MITE RADIO 0492 906 469
  • MITE RADIO
  • Volunteer
  • Thank You
  • Blog
  • Programs
    • Making IT Easy with Tony & Kay
    • The Blues Hotel ​with Kelvin Huggins
    • Jazz Fusion with Brett C
    • Pheez Feels
    • Able & Unfiltered
    • Glenn & Tracy's Timeless Tracks
    • Cort In The Morning
    • Hits, Quizzes & Stuff with Harley Buckner
    • Solid Gold Sounds - Chris Pitchford
    • Gordon Cooper (multiple programs)
    • The Vinyl Countdown with Jonathan Charles
    • 50 Years and Rolling with Leo Kirby
    • Soul Vaults with David Southway
    • The Best Disco In Town with Jonathan Charles
    • ABC Oldies - JP McCartney
    • 50 Years of Pop with Peter Kirkpatrick
    • All About The 80s with Rob Charles
    • No More Heroes with Magnus Shaw
    • Classic Chart Rundowns with Dave Marley (multiple programs)
    • US UK Rock Soul Connection
    • Decades Breakfast with Mark Gale
    • Flashback to the 60s with Jim Barrington
    • The Time of Our Musical Life with Geoff Wood
    • Steve Bishops Old Record Club
    • Steve Algar ​(multiple programs)
    • Chris Palin ​(multiple programs)
    • The Peter Nightingale Show
    • Deeper Dimensions with David Dyke
    • Choice Cuts with Kevin Butcher
    • Ken Anton (Multiple Programs)
    • Gary Hopkins (Multiple Programs)
  • WAYS TO LISTEN
Picture
​

click here to listen
​to Mite radio (then click the red play arrow)
An initiative of ​The Stairway Project Inc
Picture

3rd Party Providers

29/5/2025

0 Comments

 
Let me start with an old bugbear of mine: Outsourcing!

Outsourcing some business function allows organisations to concentrate more on core business activities and when implemented strategically, can ultimately result in better productivity, profits, shareholder dividends and more. Outsourcing to third party providers that specialise in those core business systems and provide the service at a competitive price can be a good option for many organisations. Staff costs alone can be significantly reduced. The problem is (and the question I have always had) - what is the compromise?

Picture
It used to be quality of service. A third party might not give you the same level of service you had previously and have come to expect, just make a support call to Telstra or Optus or iiNet and you’ll quickly see what I mean. But more scarily, what guarantees do we have that they are doing at protecting our privacy and data?
Clearly, they’re not all doing so well.

What does that mean for us? We don’t have a choice which 3rd parties our accounts go through, who our data is shared with or even where it is stored.

Cybercriminals are increasingly sophisticated, shifting their focus from direct assaults on well-defended organizations to exploiting their trusted partners. These "supply chain attacks" leverage a single point of entry within a vendor's system to gain unauthorized access to multiple, often larger, client networks. This trend is alarming, with figures showing a dramatic surge in such incidents over the past few years. 

As a consumer, it’s frustrating to feel like your data is at risk due to a company's third-party providers, especially since you have no direct control over their security practices. 

However, there are definitely proactive steps you can take to minimize your exposure and protect yourself:

1. Be Mindful of What You Share (and Where):

  • Data Minimization: Before signing up for a service or making a purchase, consider if you really need to provide all the information requested. Many forms ask for optional details. If it's not essential, don't provide it.
  • Review Privacy Policies: While they can be lengthy, try to skim privacy policies for key information. Look for sections on data sharing with third parties, data retention periods, and how they protect your information. If a policy is vague or doesn't seem to prioritize your privacy, consider if you truly need to use that service.
  • Limit Account Creation: Do you really need an account for every single website you visit? If it's a one-off purchase, consider using a guest checkout option if available to avoid creating a persistent data profile.

2. Strengthen Your Own Digital Hygiene:

  • Strong, Unique Passwords: This is paramount. Never reuse passwords across different accounts. Use a strong, complex password (a mix of uppercase, lowercase, numbers, and symbols) for each service. A password manager can help you manage these securely.
  • Enable Multi-Factor Authentication (MFA): Whenever possible, activate MFA (also known as two-factor authentication or 2FA). This adds an extra layer of security, usually requiring a code from your phone or a hardware key in addition to your password. Even if a third-party breach exposes your password, MFA can prevent unauthorized access to your account.
  • Be Skeptical of Phishing Attempts: Data breaches, especially those involving contact information, are often followed by phishing attempts. Be extremely wary of unsolicited emails, texts, or calls asking for personal information, login credentials, or urging you to click suspicious links. Always verify the sender and the legitimacy of the request.
  • Keep Software Updated: Ensure your operating system, web browsers, antivirus software, and all applications on your devices are regularly updated. These updates often include critical security patches that protect against known vulnerabilities.

3. Act Quickly When a Breach is Disclosed:

  • Monitor for Breach Notifications: Pay attention to news about data breaches, especially from companies you do business with. Companies are often legally required to notify affected individuals.
  • Change Compromised Passwords Immediately: If you're notified of a breach affecting a service you use, change your password for that service immediately. If you've used the same password on other sites (which you shouldn't!), change those too.
  • Enable Fraud Alerts/Credit Freezes: If the breach involves sensitive financial information or identity data (like Social Security numbers), consider placing a fraud alert or credit freeze on your credit reports with major credit bureaus. This makes it harder for identity thieves to open new accounts in your name.
  • Monitor Financial Statements and Credit Reports: Regularly review your bank and credit card statements for any suspicious activity. You're entitled to a free credit report from each of the major credit bureaus annually – take advantage of this to check for any unauthorized accounts or inquiries.
  • Be Wary of Scams: Be extra vigilant for scam calls or emails that claim to be from the breached company, offering "help" or asking for more personal information. Always go directly to the company's official website or customer service number to verify any communications.
​
Ep334
Image created by AI
0 Comments

Duck Duck Go Search

29/5/2025

0 Comments

 
Do you feel that every time you search the internet using Google, you’re getting a biased set of search results and may be missing important or less known information. Well, you are!. Google is a great search engine, but they are ultimately focussed on their bottom line, so results are aggregated and promoted accordingly. Wouldn’t it be nice to get a less stacked set of results? Well you can with Duck Duck Go.​

Picture

DuckDuckGo is an American software company founded in 2008 by Gabriel Weinberg, primarily known for its privacy-oriented search engine. Its core mission is to provide a search and Browse experience that protects user privacy by not tracking personal information or search history.

  • Search Result Sources: DuckDuckGo compiles its search results from "over 400" sources, including Bing, Yahoo! Search BOSS, Wolfram Alpha, Yandex, and its own web crawler (DuckDuckBot). It does not use Google for its results.

