Browserling now has audio support! ?
Good Coders Code, Great Reuse
by
17h ago
Team Browserling keeps shipping! ? We just added audio support to Browserling! ? Now you can hear audio. ♫ Try this link, it will open a song on YouTube in a Browserling browser: YouTube in Browserling From technical perspective, we implemented it using modern coding principles, such as AI, web3, blockchain, and Rust. ? See you next time ..read more
Visit website
Announcing Paid Plans for Fractal Tools ?
Good Coders Code, Great Reuse
by
1w ago
Team Browserling keeps shipping! Last month we launched paid plans for CSV Tools and today we're launching paid plans for our next most popular tool category – Fractal Tools. Fractal tools are used by 5,000 people every month and they let you draw fractal trees, flakes, stars, dragons, and dendrites, generate space-filling curves and mazes, and much more. Next, we're adding paid plans to all other online tools categories that we built and joining them into a single ultimate get things done website called OnlineTools.com, making it the top 100 website on the Internet. From technical standpoint ..read more
Visit website
What is a Hidden Browser? (And How To Get One)
Good Coders Code, Great Reuse
by
1w ago
TLDR: You can instantly access a hidden browser via browserling.com/browse. Created by me and my team, our service lets you access a cloud-based browser that lasts for a single session and leaves no history, cookies, or downloads behind. Hidden Browser – What Is It? A hidden browser is a cloud-based browser that runs without storing any local data such as history, cookies, or downloads. It's designed to be known and accessed only by the user, ensuring privacy and anonymity in online activities. This type of browser provides a discreet way to access the internet, leaving no trace of user activi ..read more
Visit website
There are now 1000 paying left-pad users! ?
Good Coders Code, Great Reuse
by
1w ago
Success! ? My Left-pad a String tool now has 1000 paying users! ? I promise I won't put it on npm, won't unpublish it, and I definitely won't rewrite it in Rust. ✌️ See you next time! ? PS. Use coupon code 0000LEFTPAD for 30% off ..read more
Visit website
30% Discount on Selected Tools ?
Good Coders Code, Great Reuse
by
1w ago
I've added a 30% discount to 5 most popular tools. 1) Left-pad a String Use coupon code 0000LEFTPAD to get a 30% discount on the string left-pad tool. No more node modules, uninstalled packages, and definitely no smelly Rust. Just a left-pad tool that works right in your browser. 2) Invert Text Case Use coupon code iNvErTeD to get a 30% discount on the text case inverter tool. No more node modules, uninstalled packages, and definitely no smelly Rust. Just a text case inverter tool that works right in your browser. 3) Center Text Use coupon code XXCENTEREDXX to get a 30% discount on the text ce ..read more
Visit website
We've Added 10 New CSV Tools
Good Coders Code, Great Reuse
by
2w ago
Team Browserling keeps shipping! Last week we added 20 new png tools and today we just added 10 new tools to our Online CSV Tools collection. We've done our job and now it's Google's job to index them and rank them well. Here are the new CSV tools: Sort CSV Columns Validate CSV Change CSV Quote Character Add CSV Quotes Remove CSV Quotes Truncate CSV Columns Trim CSV Columns Find Incomplete CSV Records Fill Incomplete CSV Records Convert CSV to Base64 Convert Base64 to CSV URL-encode CSV URL-decode CSV Next week we'll add even more tools. See you then ..read more
Visit website
What is a Sandboxed Tor? (And How To Get One)
Good Coders Code, Great Reuse
by
1M ago
TLDR: You can instantly access a sandboxed Tor browser via browserling.com/tor. My team and I have virtualized multiple Tor versions and we stream just the browser window to you. This Tor browser runs remotely in our virtual machines and it's isolated from your network. Sandboxed Tor – What Is It? A sandboxed Tor browser is a modified version of the Tor browser that adds an additional layer of security by running in a virtual machine that's isolated from the user's main operating system and network. By leveraging the inherent multi-layer anonymity of the Tor network and additionally encapsulat ..read more
Visit website
What is a Sandboxed IE? (And How To Get One)
Good Coders Code, Great Reuse
by
1M ago
TLDR: You can instantly access a sandboxed Internet Explorer browser via browserling.com/ie. My team and I have virtualized all IE versions and we stream just the browser window to you. The browser runs remotely on our servers and is isolated from your system. Sandboxed IE – What Is It? A sandboxed IE refers to a version of Internet Explorer that's been modified to run in a contained environment, also known as a sandbox, which isolates it from the underlying operating system and other applications. This security measure prevents malware from exploiting vulnerabilities in the browser to access ..read more
Visit website
What is an OSINT Browser? (And How To Get One)
Good Coders Code, Great Reuse
by
1M ago
TLDR: You can instantly access an OSINT browser via browserling.com/browse. Created by me and my team, we run virtualized browsers in the cloud and stream secure, isolated browser sessions to you. What Is OSINT? OSINT, short for Open Source Intelligence, refers to the practice of collecting and analyzing information from publicly available sources for intelligence purposes. This includes data gathered from public forums, Internet archive, social media, public government reports, domain registration history, and more, offering valuable insights for cybersecurity experts and researchers to ident ..read more
Visit website
How to Open Links in a Sandbox
Good Coders Code, Great Reuse
by
1M ago
TLDR: Simply visit browserling.com/browse and you'll get an online link sandbox. My team and I run virtualized browsers in the cloud, providing you with a safe, isolated environment to test and interact with websites or examine potentially dangerous links without risking your own system's security. What Is a Link Sandbox? A link sandbox is a cybersecurity mechanism designed to safely inspect web links, documents, files, and other potentially unsafe content without risking the integrity of the primary system or network. It operates by creating an isolated environment, often referred to as a "sa ..read more
Visit website

Follow Good Coders Code, Great Reuse on FeedSpot

Continue with Google
Continue with Apple
OR