Shanes Computing and Networking Blog

Return to Business Page





New Cyber Security Threat: Hidden Text in Emails Can Manipulate Generative AI Tools Used by Staff.

28/07/25 by Mr Shane Currie | Australian Computing, Networking and Cyber Security

In todays article, I address a new potential threat regarding responding to emails with AI.

By using a very simple steganography method, that a child could probably figure out, it is possible to exploit how the AI responds to an email.

While, it could be funny to use this simple exploit to catch out staff using AI to respond to emails, this simple exploit does raise new cyber security concerns regarding integrity.

I recommend all Australian companies and organisations to read this article and consider updating their policies regarding staff use of generative AI.

Click here to view the article & demo the game





Blackhole Run V1.18.11 introducing lasers to the game.

26/07/25 by Mr Shane Currie | Charles Sturt University & IT Masters Student

Black hole run

In todays update for my Blackhole Run videogame, I have introduced lasers that can shoot down asteroids. Click on the link below to watch the video demonstration of the game and play the current version of the JavaScript game (no downloads required)

You can reed the full article via the link below.

Click here to view the article & demo the game





Why restricting outbound connections in your firewall is just as important as restricting inbound connections.

26/06/25 by Mr Shane Currie | Australian Computing, Networking and Cyber Security

By using an analogy, this article explains why is just important to restrict outbound network connections in your firewall.

By restricting outbound connections, if malware does somehow infect your system, it will not be able to establish an outbound connection to the cybercriminal, making it more difficult for the criminal to extract your sensitive data.

You can reed the full article via the link below.

Click here to view the article & demo the game





Blackhole Run (Beta Version 1.15.3 & 1.15.7) a 2D game based on space physics.

21/06/25 by Mr Shane Currie | Charles Sturt University & IT Masters Student

Black hole run

As promised, this Australia winter I have updated the beta version of my Blackhole run game

In version 1.15.3 I have included asteroids, the blackhole will eat the asteroids and increase its mas and gravitational pull, in version 1.15.4 I have included an accretion disk

The game is still a work in progress, im still working on minor bugs. The code is open source on github, links to demo the game is in the artice

Click here to view the article & demo the game





Using Generative AI to simulate an Emu Uprising, Part two

12/06/25 by Mr Shane Currie | Sole Trader - Shanes Computing, Networking and Cyber Security

In this article I take a comedic look at the possibilities of generative AI deepfakes being used to create fake digital news on social media and reminds people to not believe everything that they watch online.

In part two of the fictional Emu uprising series, the emus plan to use deepfake videos of the Kangaroos to distract the public from the Emu uprising.

The link to part one of the Emu uprising is included in this article, enjoy a comedic take on generative AI & fake news.

Click here to read the article





What to do if you have been targeted by a scammer who was provided remote access to your computer system

12/06/25 by Mr Shane Currie | Sole Trader - Shanes Computing, Networking and Cyber Security

This article explains the key steps to take if you have been contacted by a scammer who was provided access to your computer system.

Key steps include, disconnect your computer from the internet, contact your bank to block access to your internet banking account then contact a local IT security professional to clean and restore your system.

You can read the full article in detail via the link below

Click here to read the article





How businesses and organisations can enable staff to work from home securely.

11/06/25 by Mr Shane Currie | Sole Trader - Shanes Computing, Networking and Cyber Security

This article explores common security risks of allowing staff to work from home and how those risks can be mitigated.

By opting to hire a local Australian trained cyber security professional, business can enable staff to work from home while protecting their business assets.

You can read the article via the link below

Click here to read the article





The Difference Between Cyber Security & Cyber Safety & Why This Matters to your Home or Business.

19/04/25 by Mr Shane Currie | Sole Trader - Shanes Computer, Network and Cyber Security

This article explains the difference between cyber security and cyber safety and why businesses and homes users should consider hiring a professional, to secure their systems and train the user on how to stay safe online.