Here's a breakdown of DuckDuckGo:

Core Principles & Privacy:
  • No Tracking: The most significant differentiator of DuckDuckGo is its strict "no tracking" policy. Unlike many mainstream search engines (like Google), DuckDuckGo does not:

    • Store your IP address.
    • Save your search history.
    • Use cookies to track you.
    • Create detailed profiles of users based on their online activity.
  • Unbiased Search Results: Because it doesn't track your history, DuckDuckGo's search results are not personalized or influenced by your past activity. This means every user searching for the same term will get the same results, avoiding the "filter bubble" often associated with personalized search.
  • Blocking Trackers: DuckDuckGo's browser and extensions actively block most third-party trackers from advertisers and websites, aiming to prevent companies from profiling you and serving targeted ads.
  • Enhanced Encryption: It automatically upgrades connections to HTTPS (encrypted) whenever possible, enhancing security.
  • Global Privacy Control (GPC): DuckDuckGo's browser has GPC enabled by default, signaling to websites that you don't consent to the sale or sharing of your data.

Key Features:

  • Search Engine:
    • Instant Answers ("Zero-click Info"): Displays relevant answers directly on the search results page, often from sources like Wikipedia, to provide information without needing to click through.
    • "Bangs" (!): These are shortcuts that allow you to directly search on other websites from the DuckDuckGo search bar (e.g., typing "!a" for Amazon, "!yt" for YouTube).
    • Contextual Data: Uses contextual data based on Internet Service Providers (ISPs) to generate more specific results without using personal data.
  • Web Browser and Extensions:
    • Tracker Blocking: Built-in tracker blocker.
    • Cookie Consent Pop-up Management: Automatically handles cookie consent pop-ups, setting privacy-maximizing preferences.
    • Email Protection: A forwarding service that removes hidden trackers from emails before sending them to your usual address.
    • Fire Button: A one-click button to clear all tabs, Browse history, and cookies.
    • Duck Player: Allows you to watch YouTube videos without YouTube tracking your activity or showing personalized ads.
    • Password Manager: Built-in password manager with note-taking capabilities.
    • Multiplatform Compatibility: Available as a browser on Windows, macOS, Android, and iOS, with sync capabilities.
    • Duck AI: Allows anonymous chats with various AI chatbots without requiring an account or saving chats.

How DuckDuckGo Makes Money:

DuckDuckGo has been profitable since 2014, and its business model is not reliant on tracking user data. Its primary revenue sources are:

  • Private Search Ads: The majority of its revenue comes from contextual advertising. This means ads are shown based on the keywords you type into the search bar, not on your personal profile, search history, or Browse habits. For example, if you search for "cars," you'll see ads related to cars. These ad clicks are often managed through partnerships with networks like Microsoft Advertising, which also commit to not associating ad-click behavior with user profiles.
  • Affiliate Marketing: DuckDuckGo participates in affiliate programs with major e-commerce sites (like Amazon and eBay). If a user clicks on an affiliate link through DuckDuckGo and makes a purchase, DuckDuckGo earns a small commission.
  • Subscription Fees (Privacy Pro): DuckDuckGo also offers a subscription service called "Privacy Pro," which includes a VPN, a personal information removal service (to get your data off data broker sites), and an identity theft restoration service.

Considerations:

  • Search Result Sources: DuckDuckGo compiles its search results from "over 400" sources, including Bing, Yahoo! Search BOSS, Wolfram Alpha, Yandex, and its own web crawler (DuckDuckBot). It does not use Google for its results.
  • Smaller Index: While it strives for quality, DuckDuckGo's search index may not be as extensive as Google's for certain niche queries.
  • Microsoft Partnership (2022 Criticism): In 2022, DuckDuckGo faced criticism when it was revealed that its browser (but not its search engine) allowed some Microsoft sites to bypass its tracker-blocking features due to a syndicated search content contract. DuckDuckGo stated that these Microsoft trackers collect only anonymized data and do not apply to their search engine.

In essence, DuckDuckGo presents itself as a strong alternative for users who prioritize privacy and wish to avoid the extensive data collection practiced by other major tech companies.


Ep334
Image Source: https://duckduckgo.com/about
0 Comments

Split Screen on Mac OS

29/5/2025

0 Comments

 
It’s actually really quick to do.

In your open Window hover (top left) and you will see 3 buttons for Close, Minimise and Resize (Red, Orange and Green).

It’s all about the Green button.
​

On older Macs HOLD down the green button and then you can select which half of the screen to move the window to. You then select the second window to tile it to the opposite side.
​
Picture

On newer Macs HOVERover the green button and you will see dedicated menu options (Tile, Slip to Left, Spit to Right)

Picture
Ep334
Image Source: Screenshot taken by MITE Radio.
0 Comments

Lately App

29/5/2025

0 Comments

 
Hey, so I just came across this really interesting new app called Lately, and I instantly thought of how much it could help so many people – especially if you, or anyone you know, tends to run a bit behind. It's actually designed specifically with ADHD in mind, but honestly, it sounds like it could be a game-changer for anyone who struggles with punctuality.
Picture

So, how it works is pretty cool: you essentially create a 'trip' in the app for wherever you need to be. Then, it turns the whole process of getting out on time into a game. There are four different difficulty levels, and the goal is to earn points by actually leaving when you're supposed to. As you rack up points, you unlock different characters in the app, which gives you that little burst of accomplishment. And yeah, if you're late, you actually lose points, which is a pretty good motivator to get moving!

Beyond the game aspect, it's got some really smart practical features. It sends you reminders at 30, 10, and 5 minutes before you need to depart. Plus, it integrates really well with Apple's ecosystem – you get a Live Activity on both your Apple Watch and iPhone, and even a lock screen progression bar so you can see your countdown at a glance.

It's a free download, which is awesome, so you can just try it out. But there's also an optional subscription, about $10 a year or $3 a month, that gives you a bit more control – like customizing those difficulty levels and setting up recurring leave timers for things you do regularly.
​

What do you make of it? Do you think the gamified approach would actually work for someone who's chronically late? And are those subscription features compelling enough, or do you think the free version would be sufficient for most people? I'm genuinely curious if this could be the thing that finally helps people (myself included, sometimes!) conquer habitual lateness.

Ep334
Image created by AI
0 Comments

Close Active Window

29/5/2025

0 Comments

 
Just a quickie. If you need to close your current open window on a Windows PC, the keyboard shortcut CTRL+ F4 should do the trick. Sometimes your mouse might not be  responding or you might get a full screen popup or you can’t see the X in the top right corner. Give it a go and see if things go back to normal. If all the Windows are closed and you do it again, you will be prompted to shutdown, which might get you out of trouble too.

