MITE RADIO 0492 906 469
  • MITE RADIO
  • Volunteer
  • Thank You
  • Blog
  • Programs
    • Making IT Easy with Tony & Kay
    • The Blues Hotel ​with Kelvin Huggins
    • Jazz Fusion with Brett C
    • Pheez Feels
    • Able & Unfiltered
    • Glenn & Tracy's Timeless Tracks
    • Cort In The Morning
    • Hits, Quizzes & Stuff with Harley Buckner
    • Solid Gold Sounds - Chris Pitchford
    • Gordon Cooper (multiple programs)
    • The Vinyl Countdown with Jonathan Charles
    • 50 Years and Rolling with Leo Kirby
    • Soul Vaults with David Southway
    • The Best Disco In Town with Jonathan Charles
    • ABC Oldies - JP McCartney
    • 50 Years of Pop with Peter Kirkpatrick
    • All About The 80s with Rob Charles
    • No More Heroes with Magnus Shaw
    • Classic Chart Rundowns with Dave Marley (multiple programs)
    • US UK Rock Soul Connection
    • Decades Breakfast with Mark Gale
    • Flashback to the 60s with Jim Barrington
    • The Time of Our Musical Life with Geoff Wood
    • Steve Bishops Old Record Club
    • Steve Algar ​(multiple programs)
    • Chris Palin ​(multiple programs)
    • The Peter Nightingale Show
    • Deeper Dimensions with David Dyke
    • Choice Cuts with Kevin Butcher
    • Ken Anton (Multiple Programs)
    • Gary Hopkins (Multiple Programs)
  • WAYS TO LISTEN
Picture
​

click here to listen
​to Mite radio (then click the red play arrow)
An initiative of ​The Stairway Project Inc
Picture

iPhone 16e

28/2/2025

0 Comments

 
Apple's introduction of the iPhone 16e, intended as a more accessible entry point to its latest technology, is generating discussion due to its notably higher price tag compared to previous budget-oriented models.

​The 16e aims to democratize access to Apple's advanced features, particularly its new AI capabilities, but the pricing strategy is prompting comparisons with competing Android devices.
Picture

​Key Features and Trade-offs:


The iPhone 16e includes several upgrades:

  • A18 Chip: A powerful processor ensures smooth performance and compatibility with the latest iOS features, including Apple Intelligence.
  • Enhanced Camera: An improved 48MP main camera promises better image quality.
  • USB-C Port: Adoption of the universal USB-C charging standard.
  • Action Button: Adds a customizable physical control.

However, the 16e also presents some limitations:

  • Elevated Price: The significant price increase over prior SE models is a major point of contention.
  • Feature Gaps: It lacks certain premium features found in higher-end iPhones, such as additional camera lenses and advanced display technology.
  • Display Design: The display retains an older design, with the notch.

Competitive Landscape:

The iPhone 16e enters a competitive market where Android devices, such as the Google Pixel 8a and Samsung Galaxy A series, offer compelling alternatives. These Android phones frequently provide comparable or superior camera systems, higher refresh rate displays, and larger battery capacities, often at more competitive price points.

Starting at $AU999; Google Pixel 8a $849; Samsung Galaxy A55 $699

Market Implications:

The success of the iPhone 16e will depend on consumer willingness to pay a premium for the Apple ecosystem and its integrated software experience. The device's pricing strategy raises questions about Apple's approach to the "affordable" smartphone market, and analysts will be closely monitoring its performance.

Ep305
Image Source: https://www.apple.com/au/iphone-16e/
0 Comments

2FA Hijacking

28/2/2025

0 Comments

 
A new phishing kit called Astaroth is exploiting a vulnerability in two-factor authentication (2FA), putting millions of Gmail and Outlook users at risk.

The kit, which was first advertised last month, allows hackers to steal 2FA codes and session cookies in real-time, effectively bypassing this critical security measure. This is achieved through a "man-in-the-middle" attack, where the user is redirected to a fake login page that mimics the appearance of the legitimate site.
​
Picture
This type of attack bypasses two-factor authentication through session hijacking and real-time credential interception.

Traditional phishing attacks typically capture only primary credentials, leaving 2FA intact. However, Astaroth intercepts all authentication data in real-time, rendering 2FA ineffective.

How the Attack Works:

  1. Users click on a malicious link, often disguised within a seemingly legitimate email or message.
  2. They are redirected to a fake login page that mirrors the appearance of Gmail, Outlook, or another email platform and you are prompted to login.
  3. When users enter their login credentials and 2FA code, this information is instantly captured by the attackers.
  4. The attackers can then access the user's account, even though they have the correct 2FA code.

What You Can Do:

  • Never click on links in emails or messages, even if they appear to be from a trusted source.
  • Always navigate to login pages directly through your browser or app.
  • Be wary of any suspicious pop-up windows or requests for personal information.
  • Consider using passkeys, a more secure authentication method that is not vulnerable to this type of attack.

This phishing kit is readily available for purchase on cybercrime marketplaces for $2,000, making it a serious threat to users. It is crucial to remain vigilant and follow best practices to avoid falling victim to this attack.

Ep305
Image created by AI
0 Comments

Menu Ideas with AI

28/2/2025

0 Comments

 
Cooking can be a joy, but the daily "what's for dinner?" struggle? Not so much. If you're staring blankly into your fridge, inspiration nowhere to be found, Google Gemini can be your secret weapon.
Picture
The Ingredient-Based Inspiration:
​
  • List it Out:
    • Simply type a list of your available ingredients into Gemini. For example: "I have chicken breast, broccoli, carrots, and rice. What dishes can I make?"
    • Gemini will generate a range of meal ideas, from simple stir-fries to more elaborate creations.
  • Get Specific:
    • Want something healthy? Ask: "I have salmon, spinach, and sweet potatoes. Suggest a healthy dinner recipe."
    • Craving comfort food? Try: "I have ground beef, potatoes, and cheese. What comfort food dishes can I make?"

The Visual Approach: Fridge Inventory Made Easy:
​
  • Snap a Pic:
    • Open Gemini and take a clear photo of the contents of your refrigerator.
  • Ask for Suggestions:
    • Upload the photo and ask: "What meals can I make with these ingredients?"
    • Gemini's image recognition capabilities will identify the items and provide meal suggestions. This is perfect when you don't have the energy to manually list everything.

