way to tell a live battery from a dead one without needing a tester? According to PCWorld's Australian Editor Dominic Bayley, there is – and it's a neat trick involving a quick drop.
Picture

Bayley, like many of us, recounts the common struggle of cycling through partially used batteries, often storing them for recycling or "just in case." The real headache, he notes, comes when a device unexpectedly dies, forcing a frustrating trial-and-error search for a viable replacement. His solution? A surprisingly effective "bounce test."

Here's how to perform this quick test at home:
​
  1. Find Your Surface: Locate a flat, firm surface. A sturdy table or even a thick book will work as your test platform.
  2. The Drop: Hold the battery (typically an AA or AAA, though the principle applies to others) vertically above the surface.
  3. Release and Observe: Drop the battery straight down onto the surface from a height of approximately 8 inches (about 20cm).

The Key Observation:

The magic lies in how the battery reacts upon impact:
  • A fully charged battery will tend to fall with a duller thud, tipping over and staying put on the surface, or bouncing minimally before settling.
  • A flat or dead battery, however, will often bounce back up a few centimeters or more, indicating it's no longer worth using.

This simple physical reaction provides a quick and clear indicator of a battery's remaining charge, saving precious time and effort. It's a handy piece of everyday science that can help anyone quickly sort through their battery stash, ensuring you grab a good one when you're in a pinch. So next time you're unsure, just drop it and watch.


Ep341
Image created by AI
0 Comments

Bulb Cam

12/6/2025

0 Comments

 
In the ever-expanding universe of smart home security, Wyze has consistently aimed to disrupt the market with affordable, innovative gadgets. Their latest offering, the Wyze Bulb Cam, continues this trend, proposing a remarkably simple yet ingenious concept: transforming any standard light socket into a 2K security camera. Priced at just $50, it certainly catches the eye, but how well does this dual-purpose device truly perform?
Picture

The core appeal of the Wyze Bulb Cam lies in its discreet design and ease of installation. It screws directly into any existing light fixture, instantly providing both illumination and surveillance without the need for additional wiring or complex setups. The camera itself, cleverly positioned below the lightbulb, boasts a 2K resolution and a 160-degree field of view, offering a wide perspective of your chosen space. Even in low-light conditions, the Bulb Cam features color night vision, a significant upgrade from traditional black-and-white infrared, allowing for clearer identification of subjects after dark.

As a smart light, the Bulb Cam is no slouch either, capable of reaching up to 800 lumens and offering customizable dimming options through the Wyze mobile app. This dual functionality means you're not just adding a camera; you're also upgrading your lighting.

​Sounds good, but it is manually adjusted only and will not track movement. There is no AI to distinguish between people, pets and objects, but for $50 it will give you basic camera and local recording so not too bad in my book.

Ep341
Image Source: wyze.com.au
0 Comments

Passkeys Database

12/6/2025

0 Comments

 
Are you ready to try passkeys?

Not heard of them? Where have you been?

For decades, passwords have been the shaky foundation of our digital lives. They're too weak, easily stolen in data breaches, frequently forgotten, and a constant source of online frustration. We've endured endless password resets, complex strength requirements, and the nagging fear of phishing attacks. There is a better way and they’re called Passkeys.
Picture

The benefits are simple: 
​

Phishing Resistant: Passkeys are inherently resistant to phishing. Since you're not typing a password, there's nothing for a fake website to steal. The authentication happens directly between your device and the legitimate service.
Simpler Login: No more typing complicated passwords or struggling with autofill. A quick glance or touch is all it takes.
More Secure: Cryptographic keys are far more robust than even the strongest human-created passwords.
Device-Linked Convenience: Your passkeys are often synced across your devices, making it easy to log in from anywhere you trust.

While passkeys are rapidly gaining traction, they're still a relatively new technology, and not every website or service has implemented them yet. This can leave users wondering: "Where can I actually start ditching my passwords?"

This is where passkeys.directory steps in.

This site helps: 

Discover compatible services: Easily find out which of your favorite apps and websites now offer passkey login.
Learn how to enable passkeys: Many entries on the directory might include quick guides on setting up passkeys for specific services.
Stay updated: As more companies roll out passkey support, the directory will provide a live overview of the expanding ecosystem.

Ep341
Image created by AI
0 Comments

ANZ Plus

12/6/2025

0 Comments

 
Australia and New Zealand Banking Group (ANZ) is set to undergo a significant digital transformation, with an accelerated plan to migrate the bank's 7 million retail customers onto its modern digital platform, ANZ Plus. 

Picture

Launched in 2022, ANZ Plus has already onboarded over one million customers, steadily building out new features and products. A key upcoming innovation for the platform is the rollout of fully password-less web banking, promising a more secure and streamlined online experience.

The ambitious long-term goal is to run the entire retail bank on Plus by 2029, a move that will encompass not only the six million existing ANZ customers but also the 1.2 million customers recently acquired from Suncorp Bank.

For existing ANZ customers, the migration to the Plus platform will be a gradual process over the coming years, though a precise timeline for individual customers has not yet been provided. However, ANZ has reassured customers that vital details such as existing BSB and account numbers, credit card numbers, and direct debits will be retained, aiming for an experience akin to a seamless app upgrade.

ANZ Plus offers a suite of modern banking tools designed to help customers manage their finances more effectively. These include smart saving features like "roundups" (where spare change from transactions is saved) and predictions for upcoming bills, moving towards a more proactive and digitally-driven banking experience.

So if you’re an ANZ customer, be ready for the change.

Ep341
Image created by AI
0 Comments

Portable Airbags

12/6/2025

0 Comments

 
Remember the days when safety gear meant a bicycle helmet or, for the truly daring, elbow pads? Well, move over, humble foam, because the future of personal protection has arrived, and it's… inflatable. We're talking about wearable airbags for humans, a concept that sounds more like a discarded prop from a slapstick comedy.