If you have a laptop and F4 doesn’t work as expected, you might need to turn on Function Lock or Press Alt + Fn + F4.
​
Picture
Ep333
Image created by AI
0 Comments

Sega Master System Lives on

29/5/2025

0 Comments

 
While retro gaming often conjures images of dusty consoles in collectors' cabinets, in Brazil, the Sega Master System isn't just a nostalgic relic – it's a living, breathing testament to a unique gaming culture. Decades after fading from shelves elsewhere, the 8-bit console continues to be manufactured, sold, and embraced by new generations, not as a bootleg, but as a fully licensed, modern iteration of a beloved classic.
​


Picture

​Forty years after its initial global release, and 36 years since it first arrived in Brazil, the Master System has maintained an astonishing presence. Manufactured and distributed by local electronics company TecToy, the current "Master System Evolution" is a ROM-on-Chip (RoC) console – essentially a self-contained emulator preloaded with 132 classic games. It's a plug-and-play solution, designed for practicality, affordability, and accessibility, particularly for lower-income families and children getting their first taste of home gaming.


This enduring popularity is not merely a quirk of nostalgia. Brazil's gaming landscape was shaped by a distinct history of frustrating tariff policies and trade restrictions that largely isolated the country from the global gaming industry. This created a fertile ground for a homegrown ecosystem, with TecToy at its heart. The original Master System, manufactured locally under license, became hugely popular, cementing its place in the nation's cultural fabric.

Even after selling over 8 Millions units since 1989, TecToy has been continuing to produce 200,000 consoles annually which includes Master System, Mega Drive and Atari.

For many Brazilians, the Master System wasn't just a game system; it was their first introduction to home gaming, a hard-won experience that fostered a deeper attachment. Adults who grew up with the system are now sharing it with their children, passing down a story of how Brazil "made gaming its own."
​

Ep333
Image created by AI
0 Comments

Adidas Latest Cyber Victim

29/5/2025

0 Comments

 
Sportswear titan Adidas has confirmed a significant data breach stemming from a compromise of one of its third-party customer service providers, leading to the exfiltration of customer contact information. What initially appeared to be localized incidents affecting Adidas Turkey and Adidas Korea has now been confirmed as a broader, global event.
Picture

The company released a statement acknowledging that an "unauthorised external party obtained certain consumer data through a third-party customer service provider." Adidas has swiftly initiated containment measures and launched a comprehensive investigation with the assistance of leading information security experts.

Crucially, Adidas has reassured customers that "The affected data does not contain passwords, credit card or any other payment-related information." The exfiltrated data primarily consists of "contact information relating to consumers who had contacted our customer service help desk in the past."

Previous disclosures regarding the regional breaches in Turkey and Korea indicated that the compromised data included full names, phone numbers, dates of birth, gender details, and email addresses. These regional reports also emphasized that no passwords or financial information were accessed.

Given Adidas's vast international reach, with operations in 50 countries and a staggering 303 million members in its adiClub loyalty program, the potential scale of this incident is considerable. If the breach impacts customers who have contacted their help desk globally, millions of individuals could have had their contact information exposed.

Adidas has commenced the process of notifying potentially affected consumers, as well as relevant data protection and law enforcement authorities, in compliance with applicable laws. "We remain fully committed to protecting the privacy and security of our consumers, and sincerely regret any inconvenience or concern caused by this incident," the company stated.
​

As of reporting, no threat actors have publicly claimed responsibility for the breach. The incident underscores the escalating risks associated with third-party vendor relationships and the critical importance of robust supply chain cybersecurity.

Ep333
Image created by AI
0 Comments

Smart App Control

29/5/2025

0 Comments

 
Microsoft have released a new player in their security arsenal called Smart App Control.

It needs to be enabled on a New installation of Windows 11 (with optional diagnostic data enabled).
​

Designed to sit alongside existing virus protection software including Microsoft’s Own Defender, Smart App Control will offer a more efficient and responsive defense against malicious applications.

Picture
Many antivirus programs are doing a lot of work scanning everything you open and access, this can cause your PC to slow down while it does all thai work. Smart App Control’s job is to do the preliminaries and determine if a file is safe without needing to engage with the AV software to check the file.

This should reduce a significant amount of system overhead and your PC should run smoother as a result.

The added advantage of Smart App Control is that malware files can be pro-actively intercepted before they are executed. Antivirus programs on the other hand often don’t respond until after a threat has been detected.

The upshot: This could be good, but keep your existing AV software for the time being.
The catch: You may need to do a fresh install of Windows 11 to activate this new feature.
​

Ep333
Image created by AI
0 Comments

Woodoku

23/5/2025

0 Comments

 
It’s like Tetris met Sudoku and had a child.

Marketed as a relaxing yet challenging brain trainer, it has garnered millions of downloads and a dedicated player base.

​Woodoku's core gameplay is elegantly simple: players are presented with a 9x9 wooden grid, reminiscent of a Sudoku board. Various wooden blocks, similar to Tetris pieces, appear at the bottom of the screen in sets of three. The objective is to drag and place these blocks onto the grid, aiming to clear lines by filling complete rows, columns, or 3x3 squares (like in Sudoku). Points are awarded for each block placed, with bonus points for clearing multiple lines or squares in a single move (combos) or on consecutive turns (streaks). The game ends when you run out of space to place the available blocks.



​
Picture

​This seemingly straightforward mechanic quickly reveals surprising depth. As the board fills up, strategic planning becomes crucial. Deciding which blocks to use and where to place them to maximize clearing opportunities and avoid getting "bricked" (running out of viable moves) is the key to achieving high scores. The tactile feel of the wooden blocks and satisfying sound effects add to the immersive quality of the game.


Beyond the endless classic mode, Woodoku often features "Journey" modes with specific goals and "Daily Puzzles" that offer fresh challenges and rewards, keeping the gameplay engaging and varied. The game is also playable offline, a significant plus for on-the-go entertainment.
​
Ep332
Image Source: This image is used under the Fair Use provision for the purpose of review and commentary. 
0 Comments

Android 16 Security Updates

23/5/2025

0 Comments

 
Google is rolling out a significant suite of new security and privacy features for Android devices in 2025, heavily focusing on combating increasingly sophisticated phone and text message scams. The updates aim to provide users with more intelligent, on-device protections to safeguard against fraud and data theft.
Picture

A major highlight is smarter in-call protections designed to thwart common scam tactics. Android will now actively warn users and even block specific risky actions during calls with non-contacts. This includes preventing the disabling of Google Play Protect, blocking the sideloading of unverified apps, and restricting the granting of dangerous accessibility permissions – all common requests from phone scammers. If screen sharing is active during a call, Android will also prompt users to stop sharing once the call ends.

