MITE RADIO 0492 906 469
  • MITE RADIO
  • Volunteer
  • Thank You
  • Blog
  • Programs
    • Making IT Easy with Tony & Kay
    • The Blues Hotel ​with Kelvin Huggins
    • Jazz Fusion with Brett C
    • Pheez Feels
    • Able & Unfiltered
    • Glenn & Tracy's Timeless Tracks
    • Cort In The Morning
    • Hits, Quizzes & Stuff with Harley Buckner
    • Solid Gold Sounds - Chris Pitchford
    • Gordon Cooper (multiple programs)
    • The Vinyl Countdown with Jonathan Charles
    • 50 Years and Rolling with Leo Kirby
    • Soul Vaults with David Southway
    • The Best Disco In Town with Jonathan Charles
    • ABC Oldies - JP McCartney
    • 50 Years of Pop with Peter Kirkpatrick
    • All About The 80s with Rob Charles
    • No More Heroes with Magnus Shaw
    • Classic Chart Rundowns with Dave Marley (multiple programs)
    • US UK Rock Soul Connection
    • Decades Breakfast with Mark Gale
    • Flashback to the 60s with Jim Barrington
    • The Time of Our Musical Life with Geoff Wood
    • Steve Bishops Old Record Club
    • Steve Algar ​(multiple programs)
    • Chris Palin ​(multiple programs)
    • The Peter Nightingale Show
    • Deeper Dimensions with David Dyke
    • Choice Cuts with Kevin Butcher
    • Ken Anton (Multiple Programs)
    • Gary Hopkins (Multiple Programs)
  • WAYS TO LISTEN
Picture
​

click here to listen
​to Mite radio (then click the red play arrow)
An initiative of ​The Stairway Project Inc
Picture

Commodore 64 X

31/1/2025

0 Comments

 
In a blast from the past, the iconic Commodore 64 is back, not as a retro console, but as a fully functional PC. The Commodore 64x, unveiled recently, marries the classic C64 design with modern PC components, offering a unique blend of nostalgia and functionality.
​

Picture

The C64x sports the familiar beige case and keyboard of the original Commodore 64, but inside, it's a different beast. Powered by an Intel Core i5 processor and featuring 8GB of RAM, the C64x can handle modern computing tasks with ease. It also includes a 512GB solid-state drive for fast storage and an Nvidia GeForce GTX 1650 graphics card for smooth visuals.

"We wanted to create a machine that would appeal to both retro enthusiasts and modern PC users," said a spokesperson for the company behind the C64x. "The C64x is a conversation starter, a piece of computing history that can also handle your everyday computing needs."

The C64x comes with Commodore OS Vision, a Linux-based operating system designed to evoke the look and feel of the original Commodore 64's operating system. It also includes a suite of pre-installed software, including a web browser, office suite, and games.

The C64x is available for purchase (if you can get one - out of stock everywhere) with prices starting at $AU1000 While it's not the cheapest PC on the market, the C64x is sure to appeal to those who want a unique and stylish computer that pays homage to one of the most iconic computers of all time.

This could be your new replacement for your old Windows 10 PC.

Ep297
Image Source from Supplier: https://www.mini-itx.com/
0 Comments

Vishing

31/1/2025

0 Comments

 
​In today's digital age, cybercriminals are constantly finding new ways to trick unsuspecting victims. One increasingly prevalent tactic is "vishing," or voice phishing, which uses phone calls and voice messages to steal personal information. These scams can be incredibly convincing, often impersonating trusted institutions to gain your confidence.
Picture

Vishing is particularly effective because it plays on our trust in voice communication. Hearing a human voice, even a recorded one, can create a sense of legitimacy that's harder to replicate in other forms of phishing.

A typical vishing scam involves a phone call or voicemail message from someone claiming to represent a reputable organization, such as the IRS, your bank, a credit card company, or a tech support provider. They might use various pretexts to pressure you into revealing sensitive information:

  • Tax Scams: The caller might claim you owe back taxes and threaten legal action if you don't pay immediately.
  • Bank or Credit Card Fraud: The caller might warn of suspicious activity on your account and request verification of your personal details.
  • Tech Support Scams: The caller might claim there's a problem with your computer and offer to "fix" it remotely, often requesting access to your device.
  • Prize or Lottery Scams: The caller might inform you that you've won a prize but require you to pay a "processing fee" or provide bank account details to claim it.

These scammers often use sophisticated techniques to make their calls appear legitimate. They might use "spoofing" technology to display a familiar phone number on your caller ID, such as your bank's or a government agency's. They might also use pre-recorded messages that sound professional and urgent.

The key to vishing is creating a sense of urgency and fear. Scammers want to pressure you into acting quickly without giving you time to think critically.

The consequences of falling victim to a vishing scam can be severe, including:

  • Financial loss: Scammers can use your stolen bank account or credit card information to make unauthorized purchases or withdraw funds.
  • Identity theft: Providing your Social Security number or other personal identifiers can lead to identity theft, with scammers opening accounts or applying for loans in your name.
  • Damage to credit score: Fraudulent activity can negatively impact your credit score, making it difficult to obtain loans or credit in the future.

Protecting yourself from vishing requires vigilance and a cautious approach to unsolicited phone calls. Here are some essential tips:

  • Never give out personal information over the phone unless you initiated the call and are absolutely certain of the recipient's identity: Legitimate organizations will never ask for sensitive information like your Social Security number, bank account details, or passwords over the phone unless you have contacted them first.
  • Be suspicious of calls from unknown numbers or automated messages: If you don't recognize the number or the message sounds automated, be extremely cautious.
  • Hang up immediately if you feel pressured or uncomfortable: If the caller is aggressive, uses scare tactics, or refuses to provide verifiable information, hang up immediately.
  • Verify the caller's identity independently: If you receive a call from someone claiming to represent a legitimate organization, hang up and contact the organization directly using a phone number you know is correct, such as the one listed on their official website or on your account statements. Do not call back the number that called you.
  • Be wary of calls offering unsolicited prizes or services: If it sounds too good to be true, it probably is.
​
By staying informed and practicing these simple precautions, you can significantly reduce your risk of becoming a victim of vishing and protect your valuable personal information.