​
Picture

​Yes, they exist. No, they're not just for stunt performers anymore. Companies are now marketing these sartorial safety bubbles to the general public, promising to cushion your every fall, trip, and potentially, your dignity. Imagine strolling down the street, enjoying a leisurely afternoon, when suddenly, you stumble on a rogue pebble. WHUMPFF! Your stylish new vest (or belt, or even, dare we say, a full-body suit?) instantly inflates, transforming you into a human marshmallow, mid-air.

The official spiel touts "advanced sensors" and "milliseconds-fast deployment," detecting everything from a gentle wobble to a full-blown face-plant. They're primarily aimed at the elderly for fall prevention, or extreme sports enthusiasts who apparently view broken bones as an inconvenient interruption to their adrenaline fixes. But the logical conclusion, as always at
The Tech Absurd, is a world where everyone, from toddlers to octogenarians, is perpetually encased in a pre-inflated cocoon of caution.


Picture this: your morning commute. The bus comes to a sudden stop. Instantly, the entire carriage becomes a sea of rapidly expanding nylon, passengers gently bouncing off each other like human bumper cars. Or a bustling supermarket, where a misplaced banana peel triggers a chain reaction of spontaneous inflation, turning aisle five into an impromptu bouncy castle. The sheer logistics of everyday life become a comedy of errors.


And what about the re-inflation process? Do we carry spare CO2 cartridges in our pockets, ready to re-arm ourselves after every minor mishap? Is there a roadside assistance service for prematurely deployed airbags? The thought of awkwardly waddling to the nearest "re-inflation station" after a minor trip over your own feet is enough to induce a collective sigh of existential defeat.


While the intent is undeniably noble – reducing injuries is a worthy goal – the practical absurdity of ubiquitous wearable airbags is undeniable. We're hurtling towards a future where the fear of a scraped knee or a bruised hip might just outweigh the desire for spontaneous movement. Soon, perhaps, walking will require a pre-flight checklist, and every public space will resemble a giant, human-sized ball pit.


So, the next time you see someone waddling around in what appears to be a personal cloud of inflated fabric, remember: it’s not just about safety. It’s about the hilariously over-protective, utterly absurd direction our technology is taking us. Just try not to laugh too hard; you wouldn't want to trigger their shoulder pads.


Ep340
Image created by AI
0 Comments

Search Google Photos with Words

12/6/2025

0 Comments

 
For anyone (like me) who's ever scrolled endlessly through thousands of digital memories, desperately searching for that one specific photo containing a street name, a recipe, or a crucial piece of information, Google Photos has just delivered a new solution: the ability to search for specific words within their photos using quotation marks.
Picture

This update significantly enhances Google Photos' already powerful search capabilities. While the platform has long used AI to recognize objects and faces, this new functionality allows for much more precise textual searches embedded within the images themselves.

Here's how it works: If you're looking for a photo that contains a particular word, you can now simply type that word enclosed in quotation marks into the Google Photos search bar. For instance, a search for
"passport" will now specifically show you only those photos in your library that visibly contain the word "passport" in them. This cuts down dramatically on irrelevant results, helping you pinpoint exactly what you're looking for with unprecedented speed.


Imagine trying to find a snapshot of a business card, a Wi-Fi password written on a coffee shop wall, or a handwritten note with a specific term. This new exact text search feature turns your photo library into a searchable document, making it far more practical and efficient.


It's important to note that while incredibly powerful, the feature performs best with clear, legible text. It might encounter challenges with highly stylized fonts, words that are partially obscured, or text in certain less common languages. However, for everyday use with clear text, it stands to change how we interact with our vast digital archives.

NOTE: This precise text search feature is rolling out gradually to Google Photos users, so keep checking.

Ep340
Image created by AI
0 Comments

Lock Your Phone

12/6/2025

0 Comments

 
In our hyper-connected world, our smartphones and other personal devices are veritable treasure troves of sensitive information. From banking apps and personal photos to work emails and social media accounts, these gadgets hold the keys to our digital lives. Yet, despite their immense value, a surprisingly high number of people forgo one of the most basic, yet crucial, security measures: a screen lock.
Picture

Whether it's a PIN, password, pattern, fingerprint, or facial recognition, enabling a screen lock on your phone, tablet, or laptop is your first and most essential line of defense against unauthorized access. It’s the digital equivalent of locking your front door; without it, anyone can simply walk in.

The Risks of an Unlocked Device:
​
  • Data Theft and Identity Theft: If your device falls into the wrong hands, whether lost or stolen, an unlocked screen grants immediate access to your entire digital world. This includes personal messages, photos, financial apps, saved passwords, and contact lists. A thief could quickly extract enough information to commit identity theft, access your bank accounts, or impersonate you online.
  • Privacy Compromise: Even if a malicious actor isn't looking for financial gain, an unlocked device exposes your private conversations, Browse history, and personal media to anyone who picks it up. This can lead to embarrassment, blackmail, or simply a profound invasion of privacy.
  • Unauthorized Use: A child could accidentally (or intentionally) make in-app purchases, send inappropriate messages, or access content they shouldn't. In a professional context, sensitive company data could be viewed or even leaked if an unlocked work device is compromised.
  • Malware Installation: With direct access to your device, an attacker could quickly install malicious software, spyware, or ransomware, further compromising your data and device functionality.
  • "Find My Device" Feature Blocked: If your phone is stolen and unlocked, a thief can easily disable features like "Find My Device" or "Erase Device," making it impossible for you to locate or wipe your data remotely.

Choosing the Right Screen Lock:

Modern devices offer various options, each with its own balance of convenience and security:

  • PIN (Personal Identification Number): A classic and reliable choice. Opt for at least 6 digits and avoid obvious sequences like birthdays or "1234."
  • Password: The most secure option, especially if it's long and complex (combining letters, numbers, and symbols). This is ideal for devices that store highly sensitive information.
  • Pattern: While convenient, patterns can sometimes be guessed by observing smudges on the screen. If you use one, make it complex and avoid common shapes.
  • Fingerprint Recognition: Fast and secure, leveraging your unique biometric data. Most modern smartphones offer this.
  • Facial Recognition: Increasingly common, offering quick access. Ensure your device's facial recognition is robust and not easily fooled by photos.