Building on these in-call defenses, Google is piloting enhanced protections specifically for banking apps in the UK, starting with partners like Monzo, NatWest, and Revolut. If a user launches a participating banking app while screen sharing with an unknown contact, their Android device will issue a warning and offer a one-tap option to end the call and stop sharing, directly addressing the growing threat of screen-sharing banking scams.

Also, Scam Detection in Google Messages is becoming even more intelligent. The AI-powered feature, which already flags suspicious conversational patterns, is expanding its scope to detect a wider variety of scams, including those related to toll fees, cryptocurrency, financial impersonation, gift cards, and technical support. Crucially, this advanced detection happens entirely on-device, ensuring user privacy.

To combat impersonation scams in messaging, Google is introducing Key Verifier for Google Messages on Android 10+ devices later this summer. This feature will allow users and their contacts to confirm each other's identities by verifying unique encryption keys through QR code scanning or number comparison. If a contact's verification status changes (e.g., due to a SIM swap or compromised account), the Google Contacts app will flag it, providing a crucial warning that the sender might not be who they appear to be.

Finally, Google is enhancing Advanced Protection with a new device-level setting. This will simplify the activation of Google's strongest security features for all users, not just high-risk individuals, providing a comprehensive defense against sophisticated online attacks and data risks.

These significant updates underscore Google's ongoing commitment to evolving Android's security landscape, aiming to empower users with smarter, more proactive defenses against the ever-changing tactics of cybercriminals.

Maybe consider an Android for your next phone.
​
Ep332
Image created by AI
0 Comments

Google Magic Portrait

23/5/2025

0 Comments

 
Google has always offered fantastic ways to personalize your Android device, from a vast library of wallpapers to tools for creating entirely new looks. "Magic Portrait" takes this a step further, offering a subtle yet impactful way to elevate your lock screen aesthetics.
Picture

Here's how "Magic Portrait" will transform your phone:
​

  • Framing Your Focus: The core of Magic Portrait allows you to select an existing still image from your gallery and apply a unique frame to the main subject. This isn't just a simple border; these frames are designed to subtly highlight the person or object you want to emphasize, providing a fantastic contrast that draws the eye.
  • Customizable Flair: Don't settle for a generic look! Magic Portrait lets you customize these frames with different shapes and colors. This means you can truly tailor the effect to match your personal style and the mood of your photo, making your lock screen uniquely yours without being overly flashy.
  • Dynamic Weather Effects (or Your Own Personal Forecast): This is where "Magic Portrait" truly comes alive. You'll have the option to add real-time weather animations to your lock screen, reflecting your current local conditions. Imagine looking at your phone and seeing gentle rain falling over your favorite photo if it's raining outside. Alternatively, if you just fancy a perpetually snowy scene, you can set a default weather effect to suit your preference.
​
Ep332
Image created by AI
0 Comments

Android 16 Preview for Pixels

23/5/2025

0 Comments

 
Google has officially rolled out Android 16 QPR1 Beta 1 to eligible Pixel devices, bringing with it the highly anticipated "Material 3 Expressive" redesign. This significant visual overhaul, a key focus for Android 16's first Quarterly Platform Release (QPR), is set to redefine the user experience with a more dynamic and engaging interface.
Picture
If you have a Pixel 6 series or newer, including the Pixel Tablet and Pixel Fold, there’s a comprehensive suite of UI changes across various core elements of the Android system. If you are eager for a first look, you can enroll your compatible devices in the Android Beta Program.

Dubbed the "Material 3 Expressive" update, this is far more than just a cosmetic tweak. It brings a holistic approach to Android's visual language, emphasizing fluidity, personalization, and a more intuitive interaction model. 

Key highlights include:
​
  • Revamped Notifications: Expect a fresh new look for the notification shade, complete with new shortcuts and an updated lock screen layout for notifications, including both "Compact view" and a "Full list" option. Animations for dismissing notifications are also enhanced with a satisfying "snap" effect.
  • Quick Settings Evolution: The Quick Settings panel receives a substantial redesign, offering more customizable and resizable tiles, allowing users to pack more controls into the space. Background blur effects are also now prominently featured in this area.
  • Multitasking Reimagined: The Recents multitasking interface has been redesigned, incorporating drop-down options and a new "jiggle" animation. Large screen layouts for multitasking have also seen a visual refresh.
  • Refined Volume Controls: The volume slider and panel have been redesigned with a less bubbly, more streamlined appearance.
  • Personalization at its Core: The Wallpaper & Style section has been overhauled, offering more options for wallpaper shape and new weather "Effects."
  • Streamlined App Navigation: The app list is now presented as a sheet rather than a fullscreen view, and the App info screen has also undergone a redesign.
  • Settings App Glow-Up: The Settings app itself has been given a colorful redesign, using distinct hues to group different categories of settings (e.g., red for sound, blue for network, coral for display).
  • Lockscreen Makeover: The lock screen sports a fresh look, with "At a Glance" moving to the bottom of the large clock. When the corner clock is active, the day/date and temperature shift to the right.
  • New Home Screen Grid Sizes: Users will find additional options for home screen grid sizes, offering more flexibility in layout.
  • Audio Sharing: A new audio sharing feature has been introduced, allowing for more versatile audio experiences.
​
Ep332
Image created by AI
0 Comments

Ball Sort

23/5/2025

0 Comments

 
Not a bad game. It looked pretty easy at first.
​

You have a number of test tubes randomly filled with balls of different colours.

You must tap a tube to extract the top ball and then tap another tube to put it there - but the tube must be empty or contain the same coloured ball on top.

After 3 levels you go, meh that’s too easy, but then… the next level obscures the colours of all but the top balls making it much much much more difficult.

​The saving grace is that you can stack the obscured balls and the top one will show its true colour.​
Picture

Great fun and rather addictive.
​

Ads are a pain, so try aircraft mode and enjoy the peace.
​

Ep331
Image Source: Screenshot taken by MITE Radio
0 Comments

Tame App Icons

23/5/2025

0 Comments

 
If everytime you excitedly explore the world of new apps on the Google Play Store and install something, you will likely find it dropped on your well sorted and precious Home Screen.

You then will likely need to make some decision about moving it, if indeed it proves to be an app worthy of this cherished home screen space.

