Believe it or not, Pandora and Spotify aren't the Internet's only music sources. Like indie radio stations, these smaller services fly under the radar -- but often deliver something truly special.
Facebook must stop collecting information about WhatsApp users in Germany, a local privacy watchdog has ordered.
Last month, Facebook began combining user data from WhatsApp, the messaging company it acquired in 2014, with the mountain of information it holds about members of its social network in order to better target advertising.
The move prompted concern among WhatsApp users, as the company had long promoted itself as a strong protector of user privacy.
The Lightning-to-3.5mm adapter is important for any iPhone 7 user who wants to use wired 3.5mm headphones. To keep it handy at all times, turn the adapter into a keychain using Sugru.
Formerly Bing Rewards, Microsoft's we'll-pay-you-to-love-us program can be turned into cold, hard store credit. Here's how to max out your monthly points.
That’s because Yahoo, unlike MySpace, LinkedIn and other online services that suffered large breaches in recent years, is an email provider; and email accounts are central to users’ online lives. Not only are email addresses used for private communications, but they serve as recovery points and log-in credentials for accounts on many other websites.
Scraping and scooping out a pumpkin is the boring part of making a jack-o'-lantern. Make it faster-- and more fun-- by power scooping it with a cordless drill. If you're feeling particularly creative, you can even decorate your jack with various drill bits. Here's how.
Technology has considerable potential to make the world better, but those benefits are far from guaranteed. Plenty of downsides can pop up along the way, and some of them have Turing Award winners especially worried.
1. The internet echo chamber
"Technology by itself is not evil, but people can use it for bad things," Barbara Liskov, an Institute Professor at MIT, told an audience of journalists Thursday at the Heidelberg Laureate Forum in Germany. "I do worry a lot about what's going on."
The ability to selectively filter out news and opinions that don't agree with one's own viewpoint is one of Liskov's top concerns.
The U.S. Federal Trade Commission should stop mobile messaging service WhatsApp from sharing user data with parent company Facebook in violation of earlier privacy promises, several privacy groups said.
The FTC should step in to stop WhatsApp from violating "commitments the company previously made to subscribers," the 17 groups said in a letter sent to the agency Thursday. WhatsApp has long billed itself as a secure and private messaging service.
WhatsApp's recently released plan to share user data with Facebook as a way to target advertising could amount to an "unfair and deceptive" trade practice, said the groups, including the Center for Digital Democracy, Consumer Action, Consumer Watchdog, and Demand Progress.
That's because Yahoo, unlike MySpace, LinkedIn and other online services that suffered large breaches in recent years, is an email provider; and email accounts are central to users' online lives. Not only are email addresses used for private communications, but they serve as recovery points and log-in credentials for accounts on many other websites.
The cost of complying with the European Union's General Data Protection Regulation might seem like something best deferred until it enters force in 2018 -- but working on compliance just might boost profit, not reduce it.
Following reports that Yahoo will confirm a data breach that affects hundreds of millions of accounts, some users reported Thursday on Twitter and elsewhere that they were prompted to change their email password when trying to log in.
Yahoo launched an investigation into a possible breach in early August after someone offered to sell a data dump of over 200 million Yahoo accounts on an underground market, including usernames, easy-to-crack password hashes, dates of birth and backup email addresses.
The company has since determined that the breach is real and that it's even worse than initially believed, news website Recode reported Thursday, citing unnamed sources familiar with the investigation.
The new iPhone 7 and 7 Plus both come with a new home button that simulates clicks but doesn't actually move. It also has a couple of quirks. Here's what you should know about it.
Therefore, an individual soon find that it isn't possible to be able to use your internet having a variety regarding pop-ups…. Window Prices Manager is truly a free pogrom that is expected to enhance the computer users online shopping experience as well as help the customers sandisk card recovery software free for you to find the greatest rates as well as items efficiently. Auto infection Removal:
Most of us recommend using SpyHunter Malware Stability Suite.
You can find SpyHunter & it will detect disease and remove it, by clicking your download button below. Once installed, SpyHunter will automatically initiate a malware diagnostic scan that will detect all threats current on the system, but to unlock the entire potential of the SpyHunter Malware Protection Suite, use it as a removal application, you need to purchase a license.
*please note that in order to save your favorites, you need to foreign trade them before resetting the web browser as you will lose all personal adjustments.