So, make it a habit:


Enabling a screen lock takes mere seconds to set up in your device's security settings. Most devices allow you to choose how quickly the screen locks after inactivity (e.g., immediately, after 30 seconds, 1 minute). For optimal security, set it to lock almost instantly.


In an age where our devices are extensions of ourselves, protecting them is paramount. A simple screen lock isn't just a recommendation; it's a fundamental pillar of personal cybersecurity. Don't leave your digital life exposed – lock it down.


Ep340
Image created by AI
0 Comments

Updated Microsoft Store

12/6/2025

0 Comments

 
Microsoft is rolling out significant updates to its Microsoft Store on Windows, promising a dramatically improved experience for users. You know that little shopping bag icon on the taskbar. The enhancements focus on greater personalization, smarter search capabilities, boosted performance, and a host of new features designed to make discovering and installing apps and games smoother than ever before.

​
Picture

The most noticeable change for many will be the personalised homepage, tailoring content to individual user preferences and habits. Complementing this, the Store's search function has become far more intelligent and intent-aware, leveraging signals like app updates and ratings to deliver more relevant results and better address language-specific nuances. For users in the United States, (and soon to be released everywhere) a standout addition is the integration of Copilot, now accessible directly from product pages to answer questions as you browse.

​Discovery is also getting a major uplift. A new
“Discover More” section on product pages will surface related content, helping users find complementary apps and games. Furthermore, new product page badges will clearly indicate apps boasting AI features and those specifically optimized for the new generation of Copilot+ PCs, making it easier to identify cutting-edge software.


Beyond new features, Microsoft has made substantial strides in
performance and reliability. The Store now launches an impressive two times faster than it did just six months ago, and installation reliability and speed have seen significant improvements. Gamers will particularly appreciate the new ability to install individual components for games, offering greater control over downloads. Everyday conveniences include faster in-app rating dialogs and a new field on product pages indicating when an app or game was last updated, providing crucial transparency for users.


Perhaps one of the most streamlined features is the ability to
install apps directly from Windows Search. Users can now search for an app or game from the Windows search bar, and if available in the Store, quickly initiate the installation without needing to fully open the Store application.


These comprehensive updates underscore Microsoft's ongoing commitment to refining the Windows experience, making the Microsoft Store a faster, more intuitive, and more secure hub for digital content.


Ep340
Image created by AI
0 Comments

Wiki for Extensions

12/6/2025

0 Comments

 
Your web browser is your gateway to the internet, and while extensions can be incredibly useful, they also pose a significant security risk. In case you’re wondering: an extension is a small software program that you can install into your web browser (like Chrome, Firefox, or Edge) to add new features, customize its behavior, or integrate with other services - Think of it like an "app" for your browser.

​
Picture

Many users unknowingly install extensions that can track their data, display unwanted ads, or even contain malicious code. The problem? App stores often provide only a superficial review of these add-ons, leaving a dangerous gap in your online protection.

​But now, a new tool is here to help you navigate this digital minefield. Cybersecurity company LayerX has launched
ExtensionPedia, a platform being dubbed the "Wikipedia for extensions." Its mission is simple: to make your web browser far more secure by exposing dangerous browser extensions and providing transparent, in-depth risk assessments.


What is ExtensionPedia and How Does it Help You?

ExtensionPedia offers a comprehensive database of over 200,000 browser extensions across popular platforms like Chrome, Firefox, and Edge. Unlike basic app store descriptions, this free-to-use tool gives you crucial insights into the security posture of any extension you're considering or already have installed.

Here’s what ExtensionPedia provides:

  • In-depth Risk Assessments: Get a clear understanding of the potential dangers an extension might pose.
  • Unified Risk Scores: A simple score helps you quickly gauge the overall security risk.
  • Granular Permission Breakdowns: See exactly what permissions an extension requests (e.g., access to your Browse history, ability to read all website data). This helps you understand if an extension is asking for more access than it truly needs.
  • Detailed Reputation Analyses: Learn about the developer's history and any reported issues or vulnerabilities associated with the extension.

ExtensionPedia achieves this by pulling anonymous data from millions of browser sessions, aggregating it into a searchable, public-facing tool. This means you can quickly look up an extension and get a clear picture of its security profile.


Your Simple Tip for a More Secure Browser:

Before you install any new extension, or to audit your existing ones, make it a habit to check it on ExtensionPedia. Simply visit the platform, search for the extension by name, and review its risk assessment. If an extension demands excessive permissions or has a low reputation score, it's a strong indicator that it might be a privacy risk or worse.

By leveraging tools like ExtensionPedia, you can take a proactive step in safeguarding your online activity and ensuring your browser remains a secure environment for all your digital tasks. Don't let a convenient extension become a backdoor for cyber threats.


​https://layerxsecurity.com/extensions/
​
Ep339
Image created by AI
0 Comments

Location Sharing

12/6/2025

0 Comments

 
It's a common scene in modern families: a quick glance at a smartphone app confirms a child has arrived safely at school, or a partner is on their way home. For many, location-sharing apps offer invaluable peace of mind, providing real-time updates on loved ones' whereabouts. But beneath this comforting surface lies a complex web of data collection, one that can create an invisible digital trail far wider than most users realise.
Picture

Cybersecurity experts are increasingly sounding the alarm, highlighting the inherent cyber risks that come with such highly sensitive data, particularly the danger of this collected information falling into the wrong hands through data breaches or misuse. This raises a crucial question: are we trading too much privacy for the convenience of knowing exactly where everyone is?

​For many families, apps like
Life360 embody the promise of constant connection and safety – real-time location tracking, crash detection, and emergency alerts. The idea of always knowing where your loved ones are can be incredibly reassuring. However, cybersecurity experts are increasingly highlighting the inherent cyber risks that come with such highly sensitive data, citing past incidents and persistent privacy concerns surrounding these omnipresent tools.