Beyond Food: Cocktail Creations:

  • Home Bar Help:
    • Take a picture of your liquor bottles, mixers, and other bar supplies.
    • Upload the picture to Gemini and ask: "What cocktails can I make with these ingredients?"
    • Gemini will identify the spirits and mixers and suggest cocktail recipes, helping you become your own home bartender.

Why This Works:

  • Overcomes Decision Fatigue: No more staring into the fridge, paralyzed by indecision.
  • Reduces Food Waste: Use up the ingredients you already have.
  • Sparks Creativity: Discover new recipes and meal combinations.
  • Convenient and Fast: Get instant meal ideas with a simple text prompt or photo upload.

Tips for Success:

  • Clear Photos: Ensure your fridge and bar photos are well-lit and in focus.
  • Be Specific: The more details you provide, the better Gemini's suggestions will be.
  • Experiment: Try different prompts and approaches to find what works best for you.
  • Double-Check: Always double-check recipes and ingredient lists to ensure accuracy.
  • Use your own judgement: Gemini is a tool to help you find information, it is not a replacement for common sense.

Let Gemini take the guesswork out of meal planning and cocktail creation, making your kitchen adventures more enjoyable and stress-free.

Ep305
Image created by AI
0 Comments

AI Security Cameras

28/2/2025

0 Comments

 
​A new wave of artificial intelligence is transforming home security, bringing with it both unprecedented convenience and heightened privacy anxieties. AI-powered video searching is rapidly becoming a standard feature, allowing users to analyze their security footage with simple voice commands or text queries.

​This technology, driven by advanced AI models like Gemini and Apple Intelligence, allows users to ask questions like, "Did the kids leave their bikes in the driveway?" or "Did a UPS truck stop by today?" The AI then scans through hours of recorded footage, identifying objects, recognizing patterns, and providing concise, human-readable answers.

Picture

How it Works:

Traditional motion detection and object recognition often generate a deluge of video clips, making it tedious to find specific events. AI video search eliminates this hassle. By leveraging large language models (LLMs), these systems understand natural language queries and can identify a wide range of objects and activities within the footage.

"Home AI could enable language-based notifications and conversations about what's happening at home in real-time," explains Tete Xiao, CEO and co-founder of Prompt AI. "You can get insights such as which delivery service came by, whether the dog was fed and if suspicious activity was detected around your house. You could even ask what your kids did after school or if specific people it recognizes stopped by."

Benefits and Use Cases:

  • Quickly find specific events: Locate misplaced items, track pet movements, or verify deliveries.
  • Monitor activity: Review visitor logs, check on children after school, or ensure pets are behaving.
  • Enhance security: Identify suspicious activity and receive real-time alerts.
  • Summarize events: Get a broad overview of daily or weekly activity.

Brands Embracing AI:

Google Home, Ring (beta), Wyze, and various third-party AI platforms are already offering or developing AI video search capabilities. Amazon's Alexa is also showing signs of entering this space. While Arlo focuses on advanced object detection, and pet cams like Furbo use AI for pet activity analysis, it is expected that almost all video recording security camera companies will implement this technology.

Privacy Concerns:

The use of AI in home security raises significant privacy concerns. AIs require vast amounts of data for training, and users often grant companies permission to use their video footage for this purpose. This raises the risk of data breaches, employee abuse, and potential misuse of personal information.
Furthermore, the cloud storage of video footage increases vulnerability to security flaws.

Opting Out:

Fortunately, most systems allow users to disable AI features or avoid participating in video AI searches. Users can also choose video cameras without subscriptions if they are very concerned about privacy.

"We never train on user data without explicit permission, and even then, we do not use personal details—period," says Tete Xiao. "We also give users the ability to permanently delete their data from our platform at any time."

As AI continues to integrate into home security, it's crucial for consumers to understand the benefits and risks, and to choose systems that prioritize privacy and data security.

Ep305
Image created by AI
0 Comments

AR Surgery

28/2/2025

0 Comments

 
"Woah... this is an insane AR breakthrough." That's the sentiment echoing across the tech and medical communities as Medivis unveils SurgicalAR, a revolutionary tool poised to redefine surgical procedures. Gone are the days of surgeons relying solely on flat, 2D images from MRIs and CT scans. In their place, a world where 3D visualizations are overlaid directly onto the patient's body in real-time, thanks to the power of augmented reality (AR) and artificial intelligence (AI).
Picture
Imagine trying to explain to future generations that surgeons once navigated the complexities of the human body by interpreting 2D slices on a screen. It's a stark contrast to the immersive, intuitive experience offered by SurgicalAR, a leap so significant it could easily be compared to moving from candlelight to electric light.

Medivis has essentially transformed static, 2D diagnostic images into dynamic, 3D holograms, allowing surgeons to see a patient's anatomy as if it were transparent. This provides an unprecedented level of detail and spatial awareness, potentially minimizing errors and improving surgical outcomes.

While 3D reconstructions of medical images have existed on monitors, the real game-changer here is the integration with AR. By overlaying these 3D models onto the patient's actual body, surgeons gain a real-time, intuitive understanding of the anatomical landscape they're operating within. This is not just a technological advancement; it's a paradigm shift.

The question naturally arises: is there a genuine clinical need for AR in surgery? While healthcare professionals routinely utilize 3D reconstructions on monitors, the added dimension of AR offers a level of immersion that could significantly enhance surgical precision. The ability to visualize intricate anatomical structures in their true spatial context, directly on the patient, could be invaluable for complex procedures.

Beyond the theoretical benefits, the practical implications are profound. Even the most skilled surgeons are human, and errors can occur. SurgicalAR has the potential to mitigate these risks by providing a more comprehensive and intuitive visualization of the surgical field. This could lead to reduced complications, shorter recovery times, and ultimately, saved lives.

Of course, the successful implementation of any new technology hinges on its performance. Latency, or the delay between input and output, is a critical factor in surgical applications. Medivis's ability to achieve real-time rendering and seamless overlay is a testament to the advancements in AR and AI technology.

The arrival of SurgicalAR marks a significant milestone in the evolution of surgical technology. It's a tangible example of how AR and AI are moving beyond science fiction and into the realm of practical, life-saving applications. As these technologies continue to mature, we can expect to see even more clever solutions that transform the way we approach healthcare. The era of 2D surgery is fading, and the future, it seems, is vividly 3D.