Ep297
Image created by AI
0 Comments

Adding Your Phone Number to Your Google Account

31/1/2025

0 Comments

 
Here's how to add a phone number to your Google/Gmail account:
​
​
Picture
  1. Go to your Google Account settings.
  2. Find the Personal info section, usually in the navigation panel.
  3. Click on Contact info.
  4. Select Phone.
  5. Click Set up and enter the phone number you want to use for recovery and verification.
​
Ep297
Image Source: Screenshot taken by MITE Radio
0 Comments

Google Wants Your Phone Number

31/1/2025

0 Comments

 
Does Google have your phone number?
​

In many cases, especially when creating a new Google account, Google will request a phone number for verification purposes. This helps prevent bot creation of accounts and adds a layer of security from the start. However, there are instances where you might be able to skip this step during initial account creation, though this is becoming less common. If you go into your account settings at any point you may be prompted to add your phone number - perhaps think twice before just ignoring it.
Picture

​Your Google account, the key to your Gmail, holds a wealth of valuable information, making it a prime target for hackers. Protecting this information is crucial, and providing Google with your phone number is a key part of that protection. While privacy concerns are valid, from a security standpoint, the benefits of providing your phone number generally outweigh the risks.


Google recommends using a phone number that:

  • Can receive SMS text messages.
  • Is used exclusively by you.
  • Is used regularly and kept with you.

In other words, your primary smartphone is the ideal choice. Using a shared or infrequently accessed number can compromise the verification process.

Providing your phone number enables several important security features:

  • Two-Factor Authentication (2FA): This adds an extra layer of security by requiring a verification code sent to your phone in addition to your password.
  • Account Recovery: If you forget your password, Google can send a verification code to your phone to help you regain access.
  • Suspicious Activity Alerts: Google can send you alerts if it detects suspicious activity on your account, such as logins from unfamiliar devices or locations.

​By providing Google with your phone number, you are significantly strengthening your account security and making it much harder for unauthorized individuals to gain access. While privacy concerns are understandable, the security benefits are substantial.

Ep297
Image created by AI
0 Comments

Ring Camera

31/1/2025

0 Comments

 
Ring is a company that specializes in home security and smart home devices, most notably known for its video doorbells and security cameras.
​

Picture

Video Recording: Ring cameras record video footage of their surroundings, capturing events like motion detection, doorbell rings, or live views.

Motion Detection: Built-in motion sensors trigger recordings and send notifications to your smartphone when activity is detected.

Two-Way Audio: Many Ring cameras feature two-way audio, allowing you to speak to and hear visitors through the Ring app, even when you're not home.

Night Vision: Infrared LEDs provide clear video footage even in low-light or nighttime conditions.

Wi-Fi Connectivity: Ring cameras connect to your home's Wi-Fi network, allowing you to access live feeds and recorded videos remotely through the Ring app.
​

Cloud Storage: Recorded videos are typically stored in the cloud (with a Ring Protect subscription), allowing you to review past events.

The Ring outdoor camera is a pretty neat bit of kit at $AU99.

Totally wireless and portable with battery lasting 3 months between charges. There is a wired option and a solar option.
​
Ep296
Image Source: ring.com
0 Comments

Smishing

31/1/2025

0 Comments

 
​Phishing, the deceptive practice of tricking people into revealing personal information online, has evolved beyond email. Scammers are now increasingly leveraging text messages to launch "smishing" attacks (SMS phishing), targeting the ever-present smartphone. These attacks can be just as damaging as traditional phishing scams, potentially leading to identity theft, financial loss, and malware infections.
Picture

​Smishing is a growing concern because people often treat text messages with less suspicion than emails. We're used to receiving legitimate updates and notifications via text, making it easier for scammers to blend in.

A typical smishing attack involves a text message designed to create a sense of urgency or excitement. You might receive a message claiming you've won a prize, alerting you to a problem with a delivery, warning of suspicious activity on your bank account, or even offering a limited-time discount. These messages often include a link that, when clicked, leads to a malicious website.

The goal of smishing is the same as phishing: to trick you into giving up valuable information. These links can take you to fake websites that mimic legitimate businesses, prompting you to enter your login credentials, credit card details, or other personal data.

These fake websites are meticulously crafted to look authentic, often using logos and branding stolen from real companies. Once you enter your information, it goes directly to the scammers, who can then use it for fraudulent purposes.

But the danger doesn't stop with fake websites. Some smishing attacks can also install malware directly onto your phone. This malware can track your activity, steal your data, or even take control of your device.

Here are some common examples of smishing attacks:
​
  • "You've won a prize!" These messages often promise a valuable reward, but require you to click a link to claim it.
  • "There's a problem with your delivery." These messages create anxiety about a pending package, urging you to click a link to track its status or resolve an issue.
  • "Suspicious activity on your account." These messages create a sense of urgency, prompting you to log in to your account to verify your identity.
  • "Limited-time offer!" These messages offer enticing discounts or deals, but require you to act quickly by clicking a link.

Protecting yourself from smishing requires vigilance and a healthy dose of skepticism. Here are some key steps you can take:

  • Never click links in text messages from unknown numbers or unrecognized sources: This is the most important rule. If you don't recognize the sender, don't click the link.
  • Be suspicious of messages that create a sense of urgency: Scammers often use tactics that pressure you to act quickly without thinking.
  • Verify directly with the company: If you receive a suspicious text message from a company you do know, contact them directly through their official website or phone number to verify if the message is legitimate. Don't use the contact information provided in the text message.
  • Be wary of shortened links: Shortened links make it difficult to see where they actually lead. Avoid clicking on them whenever possible.
  • Install a reputable mobile security app: These apps can help detect and block malicious websites and malware.
  • Keep your phone's software updated: Software updates often include security patches that can protect against the latest threats.
  • Report suspicious messages: Report smishing attempts to your mobile carrier and to the Federal Trade Commission (FTC) at reportfraud.ftc.gov.

By being aware of the risks and following these simple precautions, you can significantly reduce your chances of falling victim to a smishing attack and protect your personal information.


Ep296
Image created by AI
0 Comments

Google FindMy

31/1/2025

0 Comments

 
Have you tested the Android Find My functionality?

Better to know how to use it before you misplace or lose your phone.

Google: “Find My Device”
Sign in to your Google Account

All your devices linked to that account will show up on a map

Picture

​Tap on your phone and it will zoom in to the location.