These "family safety" applications typically operate by continuously monitoring GPS signals, often enhancing accuracy with Wi-Fi and Bluetooth data. Users form "Circles" to share their whereabouts with chosen contacts, receiving automatic notifications for arrivals and departures from designated locations. While some premium features even extend to identity theft protection and dark web monitoring, the core function—constant location data collection—creates significant vulnerabilities.

Reports and analyses have consistently pointed to several critical areas of concern:

  • Data Selling and Sharing: Perhaps the most unsettling aspect revealed about certain location-sharing apps, including Life360, is their past practices of allegedly selling precise location data of their millions of users to third-party data brokers. While companies might claim to anonymize this data, experts caution that it can often be re-identified, potentially exposing sensitive routines and exact whereabouts to unknown entities. This raises the serious risk that your personal movements could be used for targeted advertising, or even worse, for less legitimate purposes by unknown parties. Although Life360 has publicly committed to ceasing the sale of precise location data, the history of such practices underscores the inherent risks.
  • Data Breaches and API Vulnerabilities: The Threat of Exposure: No digital system is perfectly impervious to attack. A notable incident involving Tile, a company acquired by Life360, saw a hacker exploit outdated login credentials of a former employee to gain unauthorized access to users' personal data. This included names, addresses, emails, and phone numbers, raising the specter of phishing attacks, smishing, or even physical threats based on leaked daily routines. Cybersecurity analysts have also identified API (Application Programming Interface) vulnerabilities, where a deeper dive into an app's underlying data requests could potentially expose sensitive information not visible on the user interface. When such personal and location data is breached, it can lead to identity theft, stalking, or other forms of targeted crime.
  • Gaps in Fundamental Security Practices: Some analyses suggest that specific location-sharing apps may fall short on crucial cybersecurity safeguards. This can include a lack of mandatory two-factor authentication (2FA) – a vital barrier against account takeovers – and insufficient measures to deter brute-force login attempts. The absence of email validation during signup can further simplify the creation of fraudulent accounts by malicious actors, increasing the likelihood of unauthorized access to sensitive user data.
  • The Extent of Data Collection: Beyond just geographical coordinates, these applications can gather an extensive amount of personal data. This can include driving behaviors (like speed and braking patterns), phone usage while driving, specific device information, and even in-app communications. While some of this data serves the stated safety features, the sheer volume of personal information centralized in one location significantly magnifies the potential consequences if a breach or misuse occurs, providing a rich target for cybercriminals.

While location-sharing apps undoubtedly offer a sense of security, users must critically evaluate the privacy trade-offs and cybersecurity risks involved. It is paramount to meticulously review an app's privacy policy, configure permissions to the absolute minimum required, employ robust and unique passwords, enable multi-factor authentication whenever possible, and remain perpetually vigilant for any suspicious activity linked to your accounts. For families weighing the benefits against the potential perils, exploring alternatives with stronger privacy guarantees or engaging in transparent conversations about data sharing boundaries is crucial.


Ep339
Image created by AI
0 Comments

Linnaco Water Blaster

12/6/2025

0 Comments

 
Just when you thought the humble water pistol had reached peak squirt, along comes the "Ultimate Water Battle Blaster" from Linnaco, promising to sort out aquatic skirmishes once and for all. But as we explore this supposed marvel, one question drenches our minds: Have we, as a species, simply run out of sensible things to invent?
Picture

Behold, the Blaster. It’s not merely a child’s toy; it’s a tactical, battery-powered liquid assault system that feels less like fun and more like a preparatory drill for a highly specialized fire department. The product page, a veritable shrine to over-engineering, boasts of its “powerful motor” and a design that makes it "the most technologically advanced water gun on the market." Because, apparently, our backyard water fights were suffering from a severe lack of cutting-edge innovation.

Gone are the days of manual pumping, the satisfying
thwack-thwack that built anticipation. Now, the future of hydration-based combat is automated. Press a button, and a relentless stream of H2O erupts, likely leaving your opponent drenched before they can even comprehend the sheer absurdity of your firepower. 


This thing boasts a level of precision and power usually reserved for pressure washers, making you wonder if it's meant for soaking siblings or power-washing stubborn patio stains.


While the "Ultimate Water Battle Blaster" proudly proclaims its battery-powered might, one can't help but envision the frantic scramble for AAAs mid-battle, or the existential dread of a low-battery indicator during a critical ambush. What happens when your ultra-advanced blaster dies, and your foe is armed with a simple, reliable bucket? The shame. The absolute, unadulterated shame.


In an age where technology aims to solve increasingly complex problems – climate change, disease, sending tourists into space – Linnaco has bravely tackled the most pressing issue of our time: the inefficient drenching of loved ones. It’s a testament to humanity’s boundless creativity, or perhaps, its boundless capacity for inventing things nobody truly asked for.


​So, if your summer water fights feel too primitive, too
manual, or simply lack the cold, unfeeling efficiency of a precision-engineered liquid delivery system, then the Ultimate Water Battle Blaster is your absurd solution. Just don't accidentally power-wash your pet or trigger an international incident with its unforeseen aquatic might. The future, it seems, is surprisingly wet and wonderfully ridiculous.
​
Ep339
This image is used under the Fair Use provision for the purpose of review and commentary.
​Source: https://linnaco.com/products/ultimate-water-battle-blaster

0 Comments

Word and Excel Chat

12/6/2025

0 Comments

 
A new, low-tech, yet highly effective method of clandestine communication is quietly spreading through school campuses, allowing students to bypass traditional messaging restrictions. Educators and IT administrators are discovering that the seemingly innocuous chat features built into Microsoft Word and Excel are being repurposed by students to send secret notes to one another, right under the nose of school monitoring systems.
Picture

While schools commonly deploy robust firewalls and content filters to block social media, chat apps, and unauthorized websites, the integrated collaboration tools within popular productivity suites like Microsoft 365 often slip through the cracks. These features, designed for legitimate co-editing and project work, allow users to chat in real-time within a shared document or spreadsheet.

"We first noticed it when a teacher caught two students giggling while 'working' on a shared history project," explained one school IT administrator, who requested anonymity due to the sensitive nature of the discovery. "On closer inspection, their 'edits' were minimal, but the chat pane was filled with rapid-fire messages discussing everything from weekend plans to exam answers. Our usual filters don't flag internal chat within a Word document as 'social media' traffic."