Ep304
Image Source: Video on https://www.medivis.com/
0 Comments

Do the Scam Quiz

28/2/2025

0 Comments

 
Take the 2 minute quiz on the scamwatch website and test your understanding. (multiple choice)

1. What are some common signs that you are dealing with a scammer?

2. Phishing scams are attempts by scammers to deceive you into sharing your personal information. 

​
Which of the following can you rely on, to be sure you aren't dealing with a phishing scam?

3. You receive a call or message from an organisation you think you know, claiming your device or accounts aren't secure. What do you do?

4. Which of the following is a common tactic used by scammers to get you to give them money quickly?

5. What’s the first thing you should you do if you think you've had money or information stolen by a scammer?

6. Scammers may intercept and modify invoices or call you to change bank account details on a bill you’re expecting.

What can you do to stay safe from these scams?

7. Which of the following is the best way to protect yourself from online shopping scams?

8. What does Scamwatch recommend people do to stay safe from scams?
​

Picture
Ep304
Image Source: https://www.scamwatch.gov.au/
0 Comments

Summarise Recipes with AI

28/2/2025

0 Comments

 
Tired of wading through endless recipe blog posts just to find the ingredient list? We've all been there: a simple chicken adobo recipe buried under a novel about its origins and endless pop-up ads. Thankfully, Google Gemini can be your culinary sidekick, cutting through the clutter and getting you straight to the cooking.
​


Picture

​Here's how to use Gemini to streamline your recipe experience:


1. Copy the Recipe Link:

  • Find the recipe you want to cook and copy the URL from your browser's address bar.

2. Ask Gemini to Summarize:

  • Open Gemini (either through the website or app).
  • Paste the recipe link into the prompt.
  • Add a clear request, such as: "Summarize this recipe. Provide a list of ingredients and a list of steps."

3. Convert Units (Optional):

  • If you prefer metric units, add a conversion request to your prompt. For example: "Also, convert all measurements to grams and milliliters."
  • Gemini will attempt to convert the units for you. It is always a good idea to double check the conversions, especially for baking.

4. Generate a Shopping List (Optional):
​
  • To create a shopping list, add another request to your prompt: "Generate a shopping list and save it to my Google Keep notes."
  • Gemini will create a new note in your Google Keep with the ingredients listed. This is a great way to have your shopping list ready when you head to the store.

Example Prompt:

"Summarize this recipe: [Recipe URL]. Provide a list of ingredients and a list of steps. Also, convert all measurements to grams and milliliters. Generate a shopping list and save it to my Google Keep notes."

Why This Works:

  • Saves Time: Gemini quickly extracts the essential information, eliminating the need to scroll through lengthy blog posts.
  • Customizable: You can tailor your prompts to get the exact information you need, including unit conversions and shopping lists.
  • Organized: Google Keep integration keeps your shopping lists easily accessible.

Tips for Best Results:
​
  • Be Specific: The more specific your prompt, the better Gemini's response will be.
  • Double-Check: Always double-check ingredient lists and conversions, especially for critical measurements in baking.
  • Experiment: Try different prompts to see what works best for you. You can even ask Gemini to suggest substitutions or variations on the recipe.

With Gemini, you can spend less time reading and more time cooking. Enjoy!

Ep304
Image created by AI
0 Comments

GPS School Zones

28/2/2025

0 Comments

 
Are you a Wazer, Google or Apple maps or God forbid a UBD/MSD user?
​

Despite persistent whispers of an eventual merger with Google Maps, Waze continues to assert its independence with a steady stream of clever features, solidifying its position as a navigation powerhouse. The latest addition, school zone alerts, further demonstrates Waze's commitment to enhancing driver safety and awareness, pushing the boundaries of what a navigation app can offer.

​
Picture
The popular community-driven navigation app, known for its real-time incident reporting, has now rolled out school zone alerts, a feature highly requested by users. This addition builds upon Waze's core strength: leveraging user-generated data to provide timely and relevant information to drivers.

Waze's unique selling point lies in its ability to harness the collective knowledge of its users. Drivers can report real-time hazards, such as accidents, traffic jams, and road closures, allowing the app to dynamically adjust routes and alert other drivers. Beyond these temporary incidents, Waze also incorporates "permanent hazards," like speed bumps and merging lanes, added by dedicated map editors. Now, this category includes school zones.

The new school zone alerts, which began appearing on Waze platforms, including Android Auto and CarPlay, offer two distinct forms of notification. Drivers receive a pop-up alert on their screen, warning them of an approaching school zone and urging increased vigilance. Additionally, a dedicated school zone icon appears on the map, pinpointing the exact location of the hazard.

These alerts are designed to cover both schools and kindergartens, and they are triggered not just by the buildings themselves, but also by nearby crosswalks, recognizing the increased likelihood of pedestrian traffic. This comprehensive approach ensures drivers are aware of potential risks and can take appropriate precautions.

Ep304
Image Source: https://play.google.com/store/apps/details?id=com.waze&hl=en_AU
0 Comments

Vita Mahjong

28/2/2025

0 Comments

 
Vita Mahjong is a classic mahjong solitaire game that offers a relaxing and challenging experience for players of all skill levels and no ads!
Picture

​Classic Gameplay: The game faithfully recreates the traditional mahjong solitaire experience, providing a familiar and enjoyable gameplay loop.

Large Tile Sets: The game features a variety of beautifully designed tile sets, adding visual appeal and variety.

Hundreds of Levels: With a vast number of levels, Vita Mahjong offers ample replayability and a constant stream of new challenges.

User-Friendly Interface: The game boasts a clean and intuitive interface, making it easy to navigate and understand.

Relaxing Atmosphere: The game's soothing background music and sound effects create a calming and enjoyable gaming experience.

Vita Mahjong is a well-executed and enjoyable mahjong solitaire game that offers a relaxing and engaging experience. With its large selection of levels, beautiful visuals, and user-friendly interface, it's a great option for fans of the classic tile-matching puzzle.

Available for Android and iOS in the usual places.