Well, why not turn the auto add option off and test the app form the app tray and only then, when you’re ready, move it to somewhere more useful or delete it.​

Picture

If this excites you, then adjust the setting and stop the icon invasion.


  1. Find an Empty Spot: On any of your home screen pages, locate an area where there are no app icons or widgets.
  2. Long Press: Place your finger on that empty area and hold it down for a brief moment. This action usually brings up a context menu with customization options.
  3. Dive into Settings: Look for an option labeled Settings. Tap on it. The exact wording might vary slightly depending on your phone's manufacturer and Android version, but it's usually towards the bottom of the menu.
  4. Toggle the Magic Switch: Within the Home screen settings, look for an option with a name similar to:

  • Add icon to Home Screen
  • Add new apps to Home Screen
  • Automatically add apps to Home Screen
  • ​Place new apps on Home screen Once you find this toggle, simply turn it off.
​
Ep331
Image created by AI
0 Comments

Steam Cyber Attack

23/5/2025

0 Comments

 
Gaming communities worldwide were sent into a flurry of concern recently following reports of a potential massive data breach on Steam, the dominant PC gaming platform boasting over 120 million monthly active users. The initial news, delivered by dark web monitoring group Underdark.ai, painted a worrying picture: a threat actor allegedly offered to sell a staggering 89 million user records for a mere $5,000. This sparked immediate calls for users to bolster their account security.
Picture

​The Bad News: Underdark.ai's follow-up report indicated that a sample of the purported data for sale included recent 2025 2FA SMS logs. This leaked information seemingly contained one-time access codes sent to users, along with message content, delivery status, metadata, routing costs, and crucially, phone numbers. The potential exposure of even this limited data understandably caused alarm among Steam users.

The Good News: Valve, the company behind Steam, has stepped forward to address these concerns, and their statement offers a significant sigh of relief. According to Valve, none of the leaked data was ever linked to Steam accounts. Their investigation revealed that the exposed information consisted of older text messages containing one-time codes, which are only valid for a brief 15-minute window, along with the associated phone numbers. Crucially, Valve explicitly stated that the leaked data did not include any association between these phone numbers and Steam accounts, passwords, payment information, or other personal data.

Furthermore, Valve reassured users that these old text messages cannot be exploited to compromise Steam accounts. They also highlighted the existing security measures in place, such as email and Steam secure message confirmations for any SMS-based email or password changes.
​

The Bottom Line: While the news of any data leak is unsettling, Valve's swift response and clarification offer a considerable silver lining. Steam users can take comfort in knowing that their sensitive account information appears to be safe. However, this incident serves as a potent reminder to remain vigilant about online security. Valve strongly recommends that all Steam users who haven't already done so set up the Steam Mobile Authenticator, providing an even more secure method for account protection and communication about account safety. It's also crucial to treat any unsolicited account security messages with suspicion. So, while a potential crisis was averted, the importance of proactive security measures remains paramount for all Steam users.
​
Ep331
Image created by AI
0 Comments

Google Earth Historical Imagery

19/5/2025

0 Comments

 
Ever wondered what your neighborhood looked like decades ago? Or perhaps you're curious about the changes a distant city has undergone over time? Google Earth offers a fascinating feature that lets you become a digital time traveler, exploring historical satellite and aerial imagery to witness the evolution of our planet. It's a powerful tool for education, research, or simply satisfying your curiosity.
​

Picture

​Step 1: Launch Google Earth Pro (Desktop)

While basic Google Earth in your browser offers some historical imagery, the most comprehensive and user-friendly experience for in-depth historical exploration is through the Google Earth Pro desktop application. It's free to download and provides more tools and a clearer timeline for navigating historical data. You can download it from the Google Earth website.

Step 2: Navigate to Your Area of Interest

Once Google Earth Pro is open, use the search bar in the top left corner to type in the location you want to explore. This could be your hometown, a famous landmark, or anywhere else on the globe. Zoom in to the desired level of detail using your mouse scroll wheel or the on-screen controls.

Step 3: Access the Historical Imagery Tool

With your location in view, look for the clock icon on the toolbar above the 3D viewer. Clicking this icon will open the Historical Imagery timeline in the top left corner of your screen, often overlaid on the map.

Step 4: Explore the Timeline and Imagery

  • Timeline Slider: A slider will appear, representing the available dates of imagery for your current view. The earliest available date will be on the left, and the most recent on the right.
  • Drag the Slider: Click and drag the slider along the timeline to move through different years and months. As you move the slider, the imagery in the main viewer will update to reflect the selected date.
  • Date Display: The specific date of the imagery currently displayed will be shown on the timeline.
  • Imagery Availability: The frequency and availability of historical imagery vary depending on the location. Densely populated or areas of significant change may have more frequent updates. Some areas might only have snapshots from a few specific years.
  • Zoom Levels: The availability of historical imagery can also depend on your zoom level. You might find more detailed historical shots when you zoom in closer.

Step 5: Observe the Changes Over Time

Now the fun begins! As you navigate through the timeline, pay attention to the transformations you observe:

  • Urban Development: Witness the growth of cities, the construction of new buildings and infrastructure, and the expansion of suburbs.
  • Environmental Changes: Observe deforestation, coastal erosion, the retreat of glaciers, the expansion or shrinking of lakes and rivers, and the impact of natural disasters.
  • Agricultural Shifts: See changes in land use for farming, the development of irrigation systems, and the evolution of agricultural patterns.
  • Landmark Construction: Track the progress of iconic structures from their initial groundbreaking to their completion.

Tips for a Deeper Dive:

  • Use the Zoom and Pan Tools: Zoom in and pan around the historical imagery to examine details more closely.
  • Compare Different Dates: Jump back and forth between different dates on the timeline to clearly see the changes that have occurred.
  • Look for Subtle Differences: Sometimes the changes are gradual. Pay attention to the evolution of roads, vegetation, and smaller structures.
  • Consider Different Perspectives: Rotate the view to see the changes from different angles.
  • Take Screenshots: Capture interesting before-and-after comparisons to share or document your findings.
  • Explore Different Locations: Don't limit yourself to your own area. Explore historical imagery of significant events or places around the world.

Educational and Practical Applications:

  • History Lessons: Visualize historical events and geographical changes.
  • Environmental Studies: Track the impact of climate change and human activity on the landscape.
  • Urban Planning: Understand the growth patterns of cities and the evolution of infrastructure.
  • Genealogy: See how family properties and neighborhoods have changed over generations.