If the device is online you can:
  • play a sound
  • Secure the device
  • factory reset
​
Ep296
Image Source: Screenshot taken by MITE Radio
0 Comments

Windows 11 for Free

31/1/2025

0 Comments

 
Microsoft is making it even simpler for Windows 10 users to make the jump to Windows 11. The company has begun rolling out Windows 11 version 24H2 as a free upgrade to eligible Windows 10 PCs.
​

According to a Microsoft support page, "Windows 11, version 24H2, also known as the Windows 11 2024 Update, is now broadly available." The rollout is being expanded to include eligible devices running Windows 10, version 22H2, starting this week. This move signals Microsoft's strong push to encourage wider adoption of Windows 11, especially as the end of support for Windows 10 approaches. This initiative also coincides with the recent announcement that the 24H2 update is now mandatory for Windows 11 users, effectively combining two goals into one.
​
Picture

​To determine if your Windows 10 PC qualifies for the free Windows 11 upgrade, you'll need to ensure it meets certain minimum hardware requirements, most notably the presence of a TPM 2.0 chip.

Here's how to check your eligibility:
​
  1. Open the Settings app on your Windows 10 PC.
  2. Navigate to Windows Update.
  3. If your PC meets the technical requirements, the Windows 11 24H2 update will be displayed as an available upgrade.

It's important to note that the update might not appear immediately, as the rollout is being conducted in phases. It may take a few days for it to reach your specific device. If you're running Windows 10 Home, you'll be upgraded to Windows 11 Home. Upgrading to Windows 11 Pro will require a separate purchase.


This free upgrade offer comes with a deadline. Microsoft will officially end support for Windows 10 on October 14, 2025. After this date, Windows 10 PCs will no longer receive crucial security updates, and compatibility with Office 365 apps may eventually be affected.


While you'll still be able to use your Windows 10 PC after the end-of-life date, doing so will significantly increase your vulnerability to malware and other security threats. Security experts strongly advise upgrading to Windows 11 to maintain a secure computing environment. If upgrading isn't an option, you can explore paying for extended Windows 10 support or consider switching to a different operating system altogether. This free upgrade opportunity offers a compelling incentive for Windows 10 users to transition to the newer operating system before the support deadline arrives.

​
Ep296
Image Source: https://www.microsoft.com/en-us/software-download/windows11
0 Comments

Switchbot Curtain 3

30/1/2025

0 Comments

 
SwitchBot, known for its diverse range of smart home gadgets, offers a clever solution for automating your curtains: the SwitchBot Curtain 3. This small, ingenious device brings a touch of modern convenience to a traditionally manual task, making your home a little bit smarter.

The SwitchBot Curtain 3 is designed to be easily installed on existing curtains. The relatively compact device attaches between the first and second curtain rings, making installation toolless and adaptable to various curtain styles. Once installed and configured, the motor takes over, automatically opening and closing your curtains.
​

Picture
Control is flexible and convenient. You can operate the curtains through the SwitchBot app on your smartphone, or use voice commands via Alexa or Google Assistant. This allows for seamless integration with other smart home devices and routines.

Picture

Beyond simple open and close commands, the SwitchBot Curtain 3 offers automation features based on time of day or other conditions. You can schedule your curtains to open automatically in the morning to wake you with natural light or close at sunset for privacy. For iPhone users familiar with iOS Shortcuts, the SwitchBot can be integrated into custom automations for even more complex routines.
​

​Priced at $US89, the SwitchBot Curtain 3 comes in two variants to accommodate different curtain designs. With over 1,200 reviews and a 4-star rating on Amazon, the product has proven popular among users. When paired with blackout curtains, the SwitchBot Curtain 3 can significantly improve sleep quality by ensuring complete darkness at night and providing a gentle, natural wake-up call in the morning. It's a simple yet effective way to enhance your sleep and bring a touch of automated convenience to your daily routine.

Ep295
Image Source: switch-bot.com
0 Comments

Spear Phishing

30/1/2025

0 Comments

 
We often hear about cyberattacks targeting big businesses, but home computer users are increasingly in the crosshairs of a particularly dangerous type of email scam: spear phishing. Unlike the generic phishing emails that cast a wide net, spear phishing is a highly personalized attack designed to trick specific individuals like you.

Imagine receiving an email that seems to be from a close friend, mentioning a shared inside joke or referencing a recent social media post. It might contain a link to a funny video or an article you'd supposedly be interested in. This is the hallmark of spear phishing: meticulous research and personalized content designed to lower your guard.

​Spear phishing at home is especially concerning because people often feel more relaxed and less suspicious when checking their personal email.

Picture

Instead of sending the same generic message to thousands of people, spear phishers do their homework. They might scour your social media profiles, online forums, and even family websites to gather information about your interests, hobbies, family members, and online activity. This research allows them to create emails that appear incredibly legitimate.

For example, a scammer might discover through your Facebook profile that you're a fan of a particular sports team. They could then send you an email seemingly from a fellow fan, offering "exclusive" tickets to an upcoming game. The email, of course, contains a link to a fake website designed to steal your login credentials, credit card information, or even install malware on your computer.

Another common tactic involves exploiting family connections. A scammer might pose as a distant relative or a friend of a family member, using information gleaned from social media to establish a sense of familiarity. They might claim to be in a financial emergency or offer a "too good to be true" investment opportunity.

The danger of spear phishing lies in its personalization. Because the emails seem so relevant and trustworthy, home users are more likely to click on links, open attachments, or share personal information without thinking twice.

The consequences of falling victim to spear phishing at home can be devastating:
​
  • Identity theft: Scammers can use your stolen information to open credit accounts, apply for loans, or even file taxes in your name.
  • Financial loss: You could lose money through fraudulent transactions, unauthorized purchases, or by falling for investment scams.
  • Malware infection: Clicking on malicious links or opening infected attachments can install malware on your computer, allowing scammers to steal your data, spy on your activity, or even hold your files ransom.
  • Emotional distress: The feeling of being violated and the stress of dealing with the aftermath of a cyberattack can take a significant emotional toll.

Here's how you can protect yourself and your family: (cue the broken record)

  • Be wary of unexpected emails: Even if an email seems to be from someone you know, be suspicious of unusual requests or language.
  • Verify the sender: If you're unsure about an email, contact the supposed sender through a different channel (e.g., phone call, text message) to confirm its legitimacy.
  • Never click on links in suspicious emails: Instead of clicking on a link, type the website address directly into your browser.
  • Be cautious of sharing personal information online: Limit the amount of personal information you share on social media and other online platforms.
  • Use strong passwords and enable two-factor authentication: This adds an extra layer of security to your online accounts.
  • Install and update antivirus software: This can help protect against malware and other online threats.
  • Talk to your family about online safety: Educate your family members, especially children and older adults, about the dangers of spear phishing and other online scams.

By staying informed and practicing good online habits, you can significantly reduce your risk of falling victim to this increasingly prevalent threat.