Ep303
Image Source: https://play.google.com/store/apps/details?id=com.vitastudio.mahjong&hl=en_AU
0 Comments

Protect Your Facebook Account

28/2/2025

0 Comments

 
A sophisticated phishing campaign targeting Facebook users is underway, demanding immediate attention to safeguard your personal data. Security experts at Check Point have issued a critical alert, revealing a widespread attack that leverages the Facebook brand to steal credentials and compromise accounts.
​

Picture

Thousands Targeted in Ongoing Phishing Scheme

This campaign, since it was detected, has reached over 12,000 individual email addresses and numerous organizations. Primarily targeting users in the U.S. and Europe, with some Australian victims, the attack poses a significant threat due to Facebook's massive user base.

Deceptive Tactics Employed

Cybercriminals are using a clever tactic to appear legitimate. The phishing emails are sent via an automated mailing service, leveraging Salesforce's marketing tools, and use a "[email protected]" return address. This adds a layer of authenticity, making the emails harder to distinguish from legitimate communications.

The emails themselves are designed to instill fear and urgency. They claim a copyright infringement violation, prompting recipients to click a link to a fake Facebook support page. This page then requests account credentials under the guise of an "account review," rather than a direct account disablement threat, which is a subtle, but effective, psychological manipulation.

The Danger of Phishing Kits

Adding another layer of severity to this attack, new reports indicate the use of phishing kits. These kits make it easier for cybercriminals to launch these attacks, even those with limited technical skills. This means the number of attacks could drastically increase.

What You Need to Do Immediately: cue the broken record…

  • Be Suspicious of Emails:
    • Treat any email claiming copyright infringement or demanding immediate action with extreme caution.
  • Verify Directly:
    • Never click on links in suspicious emails. Instead, navigate directly to Facebook's official website or app to check for any notifications.
  • Check Sender Addresses:
    • While the "[email protected]" address adds legitimacy, always scrutinize the full sender address and look for any inconsistencies.
  • Enable Two-Factor Authentication (2FA):
    • Adding 2FA to your Facebook account provides an extra layer of security, making it harder for hackers to gain access even if they have your password.
  • Educate Yourself and Others:
    • Share this information with friends and family to help them avoid falling victim to these attacks.
  • Keep Software Updated:
    • Ensure all your devices and security software are updated. Updates often contain crucial security patches.
  • Report Phishing:
    • If you receive a phishing email, report it to facebook.

The Importance of Vigilance

This Facebook phishing campaign serves as a stark reminder of the constant threat posed by cybercriminals. Staying vigilant and practicing safe online habits are crucial for protecting your personal information and avoiding becoming a victim.

Ep303
Image created by AI
0 Comments

Sharing Passwords

28/2/2025

0 Comments

 
Sharing passwords within a family can be a necessary evil. From streaming services to Wi-Fi logins, keeping everyone connected often means sharing sensitive information. But how do you do it securely? Google Password Manager now offers a streamlined and safe way to share passwords with your family group directly from your phone.
Picture

Why Share Passwords Securely?

  • Convenience:
    • Avoid the hassle of repeatedly typing or verbally sharing passwords.
  • Security:
    • Sharing through Google Password Manager keeps your credentials encrypted and protected.
  • Family Unity:
    • Ensure everyone in your family has access to essential online services.

How to Share Passwords Using Google Password Manager on any device:
​
1.    Open Chrome:
  • ​Tap the Chrome menu (three dots) within the Chrome app.

2.    Access Password Manager:
  • Select "Password Manager."
​
3.   Choose the Password:
  • Select the specific password you wish to share.

4.   Tap "Share":

  • Tap the "Share" icon (usually an upward-pointing arrow).
​
5.    Select Family Members:
  • Choose the family members you want to share the password with.

Important Tips:

  • Family Group:
    • Ensure you have a Google Family Group set up before attempting to share passwords.
  • Review Shared Passwords:
    • Periodically review the passwords you've shared and revoke access when necessary.
  • Strong Passwords:
    • Always use strong, unique passwords for all your online accounts.
  • Keep Chrome Updated:
    • Ensure your Chrome app is up to date to access the latest features and security enhancements.
  • Get Chrome:
    • If you do not have chrome on your mobile device, scan the QR code to install it.

Using this method, you can safely and efficiently share passwords with your family, ensuring everyone has access to the online services they need.


Ep303
Image Source: https://passwords.google.com/
0 Comments

Move Over Google Search

28/2/2025

0 Comments

 
In a bold move in the online search space, OpenAI has announced that ChatGPT Search is now freely available to everyone, no account required. This update opens the doors to AI-powered web exploration for a vast audience, sparking questions about whether it's time to reconsider our reliance on traditional search engines like Google.
​
Picture

Search Without Barriers:

OpenAI's announcement, delivered via X, eliminates the previous requirement of an OpenAI account for accessing ChatGPT Search. Users can now simply visit ChatGPT.com and begin searching, enjoying the benefits of AI-driven information retrieval without any signup process.

What is ChatGPT Search?

ChatGPT Search integrates web browsing directly within the popular chatbot, enabling users to receive up-to-date information, detailed summaries, and links to relevant sources. This functionality addresses a key limitation of earlier ChatGPT versions, which had a knowledge cut-off date, preventing them from providing information on current events.

Challenging the Status Quo:

The removal of the account requirement marks an additional pivotal moment for AI search engines. With its ability to provide in-depth summaries and source citations, ChatGPT Search presents a compelling alternative to traditional search methods. OpenAI states that "ChatGPT can search the web and get you fast, timely answers with links to relevant web sources directly in ChatGPT."

A Gradual Rollout:

The new feature will be rolled out to logged-out users over the next few days. If you don't see the search icon immediately, check back soon.

Is it Time to Ditch Google?

While ChatGPT Search offers a unique and powerful approach to information gathering, the question remains: is it ready to replace Google?

Google Search has become deeply ingrained in our daily lives, serving as the primary gateway to online information for billions. ChatGPT Search, with its AI-driven summaries and source integration, offers a distinct experience. However, some users prefer the control and autonomy of curating their own information sources. That said, you can still do both or choose which you prefer.