The technique is simple yet ingenious. Students create a new, often meaningless, Word document or Excel spreadsheet, then share it with their intended recipient(s) within the school's network. Once the document is open, they use the built-in chat function (often found in the top right corner, usually with a speech bubble icon) to exchange messages. Because the communication is embedded within a Microsoft application and routed through the school's legitimate network traffic for Microsoft 365 services, it largely goes undetected by standard web filters looking for external chat applications.
​

The messages are typically ephemeral, as the chat history might only persist as long as the document is open or within a recent activity log. However, for quick, real-time exchanges during class, it proves to be a surprisingly effective loophole.

Ep339
Image created by AI
0 Comments

Bunnings App

7/6/2025

0 Comments

 
Do you shop at Bunnings?

There is an app specific for Bunnings that has some pretty cool options including whether they have stock, finding items located in specific isles and at specific stores.
Picture
Picture
Ep338
This image is used under the Fair Use provision for the purpose of review and commentary. Source: Bunnings website
0 Comments

Cryllic Alphabet

7/6/2025

0 Comments

 
The Cyrillic alphabet has significant relevance for hackers, primarily because of a tactic known as homoglyph attacks (also sometimes called homograph attacks or script spoofing).
Picture

Here's why it's a valuable tool for cybercriminals:

  • Visual Similarity to Latin Characters: Many characters in the Cyrillic alphabet (used in languages like Russian, Ukrainian, and Serbian) look identical or extremely similar to characters in the Latin alphabet (used in English and many other Western languages).

    • For example, the Latin "a" (U+0061) and the Cyrillic "а" (U+0430) appear indistinguishable to the human eye in many fonts. The Latin "o" and the Cyrillic "о" are another common pair.
    • This visual trickery is the core of the attack.
  • Deceiving Users in URLs and Email Addresses: Hackers exploit this visual similarity to create fake website addresses (URLs) or email addresses that look exactly like legitimate ones.
​
So basically, in the past the links were obvious to detect as they go to unexpected addresses. Now they actually look correct but the changes font for particular letters can completely change the destination.

How to Protect Yourself

  • Hover Before Clicking: Before clicking on any link in an email or message, hover your mouse cursor over it. This will reveal the actual URL in your browser's status bar (usually at the bottom of the screen). Carefully inspect the URL for any unusual characters, especially if it looks slightly "off."
  • Look for xn--: If the URL in the status bar starts with xn--, it's an Internationalized Domain Name. While not all IDNs are malicious, this is a major red flag and warrants extra scrutiny.
  • Type URLs Manually or Use Bookmarks: For sensitive websites (like banking, email, or shopping), always type the URL directly into your browser or use a trusted bookmark. Never click on links from emails or messages to access these sites.
  • Use Multi-Factor Authentication (MFA): Even if an attacker manages to steal your password through a homoglyph attack, MFA adds an extra layer of security. This requires a second verification step (like a code from your phone) before access is granted.
  • Keep Software Updated: Modern web browsers, email clients, and operating systems often include built-in protections against homoglyph attacks. Regularly updating your software ensures you have the latest defenses.
  • Be Vigilant and Educated: User awareness is paramount. Understand what homoglyph attacks are and how they work. Share this knowledge with others. If something feels suspicious, err on the side of caution.
​
Ep338
This image is used under the Fair Use provision for the purpose of review and commentary. Source: Facebook
0 Comments

I Have a New Mac

7/6/2025

0 Comments

 
If you’re a Mac user and you want to upgrade to a new iMac or MacBook, you can use several methods to get your data across and basically pick up where you left off and keep working.

The easiest method is to use Migration Assistant.
​

Transfer to a new Mac with Migration Assistant
​

Use Migration Assistant to copy some or all of your content from one Mac to another Mac.

What does Migration Assistant do?

Migration Assistant transfers documents, apps, user accounts and settings from one Mac to another. It doesn’t delete information from your old Mac or replace the operating system (macOS) on your new Mac.
Picture

Migration Assistant can also transfer from a Time Machine backup or transfer from a Windows PC.

  • Connect both old and new devices to the same WiFi.
  • Run Migration assistant on the Old
  • Go through the setup process on your new and tell it to get data from your old Mac device.
  • Create a new User Account and password and hit go

This may take some time depending on how much data you need to transfer.

Ep338
Image Source: Screenshot taken by MITE Radio
0 Comments

Telstra Goes Starlink

7/6/2025

0 Comments

 
For millions of Australians living or travelling beyond major urban and regional centres, the frustration of patchy or non-existent mobile coverage has long been a harsh reality. That has finally changed dramatically, as Telstra has officially launched "Telstra Satellite Messaging," enabling its customers to send SMS messages from virtually anywhere across the continent, provided they have a clear view of the sky.
Picture

This service leverages the advanced "direct to cell" capabilities of new SpaceX Starlink satellites. While only 25-30 percent of Australia currently boasts traditional mobile coverage, Telstra's new offering aims to bridge this vast communication gap.

How do you turn it on?..."As long as your phone has a direct line of sight to the sky, your phone will show 'Telstra SpaceX' as the mobile network, with a Satellite icon in the signal strength area" 

This seamless connection allows Telstra customers on an upfront plan to send text messages to any Australian mobile number, regardless of their location, from the remotest outback to the most isolated coastal stretches.

The service's initial rollout is exclusively for the latest Samsung Galaxy S25 with the newest software update. However, hints from testing in the USA suggest broader device compatibility is on the horizon, with older Samsung phones, recent iPhones (from the last 3-4 years), Google devices, and Motorola's foldable Razr potentially gaining access via future software updates and Telstra network validation.