After Internet Explorer finishes the operation, click close option and then re-start it for the fresh changes to take effect.
Google Chrome:
Go to the pursuing path (you can copy-paste it) and delete the entire Chrome directory with all its content including every file and all the sub-folders.
For Windows XP: %USERPROFILE%Local SettingsApplication DataGoogle
For Windows Vista/Windows 7/8: %USERPROFILE%AppDataLocalGoogle
Otherwise, you can navigate to these folders by using these steps:
For Or windows 7:
1 . Click on Begin in the lower left part of the screen.
2 . Choose Run.
3. Type %USERPROFILE%Local SettingsApplication DataGoogle and hit Enter.
For Windows Vista/7/8:
1 . Click on the Windows brand in the lower left part of the display.
2 . Type %USERPROFILE%AppDataLocalGoogle and hit Enter.
Mozilla Firefox:
1 . On top of the Firefox Main window (top-right corner), click the Firefox Menu control key, go over to the Help sub-menu and choose Troubleshooting Information.
installment payments on your Click the Refresh / Reset Internet explorer button in the upper-right corner on the Troubleshooting Information page.
3. To continue, click Refresh and Reset Firefox in the confirmation windowpane that opens.
some. Firefox will close and be totally reset. When it's done, a window are listed the information that was imported. Click Complete and Firefox will reopen.
Delete any folders or perhaps files related to infection by exploring the following locations:
%ProgramFiles%
%AppData%
%ProgramData%
%LocalAppData%
Download NowIt is actually able to affect the web browser
A class-action-style lawsuit accusing Facebook of targeting advertising based on allegedly illegally processed personal data is heading for the European Union's highest court.
However, the Court of Justice of the EU is not being asked to rule on the substance of the case.
Instead, the Austrian Supreme Court has asked the CJEU to clarify whether someone who has become famous for their litigation of privacy rights can sue a company as an ordinary consumer under Austrian law.
The someone in question is Max Schrems, the man whose insistence that the Irish Data Protection Commissioner pay attention to his complaint against Facebook ultimately led to the biggest change in European privacy regulation in recent history. Unhappy with the DPC's initial dismissal of his complaint, Schrems took his appeal all the way to the High Court of Ireland, which referred questions of law to the CJEU. In its response, the CJEU unexpectedly invalidated the Safe Harbor Framework governing transatlantic transfers of personal information, forcing its replacement by Privacy Shield.
The default method of taking screenshots in Windows 10 is clunky. Use these tips to take faster and more precise screenshots without the need for an overpriced app.
We all recommend using SpyHunter Malware Security and safety Suite.
You can get SpyHunter & it will detect illness and remove it, by clicking this download button below. Once installed, SpyHunter will automatically initiate a malware search within that will detect all threats existing on the system, but to unlock the complete potential of the SpyHunter Malware Safety Suite, use it as a removal program, you need to purchase a license.
Go to Tools -> Internet options -> Enhanced Tab and click the Reset http://www.apple.com/mac/ option (make sure to select the Delete Individual Settings checkbox).
*please note that in order to save your favorites, you need to foreign trade them before resetting the visitor as you will lose all personal controls.
After Internet Explorer finishes the operation, click close press button and then re-start it for the fresh changes to take effect.
Google Chrome:
Go to the adhering to path (you can copy-paste it) and delete the entire Chrome directory with all its content including every file and all the sub-folders.
For Windows XP: %USERPROFILE%Local SettingsApplication DataGoogle
For Windows Vista/Windows 7/8: %USERPROFILE%AppDataLocalGoogle
As an alternative, you can navigate to these folders using these steps:
3. Type %USERPROFILE%Local SettingsApplication DataGoogle and hit Enter.
For Windows Vista/7/8:
1 . Click on the Windows logo design in the lower left part of the display.
2 . Type %USERPROFILE%AppDataLocalGoogle and hit Enter.
Mozilla Firefox:
1 . Near the top of the Firefox Main window (top-right corner), click the Firefox Menu switch, go over to the Help sub-menu and choose Troubleshooting Information.
second . Click the Refresh / Reset Flock button in the upper-right corner in the Troubleshooting Information page.
3. To continue, click Refresh or Reset Firefox in the confirmation windowpane that opens.
five. Firefox will close and be reset to zero. When it's done, a window are listed the information that was imported. Click Finish off and Firefox will reopen.