Ep295
Image created by AI
0 Comments

Windows Quick Keyboard Tips

30/1/2025

0 Comments

 
There are many keyboard shortcuts for Windows 10 and 11 and these are a few that you should remember.

​Useful if you get into trouble and need to close a program of screen that won’t go away.


Picture
CTRL + W: ​Closes the selected active window

ALT + F4: Closes the selected active window (repeatedly press to shutdown Windows)
​
Windows Key + L: Logs you out to the startup screen

​Ep295
Image created by AI
0 Comments

Google Photos Magic Editor

30/1/2025

0 Comments

 
Google Photos has long been a powerful tool for storing and organizing your memories, but its latest feature, the Magic Editor, takes photo editing to a whole new level. Powered by artificial intelligence, the Magic Editor simplifies complex editing tasks, allowing anyone to make stunning adjustments to their photos with just a few taps.
​

Picture

The Magic Editor goes beyond basic adjustments like brightness and contrast. It uses generative AI to understand the content of your photos, enabling you to make more advanced edits, such as:

  • Moving or Removing Objects: Ever wish you could remove a distracting background element or reposition a subject in your photo? The Magic Editor lets you do just that. Simply select the object you want to remove or move, and the AI will intelligently fill in the gap, creating a seamless and natural-looking result.
  • Adjusting the Sky: If your sky is washed out or dull, the Magic Editor can replace it with a more vibrant and dramatic sky from a selection of options. It even intelligently adjusts the lighting and colors of the rest of the image to match the new sky.
  • Enhancing Portraits: The Magic Editor can enhance portraits by subtly improving skin tone, adjusting lighting, and even subtly altering facial features (though this should be used with caution to avoid creating unnatural results).

Using the Magic Editor is designed to be intuitive and user-friendly:

  1. Open a photo in Google Photos: Select the photo you want to edit.
  2. Tap "Edit": This will open the editing tools.
  3. Select "Magic Editor": This will launch the AI-powered editing interface.
  4. Make your edits: Use the various tools to remove objects, adjust the sky, enhance portraits, and more.
  5. Save your changes: Once you're happy with your edits, save the photo.

The Magic Editor is designed to democratize advanced photo editing, making it accessible to everyone, regardless of their technical skills. It removes the need for complex photo editing software and allows users to achieve professional-looking results with minimal effort.

​While some might express concerns about the potential for misuse or manipulation of images, Google emphasizes responsible use and provides tools to help users understand when an image has been significantly altered. The Magic Editor represents a significant leap forward in AI-powered photo editing, offering a glimpse into the future of image manipulation and creative expression. It's currently rolling out to select users and devices, with wider availability expected in the future.

Ep294
Image Credit: Google Photos
0 Comments

Romance Scams

30/1/2025

0 Comments

 
Romance scams exploit people's desire for connection and companionship. Scammers create fake online profiles on dating apps and social media platforms to lure victims into romantic relationships, ultimately with the goal of financial gain. The increasing sophistication of AI tools has made these scams even more convincing and difficult to detect.
​

Picture

How Romance Scammers Operate:
​

  1. Creating Fake Profiles: Scammers create compelling profiles using stolen photos, often of attractive individuals. AI can now generate highly realistic fake profile pictures, making it even harder to spot a fraudulent account. They often craft elaborate backstories and personal details to make their profiles seem genuine.
  2. Building a Relationship: Once they've made contact, scammers engage in extended conversations with their victims, showering them with attention, compliments, and declarations of love. They often mirror the victim's interests and values to establish a strong emotional connection. This "grooming" phase can last for weeks or even months.
  3. Exploiting Trust and Empathy: After gaining the victim's trust, the scammer fabricates a crisis or emergency that requires financial assistance. These stories can be elaborate and emotionally charged, such as:
    - M
    edical emergencies for themselves or a family member. 
    - Travel difficulties or legal problems in a foreign country.
    -    Business setbacks or financial hardship.
  4. Requesting Money: The scammer will then ask the victim for money, often using various methods such as wire transfers, gift cards, or cryptocurrency. They may pressure the victim to act quickly, emphasizing the urgency of the situation.
  5. Maintaining the Deception: Even after receiving money, the scammer may continue the relationship and ask for more funds, creating new emergencies or prolonging the original story. They may also avoid meeting in person or video chatting, offering various excuses.

The Role of AI:

AI has significantly enhanced the effectiveness of romance scams:

  • AI-Generated Images: AI can create realistic fake profile pictures that are difficult to distinguish from real photos.
  • Scripted Conversations: AI-powered chatbots can generate natural-sounding text messages and even engage in limited voice conversations, making it easier for scammers to maintain multiple fake identities.
  • Deepfake Videos: In more advanced cases, scammers may use deepfake videos to create the illusion of video calls or personalized messages, further solidifying the deception.

Protecting Yourself from Romance Scams:


  • Be Wary of "Too Good to Be True" Profiles: Be suspicious of profiles with overly attractive photos or overly flattering descriptions.
  • Reverse Image Search: If you suspect a profile photo is fake, perform a reverse image search on Google Images or TinEye. This can reveal if the photo has been used elsewhere online.
  • Be Cautious of Rapid Declarations of Love: Be wary of individuals who profess strong feelings for you very quickly, especially if you've never met in person.
  • Look for Inconsistencies: Pay attention to any inconsistencies in the person's stories or profile information.
  • Avoid Sending Money: Never send money to someone you've met online, especially if you haven't met them in person. This is the biggest red flag of a romance scam.
  • Be Aware of AI-Generated Content: Learn to identify potential signs of AI-generated images or text, such as unnatural features, repetitive phrases, or inconsistencies in writing style.
  • Talk to Someone You Trust: If you're unsure about an online relationship, talk to a trusted friend or family member for an objective perspective.

If you suspect you've been targeted by a romance scammer, report it to the platform where you met them and to the appropriate authorities. Remember, it's important to protect yourself and your finances by being cautious and skeptical of online relationships, especially those that involve financial requests.

Ep294
Image created by AI
0 Comments

vabsRider Bicycle Seat

30/1/2025

1 Comment

 
For cyclists, saddle soreness is an all-too-familiar foe. That nagging discomfort, numbness, or even pain experienced after long rides can turn a pleasant cycling experience into an ordeal. Now, a new bicycle seat called the vabsRider is aiming to change all that, promising to banish saddle soreness for good.