Telstra's move places it ahead in the satellite-to-phone race in Australia. While Optus had an earlier deal with SpaceX, certification delays allowed Telstra to swiftly capitalize on the technology. Vodafone is also reportedly testing similar capabilities with an alternative satellite provider (I think Lynk Global and AST SpaceMobile)

While the service is currently limited to SMS, making it unsuitable for Triple Zero emergency calls, its implications for safety and connectivity are immense. Users can now communicate with friends and family from previously unreachable areas, offering peace of mind for adventurers, remote workers, and residents alike. Looking ahead, Telstra plans to introduce voice calling capabilities in 2026, with slow data access for messaging applications also on the roadmap.

​For a nation defined by its vast and often uninhabited landscapes, Telstra Satellite Messaging represents a revolutionary leap forward, fundamentally altering how Australians connect in the bush, on remote roads, and in any location far from traditional mobile towers.

Ep338
Image created by AI
0 Comments

Orb

7/6/2025

0 Comments

 
In today's connected world, a truly reliable internet connection is crucial. Traditional speed tests often miss the full picture. Orb, from the creators of Speedtest and Downdetector, offers a new approach, focusing on your overall "Internet Experience" rather than just raw speed.
​

Picture

What is Orb?

Orb is a free app from Orb Forge Inc. that continuously monitors your internet performance. Unlike typical speed tests, it runs lightweight, ongoing tests in the background. It's available on iOS, Android, Windows, macOS, and Linux, and can even be used on devices like Raspberry Pis for dedicated monitoring.

Key Features and Functionality

Orb evaluates your internet with three main metrics, contributing to an "Orb Score" (out of 100):

  1. Responsiveness: This is Orb's core focus, measuring how quickly your network reacts. It analyzes lag, latency, jitter, and packet loss, providing "Best," "Worst," and "Typical" times to show connection stability.
  2. Reliability: This metric assesses the consistency of your network's responsiveness over time, indicating how dependable your connection is for sustained activities.
  3. Speed: Orb still measures download and upload speeds (content speed) with minimal data use. You can also run a "peak speed" test for maximum capacity.

Additional features include:

  • Continuous Monitoring: Runs quietly to identify patterns and intermittent issues.
  • Multi-Device Monitoring: Track performance across multiple devices and locations from one account.
  • Clear Scores & Details: Offers both simple scores and in-depth technical data.
  • "Improve Connection" Suggestions: Provides AI-powered tips if your score drops below 80.
  • Alerts: Notifies you of significant internet problems.

User Experience

Orb's has an intuitive interface and clear scores, making it easy to understand complex network information. The multi-device monitoring is cool.

Performance and Accuracy

Orb's continuous, lightweight testing provides a more accurate view of real-world internet experience, especially for sensitive activities like gaming or video calls. Its focus on responsiveness metrics (latency, jitter, packet loss) and minimal data consumption (around 10MB for continuous tests) makes it less intrusive than repeated traditional speed tests. Cloudflare provides the underlying data.

Pros and Cons​

Pros:

  • Holistic internet health assessment (responsiveness, reliability, speed).
  • Continuous monitoring for ongoing insights.
  • Multi-device and remote monitoring.
  • User-friendly scores with detailed options.
  • Actionable advice for improvements.
  • Free for personal use.
  • Wide cross-platform availability.

​Cons:

  • Occasional initial setup glitches.
  • Rare reports of higher background data/performance impact.
  • Requires continuous running for full benefit, which might not suit all users on mobile.

Who is it for?

Orb is ideal for:

  • Work-from-home professionals.
  • Online gamers and streamers.
  • Tech-savvy individuals seeking deep network insights.
  • Anyone with intermittent internet issues.
  • Those managing internet for others.

Conclusion
​

The Orb internet test app is a significant advancement in internet monitoring. By prioritizing responsiveness and reliability alongside speed, it offers a much more accurate reflection of your actual internet experience. Despite being relatively new, its continuous monitoring, multi-device support, and helpful insights make it a highly recommended tool for optimizing your online life. If traditional speed tests leave you wanting more answers, Orb is worth exploring.

Ep337
Image Source: https://orb.net/
0 Comments

Notification Cooldown

7/6/2025

0 Comments

 
Do you ever feel like your phone is constantly buzzing, dinging, and lighting up, turning into a digital Christmas tree of alerts? You're not alone. While notifications are essential for staying connected, they can quickly become overwhelming. Thankfully, Android users have a new secret weapon against notification overload: Notification Cooldown.

​
Picture

This smart new feature, which has been making its way to Pixel phones and is expected in the upcoming Android 16, is designed to give you a much-needed break when your phone is bombarded with alerts. It's incredibly simple and, best of all, entirely automatic.

What is this magic I hear you ask?

Imagine this: your phone suddenly gets a flurry of messages, emails, or app updates all at once. Instead of each one blasting through with full volume and vibration, Notification Cooldown steps in. According to Google's description, if you receive "many notifications within a short time," your device will automatically lower its volume and minimize alerts for up to one minute.

Think of it as an intelligent, temporary mute button that flips on and off without you lifting a finger. It doesn't block notifications from appearing on your screen; it simply quiets the storm of sounds and vibrations. Crucially, important alerts like phone calls, alarms, and messages from your priority contacts will still come through at their normal volume, ensuring you don't miss anything critical.
​
  • Open your phone's Settings app.
  • Navigate to the "Notifications" section.
  • You'll find "Notification Cooldown" listed there.
  • Toggle it on.
​
Ep337
Image created by AI
0 Comments

SVG Phishy Attachments

7/6/2025

0 Comments

 
The latest tool in the hacker’s arsenal is the SVG file. We should all be wary of email attachments and really be sure of their legitimacy before attempting to open them.
​

There's a new and sneaky way hackers are trying to trick people, and it involves something you might think is harmless: image files. Cybersecurity experts recently discovered a new wave of phishing emails that are using special image files called SVGs to sneak past your email security and steal your information.

Think of an SVG file like a super-smart picture. Unlike regular photos you take with your phone, SVGs are actually based on text. This means they can do more than just show a picture; they can also contain hidden instructions, like tiny computer programs. This makes them great for websites because they can look good on any screen size and even be interactive. But now, bad guys are using this clever feature against us.