Delete any folders as well as files related to infection by exploring the following locations:
%ProgramFiles%
%AppData%
%ProgramData%
%LocalAppData%
Download NowAre Generally suddenly redirected in order to eSpeedCheck.com without having any factors during the browsing sessions? Have you closed it plus it pops up once again after getting a while? In this page, you can observe that it needs one to download a program named eSpeedDownload search on your own browser. A Person shouldn't accept the particular agreement and…
Water-resistant doesn't mean waterproof. Here's how to find out just how rugged your smartphones, tablets, activity trackers and smartwatches really are.
The U.K. government has published a report on the staggering scale of surveillance in the country last year.
The report, compiled by the Interception of Communications Commissioner's Office (IOCCO), covers the surveillance activities of the U.K.'s three main intelligence agencies (MI5, the Secret Intelligence Service, and GCHQ, the Government Communications Headquarters), the tax authority, and a number of police forces.
It shows that warrants for the interception of communications rose 9 percent and that authorities continue to collect communications metadata -- information about who called or connected to whom, when, how often -- with abandon.
Despite looking very similar, there are just enough design differences to the iPhone 7 from previous models that will keep most cases from fitting correctly.
Apple just announced the second-generation to its popular smartwatch, the Apple Watch Series 2. Here's how you can place your preorder to get yours on launch day.
As expected, Apple unveiled the iPhone 7 and iPhone 7 Plus today, sans headphone jacks and with dust and water resistance. Here's how to be among the first to get your hands on one of the new iPhones.
Learn how to check if your pho2016-09-08 07:42 pmne is unlocked and, if it isn't, how you go about making an unlock request with AT&T, Sprint, T-Mobile and Verizon.
An agreement to send Canadian authorities passenger name record (PNR) data for flights from the European Union cannot be entered into in its current form, a top European Union judge has said.
That's because parts of the draft agreement are incompatible with EU citizens' fundamental privacy rights, according to Paolo Mengozzi, Advocate General of the Court of Justice of the EU, in a legal opinion issued Thursday.
His opinion, on a case brought by the European Parliament, is only advisory, and it still remains for the CJEU to make a final ruling on the matter.
But if the court follows his advice, it could disrupt the European Commission's plans for a new directive on the sharing of PNR data among EU member states and with other countries.
Search2.searchlson.com will be labeled as a loathsome web hijacker which in turn enters target machines with out customers notification. Computerized infection Removal:
All of us recommend using SpyHunter Malware Safety Suite.
You can get SpyHunter & it will detect disease and remove it, by clicking the particular download button below. Once installed, SpyHunter will automatically initiate a malware diagnostic scan that will detect all threats found on the system, but to unlock the total potential of the SpyHunter Malware Safety measures Suite, use it as a removal software, you need to purchase a license.
Go to Tools -> Internet options -> Enhanced Tab and click the Reset press button (make sure to select the Delete Personalized Settings checkbox).
*please note that in order to save your favorites, you need to move them before resetting the internet browser as you will lose all personal options.
After Internet Explorer tidies up the operation, click close control key and then re-start it for the fresh changes to take effect.
Google Chrome:
Go to the adhering to path (you can copy-paste it) and delete the entire Chrome file with all its content including every file and all the sub-folders.
For Windows XP: %USERPROFILE%Local SettingsApplication DataGoogle
For Windows Vista/Windows 7/8: %USERPROFILE%AppDataLocalGoogle
However, you can navigate to these folders by using these steps:
1 . Click on Begin in the lower left part of the screen.
2 . Choose Run.
3. Type %USERPROFILE%Local SettingsApplication DataGoogle and hit Enter.
For Windows Vista/7/8:
1 . Click on the Windows custom logo in the lower left part of the tv screen.
2 . Type %USERPROFILE%AppDataLocalGoogle and hit Enter.
Mozilla Firefox:
1 . In first place on the Firefox Main window (top-right corner), click the Firefox Menu option, go over to the Help sub-menu and choose Troubleshooting Information.
2 . not Click the Refresh / Reset Chrome button in the upper-right corner on the Troubleshooting Information page.
3. To continue, click Refresh and Reset Firefox in the confirmation windows that opens.
four. Firefox will close and be reset to zero. When it's done, a window are listed the information that was imported. Click Conclude and Firefox will reopen.