The vabsRider isn't just another padded saddle. It features a unique split-seat design, consisting of two separate, independently moving padded sections. This approach directly addresses the root cause of saddle discomfort: concentrated pressure on the sit bones.
​


Traditional bicycle seats force the rider's weight onto a small area of the pelvis, the sit bones. As you pedal, your legs move up and down and rotate at the hips, creating friction and pressure points. The vabsRider's split design allows each side of the saddle to move in conjunction with each leg's natural motion. This "virtual axis" movement, centered around the hip joint, is the key to its comfort.

By allowing independent movement, the vabsRider effectively distributes pressure away from the sit bones and onto the larger surface area of the femurs (thigh bones). This more even weight distribution minimizes pressure points, reducing friction and chafing, and ultimately leading to a more comfortable ride.

The benefits of this design are clear:
​

  • Reduced Discomfort: The primary advantage is a significant reduction or elimination of saddle soreness, allowing cyclists to enjoy longer rides without pain.
  • Improved Blood Flow: By minimizing pressure on sensitive areas, the vabsRider can also improve blood flow, reducing numbness and other related issues.
  • Adaptability: The vabsRider is designed to be compatible with various types of bicycles, from road bikes and mountain bikes to commuter and recreational bikes.

While the vabsRider isn't a "smart" device in the sense of incorporating electronics or data tracking, its ingenious mechanical design offers a smart solution to a common cycling problem. It's a testament to the power of biomechanics and ergonomic design in improving the cycling experience. For cyclists tired of saddle soreness, the vabsRider offers a promising new approach to comfortable riding.

Smart but not tech smart.

Ep294
Credit: https://www.ataraxybsc.com/
1 Comment

The End of Image Puzzles?

30/1/2025

0 Comments

 
CAPTCHAs: "Completely Automated Public Turing test to tell Computers and Humans Apart."
​



​
Picture
Just for completeness: The Turing Test is a test of a machine's ability to exhibit intelligent behavior equivalent to, or indistinguishable from, that of a human. 1  It was introduced by Alan Turing in his 1950 paper "Computing Machinery and Intelligence," which explored the question "Can machines think?"

For years, CAPTCHAs have been the internet's gatekeepers, presenting users with distorted text, identifying objects in images, or solving simple math problems to prove they're human. But a new form of CAPTCHA is becoming increasingly common: the simple "I'm not a robot" checkbox. While it might seem too easy, there's a lot more going on behind the scenes.

This new approach, often referred to as "No CAPTCHA reCAPTCHA," relies heavily on analyzing user behavior. When you click that seemingly simple checkbox, the system is secretly observing a range of factors to determine if you're a human or a bot:

  • Mouse Movements: Humans tend to move their mouse cursors in irregular, slightly shaky patterns. Bots, on the other hand, often move the cursor in straight lines or with robotic precision. The system analyzes the trajectory and speed of your mouse movements as you approach and click the checkbox.
  • Click Timing: The timing of your click is also a factor. Humans tend to have slight variations in their click timing, while bots often have consistent, machine-like timing.
  • Browsing History: This is where things get interesting. The CAPTCHA system takes into account your browsing history. If you have a history of normal human browsing behavior, such as visiting various websites, clicking on links, and spending time reading content, it's more likely to consider you a human. Conversely, if your browsing history is limited or shows suspicious patterns, it might raise a red flag.
  • IP Address and Other Data: The system also considers other factors like your IP address, the device you're using, and other technical data to assess the risk.

By combining these factors, the CAPTCHA system can make a highly accurate determination about whether a user is human or a bot, often without requiring any further interaction. If the system is confident that you're human, you'll simply be allowed to proceed. However, if it detects suspicious behavior, it might present you with a more traditional CAPTCHA challenge, such as identifying objects in images.

This new approach offers a much smoother user experience, as most users can simply click the checkbox and move on. It also makes it more difficult for bots to bypass the system, as they need to mimic not only the click itself but also a range of complex human behaviors. While no system is foolproof, this new type of CAPTCHA represents a significant advancement in online security, making it easier for humans to access websites while keeping bots at bay.

Ep294
Image created by AI
0 Comments

Potential New Tiktok Owners?

29/1/2025

0 Comments

 
Oracle and Microsoft are reportedly engaged in talks to acquire TikTok's global operations, according to US- based NPR (National Public Radio). This development comes amidst a backdrop of political pressure and shifting stances regarding the app's future in the United States.

Picture
The proposed deal would involve ByteDance, TikTok's parent company, retaining a minority stake, while Oracle would take the lead in overseeing the app's algorithm, data collection, and software updates. NPR reports that the White House is involved in negotiating the deal, although President Trump later denied direct collaboration with Oracle. He did however acknowledge speaking with numerous interested parties regarding a potential acquisition of TikTok, stating a decision would likely be made within the next month.

Other parties reportedly interested in acquiring TikTok include Elon Musk, real estate billionaire Frank McCourt, and Shark Tank personality Kevin O’Leary. President Trump had previously expressed a preference for Oracle co-founder Larry Ellison to purchase the platform.

Oracle already plays a significant role in TikTok's infrastructure, providing a large portion of its server network. A potential acquisition could see Oracle significantly enhance its involvement, "effectively monitoring and providing oversight with what is going on with TikTok," according to an NPR source who wished to remain anonymous. The source also indicated that a key objective of the agreement is to "minimize Chinese ownership" of the platform.

Microsoft's reported role in the discussions remains less clear, described only as being "engaged in the talks." Microsoft was also involved, along with Oracle and Walmart, in a previous attempt to take over TikTok in 2020, which Microsoft co-founder Bill Gates famously described as a "poisoned chalice." Walmart is reportedly not participating in the current negotiations due to concerns about the app's valuation.

This news follows an executive order granting TikTok and other companies a 75-day reprieve from enforcement actions related to requirements for ByteDance to divest from TikTok in the US. The president had earlier suggested the possibility of a "joint venture" with the US owning 50% of the company.
​

Microsoft has declined to comment on the reports. Reaching out to Oracle, TikTok, and the White House for comment did not immediately result in a response. This potential acquisition highlights the complex intersection of technology, business, and international politics surrounding TikTok and its future.

Ep 295

​Image source: MITE Radio. Sharing and editing welcome.