Here's the trick: hackers are putting secret instructions inside these SVG image files. When you open the SVG file (which might look like a simple invoice or a document), those hidden instructions kick in. They tell your computer to automatically send you to a fake website that looks exactly like a real one, perhaps your bank or a well-known online service. Their goal? To get you to type in your usernames and passwords, which they then steal.

What makes this so tricky is that many security tools are designed to spot typical dangerous files like Word documents with tricky macros or PDF files. But because SVGs are often seen as innocent image files, these tools might not look inside them for hidden dangers.

Watch out for Phishy emails especially as specific events are nearing. Tax time is a good one.
​
Picture
Picture
Ep337
Image Source: Screenshot taken by MITE Radio
0 Comments

Xiaomi Xring Chip

7/6/2025

0 Comments

 
In a move set to reverberate across the global technology landscape, Chinese tech titan Xiaomi has officially revealed its first high-end processor, the Xring 01. The powerful new chip is designed to compete directly with leading silicon, from industry giants like Qualcomm and Apple, marking a significant milestone that has garnered unusual public commendation from the Chinese government.
Picture

These are the chips used in mobile phones and other portable devices…

The unveiling of the Xring 01 signals a bold shift in technological power dynamics, a testament to years of intense development and a substantial financial commitment from the company. Lei Jun, Xiaomi’s founder and CEO, lauded the processor as "the fruit of four years of development," emphasizing that this is just the beginning of a much larger semiconductor endeavor.

The development of the Xring 01 was no small feat, involving over 2,500 engineers and an initial investment of around 3 billion $AU over four years. Xiaomi has also announced plans to inject an additional 10.5 billion $AU over the next decade, further solidifying its ambitious semiconductor strategy.
​

Making their own chips is a big deal and although existing partnerships are currently stable, this may change as the USA changes things to be more inwardly facing.

Ep337
Image created by AI
0 Comments

Google Lens Any Webpage

2/6/2025

0 Comments

 
If you open a website in Chrome then you can tap in the URL banner to see the Google Lens icon. You can search from anywhere on the page.
​
Picture
Picture
Ep336
Image Source: Screenshot taken by MITE Radio
0 Comments

Risks of Keeping Emails

2/6/2025

0 Comments

 
Do you keep your emails forever?
​

Do they contain sensitive data, attachments perhaps with sensitive data like taxation info, passport applications, etc…?

Well your emails are typically stored on a server (or cloud system) somewhere in the world which could potentially be breached. Also, if your password is cracked then the hacker has access to all of your emails past present and future - if you catch my meaning. They can be you!
Picture

Your main email account with Google, Microsoft, Apple may be pretty robust, but what if you connect your email to other services like a calendar, to-do list, CRM system. These third party systems may provide hackers a back way into your accounts.

So be aware of what's in your email and maybe file some things elsewhere as well as deleting them if they have served their purpose. Consider encrypted cloud storage (Google Drive) or perhaps Vaults Apps like OneDrive and Dropbox. 

Oh, don’t forget to empty the trash.

Ep336
Image created by AI
0 Comments

SnaplyLens

2/6/2025

0 Comments

 
This is cool!

SnaplyLens. A magnetic, wireless selfie monitor designed for content creators who want to use their phone's rear camera for high-quality content while still being able to see themselves. It mirrors your phone's screen in real-time, helping you stay in focus and within the frame.
Picture

So you clip this thing on the back of your phone so when your phone is on a tripod, you can use the rear facing camera and this display shows you what the rear camera can see.​
​

So, it basically mirrors your phone's screen instantly, allowing you to use your best camera while still seeing yourself.

MagSafe Compatible: Attaches magnetically to iPhones or MagSafe-compatible cases.
Crisp Display, Pocket-Size Design: Features a high-resolution screen in a lightweight, portable form factor.
Adjustable Brightness: Includes 3 brightness settings controlled by a dedicated button.
Reliable Connection: Maintains a stable connection from up to 100 feet (30 meters) away.

No Apps, power on, pair, shoot! Use it with a remote BT shutter release and you’re set to move around.
​

A tad of AU$100.
​
Ep336
This image is used under the Fair Use provision for the purpose of review and commentary. Source: snaplylens.com

0 Comments

Using 2FA

2/6/2025

0 Comments

 
Online fraud and cyberattacks are on a massive upswing, with Britain’s National Cyber Security Centre (NCSC) reporting that a staggering 80% of fraud is now "cyber-enabled." In Australia, the cyber threat landscape is also rapidly evolving. Australia recorded 47 million data breaches last year, making it the 11th most affected country globally, with, on average, one Australian account compromised every second last year. The Australian Cyber Security Centre (ACSC) reported over 87,400 cybercrime reports in FY2023-24, equivalent to one report every six minutes. The average self-reported cost of cybercrime per report for individuals in Australia has also risen to approximately $30,700, a 17% increase from the previous year.
Picture

The first line of defense for your email, social media, and other online accounts is often woefully inadequate as we are generally not implementing good password hygiene. Make them long and strong… and… if there’s a MFA option, use it!

Two-factor authentication adds an extra layer of security beyond just your password. When you log in, in addition to entering your password, you'll need to provide a second piece of verification, such as a code sent to your phone via text message. This dramatically increases security, as even if a criminal manages to guess or steal your password, they still can't access your account without that second factor.

2FA works by providing a critical second layer of security before someone can access an account. This can be done through an authenticator app, SMS message, hardware security key or biometric verification (using facial scans, eye scans or fingerprints). These verification factors are often time-sensitive, ensuring they cannot be reused. By reducing reliance on passwords alone, 2FA effectively protects against phishing and other common cyber threats, making it a simple yet powerful tool for enhancing online security.

How to Set Up 2FA Securely

Most online platforms, including email and social media, offer the option to set up 2FA. Look for it in your account's "Settings," "Security," or "Privacy" sections. You can typically choose between receiving codes via email, SMS, or using a dedicated authenticator app. Pick an option that is easily accessible for you.

When you attempt to log in, you'll either receive a text or email with a 2FA code, or an alert from your authenticator app requiring you to enter a code. This crucial step locks out attackers, even if they have access to your email, and significantly deters automated or mass attacks.