The Future of AI Search:

ChatGPT Search is still in its early stages, and its capabilities are expected to evolve significantly. For those curious about AI-powered search, this is an opportune moment to explore its potential. Whether it will ultimately dethrone Google remains to be seen, but OpenAI's move undoubtedly signals a shift in the way we access and consume information online.
​

Check it out ChatGPT.com
​

Ep303
Image Source: https://openai.com/index/introducing-chatgpt-search/
0 Comments

Pepe Pet Washer Update

28/2/2025

0 Comments

 
Were you listening when we spoke about the Pepe Pet dryer? Well it seems the concept is catching on and with increased interest, pricing has basically halved. You can get one of these bench top marvels for half the original price $300 from many online retailers including: Catch, Kogan, AliExpress, ebay and even Woolies! Sheesh

Picture

Automated drying: The PEPE Dry Room uses warm air circulation to dry your pet's fur after a bath, eliminating the need for manual towel drying or blow drying. This can be especially helpful for pets who dislike the noise or force of a traditional hair dryer.

Grooming features: Some models may include features like UV sterilization to keep the drying chamber clean and hygienic, as well as different drying modes for various fur types or needs.

Stress reduction: The enclosed design can provide a sense of security for some pets, and the quiet operation helps minimize anxiety during the drying process.

Convenience: It frees up your hands to do other things while your pet is drying, and it helps contain the mess of shedding fur.

Ep302
Image Source: Screenshot taken on Google search website
0 Comments

Update Your Browsers

28/2/2025

0 Comments

 
In today's digital world, online threats like malware, scareware, and intrusive pop-ups are a constant concern. But did you know that your web browser is a powerful tool in your defense arsenal? Keeping your browser consistently updated is crucial for maximizing its protective capabilities and staying safe online.

Picture
Why Updates Matter: A Security Power-Up
​

Browser developers are constantly working to improve security features and patch vulnerabilities that cybercriminals exploit. These updates are not just about adding new features; they're vital for safeguarding your digital experience. Here's how:
​

  • Patching Security Holes:
    • Cybercriminals are adept at finding weaknesses in software. Browser updates often include critical security patches that close these gaps, preventing malware and scareware from infiltrating your system.
  • Enhanced Threat Detection:
    • Modern browsers incorporate sophisticated "safe browsing" features that analyze websites and downloads for suspicious activity. Updates ensure these systems have the latest threat intelligence, allowing them to identify and block emerging dangers.
  • Blocking Deceptive Tactics:
    • Scareware and malicious pop-ups often rely on trickery and deception. Updated browsers are better equipped to recognize these tactics, providing clear warnings and preventing unwanted intrusions.
  • Strengthening Built-in Defenses:
    • Browsers continuously enhance their built-in security features, such as pop-up blockers, phishing protection, and malware scanners. Regular updates ensure you have the latest and most effective versions of these tools.

Beyond Updates: Smart Browsing Habits

While keeping your browser updated is essential, it's also crucial to practice safe browsing habits:

  • Be Cautious of Links:
    • Avoid clicking on links from unknown sources or suspicious emails.
  • Verify Website Authenticity:
    • Double-check website URLs and look for secure connections (HTTPS).
  • Download from Trusted Sources:
    • Only download software and files from reputable websites.
  • Utilise Security Software:
    • Complement your browser's security with robust antivirus and anti-malware software.

The Bottom Line: Proactive Protection

In the ongoing battle against online threats, staying proactive is key. By keeping your browser updated and practicing safe browsing habits, you can significantly reduce your risk of falling victim to malware, scareware, and other browser-based attacks. Take control of your online security and make browser updates a regular part of your digital routine.

Ep302
Image created by AI
0 Comments

Smart Sleep Mask

28/2/2025

0 Comments

 
Sleep masks have been around for a while. They are basically a blindfold you put on which have speakers embedded in the material around your ears and you can pipe music through them to help you sleep - yawn so yesterday.
​

Picture

​Enter the smart sleep mask. Yes they are a blindfold with hidden speakers and  bluetooth connectivity to your phone for ease of control, but now we have emerging smart tech.

Voice control, sleep tracking, sleep optimisation based on how much you stir can change the music to better suit the differing stages of your sleep.

It’s early-ish days but there are some cool tweaks to this concept nearing the end of the pipeline. Check out Manta if you’re keen.

Ep302
Image Source: mantasleep.com.au/products/manta-sleep-mask-sound
0 Comments

Handing Over Your ID has Become Common-Place

28/2/2025

0 Comments

 
Handing over your driver's license or passport for a quick scan at a club entrance has become increasingly commonplace, but is your personal information truly safe? As venues embrace sophisticated ID scanning technology, concerns are mounting over the potential misuse and security of sensitive data.
​

A sentiment shared by many: "You don't get a choice, if you want to go inside, they take a photo. It kind of sucks." We, like many others, feel a sense of lost privacy in exchange for the convenience of entry. We are forced to put our trust in venues to handle data responsibly, the reality is that the practice raises significant privacy questions.
​

Picture
The Rise of ID Scanning Technology

Companies like Scantek are driving the widespread adoption of ID scanning systems. These systems can verify ID authenticity, perform facial recognition to match individuals to their documents, flag troublemakers, and even share banned patron information between venues. This technology, often implemented at the industry's own initiative rather than legal mandate, is rapidly expanding its reach.

Privacy Concerns and Legal Ambiguities

Australian Privacy Commissioner Carly Kind has labeled the practice "very concerning" and "problematic." She highlights the inherent risks of collecting and storing sensitive data like driver's license and passport information, warning of potential misuse and long-term storage.

While some states mandate ID scanning for specific venues or in designated "Safe Night Precincts," most bars and nightclubs operate without such legal requirements. The Privacy Act, being principle-based, offers flexibility but lacks clear "red lines," leaving room for interpretation.

Data Breaches and Security Risks

The potential for data breaches is a significant concern. There have been many breaches in many more sophisticated systems involving the personal details of over a millions of people in recent years and this just underscores the vulnerability of such systems.

Cybersecurity experts warn that no technology is 100% secure, and businesses must carefully weigh the risks against the benefits of collecting and storing sensitive data. Even with robust safeguards, the reputational damage from a breach falls squarely on the venue.

The Balancing Act: Safety vs. Privacy

Venues argue that ID scanning enhances patron safety and reduces incidents. They also point to the technology's assistance in police investigations. However, privacy advocates argue that the collection of excessive personal information, beyond what's necessary for age verification, is a dangerous trend.

Angus Murray, vice president of the Queensland Council for Civil Liberties, advocates for "data minimization," urging businesses to collect only the essential information. He also raises concerns about the use of facial recognition technology and the commercialization of personal data.