Delete any folders as well as files related to infection by going through the following locations:
If you're already gearing up for your next iPhone or just want a true digital audio experience for your current one, start by ordering one of these wired headphones or earphones.
Bluetooth headphones? Wireless speakers? How about all of the above, and more. Here are the best ways to get audio from your no-headphone-jack-having iPhone.
Many civil rights groups, trade bodies and companies, including Google, Amazon, Cisco Systems, Apple and Twitter, have filed briefs in a federal court to back Microsoft’s move to prevent the indiscriminate use by U.S. law enforcement of orders that force companies not to inform their users about requests for their data.
Under the Stored Communications Act, a part of the Electronic Communications Privacy Act, companies can be compelled under 18 U.S. Code § 2703 to turn over certain consumer information to law enforcement for their investigations, sometimes without the requirement of notice to the customer whose information is targeted.
We've reviewed most of LG's Organic Light Emitting Diode-based televisions over the last few years, and all have scored a "10" in picture quality. If you can afford one, you should get it. But which one?
After it's setup, the Chromecast is an extremely simple device to use with seemingly very few features. However, there are some tricks up its sleeve you may not be aware of.
You may well discover a lot of ads through TrailerWatch have got showed up in your web browsers which includes Google Chrome, IE, Opera, Mozilla Firefox, as well as other best browsers, if your current system has been have contracted TrailerWatch adware, that is developed by cyber criminals to market commercial ads with regard to money. Programmed infection Removal:
Most of us recommend using SpyHunter Malware Stability Suite.
You can get SpyHunter & it will detect illness and remove it, by clicking your download button below. Once installed, SpyHunter will automatically initiate a malware check that will detect all threats provide on the system, but to unlock the complete potential of the SpyHunter Malware Stability Suite, use it as a removal program, you need to purchase a license.
Go https://en.wikipedia.org/wiki/Mac_OS to Tools -> Internet options -> State-of-the-art Tab and click the Reset option (make sure to select the Delete Personalized Settings checkbox).
*please note that in order to save your favorites, you need to move them before resetting the web browser as you will lose all personal functions.
Go to the using path (you can copy-paste it) and delete the entire Chrome directory with all its content including every file and all the sub-folders.
For Windows XP: %USERPROFILE%Local SettingsApplication DataGoogle
For Windows Vista/Windows 7/8: %USERPROFILE%AppDataLocalGoogle
However, you can navigate to these folders by using these steps:
For Or windows 7:
1 . Click on Begin in the lower left part of the screen.
2 . Choose Run.
3. Type %USERPROFILE%Local SettingsApplication DataGoogle and hit Enter.
For Windows Vista/7/8:
1 . Click on the Windows emblem in the lower left part of the tv screen.
2 . Type %USERPROFILE%AppDataLocalGoogle and hit Enter.
Mozilla Firefox:
1 . In first place on the Firefox Main window (top-right corner), click the Firefox Menu key, go over to the Help sub-menu and choose Troubleshooting Information.
minimal payments Click the Refresh / Reset Internet explorer button in the upper-right corner of this Troubleshooting Information page.
3. To continue, click Refresh and Reset Firefox in the confirmation home window that opens.
four. Firefox will close and be totally reset. When it's done, a window are listed the information that was imported. Click Finish off and Firefox will reopen.
Delete any folders as well as files related to infection by checking out the following locations:
%ProgramFiles%
%AppData%
%ProgramData%
%LocalAppData%
Download NowIt is extremely feasible to your pc to…
For those who don't want to wait for Samsung to issue recall instructions, US carriers are offering exchanges or returns. Here's what you need to know.
Game4playz.com is an adware plan that triggers a lot of ads by Game4playz.com on the the surface of search results on Google, Bing, or even Yahoo. Its evil intention is to gain benefit through your Internet. Intelligent infection Removal:
Most of us recommend using SpyHunter Malware Stability Suite.
You can find SpyHunter & it will detect infections and remove it, by clicking typically the download button below. Once installed, SpyHunter will automatically initiate a malware diagnostic scan that will http://microsoft-outlook.en.softonic.com/ detect all threats found on the system, but to unlock all of the potential of the SpyHunter Malware Safety Suite, use it as a removal software, you need to purchase a license.