0 Comments

TikTok Premium

25/1/2025

0 Comments

 
The recent legal rollercoaster surrounding TikTok in the US has created a truly bizarre marketplace on eBay: used iPhones with the app pre-installed are being listed for prices ranging from $2,000 to a staggering $50,000. It seems some sellers think they've struck gold – or at least TikTok gold – believing they've cornered the market on pre-ban digital relics. This comes after a period of legal uncertainty that could rival a soap opera plot, including a Supreme Court ruling, a brief digital blackout, and a subsequent executive order that basically said, "Oops, never mind."
​

Picture

To recap the legal tango: The US Supreme Court upheld a TikTok ban, leading to its removal from app stores and a brief period where the app went dark, leaving millions of teens in a state of existential dread. A subsequent executive order then suspended enforcement of the ban, essentially saying, "Just kidding! You can have your dance videos back." However, legal experts have disputed the validity of this order, suggesting that companies disregarding the original ban could still face substantial fines. This legal limbo created a window of opportunity for opportunistic sellers on eBay – who apparently thought they could sell digital air for a premium.

Well after the ban (however brief it was), prices on ebay skyrocketed, with some "Buy It Now" listings reaching as high as $50,000 for an unlocked iPhone 12 Pro Max with TikTok. That's enough to buy a brand new car, a down payment on a house, or perhaps, several thousand hours of therapy to cope with the loss of TikTok (and the realization you just spent $50,000 on a used phone). Many other listings fell within the $2,000 to $5,000 range, significantly above the typical market value for these devices. You could practically buy a brand new phone and hire a professional TikTok dancer to teach you all the trends for that price.

Settle down people, you can still download the app. It might just be a bit more tricky.
​

Ep293
Image created by AI
0 Comments

Understanding Phishing

25/1/2025

0 Comments

 
Phishing scams, attempts to trick individuals into revealing sensitive information like login credentials or financial details, have become increasingly sophisticated with the advent of artificial intelligence (AI). Scammers are now using AI to craft highly convincing phishing messages that are harder than ever to detect.

Picture
Traditional phishing often relies on generic emails or messages with obvious red flags like poor grammar and spelling. However, AI enables scammers to create context-specific messaging that mimics the writing style and tone of trusted organizations, making the communication appear legitimate. This personalization significantly increases the chances of unsuspecting victims clicking on malicious links.
​​
How AI Enhances Phishing Attacks:

  • Contextual Messaging: AI algorithms can analyze vast amounts of data to understand individual preferences, online behavior, and social connections. This allows scammers to tailor phishing messages to each target, making them more relevant and believable. For example, a scammer might send a fake email from a bank that the victim actually uses, referencing recent transactions or account details.
  • Impersonation of Trusted Organizations: AI can be used to mimic the branding, logos, and communication style of legitimate companies, government agencies, or even personal contacts. This makes it difficult for victims to distinguish between a genuine message and a phishing attempt.
  • Automated Content Creation: AI can generate large volumes of phishing emails or messages quickly and efficiently, allowing scammers to target a wider range of victims.

The Consequences of Clicking a Phishing Link:

Phishing links typically lead to one of two outcomes:

  • Fake Websites: The link directs the victim to a fraudulent website that closely resembles a legitimate login page. Victims are then prompted to enter their username and password, which are immediately captured by the scammer. This allows the scammer to gain unauthorized access to the victim's accounts.
  • Malware Downloads: The link triggers the download of malware onto the victim's device. This malware can take various forms, including viruses, spyware, and ransomware. Malware can steal data, track online activity, encrypt files, or even take control of the device.

Protecting Yourself from Phishing:
​

  • Be Suspicious of Unexpected Messages: Be wary of any unexpected emails, text messages, or phone calls, especially those requesting personal information or urging you to click on links.
  • Verify Sender Identity: Always verify the sender's identity by contacting the organization directly through official channels. Don't rely on contact information provided in the suspicious message.
  • Check Links Before Clicking: Hover your mouse over links before clicking on them to see the actual URL. Look for any suspicious characters or domain names.
  • Use Strong Passwords and Enable Two-Factor Authentication: Strong, unique passwords and two-factor authentication can significantly enhance your account security.
  • Keep Your Software Updated: Ensure your operating system, web browser, and antivirus software are up to date to protect against the latest threats.
​
Ep293
Image created by AI
0 Comments

Volume Adjustments

25/1/2025

0 Comments

 
Do you know where your device’s volume buttons are? Beyond the usual mute and vibrate, your phone's volume controls offer surprisingly granular control over your audio experience. 

Don't just rely on the volume buttons or rocker! Look for the small dots or an expand icon (often a downward-pointing arrow or similar) beneath the main volume slider. Tapping this reveals a hidden menu with separate volume controls for different audio streams like media, ringtones, alarms, and calls. 
Picture

Depending on your device, you might also find quick access to features like Clear Calling (which reduces background noise during calls), Live Caption (which automatically generates captions for audio), and Spatial Audio (for a more immersive sound experience). This expanded menu also allows you to manage audio output to connected Bluetooth devices or cast audio to other screens, all from one convenient location.

It's a powerful feature many of us overlook, so take a moment to explore it and unlock a new level of audio control on your phone.

Ep293
Image Source: Screenshot taken by MITE Radio
0 Comments

Farewell Bixby

25/1/2025

0 Comments

 
A significant shift in the mobile landscape has occurred: Samsung is replacing its Bixby virtual assistant with Google Gemini as the default option when users long-press the side button on their phones. This move has major implications for both Samsung and Google, igniting the already fierce competition in the AI assistant market.

Picture
For Samsung users, this is likely a welcome change. Bixby, while improving over time, never quite reached the level of functionality and widespread adoption of competitors like Alexa, Google Assistant, or Siri. While Bixby will still be available as an app for dedicated users, the vast majority will now have access to Google's more advanced AI.

This switch is an even bigger win for Google. After being caught off guard by the rapid rise of ChatGPT, Google has doubled down on its AI efforts, with CEO Sundar Pichai reportedly believing that Gemini has now surpassed ChatGPT in capabilities. Google aims to reach 500 million Gemini users by the end of the year, and this partnership with Samsung could significantly accelerate that goal.

By making Gemini a front-and-center feature on millions of Samsung Android phones—some of the most popular in the world—Google gains access to a massive new user base. This increased usage provides invaluable data and feedback, which will further refine and improve Gemini's performance. It's a classic network effect: more users lead to better data, which leads to a better product, which attracts even more users.

Google's current advantage lies in Gemini's extensive access to information and a vast user base. While other AI assistants like ChatGPT, Claude, Grok, and Copilot have powerful underlying models and even similar multimodal capabilities, they lack the same level of distribution. These alternatives require users to actively download, install, and open separate apps, while Gemini is now integrated directly into the core functionality of millions of devices.

This deep integration gives Gemini a significant edge. It can perform tasks across multiple apps, seamlessly transferring information between them—for example, pulling data from an email and inserting it into a text message. Due to the architecture of iOS and Android, other assistants currently can't match this level of integration.