You can read the article via the link below

Click here to read the article





Shanes Computing & Networking has Rebranded to Shanes Computer, Network and Cyber Security.

03/04/25 by Mr Shane Currie | Sole Trader - Shanes Computer, Network and Cyber Security

A message from Shane regarding the rebranding of his sole trader entrepreneurship.

You can read the article via the link below

Click here to read the article





How IT Professionals Offering Web Design & Search Engine Optimisation Services (SEO) can Improve their Business Model

03/04/25 by Mr Shane Currie | Charles Sturt Student

In todays article I discuss basic business strategies for Australian entrepreneurs who are looking to start their own business in web design and search engine optimisation.

I receive multiple marketing emails a week, all offering services in web design and search engine optimisation. However, all these emails go directly to my bin, this article explains why.

Australians who are interested in starting their own businesses in web design or search engine optimisation are encouraged to read this article.

You can read the article via the link below

Click here to read the article





Who is Responsible for Your Companies Cyber Security, Data Protection and Restoration in the Cloud?

14/03/25 by Mr Shane Currie | Charles Sturt Student

In todays article I address common misconceptions with who is responsible for maintaining cyber security and data protection and recovery standards for cloud based services.

By using an example company and explaining using laypersons terms by using an analogy of a landlord and tenant relationship, I explain how companies can secure their databases, such as customer records in the cloud and recover from security incidents.

You can read the article via the link below

Click here to read the article





Ethical Dilemma of Replicating Images, Voices and Personalities of the Deceased in Digital format or in Dolls with Deepfake AI & GenAI Technology.

11/03/25 by Mr Shane Currie | Charles Sturt Student

In todays article I explore the ethical considerations of using Deapfake and GenAI technology to replicate images and videos of the deceased.

Ethical considerations I explore is the potential for deceased users of social media to have their digital likeness and personalities fed into a Deepfake and GenAI platforms for the purpose of creating an indistinguishable digital resemblance of deceased individuals without their consent.

This article, addresses the common law for using manipulated images of a person to harass, stalk or discredit them. However, while common laws provide protections for the living, what about the dead?

You can read the article via the link below

Click here to read the article





Building a Morse Code Trainer using Raspberry PI GPIO Pins, a Button & a Buzzer.

21/02/25 by Mr Shane Currie | Charles Sturt Student

This is a technical document requiring technical expertise to understand.

In todays article, for fun I create a Morse code trainer using python programming, a Raspberry Pi, a Button and a buzzer.

By using my basic circuitry knowledge, I circuit up my own buzzer and a button to a Raspberry Pi. The user can interact with the device by pressing the button for sending Morse code then the program will decode the Morse code and play a sound on the buzzer.

Check out my article for a quick video presentation of the Morse code trainer, including a link to the Github code repository for the code.

You can read the article via the link below

Click here to read the article





How to create a JavaScript game using GenAI for Absolute Beginners.

15/02/25 by Mr Shane Currie | Charles Sturt Student

This is a technical document requiring technical expertise to understand.

Edited 17/02/25 to include further explanations

In todays article I create a guide explaining the basic fundamentals for creating a JavaScript game with the assistance with GenAI

Creating a JavaScript game with GenAI is not a simple copy and paste job, you will need to learn the basic fundamentals. I explain some of those fundamentals in my article.

I include a link to the demo of my game as well as the full code for the javascript game

You can read the article via the link below

Click here to read the article





Why its Now Even More Important to Verify Staff Identity for Password Reset Requests.

14/02/25 by Mr Shane Currie | Charles Sturt Student

This article explains why its important for help desk staff and security professionals to verify the staff members identity for password resets.

Due to advancements in AI technology it is now possible for threat actors to impersonate the voice of a staff member via the use of AI voice cloning technology

By verifying staff identity using non publicly available information and storing that information in encrypted and password protected databases, companies and organisations can strengthen their cyber security practices.