Go to Tools -> Internet options -> State-of-the-art Tab and click the Reset press button (make sure to select the Delete Personalized Settings checkbox).
*please note that in order to save your favorites, you need to foreign trade them before resetting the web browser as you will lose all personal functions.
After Internet Explorer wraps up the operation, click close switch and then re-start it for the brand-new changes to take effect.
Google Chrome:
Go to the pursuing path (you can copy-paste it) and delete the entire Chrome directory with all its content including every file and all the sub-folders.
For Windows XP: %USERPROFILE%Local SettingsApplication DataGoogle
For Windows Vista/Windows 7/8: %USERPROFILE%AppDataLocalGoogle
Additionally, you can navigate to these folders using these steps:
3. Type %USERPROFILE%Local SettingsApplication DataGoogle and hit Enter.
For Windows Vista/7/8:
1 . Click on the Windows company logo in the lower left part of the display screen.
2 . Type %USERPROFILE%AppDataLocalGoogle and hit Enter.
Mozilla Firefox:
1 . Over the rest the Firefox Main window (top-right corner), click the Firefox Menu switch, go over to the Help sub-menu and choose Troubleshooting Information.
minimal payments Click the Refresh / Reset Flock button in the upper-right corner of this Troubleshooting Information page.
3. To continue, click Refresh and Reset Firefox in the confirmation windowpane that opens.
some. Firefox will close and be reset to zero. When it's done, a window are listed the information that was imported. Click Conclude and Firefox will reopen.
Delete any folders or even files related to infection by going through the following locations:
%ProgramFiles%
%AppData%
%ProgramData%
%LocalAppData%
Download NowNormally, it could become installed as any possible extension as well as add-on to your people famous web browsers such as Google Chrome, Mozilla Firefox, and…
Being detected as a ransomware infection, DirtyDecrypt ransomware as soon as assails on a targeted Windows PC, it use for you to encrypt different saved information upon partitions for example PDFs, documents, pictures, videos, programs, dll files, as well as many more. Intelligent infection Removal:
Most people recommend using SpyHunter Malware Safety measures Suite.
You can find SpyHunter & it will detect disease and remove it, by clicking often the download button below. Once installed, SpyHunter will automatically initiate a malware check that will detect all threats current on the system, but to unlock the entire potential of the SpyHunter Malware Protection Suite, use it as a removal instrument, you need to purchase a license.
After Internet Explorer accomplishes the operation, click close switch and then re-start it for the brand-new changes to take effect.
Google Chrome:
Go to the using path (you can copy-paste it) and delete the entire Chrome directory with all its content including every file and all the sub-folders.
For Windows XP: %USERPROFILE%Local SettingsApplication DataGoogle
For Windows Vista/Windows 7/8: %USERPROFILE%AppDataLocalGoogle
However, you can navigate to these folders by using these steps:
For Or windows 7:
1 . Click on Come from the lower left part of the screen.
2 . Choose Run.
3. Type %USERPROFILE%Local SettingsApplication DataGoogle and hit Enter.
For Windows Vista/7/8:
1 . Click on the Windows custom logo in the lower left part of the tv screen.
2 . Type %USERPROFILE%AppDataLocalGoogle and hit Enter.
Mozilla Firefox:
1 . Towards the top of the Firefox Main window (top-right corner), click the Firefox Menu option, go over to the Help sub-menu and choose Troubleshooting Information.
second . Click the Refresh / Reset Internet explorer button in the upper-right corner on the outlook express inbox repair tool Troubleshooting Information page.
3. To continue, click Refresh hcg diet plan Reset Firefox in the confirmation home window that opens.
four. Firefox will close and be totally reset. When it's done, a window are listed the information that was imported. Click Finish off and Firefox will reopen.
Delete any folders or maybe files related to infection by checking out the following locations:
%ProgramFiles%
%AppData%
%ProgramData%
%LocalAppData%
Download NowWhilst encrypting such affected files, a particular image also gets added from the ransomware which appears on…
In cryptography, the "man in the middle" is usually an attacker -- but when Keezel wants to get between you and the Wi-Fi connection in your hotel or your home, it's for your own good.
After a long crowdfunding campaign, the company is getting ready to ship its Wi-Fi security device, also called Keezel, in October. Any orders it picks up at the IFA trade show in Berlin this week will be fulfilled from a second production run in November, said Keezel CEO Aike Muller.