Google is also integrating Gemini across its broader ecosystem, from Workspace apps like Gmail and Docs to platforms like YouTube and Drive. This pervasive presence ensures that users encounter and interact with Gemini in various contexts throughout their daily digital lives.

While all current AI assistants, including Gemini, still have limitations and occasional errors, Google's strategy of widespread distribution is a powerful one. By placing Gemini in front of a massive audience, Google gains the data and feedback necessary to rapidly improve its AI, potentially solidifying its position as a dominant force in the rapidly evolving world of artificial intelligence.
​

Ep293
Image Source: Screenshot taken by MITE Radio
0 Comments

NYT Games

25/1/2025

0 Comments

 
The New York Times Games app is a popular destination for word puzzle enthusiasts, offering a variety of engaging games that provide a daily mental workout.
​

Picture

The key strength of the NYT Games app is its diverse selection of puzzles, catering to different preferences and skill levels. Some of the most popular games include:
​
  • Wordle: The viral word game where you have six tries to guess a five-letter word.
  • Spelling Bee: A word puzzle where you create words using seven given letters, with one central letter that must be used in every word.
  • The Mini Crossword: A smaller, quicker version of the classic crossword puzzle.
  • Sudoku: The number-placement puzzle where you fill a 9x9 grid with digits so that each column, each row, and each of the nine 3x3 subgrids that compose the grid contain all of the digits from 1 to 9.
  • Letter Boxed: A word game where you connect letters around the perimeter of a square to form words.
  • Tiles: A matching puzzle game where you clear tiles by finding pairs.
  • Vertex: A logic puzzle where you connect dots to form a single continuous loop.
  • KenKen: A number puzzle similar to Sudoku but with added arithmetic constraints.

Why People Enjoy NYT Games:

  • Daily Challenge: The daily release of new puzzles provides a consistent and engaging activity.
  • Mental Stimulation: The games offer a mental workout, improving vocabulary, logic skills, and problem-solving abilities.
  • Variety Prevents Boredom: The wide range of games keeps things fresh and prevents users from getting tired of a single game mechanic.
  • Convenience: Having multiple puzzle types in one app is more convenient than downloading several individual game apps.
  • Sense of Accomplishment: Completing a challenging puzzle provides a satisfying sense of accomplishment.
  • Connection to a Reputable Brand: The association with The New York Times lends credibility and quality to the app.

Comparison to Other Daily Games:

Individual games like Wordle or smaller crosswords can be fun for a while, but they might lose their appeal after a few weeks or months. The NYT Games app addresses this issue by offering a rotation of different games, keeping users engaged over a longer period.

Overall:

The NYT Games app is a well-regarded platform for word and logic puzzles. Its variety, daily challenges, and connection to a respected brand make it a popular choice for those seeking a daily dose of mental stimulation. While some users might prefer individual puzzle apps, the NYT Games app provides a convenient and comprehensive package for puzzle enthusiasts.

Ep292
Image Source: Screenshot taken by MITE Radio
0 Comments

Investment Scams

25/1/2025

0 Comments

 
The allure of quick riches is a powerful motivator, and scammers are increasingly leveraging the power of artificial intelligence (AI) to create more sophisticated and convincing investment scams. From AI-generated investment advice to phony websites and fabricated hype around AI-related companies, fraudsters are using this technology to deceive unsuspecting investors.
Picture

The speed and efficiency of AI allow scammers to create highly personalized and targeted campaigns, making their pitches even more compelling. Some common tactics include:
​
  • AI-Generated Investment Advice: Scammers use AI to create seemingly personalized investment recommendations, often promising unrealistic returns with minimal risk. These recommendations can be delivered through emails, social media, or even targeted ads.
  • Phony Investment Websites: AI can be used to quickly generate professional-looking websites that mimic legitimate investment firms. These sites may feature fabricated testimonials, impressive performance charts, and other elements designed to build trust.
  • Hype Around AI Companies: Scammers capitalize on the current excitement surrounding AI technology by creating hype around fictitious or overvalued companies supposedly involved in cutting-edge AI research or development. This can lead to "pump and dump" schemes where the price of a stock is artificially inflated and then quickly sold off, leaving investors with losses.

Protecting Yourself from AI-Driven Investment Scams:
​

It's crucial to exercise caution and skepticism when presented with investment opportunities, especially those that seem too good to be true. Here are some key steps to protect yourself:

  • Consult a Registered Investment Advisor: Before making any investment decisions, seek advice from a qualified and registered financial advisor. They can provide unbiased guidance and help you assess the legitimacy of an investment opportunity.
  • Verify Communications: Independently verify any communication you receive from investment companies. Don't rely on contact information provided in unsolicited emails or messages. Instead, look up the company's official website or contact them through known channels.
  • Do Your Research: Thoroughly research any investment opportunity before committing any funds. Look for independent reviews, check the company's registration and licensing, and be wary of investments that lack transparency or have overly complex structures.
  • Never Share Sensitive Information or Transfer Funds Prematurely: Never share personal or financial information, such as social security numbers, bank account details, or login credentials, unless you are absolutely certain of the legitimacy of the recipient. Avoid transferring funds without conducting thorough due diligence.

The use of AI in investment scams represents a significant escalation in online fraud. By staying informed, exercising caution, and following these protective measures, you can significantly reduce your risk of becoming a victim.

Ep292
Image created by AI
0 Comments

Quick Apple Currency Convertor

25/1/2025

0 Comments

 
Imagine you're in London and want to know how much £5 is in AU dollars. You open the Calculator, turn on conversion, select British pounds as the starting currency and AU dollars as the target currency, and then type in "5". The calculator will instantly tell you the equivalent amount in AU dollars.

Picture

​1. Open the Calculator app: Find the Calculator app on your iPhone, iPad, or Mac and open it.

2. Enable Conversion:
  • On iPhone and iPad: Tap the icon in the bottom left corner (it looks like a square with an upward arrow) and then toggle the "Convert" switch to turn it on.
  • On Mac: You can either click the calculator icon and select "Convert," click "View" in the menu bar and select "Convert," or use the keyboard shortcut Option-Command-C.

3. Choose Currencies: Once conversion is enabled, you'll see default currencies at the top. Tap on one of them to bring up a full list. Select the currency you want to convert from and then the currency you want to convert to.

4. Enter the Value: Enter the amount you want to convert in either of the fields. The calculator will instantly show the converted value as you type.