Personal Nostalgia:
Relive memories and see how familiar places looked in the past.
​

Ep330
Image Source: Screenshot taken by MITE Radio
0 Comments

Dracula Aust Post SMS Scam

19/5/2025

0 Comments

 
Australia Post has issued a warning about a new sophisticated text and email scam circulating, known as "Dracula". This phishing scam involves fraudulent messages claiming a parcel delivery failed due to an invalid postcode. These messages contain malicious links designed to steal your personal information.
Picture

Invalid Postcode Claim: The messages typically state that a delivery could not be completed because of an incorrect postcode.

Malicious Links: Recipients are urged to click on a link to supposedly resolve the issue or reschedule the delivery. These links lead to fake websites intended to steal your data.

Sophisticated Techniques:
This scam uses advanced methods to bypass phone and network filters, allowing it to spread through iMessage and Rich Communication Services (RCS), making it harder to block.

Part of "Darcula" Operation: Australia Post has identified this as part of a larger "Dracula" phishing-as-a-service operation, where scammers can access tools to mimic trusted brands.

Widespread Impact:
Australia Post's research indicates that over 90% of Australians have received a scam text or call, and nearly 74% have been targeted by parcel delivery scams.


How to recognise and be aware:

Australia Post will never ask for your password, credit card details, or account information via call, text, or email.

Unexpected Message: Be suspicious of messages you receive if you are not expecting a delivery.

Requests for Payment:
They will also never contact you asking for payment.


Suspicious Links:
Avoid clicking on any links in unexpected messages.


Sense of Urgency:
Scammers often create a feeling of urgency to make you act quickly without thinking.


Incorrect Grammar or Spelling:
While increasingly sophisticated, some scam messages may still contain grammatical errors or typos.


Non-Official Sender Information:
Check the sender's number or email address. Official Australia Post SMS messages may come from "AusPost" or a specific number like 0448 008 003 for messages you can reply to. Be wary of other numbers or unfamiliar email addresses.


How to protect yourself

Use the Official AusPost App: The safest way to track your deliveries is through the official Australia Post app. Check the app first if you receive a suspicious message.

Verify Information:
If you are unsure about a message, do not click any links. Instead, go directly to the official Australia Post website or app to check your delivery status.


Do Not Share Personal Information:
Never provide personal or financial information via a link in a text message or email.


Report Suspicious Messages:
You can report scams to the Australian Cyber Security Centre's ReportCyber website. You can also forward suspicious emails to [email protected].


Be Wary of Clickbait:
Be cautious of misleading information on unofficial websites or social media accounts that offer cash relief or claim changes to Centrelink or Australia Post requirements. Always check official ".gov.au" website URLs for government services.
​

Ep330
Image created by AI
0 Comments

Battery Life Tips

19/5/2025

0 Comments

 
This question comes up all the time. How can I increase the battery life on my phone?

Firstly, battery life will wane after the first few months of usage and over a couple of years, you will likely notice your phone doesn’t stay charged all day any longer.

You may find usage patterns to be a big factor - the more you use it the quicker it depletes.
Picture

​That said, you can be a bit smarter with battery life:

1.Turn the brightness down.  Train auto-brightness that less is more - use manual control.There’s even a super dim option for night time on some devices. Use quick access (swipe down) to change with minimal fuss.

2. Let Your Phone Learn. Modern smartphones are smart! Features like Adaptive Battery and Battery Optimization learn your usage patterns to intelligently manage power consumption.

Use Adaptive Battery and Optimisation in Settings -> Battery
These features monitor which apps you use, how often, and when. They then optimize background activity and battery allocation to prioritize your most important apps

Use adaptive charging if available
This intelligent charging method learns your overnight charging habits and slows down the charging speed as it approaches 100% to help preserve the long-term health of your battery.

3. Use Dark Mode and set it up always or on a schedule.
Dark mode isn't just a stylish aesthetic; it can also contribute to better battery life, especially on phones with OLED displays (which includes most flagship devices).

​Small Changes, Big Impact
​

Implementing these simple settings can have a noticeable positive impact on your phone's battery life. By taming screen brightness, letting your phone intelligently manage power, and embracing the darkness, you can spend less time hunting for an outlet and more time enjoying your device. Give these tips a try and reclaim your phone's battery power!

Ep330
Image created by AI
0 Comments

Gemini Replaces All Google Assistants

19/5/2025

0 Comments

 
As we predicted some time ago, Google has finally announced a shift in its digital assistant strategy, confirming that its advanced AI chatbot, Gemini, will progressively replace Google Assistant across a wide range of Android-powered devices. This transition will encompass smartwatches running Wear OS, in-car systems powered by Android Auto, and smart televisions utilising Google TV, bringing enhanced AI capabilities and deeper app integration to these platforms in the coming months.
Picture

This move effectively signals the gradual sunsetting of Google Assistant, with Gemini poised to become the default assistant experience for Android users across their various devices. The integration of Gemini promises a more natural and less robotic interaction, leveraging the power of AI to understand and respond to a broader array of user requests.


For
Wear OS users, Gemini's arrival, announced alongside Wear OS 6, will see it take over the assistant functionalities. This integration will allow users to perform tasks directly from their wrist, such as setting reminders, saving important information like gym locker numbers, and retrieving details about restaurants mentioned in emails – all without needing to reach for their phones. The AI-powered assistant is expected to offer more intuitive voice interactions and a greater capacity to understand complex commands.


The automotive experience via
Android Auto is also set for a significant upgrade with the introduction of Gemini. Beyond standard assistant features, Gemini in the car will be capable of finding charging stations along a route for electric vehicle users. Notably, it will also integrate with messaging apps to summarize incoming messages and even translate replies before they are sent, a particularly useful feature for drivers who need to communicate safely while on the road. Furthermore, the "Gemini Live" feature will offer a more conversational AI companion for longer commutes, allowing users to engage in more natural dialogue. Gemini on Android Auto will also provide personalized news summaries, with the option to exclude specific topics like sports, and even offer synopses of books.


…And,
Google TV will also benefit from Gemini's integration, serving as a more intelligent assistant for content discovery. Users will be able to ask for ultra-specific recommendations for shows and movies across various streaming services. While Google TV already functions as a smart home hub, it remains unclear whether the initial Gemini integration will extend to controlling smart home devices.


Google's strategy appears to be tailoring the Gemini experience to each specific device category. While the mobile app offers a full chatbot experience, the Wear OS and Google TV versions seem to focus more on traditional assistant functionalities with AI enhancements and app integration. Android Auto, on the other hand, will feature the comprehensive Gemini Live support for more interactive in-car assistance.


​The rollout of Gemini across these platforms is expected to occur over the coming months, marking a significant step in Google's ambition to make AI a more integrated and seamless part of the user experience across the entire Android ecosystem. This transition signifies the end of the road for Google Assistant as the primary AI helper on these devices, paving the way for the more advanced and versatile capabilities of Gemini.