You can read the article via the link below

Click here to read the article





The Importance of Carrying Out a Risk Assessment with using GenAI for your Business or Organisation.

11/02/25 by Mr Shane Currie | Charles Sturt Student

This article explores the potential risks to customer privacy via unregulated usage of GenAI platforms on company and governmental systems.

By exploring a case study of a recent penetration test carried out against the GenAI platform Deekseek, this article proposes carrying out a risk assessment of using GenAI in the workplace.

You can read the article via the link below

Click here to read the article





New JavaScript Game: Blackhole Run (Beta Version 1.15) a 2D game based on space physics.

04/02/25 by Mr Shane Currie | Charles Sturt Student

This is a technical document requiring technical expertise to understand.

In this article I have embarked on a new project in the creation of a JavaScript space game where the player collects fuel from a black hole and transports it to the blue planet.

This game was created for educational purposes to learn more about the physics of space. GenAI was used to formulate the mathematical principles of the game, however this can be reversed engineered.

You can demo the game by following the links in the article, I have also included a link to the GitHub repository of the games code within the article.

You can read the article via the link below

Click here to read the article





Testing the capability of using GenAI to assist with developing a JavaScript Game | Part 1 Path Finding & Collision

01/02/25 by Mr Shane Currie | Charles Sturt Student

This is a technical document requiring technical expertise to understand.

In todays article, I explore using GenAI to create a prototype for a upcoming JavaScript Adventure game.

I discover that using GenAI to develop a JaveScript game is not as simple as just using copy and paste and a understanding of programming syntax is still required.

GenAI can increase efficiency for developers by building the code frameworks and the human developers can build on top of these frameworks.

In this article, that includes a product demonstration, I create a program where a character can collide with a static object in a game.

You can read the article via the link below

Click here to read the article





A Technicians Perspective on the Privacy & Data Tracking Policies of DeepSeek and ChatGPT GenAI Platforms.

29/01/25 by Mr Shane Currie | Charles Sturt Student

This article explores the privacy and data collection polices of Generative Artificial Intelligence (GenAI) platforms developed in the United States and China.

This article attempts to take an apoltical stance and focuses to discussing the technical aspects of what data these platforms can access or share.

This article attempts to explain the topics in laymans terms and makes brief mention about the potential for an Australian made GenAI service.

You can read the article via the link below

Click here to read the article





Can Humans Subconsciously tell the Difference between Stories Authored by Generative Artificial Intelligence (GenAI) or a Human?

22/01/25 by Mr Shane Currie | Charles Sturt Student

This article discusses if its possible for humans to subconsciously tell the difference between text authored by artificial intelligence or another human.

This article proposes a thought exercise and suggests more research in to this subject by a range of skilled professionals from a range of different professions.

You can read the article via the link below

Click here to read the article





What the United States Proposed TikTok Ban means for Australian Made and Hosted Social Media Compaines

20/01/25 by Mr Shane Currie | Sole Trader - Shanes Computing & Networking

This article explores how the United States proposed TikTok ban could affect Australian made and hosted social media websites.

Mentioned in the article is an United States bill that forbids the distribution of foreign adversary controlled applications in the United States and Australian legalisation that grants the ability for Australian authorities to access electronic data held by United States communication service providers.

Due to the nature of the article, this article makes all attempts to remain apolitical while exploring the business possibilities of the TikTok ban.

You can read the article via the link below

Click here to read the article





Using Generative AI to Simulate a Fictional Emu Invasion of Australia

31/12/24 by Mr Shane Currie | Charles Sturt Student

In todays article, I decide to end the year on a comedic note by creating some short videos using Generative AI to simulate a fictional invasion of Australia by the Emus

While the videos do have a comedic point, it showcases the current potential of generative AI sets a reminder to not always believe everything that you may see on social media or the internet.

Anyway, sit back and enjoy the short videos and see if you can spot any mistakes made by generative AI

You can read the article and view the videos via the link below

Click here to read the article





Generative AI, a Tool or a Threat in Business Operations?