Key things to remember:

  • Real-time Conversion: The calculator uses up-to-date exchange rates to provide accurate conversions.
  • Wide Range of Currencies: The Apple Calculator supports a wide range of world currencies.
  • Other Conversions: Besides currency, the Calculator app can also convert other units like length, weight, temperature, and more. You can swipe through the categories at the top of the list to find these.

This feature is a quick and convenient way to handle currency conversions without needing a separate app or website.

Ep292
Image Source: Screenshot taken by MITE Radio
0 Comments

Microsoft 365 Apps and EOL for Window 10

25/1/2025

0 Comments

 
Microsoft has announced it will discontinue support for its Microsoft 365 apps on Windows 10 starting October 14, 2025, aligning with the operating system's own end-of-life date.

While the apps will continue to function after this date, Microsoft will cease providing updates, including security patches and new features. This means users may encounter performance issues, reliability problems, and increased vulnerability to security threats over time.

Picture

​What This Means for Windows 10 Users:

According to Microsoft's support page, using Microsoft 365 apps on Windows 10 after October 14, 2025, could lead to "performance and reliability issues." The company strongly recommends upgrading to Windows 11 to maintain full functionality, security updates, and access to the latest features.

Alternatives for Windows 10 Users:

If upgrading to Windows 11 isn't an option (due to hardware limitations or other reasons), users have a few alternatives:
​
  • Web Apps: The web-based versions of Microsoft 365 apps will continue to function in supported web browsers on Windows 10.
  • Alternative Office Suites: Free office suites like LibreOffice will likely continue to support Windows 10 for the foreseeable future.
  • Standalone Office 2024: The recently released standalone Microsoft Office 2024 package is compatible with Windows 10 and will be supported for several years, although Microsoft hasn't specified an exact end-of-life date.

The Push for Windows 11:

Microsoft has been actively encouraging Windows 10 users to migrate to Windows 11, even using full-screen prompts within Windows 10 itself. However, many PCs that currently run Windows 10 don't meet Windows 11's stricter hardware requirements, making a direct upgrade impossible for some users.

Extended Security Updates (ESU) for Windows 10:

For users who cannot or choose not to upgrade to Windows 11, Microsoft is offering an Extended Security Update (ESU) program. This program provides security updates for Windows 10 for an additional year (up to 2026) for a fee of $30. Businesses can purchase up to three years of extended support. This means that while regular support ends in 2025, paying for ESU will keep your Windows 10 machine protected against known security vulnerabilities for a limited time longer.

Microsoft's Perspective:

Microsoft executives have emphasized the importance of upgrading to Windows 11, suggesting that PCs will be a key technology refresh for many in 2025.

​The Bottom Line:
​

Windows 10 users need to consider their options before October 14, 2025. Upgrading to Windows 11 is the recommended path for continued support and access to the latest features. However, alternatives like web apps, free office suites, and the standalone Office 2024 package are available for those who cannot upgrade. The ESU program offers a paid option for continued security updates on Windows 10 for a limited time.

Ep292
Image Source: https://www.microsoft.com/en-au/software-download/windows10ISO
0 Comments

Effie Clothes Robot

25/1/2025

0 Comments

 
Here’s a gadget that never made it - Effie the drying and ironing robot.

Effie was a domestic ironing machine designed to automate the chore of ironing clothes. 
​
Picture

Effie was designed to take damp clothes directly from the washing machine and dry and iron them automatically.
​
  • It could handle up to 12 items of clothing at once.
  • It was designed to handle various fabric types, including cotton, silk, viscose, polyester, and denim.
  • Effie used a pressing system and steam to remove wrinkles and dry clothes.
  • It came with special adjustable hangers to accommodate different sizes and types of clothing, from shirts and trousers to bedding.
  • Users simply had to hang their clothes on the provided hangers, load them into the machine, and press start.
  • It could be controlled via a smartphone app, allowing users to start and stop the machine remotely and receive notifications when the process was complete.

…and Effie had wheels, making it easy to move and store when not in use.


Rumor has it, the Effie design concept was on-sold to a large appliance manufacturer and with the latest advancements in AI, I think we will see it reappear in the near future.

Ep291
Image Source: helloeffie.com
0 Comments
<<Previous

    Author

    Delve into the world of MITE Radio through our captivating blogs. From music and tech to community news, our articles offer fresh perspectives and behind-the-scenes glimpses. Stay informed, connect with our community, and explore MITE Radio in a new way today!

    Archives

    June 2025
    May 2025
    April 2025
    March 2025
    February 2025
    January 2025
    December 2024
    November 2024
    October 2024
    September 2024
    August 2024
    July 2024
    June 2024
    May 2024
    April 2024
    March 2024
    February 2024
    January 2024
    December 2023
    November 2023
    June 2023
    May 2023
    April 2023

    Categories

    All
    AI
    App Of The Day
    Bytes & Beats
    Cyber Security
    Discussion
    Gadgets & Gizmos
    Game
    Innovation Hub
    Listener Question
    News
    Other
    Somethin' For Nothin'
    The Tech Absurd
    Tips & Tricks

    RSS Feed



  • MITE RADIO
  • Volunteer
  • Thank You
  • Blog
  • Programs
    • Making IT Easy with Tony & Kay
    • The Blues Hotel ​with Kelvin Huggins
    • Jazz Fusion with Brett C
    • Pheez Feels
    • Able & Unfiltered
    • Glenn & Tracy's Timeless Tracks
    • Cort In The Morning
    • Hits, Quizzes & Stuff with Harley Buckner
    • Solid Gold Sounds - Chris Pitchford
    • Gordon Cooper (multiple programs)
    • The Vinyl Countdown with Jonathan Charles
    • 50 Years and Rolling with Leo Kirby
    • Soul Vaults with David Southway
    • The Best Disco In Town with Jonathan Charles
    • ABC Oldies - JP McCartney
    • 50 Years of Pop with Peter Kirkpatrick
    • All About The 80s with Rob Charles
    • No More Heroes with Magnus Shaw
    • Classic Chart Rundowns with Dave Marley (multiple programs)
    • US UK Rock Soul Connection
    • Decades Breakfast with Mark Gale
    • Flashback to the 60s with Jim Barrington
    • The Time of Our Musical Life with Geoff Wood
    • Steve Bishops Old Record Club
    • Steve Algar ​(multiple programs)
    • Chris Palin ​(multiple programs)
    • The Peter Nightingale Show
    • Deeper Dimensions with David Dyke
    • Choice Cuts with Kevin Butcher
    • Ken Anton (Multiple Programs)
    • Gary Hopkins (Multiple Programs)
  • WAYS TO LISTEN