Ep330
Image created by AI
0 Comments

Tweeting Pigeons

15/5/2025

0 Comments

 
You may recall a past absurdity in the shape of parrots chatting to each other using iPads and Zoom where they were actually interacting with their feathered friends from afar without having to fly there first, well… in the spirit of absurdity, someone (real or otherwise) has opened the comms channels to the less conversational avians - namely the pigeons.

…a story so bizarre, so utterly… avian-garde, it’ll ruffle your feathers!
Picture
Sources – and by sources, I mean a slightly blurry, possibly photoshopped image sent in by a listener named “Bartholomew Birdbrain” – appear to depict… A veritable parliament of poultry, allegedly ENGAGED in the act of… typing. On a keyboard. Slathered, I might add, in what appears to be… crispy, delectable bacon fat.

Yes, you heard that right! Bacon. Fat. Keyboard. It’s a culinary crime scene and a technological… tweet-astrophe all rolled into one! But the story gets weirder, folks. Oh, it gets so much weirder.

These weren’t just random pecks, oh no. These weren’t some avian attempt at abstract expressionism. According to Bartholomew’s… eyewitness account (and I use that term loosely, given the alleged proximity of said witness to a rather aggressive-looking goose), these birds… they typed something. Something… specific.

O… O… O… M… M… M… M… G… G… G… G… G… G… SIX! SIX! SIX! SIX! SIX! SIX! SIX!

What cryptic message from the avian overlords is this?! Is it a prophecy? A demand for more millet?! A commentary on the declining quality of bird baths in the metropolitan area?! The mind… it flaps with possibilities!

But wait, there’s more! Apparently, this wasn’t the only profound pronunciation pecked out by our bacon-fingered… I mean, bacon-beaked… brethren. No, no, no! They went on! They continued their digital… doodling!

ONE! TWO! ONE! TWO! ONE! TWO! ONE! TWO! ONE! TWO! ONE! TWO!
​

What could it MEAN?! Is it a secret code? A countdown to the next bird seed delivery? The rhythmic tapping of tiny talons on the keys… could it be… Morse code for “more worms”?

Now, I know what you’re thinking. “This is absurd!” “This is fowl play!” And you might be right! But consider this: we underestimate our feathered friends at our peril! They watch us. They judge us. And perhaps… just perhaps… they’re finally finding their voice in the digital age, one bacon-greased peck at a time!

Don’t believe me? Check out the Twitter feed https://x.com/hungry_birds
​
Ep329
Image created by AI
0 Comments

What to If Involved in a Breach

15/5/2025

0 Comments

 
If you are involved in a hack attempt where your private information has been stolen, you need to be alert to the possibilities of your data being used by cyber criminals.
​

Contact the organisation and ask for assistance and/or perhaps IDCARE.

Cybersecurity professionals universally recommend changing passwords immediately after a data breach involving a service you use

Picture

​You should change your password for the affected organisations, websites and related accounts you may have. If you’ve used that (same) password elsewhere (which you should never do), change them too.


Make sure you have MFA setup on ALL your login accounts and if possible, choose the passkeys option or authenticator app. SMS is now considered the weakest 2FA option but better than nothing.


  • Use a strong unique password
  • Use MFA
  • Use a Password Manager
  • Remain Vigilant against subsequent Phishing attempts
  • Continue to monitor the situation

Ep329
Image created by AI
0 Comments

Windows Emergency Restart

15/5/2025

0 Comments

 
If your PC stops responding but still gives you access to the 3 finger salute… well
​

It turns out, there might just be a "secret" emergency restart method hiding in plain sight, seemingly unearthed from the depths of Windows history! While Microsoft hasn't exactly shouted this from the digital rooftops, a Reddit user stumbled upon it, and whispers suggest it might even date back to the Windows XP era.
Picture
​So, how do you access this "last resort" restart? It's surprisingly simple:

Picture

​The Emergency Restart Sequence:
  1. Press the Familiar Trio: Just like you would to open the Task Manager or lock your screen, press the CTRL + ALT + DEL keys simultaneously.
  2. Hold CTRL and Click Power: Here's the twist! While still holding down the CTRL key, look to the bottom-right corner of your screen. You'll see the familiar power button icon. Click on this power button.
  3. Confirm the Emergency: A message will appear, clearly stating: "Emergency Restart. Click OK to immediately restart. Any unsaved data will be lost. Use this only as a last resort."
  4. Click "OK": If you're sure you want to proceed with the forced restart, click "OK". Your computer will then shut down and restart.

Emergency vs. Regular Restart: What's the Difference?

Think of Emergency Restart as a slightly more controlled alternative to a hard reset. When your system is completely frozen and not responding to normal commands, even the standard restart options might be inaccessible. This method seems to bypass some of those frozen processes, offering a cleaner way to force a reboot without simply cutting the power. As BetaNews aptly put it, it's "an alternative to a hard reset" and "the closest thing to holding down the on/off button on your PC without having to press it."

When is Emergency Restart Your Go-To?
​
  • Total System Freeze: If your mouse cursor won't move, keyboard inputs are ignored, and CTRL + ALT + DEL is the only thing that elicits a response, this method could be your savior.
  • Laptops Without a Physical Power Button: While less common, some modern laptops might have unconventional power button arrangements. This on-screen option provides an alternative.
Ep329
Image Source: Screenshot taken by MITE Radio
0 Comments

Marks and Spencer Cyber Attack

15/5/2025

0 Comments

 
Another day another hack it seems… High Street giant Marks & Spencer (M&S) has today confirmed that personal customer data was compromised in the recent cyber attack that has crippled its online operations for the past three weeks. The retailer revealed that the stolen information could include customers' names, dates of birth, telephone numbers, home addresses, household information, email addresses, and online order histories.
Picture

While the company assured customers that usable payment or card details and account passwords were not compromised, the theft of contact information and order history still poses a risk of identity fraud. M&S Chief Executive Stuart Machin stated in a letter to customers that "unfortunately, some personal customer information has been taken," but added that "Importantly, there is no evidence that the information has been shared."

However, security experts warn that the hackers responsible could still share or sell the stolen data as part of their attempts to extort M&S. The retailer has not disclosed the number of customers affected but confirmed that all website users have been informed via email. The incident has also been reported to the relevant authorities, and M&S is working with cyber security specialists to monitor for any potential misuse of the stolen data.

