Home ShrinkAge Knights of the Soldering Iron


JUser: :_load: Unable to load user with ID: 2942

Author's Opinion

The views in this column are those of the author and do not necessarily reflect the views of iTWire.

Have your say and comment below.

Knights of the Soldering Iron

  • 06 December 2007
  • Written by 
  • Published in ShrinkAge
ShrinkAge has just come upon a question in an online forum that we realise marks a sort of Mason-Dixon Line between those of us who are TechnoPlods, and the digital nobility - what we call TechnoPeers. We just came across that question in the online forum devoted to the Asus Eee PC at eeeuser.com. The question is this: "What size soldering iron?"

You can probably guess the implicit message behind this question. Yes, somebody wants to know the precise size of the soldering iron tip which one requires to begin tampering with the interior workings of the Eee PC.

We're not completely unfamiliar with soldering irons. We can remember employing one now and then when we were putting together PCs back in the 80s. But even the tiniest nerve ending in our system shrieks at the very thought of opening the Eee's case and applying a piece of heated metal to its circuitry.

Look at it this way. It wasn't easy to get hold of this thing. It took until approximately 1.30pm today, applying every bit of skullduggery we could muster, to track down a single Eee PC that had somehow escaped the clutches of who knows how many desperate would-be buyers at the Myer department store chain.

Apparently the poor little thing had spent the last few days hiding somewhere in the HighPoint shopping centre, and had possibly only been spotted when it slipped out for a quick Eee pee-pee. Immediately we learned of its existence, however, we zoomed out there on the Scarabeo 250 and begged the shopping assistant to take a $499 bite out of our credit card and hand it over, which, very generously, she did.

Returning to ShrinkAge Central, we set about commissioning our brand new love object. We can be quite brutal with BIOSes and drivers. We can take a claw hammer to a Registry. We're perfectly happy to do the basic hacking   that dramatically improves the Eee PC's interface. But when it comes to, say, wiring up a USB port  and switching voltages from 5v to 3.5v, we can feel our mouth starting to dry out.
It's therefore extremely daunting for us to discover that we have innocently joined up to a community of people with the instincts of Dr Frankenstein. You'll get the drift by taking a look at the messages being posted in the Hacks and Modifications section of eeeuser.com.

They've hardly had their precious little computers more than a matter of weeks, and they're attaching SD card readers, USB hubs, and Bluetooth adapters, they're building their own PCBs (Printed Circuit Boards if you must know) and discussing, with a terrifying insouciance, switching screens and WebCams and who knows what else.

This, it seems, is a necessary rite of passage for those of us who want to be fully paid-up members of the Shrink Age. Forget about manuals and that little line in the EULA (End User Licence Agreement) about voiding the warranty. Buy yourself a soldering iron!  What you need, apparently, is the 15W model from Radio Shack, which comes with a very fine tip. Or a nice temperature-controlled Weller. Gulp!


Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips



Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.



Popular News