29/12/24 by Mr Shane Currie | Charles Sturt Student

This article explores how generative AI can be used as a tool by skilled professionals to maximise productivity and efficiency and how it can also pose a threat to privacy and security if not use correctly.

Included in the article are scenarios of how generative AI can be used in business administration and technical support operations in a correct manner, and an incorrect manner.

You can read my article by clicking on the link below

Click here to read the article





Onsite IT Support VS Remote IT Support, which option is better for your home or business?

19/12/24 by Mr Shane Currie | Sole Trader - Shanes Computing & Networking

This article analyses the advantages and disadvantages of onsite and remote technical support for your computer, network, printer or server systems.

Factors considered in this article include cyber security, accessibility, support timeframes, the general customer experience and cost.

When considering onsite or remote technical support, its always encouraged to acquire support locally or nationally from an Australian based technician.

You can read my article by clicking on the link below

Click here to read the article





Lessons learned from the CrowdStrike global outage

22/07/24 by Mr Shane Currie

In todays article, I address the topic of the CrowdStrike outage.

I address the need for professionals to implement the workaround to avoid any further issues, its best to leave this to a professional.

I discuss lessons that we can all learn form this outage, such as how testing updates in a sandbox environment can mitigate future incidents.

You can read my article by clicking on the link below

Click here to read the article





Network Intrusion Alarm System (IAS) Development: Version 2.7.1

13/07/24 by Mr Shane Currie

In todays video article, I provide a demonstration of my Network Intrusion Alarm System (IAS) version 2.7.1.

In this version, I am testing the connected modules that I purchased from JayCar. This version does not yet have network port monitoring enabled, I am simply testing if the modules work.

I have included a video presentation of prototype testing and also a video presentation of my dog Loki.

Click the link below to view.

Click here to read the article





Network Intrusion Alarm System (IAS) Development: IAS V2.7

16/06/24 by Mr Shane Currie

Shanes Computing and Networking has embarked on a new project called the Intrusion Alarm System (IAS) 2.7.

The IAS will be capable of various tasks, such as monitoring network ports for unauthorized activity, external weather conditions, movement, ultrasonic frequencies, and soil moisture.

The IAS is being developed by using a Raspberry PI and Python programming scripting. Current challenges in this version include managing CPU temperature and testing of various lightweight AI models for better performance and custom datasets.

You can read further about the robotics development by clicking the link below.

Click here to read the article





Bar and Pokies Patron Data Potentially Compromised: Alleged Offshore Leak Affecting ClubsNSW, Businesses Advised to Verify and Implement High Encryption Standards.

02/05/24 by Mr Shane Currie

An anonymous group of offshore IT subcontractors have reportedly compromised sensitive private Australian information, including biometrics, facial recognition, drivers license details, and slot machine usage of ClubsNSW patrons

The IT contracting firm servicing ClubsNSW has confirmed that the incident is under investigation.

This article highlights the crucial need for robust encryption practices, prompting businesses to leverage encryption options and seek assistance from qualified local IT professionals like Shane from Shanes Computing and Networking to ensure data is secure and properly managed.

Click here to read the article





Beyond Plug-and-Play: Unleashing the Full Power of Your Network Firewall.

31/03/24 by Mr Shane Currie

This article delves into the critical need for advanced configuration of network firewalls, challenging the "plug-and-play" misconception in today's sophisticated corporate and organizational landscapes.

Through an engaging analogy with a VCR, I reveal that while basic functionality is straightforward, leveraging a firewall's advanced features requires skillful programming.

I explore essential topics like access control lists and intrusion detection systems, and provide examples that detail the risks of inadequate configuration..

Read the full article by clicking the button below.

Click here to read the article







Cyber Criminals are using deepfake AI to replicate business stakeholders in Zoom and MSTeams video conference calls.