The ongoing disruption is reportedly costing M&S a significant £43 million per week in lost sales, according to analysis from Bank of America Global Research. Online orders on the M&S website and app have been suspended since April 25th, and the company has yet to provide a timeline for when normal service will resume.

In response to the data breach, M&S will be prompting customers to reset their account passwords "for extra peace of mind." The retailer has also urged customers to be vigilant against potential phishing attempts, warning that they "might receive emails, calls or texts claiming to be from M&S when they are not." M&S emphasized that they will never contact customers asking for personal account information like usernames or passwords.

The impact of the cyber attack is also being felt by investors, with shares in M&S reportedly down by around 12% over the past month. As the retailer continues to work on restoring its online operations and managing the fallout from the data theft, customers are advised to remain vigilant and follow the guidance provided by M&S to protect themselves from potential scams.

Ep329
Image created by AI
0 Comments

Philips Fixables

15/5/2025

0 Comments

 
In a move set to extend product longevity and empower consumers, Philips has announced Fixables, an initiative allowing customers to 3D print their own replacement parts for select Philips Personal Health products. Developed in collaboration with 3D printing experts Prusa Research and creative agency LePub, Fixables provides a digital library of 3D-printable files, directly addressing the growing need for sustainable consumption and repairability. ​
Picture

This approach tackles the common frustration of broken or missing small parts rendering otherwise functional devices unusable. Instead of discarding an entire product, Philips customers will now be able to access a growing catalogue of design files for components like shaver heads, toothbrush attachments, and other essential pieces. By making these files freely available, Philips is actively encouraging a "repair over replace" mentality, directly contributing to a reduction in electronic waste.  

​The collaboration with Prusa Research, a leader in the 3D printing community, ensures that the provided files are optimised for home 3D printers, offering users a seamless and reliable printing experience. LePub's involvement highlights the creative and user-centric approach behind the Fixables initiative, making it accessible and appealing to a broad audience.  

The initial launch of Fixables will include a selection of commonly needed parts for Philips Personal Health products, with plans to expand the library over time. Users will be able to download the required files from a dedicated Philips platform and print them using their own 3D printer or through a local 3D printing service.  

This initiative marks a significant step towards a more sustainable future for consumer electronics, placing the power of repair directly in the hands of the user. By embracing 3D printing technology, Philips is not only offering a practical solution for extending product life but also setting a precedent for other manufacturers to consider innovative approaches to repairability and waste reduction. Fixables promises to be a game-changer for consumers seeking a more sustainable and self-sufficient approach to product ownership.

Ep328
Image created by AI
0 Comments

Google Bank Scam Stopper

15/5/2025

0 Comments

 
So cyber criminals are moving towards impersonating banking staff to help with remote banking on Android phones. They are convincing people to install remote software so they can be “helped” remotely while navigating and using banking apps.
​
Picture

Google is bolstering its fight against this type of financial fraud with a new feature designed to detect and prevent bank scams that occur during screen-sharing sessions. Building upon the existing "Scam Detection" on Pixel phones, the tech giant is developing a "BankScamCallDetectionService" aimed at thwarting criminals who impersonate bank officials and manipulate victims into handing over access to their accounts.

As revealed by Android Authority's recent findings within the Google Play Services beta, this upcoming feature will proactively identify a high-risk scenario: an incoming call from an unknown number coinciding with the user having their banking application open and actively sharing their screen. Unlike the current Pixel scam detection, this new service reportedly won't need to analyse call content. Instead, it will trigger an alert based on this specific combination of activities, a common tactic used by fraudsters to guide victims through their banking apps and drain their funds.

The system is designed to provide a clear and immediate warning to users when this potentially dangerous situation is detected, giving them the opportunity to hang up and report the suspicious number. Google is also reportedly maintaining an updated list of banking applications to ensure the feature remains effective against evolving threats.

This development leverages the enhanced privacy features introduced in Android 15, which allows apps to designate sensitive information that should be hidden during screen recording or sharing. It's anticipated that this new layer of protection will roll out through a Google Play Services update, making it accessible to a wider range of Android users beyond just Pixel devices. While still in testing, this proactive approach signals Google's commitment to safeguarding users from increasingly sophisticated and damaging financial scams.

Microsoft and Apple need to catch up!

0 Comments
<<Previous

    Author

    Delve into the world of MITE Radio through our captivating blogs. From music and tech to community news, our articles offer fresh perspectives and behind-the-scenes glimpses. Stay informed, connect with our community, and explore MITE Radio in a new way today!

    Archives

    June 2025
    May 2025
    April 2025
    March 2025
    February 2025
    January 2025
    December 2024
    November 2024
    October 2024
    September 2024
    August 2024
    July 2024
    June 2024
    May 2024
    April 2024
    March 2024
    February 2024
    January 2024
    December 2023
    November 2023
    June 2023
    May 2023
    April 2023

    Categories

    All
    AI
    App Of The Day
    Bytes & Beats
    Cyber Security
    Discussion
    Gadgets & Gizmos
    Game
    Innovation Hub
    Listener Question
    News
    Other
    Somethin' For Nothin'
    The Tech Absurd
    Tips & Tricks

    RSS Feed



  • MITE RADIO
  • Volunteer
  • Thank You
  • Blog
  • Programs
    • Making IT Easy with Tony & Kay
    • The Blues Hotel ​with Kelvin Huggins
    • Jazz Fusion with Brett C
    • Pheez Feels
    • Able & Unfiltered
    • Glenn & Tracy's Timeless Tracks
    • Cort In The Morning
    • Hits, Quizzes & Stuff with Harley Buckner
    • Solid Gold Sounds - Chris Pitchford
    • Gordon Cooper (multiple programs)
    • The Vinyl Countdown with Jonathan Charles
    • 50 Years and Rolling with Leo Kirby
    • Soul Vaults with David Southway
    • The Best Disco In Town with Jonathan Charles
    • ABC Oldies - JP McCartney
    • 50 Years of Pop with Peter Kirkpatrick
    • All About The 80s with Rob Charles
    • No More Heroes with Magnus Shaw
    • Classic Chart Rundowns with Dave Marley (multiple programs)
    • US UK Rock Soul Connection
    • Decades Breakfast with Mark Gale
    • Flashback to the 60s with Jim Barrington
    • The Time of Our Musical Life with Geoff Wood
    • Steve Bishops Old Record Club
    • Steve Algar ​(multiple programs)
    • Chris Palin ​(multiple programs)
    • The Peter Nightingale Show
    • Deeper Dimensions with David Dyke
    • Choice Cuts with Kevin Butcher
    • Ken Anton (Multiple Programs)
    • Gary Hopkins (Multiple Programs)
  • WAYS TO LISTEN