Can You Still Be Hacked with 2FA?

While 2FA makes it significantly harder for cybercriminals to breach your accounts, it's not entirely foolproof. Not all 2FA methods offer the same level of security.

Text message codes, for instance, are considered less secure than other methods because criminals can sometimes intercept these codes or even trick phone network employees into creating a SIM card with your number. "While 2FA offers an important layer of protection against credential theft and breaches, not all 2FA methods are equally secure – SMS-based codes can be intercepted by bad actors, so authentication apps offer stronger protection,"


Using two-factor authentication makes it more difficult for hackers to get into your account.

It’s still worth ensuring that all passwords are strong, secure and unique – particularly for your email account, as criminals can use this to reset other passwords. Use a password manager app to store passwords, making it easier to use unique passwords for each account.

And even if you use 2FA, stay alert, "2FA alerts on a smartphone can serve as a critical warning sign that your account’s credentials have been compromised, providing an opportunity to update your password before the account is breached."

Ep336
Image created by AI
0 Comments

Phone Light Diffuser

2/6/2025

0 Comments

 
We've all grappled with the limitations of the smartphone flashlight. That tiny, aggressive beam – perfect for locating rogue Tim Tams under the couch, but less ideal for, say, creating a romantic mood or reading without feeling like you're interrogating your book.
​

Enter the Silicone Travelamp, a… well let’s say a mildly inventive device designed to liberate us from the tyranny of the tiny torch. This, my friends, is a light diffuser for your phone, a snug little silicone hug that transforms that harsh glare into something resembling, dare I say, ambiance.


They reckon your phone's flashlight can only shine so bright. True. But did you ever stop to consider if it's shining
too brightly? Like you're signalling passing aircraft from your bedside table? The Travelamp understands. It takes that unyielding beam and politely asks it to chill out, to soften its edges, to become less "lost hiker signal" and more "gentle glowworm whisper."


Picture

​Molded in silicone – which, let's be honest, is the duct tape of the 21st century – this lamp-ish thing fits most smartphones, especially the small and medium-sized ones. So, unless you're rocking a phone the size of a small brick, you should be good to go. Imagine: capturing photos with a light that doesn't make everyone look like they've just seen a ghost, or using it to navigate to the fridge for a midnight snack without blinding yourself (and potentially waking the kookaburras).

Now, here's where it gets a touch… whimsical. You can choose between a model that vaguely resembles a "cozy home bedside lamp" (picture a very squishy, minimalist version) and one that aspires to be a "traditional oil lantern" (minus the actual fire hazard and, presumably, the smell of kerosene). Whether you can actually read by these ethereal glows is debatable. Maybe for a very short text message? But for serious literature? Probably stick to the bedside lamp, mate.

​However, for setting a mood, illuminating your nocturnal wanderings (within the confines of your home, ideally), or even as a surprisingly non-threatening night light for the little tackers, the Travelamp shines (pun intended!). And let's be honest, the darn thing looks kind of cute and goofy. It’s the kind of gadget that makes you chuckle slightly every time you use it.


So, if you're tired of your phone's flashlight acting like a tiny spotlight in a dark theatre, the Silicone Travelamp offers a softer, sillier, and altogether more agreeable alternative. It brings a touch of cozy, almost absurdly gentle light wherever you need it – from your bedroom to your next camping trip (just don't expect it to ward off any actual drop bears). For those of us who just need a bit of extra, less intense glow, this could be the delightfully quirky answer.


Ep335
This image is used under the Fair Use provision for the purpose of review and commentary. Source: Amazon.com. 
0 Comments
<<Previous

    Author

    Delve into the world of MITE Radio through our captivating blogs. From music and tech to community news, our articles offer fresh perspectives and behind-the-scenes glimpses. Stay informed, connect with our community, and explore MITE Radio in a new way today!

    Archives

    June 2025
    May 2025
    April 2025
    March 2025
    February 2025
    January 2025
    December 2024
    November 2024
    October 2024
    September 2024
    August 2024
    July 2024
    June 2024
    May 2024
    April 2024
    March 2024
    February 2024
    January 2024
    December 2023
    November 2023
    June 2023
    May 2023
    April 2023

    Categories

    All
    AI
    App Of The Day
    Bytes & Beats
    Cyber Security
    Discussion
    Gadgets & Gizmos
    Game
    Innovation Hub
    Listener Question
    News
    Other
    Somethin' For Nothin'
    The Tech Absurd
    Tips & Tricks

    RSS Feed



  • MITE RADIO
  • Volunteer
  • Thank You
  • Blog
  • Programs
    • Making IT Easy with Tony & Kay
    • The Blues Hotel ​with Kelvin Huggins
    • Jazz Fusion with Brett C
    • Pheez Feels
    • Able & Unfiltered
    • Glenn & Tracy's Timeless Tracks
    • Cort In The Morning
    • Hits, Quizzes & Stuff with Harley Buckner
    • Solid Gold Sounds - Chris Pitchford
    • Gordon Cooper (multiple programs)
    • The Vinyl Countdown with Jonathan Charles
    • 50 Years and Rolling with Leo Kirby
    • Soul Vaults with David Southway
    • The Best Disco In Town with Jonathan Charles
    • ABC Oldies - JP McCartney
    • 50 Years of Pop with Peter Kirkpatrick
    • All About The 80s with Rob Charles
    • No More Heroes with Magnus Shaw
    • Classic Chart Rundowns with Dave Marley (multiple programs)
    • US UK Rock Soul Connection
    • Decades Breakfast with Mark Gale
    • Flashback to the 60s with Jim Barrington
    • The Time of Our Musical Life with Geoff Wood
    • Steve Bishops Old Record Club
    • Steve Algar ​(multiple programs)
    • Chris Palin ​(multiple programs)
    • The Peter Nightingale Show
    • Deeper Dimensions with David Dyke
    • Choice Cuts with Kevin Butcher
    • Ken Anton (Multiple Programs)
    • Gary Hopkins (Multiple Programs)
  • WAYS TO LISTEN