The Future of Privacy: Reforms and Regulations

The Australian government is in the process of reforming the Privacy Act, aiming to provide clearer guidelines and stronger protections. Future reforms may include stricter limits on data collection and harsher penalties for breaches.

In the meantime, the patchwork of state-based regulations leaves a confusing landscape for both venues and patrons. As technology advances and data breaches become more frequent, the debate over ID scanning and privacy is likely to intensify.

What Can You Do?


  • Be Aware: Understand your rights and the risks associated with ID scanning.
  • Ask Questions: Inquire about a venue's data storage and security practices.
  • Advocate for Change: Support privacy reforms and demand greater transparency from businesses.

​As the lines between convenience and privacy blur, it's crucial to remain vigilant and advocate for responsible data handling practices.

Ep302
Image created by AI
0 Comments

Sorting Hat Coffee Maker

22/2/2025

0 Comments

 
Concept only at this stage but if you're interested in a magical way to brew your morning coffee, the Sorting Hat Coffee Maker may be just what you need.
​

Picture

  • The idea exists in the fan community: Many Harry Potter enthusiasts have envisioned and even created their own versions of a Sorting Hat Coffee Maker. These creations range from concept art and 3D models to actual DIY projects.
  • Inspiration from the books: The Sorting Hat is a central element of the Harry Potter series, known for its ability to determine which Hogwarts house a new student belongs in. Combining this magical object with the everyday ritual of coffee brewing creates a fun and imaginative concept.
  • DIY and creative projects: Some fans have taken it upon themselves to bring this idea to life. You might find tutorials or examples online of people who have customized existing coffee makers to resemble the Sorting Hat.
  • The potential for a magical experience: Imagine your coffee maker not just brewing your drink but also "sorting" you into your house for the day! This could involve some fun features like the hat speaking, changing colors, or even dispensing different coffee flavors based on the house.

While an official Sorting Hat Coffee Maker might not be on the market yet, the creativity and passion of Harry Potter fans could very well bring it to life someday. In the meantime, you can find plenty of other Harry Potter-themed kitchenware and merchandise to add a touch of magic to your daily routine.

​If you're interested in exploring this idea further, I recommend searching online for "Sorting Hat Coffee Maker" to see the various fan creations and concepts that exist. You might even find inspiration to create your own!

Ep301
Image Source: https://creative.hudistore.com/a-sorting-hat-coffee-maker/
0 Comments

Google is Using AI to Protect You

22/2/2025

0 Comments

 
Google Chrome users are now enjoying a significant upgrade to their online safety with the rollout of an AI-powered "Enhanced protection" feature.  After a three-month testing period in the Canary channel, the update has landed in the stable Chrome release across all platforms, including Windows, Android, and iOS.
​

Picture
This update supercharges Chrome's existing Safe Browsing feature, which has long offered "Enhanced protection" against malicious websites, downloads, and extensions.  While the basic protection has been available for years, Google has now integrated artificial intelligence to provide real-time threat detection.

This update is now widely available. While Google previously described Chrome's protection as "proactive," the shift to AI-driven security marks a substantial change.  The exact mechanics of the AI integration remain somewhat unclear, but it's likely that Google is leveraging AI's ability to recognize patterns in real-time. This could allow Chrome to identify and warn users about potentially harmful websites and downloads, even those not previously flagged by Google's security systems.  The AI also performs more thorough scans of downloads for suspicious activity.

One key benefit of the new system is the potential for detecting zero-day threats – malicious sites or files that haven't yet been identified and added to traditional blacklists. The AI's ability to learn and adapt could provide a crucial layer of defense against these emerging dangers.

While the enhanced protection offers a significant security boost, it does come with a caveat. Google has disclosed that browsing data is sent to their servers when the feature is active.  This data sharing is a trade-off for the real-time analysis and threat detection capabilities provided by the AI.
​

Enhanced protection with AI is disabled by default. Users who wish to activate it can do so by navigating to Settings > Security within the Chrome browser on their respective devices.  The choice is now in the hands of the user: enhanced security with data sharing, or the standard level of protection.

Ep301
Image Source: https://www.google.com/intl/en_au/chrome/
0 Comments

Freezing Task Manager

22/2/2025

0 Comments

 
Have you used task Manager in Windows to see running programs and perhaps try to find a particular program to kill it? 

The Windows Task Manager is a powerful tool for monitoring your system's performance, but its constant, real-time updates can be a bit overwhelming. Processes jump around, resource usage fluctuates, and it's easy to lose track of what you're trying to analyze. If you've ever found yourself frustrated by this dynamic display, here's a simple trick to literally take control: freeze the Task Manager.

How to Freeze the Task Manager:
​
  1. Open Task Manager: Press Ctrl + Shift + Esc or right-click the taskbar and select "Task Manager."
  2. Hold the CTRL Key: To freeze the Task Manager's updates, simply press and hold the CTRL key.
  3. Analyze the Data: While holding the CTRL key, you can freely navigate through the Task Manager, examine process details, and capture screenshots.
  4. Resume Updates: When you're finished analyzing the data, release the CTRL key. The Task Manager will immediately resume its real-time updates.

Picture
Ep301
Image Source: Screenshot taken by Mite Radio
0 Comments

Edging Ahead with Microsoft

22/2/2025

0 Comments

 
Microsoft is making a serious push to win over users with its Edge browser, and it's not resorting to tricks this time. Instead, the company has focused on what truly matters: speed. In a recent blog post, Microsoft announced that Edge has become significantly faster, with performance improvements across a wide range of features.
​
Picture

Starting with version 132, Edge users have been experiencing an average 40% performance boost in 14 key areas, including Downloads, Drop, History, inPrivate browsing tabs, Favorites, and Browser Essentials. This means quicker loading times, smoother navigation, and an overall more responsive browsing experience.

The secret behind this speed surge? Microsoft's migration to WebUI 2.0. This "markup-first architecture" streamlines the browser's code, reducing its size and the amount of JavaScript needed to run various interfaces. The result is a leaner, more efficient browser that can handle tasks with greater agility.

Microsoft even provided a compelling example, showcasing how the Downloads UI is now a remarkable 54% faster on a Surface Laptop 4 with an Intel Core i7 processor and 32GB of RAM, thanks to the switch to WebUI 2.0.