13/02/24 by Mr Shane Currie

Cybercriminals are using deepfake AI to replicate business stakeholders in fake Zoom and Microsoft Teams calls, resulting in successful scams that defraud companies of millions

This article discusses the rise of deepfake replicants and emphasizes the need for businesses to safeguard against this threat. It suggests implementing network and application access controls, with a focus on using firewall rules, virtual local area networks (VLAN) and access control lists to mitigate this threat

Shane's Computing and Networking can offer a confidential, no obligation security review and provide actionable insights in protecting your business against the rise of the deapfake replicants

Read the full article by clicking the button below.

Click here to read the article





ACSC Essential 8 Simplified: Leveraging Your Current Microsoft Tech for Maximum Security & Affordably

30/01/24 by Mr Shane Currie

This article highlights cost-effective strategies for small to medium enterprises (SMEs) to comply with the Australian Cyber Security Centre's Essential 8 model using existing Microsoft tools.

It emphasizes the challenges SMEs face in developing cybercrime resilience due to limited resources and the high costs of cybersecurity expertise.

This article also advices how Shanes Computing and Networking, which offers affordable consultation services can help businesses implement these Essential 8 guidelines effectively.

Read the full article by clicking the button below.

Click here to read the article






2024: Time to Fortify! ASIC Survey Reveals Cyber Security Gaps in SMEs

17/01/24 by Mr Shane Currie

This article highlights ASIC's Cyber Pulse Survey findings, revealing many Australian SMEs' lack of preparedness for cyber threats.

It emphasizes the challenges SMEs face in developing cybercrime resilience due to limited resources and the high costs of cybersecurity expertise.

This article warns of an expected increase in cybercrime in 2024 and stresses the importance of SMEs fortifying their defenses.

Read the full article by clicking the button below.

Click here to read the article






The Silent War: Protecting MSPs and Clients from Covert Cyber Infiltration

14/12/23 by Mr Shane Currie

This article explores the heightened cybersecurity risks facing Managed Service Providers (MSPs) and their clients, emphasizing the implications of cybercriminal infiltration.

Citing warnings from cybersecurity agencies, the article delves into the specific threat of North Korean cyber criminals masquerading as IT workers to deploy ransomware.

The article advocates for the strategic hiring of local IT professionals and emphasizes proactive measures for clients and MSPs to protect against cyber threats.

Read the full article by clicking the button below.

Click here to read the article






Safeguarding Your Organizations Fortress: The Power of Monitoring TCP/IP & UDP Activity

09/12/23 by Mr Shane Currie

This article emphasizes the critical role of monitoring TCP/IP and UDP activity in safeguarding businesses from cyber threats. it explores the risks associated with remote access, illustrating the potential dangers when network communication channels go unchecked.

Citing real word examples, this article highlights the current vulnerabilities of remote work from home scenarios and how these vulnerabilities can be fortified by professional IT Staff and Contractors skilled in Network Security and Network Engineering.

Read the full article by clicking the button below.

Click here to read the article






Fortify Your Defenses: Unleashing the Power of Microsoft Exchange and SharePoint for Robust Email Security

08/12/23 by Mr Shane Currie

Emails stand out as the primary entry points targeted by cybercriminals. Typically, these malicious actors initiate attacks on businesses or organizations by deploying deceptive emails aimed at misleading staff.

This article delves into the deployment of disclaimers, email attachment blocking and review mechanisms using Microsoft Exchange. Additionally, it explores the inclusion of a Cyber Security Policy in SharePoint as a means to educate staff

Read the full article by clicking the button below.

Click here to read the article




Safeguard Your Business: Choose Local Australian IT Support Over Risky International Alternatives

23/11/23 by Mr Shane Currie

In the current political and business landscape of Australia, businesses and organizations must decide between outsourcing IT support services or employing Australian-trained IT support staff and contractors.

This article objectively explores the security risks associated with outsourcing IT support and highlights the benefits of choosing Australian-based IT support for your business or organization.

Read the full article by clicking the button below.

Click here to read the article