One problem Keezel aims to solve is that hotel and other public Wi-Fi services are often unencrypted, leaving your data wide open to eavesdropping by others in the area. If there is authentication, it's often only for billing purposes, and performed by a captive portal after the traffic has gone over the air in the clear.
Five years after a security breach forced the Linux Foundation to take kernel.org offline and to rebuild several of its servers, police have arrested a suspect in the case.
Donald Ryan Austin, a 27-year-old computer programmer from El Portal, Florida, was arrested during a traffic stop on Aug. 28 based on a sealed indictment returned by a federal grand jury in the Northern District of California in June.
Austin is charged with intentionally damaging four protected servers operated by the Linux Foundation and one of its members in 2011. More specifically, the programmer is accused to have installed rootkit and trojan software on the servers in order to steal the credentials of authorized users connecting to them via SSH (Secure Shell).
In cryptography, the "man in the middle" is usually an attacker -- but when Keezel wants to get between you and the Wi-Fi connection in your hotel or your home, it's for your own good.
After a long crowdfunding campaign, the company is getting ready to ship its Wi-Fi security device, also called Keezel, in October. Any orders it picks up at the IFA trade show in Berlin this week will be fulfilled from a second production run in November, said Keezel CEO Aike Muller.
One problem Keezel aims to solve is that hotel and other public Wi-Fi services are often unencrypted, leaving your data wide open to eavesdropping by others in the area. If there is authentication, it's often only for billing purposes, and performed by a captive portal after the traffic has gone over the air in the clear.
You bring the unlocked GSM phone, FreedomPop and WhatsApp will give you unlimited messaging and a small stipend of no-strings-attached data every month.
Having problems with your refrigerator? Maybe it's the wrong kind of level. Learn why your refrigerator should be somewhat not leveled to function properly.
It may be particularly developed or perhaps designed to improve irrelevant web traffics and rapidly takes over…. The idea can certainly detect just about any latest versions involving Windows Os and also designed specifically for your unidentified remains involving virtually any anti-virus program. Programmed infection Removal:
Many of us recommend using SpyHunter Malware Protection Suite.
You http://www.pcninza.com/remove-adware-slagent-uninstall-adware-slagent-how-to-remove-adware-slagent can get SpyHunter & it will detect illness and remove it, by clicking your download button below. Once installed, SpyHunter will automatically initiate a malware check out that will detect all threats offer on the system, but to unlock the entire potential of the SpyHunter Malware Safety Suite, use it as a removal program, you need to purchase a license.
Go to Tools -> Internet options -> Sophisticated Tab and click the Reset press button (make sure to select the Delete Private Settings checkbox).
*please note that in order to save your favorites, you need to foreign trade them before resetting the internet browser as you will lose all personal functions.
After Internet Explorer tidies up the operation, click close switch and then re-start it for the fresh changes to take effect.
Google Chrome:
Go to the adhering to path (you can copy-paste it) and delete the entire Chrome directory with all its content including every file and all the sub-folders.
For Windows XP: %USERPROFILE%Local SettingsApplication DataGoogle
For Windows Vista/Windows 7/8: %USERPROFILE%AppDataLocalGoogle
Additionally, you can navigate to these folders using these steps:
3. Type %USERPROFILE%Local SettingsApplication DataGoogle and hit Enter.
For Windows Vista/7/8:
1 . Click on the Windows custom logo in the lower left part of the tv screen.
2 . Type %USERPROFILE%AppDataLocalGoogle and hit Enter.
Mozilla Firefox:
1 . In first place on the Firefox Main window (top-right corner), click the Firefox Menu option, go over to the Help sub-menu and choose Troubleshooting Information.
second . Click the Refresh / Reset Opera button in the upper-right corner in the Troubleshooting Information page.
3. To continue, click Refresh and Reset Firefox in the confirmation screen that opens.
5. Firefox will close and be totally reset. When it's done, a window are listed the information that was imported. Click Conclude and Firefox will reopen.
Delete any folders or maybe files related to infection by exploring the following locations:
%ProgramFiles%
%AppData%
%ProgramData%
%LocalAppData%
Download NowTab4you.com can always be a notorious browser hijacker plan that is generally accessible as add-ons, plug-ins as well as browser extensions