But Microsoft isn't stopping here. The company has pledged to continue optimizing Edge's performance in the coming months, targeting areas like settings, print preview, and read aloud. This commitment to ongoing improvement suggests that Edge's speed advantage may only grow stronger.

The good news for Edge users is that these performance enhancements are already available. Edge version 132 rolled out in early January 2025, and the current stable release, version 133, likely includes these speed improvements. So, if you're an active Edge user, you're probably already enjoying a faster browsing experience.

​With these significant performance gains, Microsoft is making a strong case for Edge as a top-tier browser. It's a clear indication that the company is listening to user feedback and prioritizing performance to compete with rivals like Chrome and Firefox.

Ep301
Image Source:
https://www.microsoft.com/en-gb/edge/?cs=3769934801&form=MA13FJ
0 Comments

Windows PC Manager

15/2/2025

1 Comment

 
Keeping your Windows PC running smoothly just got easier. Microsoft has released PC Manager, a free, built-in tool designed to optimize Windows 10 and 11 performance, eliminating the need for third-party cleanup software. This move marks a significant shift, bringing system maintenance in-house after years of reliance on external applications like CCleaner.

A New Era of PC Optimization:

While Microsoft has long provided security tools like Windows Defender, system maintenance has traditionally been left to third-party developers. PC Manager changes this, offering an official, integrated solution for optimizing performance. Following a successful trial in China, Microsoft has launched PC Manager globally, directly competing with established cleanup software. Its seamless integration with Windows offers a key advantage, minimizing compatibility issues and security risks often associated with third-party programs.

Picture

What PC Manager Offers:

This free tool provides a range of features to boost system efficiency and declutter your PC:
​
  • PC Boost: Quickly clears temporary files, reduces RAM usage, and closes unnecessary background processes. "Smart Boost" goes further, identifying and removing files over 1GB for even greater performance gains.
  • Deep Cleanup: For a more thorough cleaning, Deep Cleanup targets outdated system files, browser caches, and the recycle bin, freeing up significant storage space.
  • Startup Management: Control which programs launch at startup to drastically reduce boot times.
  • Process Management: Easily identify and close resource-hogging processes through a user-friendly interface, simplifying the functionality of Task Manager.
  • Large Files Locator: Quickly find oversized files to easily delete or move them, freeing up valuable disk space.

A Game Changer for Windows Users:
​

PC Manager offers a compelling alternative to third-party optimization tools, providing a secure and reliable way to maintain PC performance. Early users have praised its ease of use and effectiveness. "Switching to PC Manager was seamless," says tech enthusiast Lily Thompson. "It's easy to use, and since it's developed by Microsoft, I feel more secure using it. My PC runs like new again!"

The Future of PC Manager:

Currently available in multiple languages, including English, Spanish, and Chinese, PC Manager is expected to expand to more regions soon. Microsoft has also indicated that future updates are planned based on user feedback, ensuring the tool continues to evolve alongside Windows 10 and 11.

A Must-Try for Windows Users:
​

With PC Manager, Microsoft has raised the bar for PC maintenance, offering a free, built-in solution that simplifies system optimization. If you're a Windows 10 or 11 user, PC Manager is definitely worth exploring. It's a simple yet powerful way to refresh your computer and experience improved performance. It may already be installed for your PC. If not Microsoft Store -> Microsoft PC Manager.

Ep300
Image Source: Screenshot taken by MITE Radio
1 Comment

Stop Check Protect

15/2/2025

0 Comments

 
Scams are a growing threat, and the Australian Competition and Consumer Commission (ACCC) is fighting back with its "Stop. Check. Protect." campaign. This initiative aims to equip Australians with the tools they need to identify and avoid scams.

The Three-Step Approach:

The campaign emphasizes three crucial actions:
​
  • Stop: Don't rush into giving money or personal information. Take a moment to think before acting.
  • Check: Verify who you're dealing with. Ask yourself if the message or call could be fake.
  • Protect: If something feels wrong, act quickly. Report scams to Scamwatch to help protect others.
​
Picture

Why This Campaign Matters:

Scams are becoming increasingly sophisticated, making them harder to spot. This campaign aims to raise awareness about common tactics and empower individuals to take control. By promoting these simple steps, the ACCC hopes to create a more scam-resistant Australia.

How You Can Get Involved:

The "Stop. Check. Protect." campaign will be featured across various media platforms, including television, online video, and social media. It's a call to action for all Australians to be vigilant and play their part in combating scams.

Remember: Anyone can be a target. By staying informed and following these simple steps, you can protect yourself and your community from the harm of scams.
​
Ep300
Image Source: https://www.scamwatch.gov.au/
0 Comments

Google Family Sharing

15/2/2025

0 Comments

 
Google Family Sharing lets up to six family members share purchases, subscriptions, and more. Maximize its potential with these tips:
​
  • Share certain apps: Pay once, for up to 6 users.
  • Share subscriptions: Don't just share apps and movies; share Google One storage and other subscriptions for cost savings.
  • Family payment: Simplify purchases with a shared payment method, but establish clear spending guidelines.
  • Family calendar: Keep everyone organized with a shared family calendar for appointments and reminders.
  • Family Keep: Share notes, lists, and reminders for groceries, chores, or quick thoughts.
  • Parental controls: Create and manage children's accounts with robust parental controls for a safer online experience.
    ​


Picture

1. Sign in to your Google Account:
  • Go to g.co/yourfamily or navigate Account -> People and Sharing

2. Create a family group:

  • Select "Create a family group."
  • Click "Get started."
  • Under "Ready to be a family manager?", select "Confirm."

3. Invite family members:

  • Enter the names or email addresses of family members you want to invite.
  • Select "Send."

4. Accept the invitation:

  • Family members will receive an invitation via email or phone number.
  • They need to accept the invitation to join the family group.

Important Notes:

  • You must be the family manager to create a family group.
  • Family members must be at least 13 years old (or the applicable age in your country) to join.
  • Children under 13 can be added if the family manager creates a supervised Google Account for them.
  • Family members must live in the same country as you.

Once your family group is created, you can start sharing Google services and content!


Unlock the full potential of Family Sharing for a more connected and organized household.


Ep300
Image Source: https://families.google/families/
0 Comments

TV Spyware

15/2/2025

0 Comments

 
Your brand new smart TV might be watching you as much as you're watching it. A feature called Automatic Content Recognition (ACR), often pre-loaded on new TVs, collects detailed data on your viewing habits, raising privacy concerns for many consumers. 
​

Picture

ACR: What Your TV Knows About You:

ACR technology identifies what's playing on your screen, whether it's from streaming services, cable TV, video games, or even commercials. It tracks not only what you watch, but also how long you watch it. This includes whether you finish shows, how quickly you watch sequels, if you change channels during commercials, and your preferred streaming services. Essentially, ACR builds a detailed profile of your viewing behavior. Surprised? Not really…

Who's Collecting Your Data?

The data collected by ACR goes to various entities. Initially, it's gathered by your TV manufacturer (e.g., Samsung, Sony, LG, Vizio), to personalize recommendations within the TV's operating system (like webOS or Tizen). However, the data often goes beyond the manufacturer. Streaming services (Netflix, Disney+), advertisers, marketing agencies, and data analytics firms can also access this information. Essentially, anyone who can profit from knowing your viewing preferences can potentially gain access to your ACR data.

Disabling ACR: A Challenge, But Possible:

While manufacturers don't make it easy, disabling ACR is possible. The settings are often buried within menus and labeled differently depending on the TV brand. Look for options related to "Privacy," "User Agreements," or "Viewing Data." The specific terminology can vary, so look for anything related to tracking your screen or viewing habits.

Finding the Setting:

Carefully examine privacy options and disable anything that involves tracking what you watch. If you're struggling to find the setting, search online for instructions specific to your TV manufacturer and model.

Example: Disabling ACR on Samsung TVs:

  1. Go to Settings.
  2. Click on General & Privacy.
  3. Select Terms & Privacy.
  4. Find Viewing Information Services.
  5. Deselect "I agree."
  6. Consider de-selecting other privacy options, like "Internet-Based Advertisement Service."

Beware the Warnings:

When you disable ACR, your TV might display warnings about reduced user experience. Don't be deterred. While personalized recommendations might be affected, the core functionality of your TV will remain intact.

Protecting Your Privacy:
​

ACR is likely enabled by default on most new smart TVs. It's crucial to check your TV's privacy settings and disable ACR if you're concerned about your viewing data being collected and shared. Taking control of your privacy is more important than ever in our increasingly connected world.

Ep300
Image created by AI
0 Comments

Water Purification with Muscles

5/2/2025

0 Comments

 
In a move that's raising eyebrows (and maybe a few tiny, mussel-sized ones), the city of Warsaw, Poland, has outsourced its water quality control to a team of eight highly discerning shellfish. These aren't your average mussels; these are elite, sensor-equipped guardians of the city's H2O, and they have the power to shut down the entire water supply if they deem it necessary.
​

Picture

Think of it as a tiny, aquatic version of a strike. When water quality takes a dive (pun intended), the mussels close their shells in protest. If four or more of these eight tiny tyrants decide the water isn't up to snuff, the control system automatically pulls the plug. One can only imagine the frantic calls to city hall: "Uh, Mayor, the mussels are at it again. Looks like we're on bottled water for the foreseeable future."

These aren't just any mussels; they're like tiny, shelled water critics. "Hmm, chlorine.  Slightly metallic.  Is that... Tuesday?  One star.  Would not recommend." And just like any good employee, they get regular breaks. After a three-month tour of duty, these discerning bivalves are released back into the wild, presumably to write scathing reviews of their experience on Yelp: "Two stars. Water pressure was inconsistent, and the commute was terrible."

This ingenious (and slightly absurd) system leverages the natural filtering abilities of mussels. They can filter up to 50 gallons a day, but if the water gets too funky, they clam up (literally). It's this natural "nope, not today" reaction that Warsaw has turned into a high-tech (well, relatively high-tech) water safety system. It's a testament to the fact that sometimes, the best way to solve a complex problem is to just ask a mussel. 

Ep299
Image Source: Credit to Julia Pełka (Gruba Kaáka)
0 Comments
<<Previous

    Author

    Delve into the world of MITE Radio through our captivating blogs. From music and tech to community news, our articles offer fresh perspectives and behind-the-scenes glimpses. Stay informed, connect with our community, and explore MITE Radio in a new way today!

    Archives

    June 2025
    May 2025
    April 2025
    March 2025
    February 2025
    January 2025
    December 2024
    November 2024
    October 2024
    September 2024
    August 2024
    July 2024
    June 2024
    May 2024
    April 2024
    March 2024
    February 2024
    January 2024
    December 2023
    November 2023
    June 2023
    May 2023
    April 2023

    Categories

    All
    AI
    App Of The Day
    Bytes & Beats
    Cyber Security
    Discussion
    Gadgets & Gizmos
    Game
    Innovation Hub
    Listener Question
    News
    Other
    Somethin' For Nothin'
    The Tech Absurd
    Tips & Tricks

    RSS Feed



  • MITE RADIO
  • Volunteer
  • Thank You
  • Blog
  • Programs
    • Making IT Easy with Tony & Kay
    • The Blues Hotel ​with Kelvin Huggins
    • Jazz Fusion with Brett C
    • Pheez Feels
    • Able & Unfiltered
    • Glenn & Tracy's Timeless Tracks
    • Cort In The Morning
    • Hits, Quizzes & Stuff with Harley Buckner
    • Solid Gold Sounds - Chris Pitchford
    • Gordon Cooper (multiple programs)
    • The Vinyl Countdown with Jonathan Charles
    • 50 Years and Rolling with Leo Kirby
    • Soul Vaults with David Southway
    • The Best Disco In Town with Jonathan Charles
    • ABC Oldies - JP McCartney
    • 50 Years of Pop with Peter Kirkpatrick
    • All About The 80s with Rob Charles
    • No More Heroes with Magnus Shaw
    • Classic Chart Rundowns with Dave Marley (multiple programs)
    • US UK Rock Soul Connection
    • Decades Breakfast with Mark Gale
    • Flashback to the 60s with Jim Barrington
    • The Time of Our Musical Life with Geoff Wood
    • Steve Bishops Old Record Club
    • Steve Algar ​(multiple programs)
    • Chris Palin ​(multiple programs)
    • The Peter Nightingale Show
    • Deeper Dimensions with David Dyke
    • Choice Cuts with Kevin Butcher
    • Ken Anton (Multiple Programs)
    • Gary Hopkins (Multiple Programs)
  • WAYS TO LISTEN