Call web pages in the terminal with Browsh

Block Graphics

Blocky

Firefox does the bulk of its work in the background, so Browsh can support its extensions, as well, especially the ad blockers. Just start Browsh with

browsh --firefox.with-gui

to open Firefox. Clicking the hamburger menu on the right and switching to Add-ons allows you to install suitable addons in the usual way. Browsh then automatically uses the enabled extensions. Always use the command-line parameter to do this. Browsh uses its own Firefox profile; other previously installed addons from other profiles are ignored by the command-line browser.

Conclusions

Browsh is always there to help if no graphical user interface is available. Simply reducing the volume of data transferred, however, only works if you run your own server. Moreover, the websites displayed by Browsh are not always easy to read. Compared with the classic competitor Lynx, Browsh maintains the layout in a much more natural format.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy ADMIN Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Application security testing with ZAP in a Docker container
    Pitting the OWASP Zed Attack Proxy against an insecure web app in a Docker container illustrates how you can tick a lot of security checkboxes.
  • Linux alternatives to Windows software
    Free software alternatives to common commercial Windows programs often are little understood. We show which applications on the Linux desktop give an especially good account of themselves.
  • Guacamole: Remote Desktop

    HTML5 offers a range of new features, such as audio and video support, without needing plugins like Flash or Java. This opens up completely new options in terms of content delivery via the web – and for mobile access to applications on the LAN.

  • Attacks on HTTPS Connections
    HTTPS protects a connection from both tapping and manipulation, but only if a man in the middle hasn't already infiltrated the Internet connection. We highlight the weaknesses in HTTPS and demonstrate how to protect your client and server.
  • Your own AWS-compatible cloud with Eucalyptus
    If you don't trust the cloud services of Amazon or cannot store customer data there for privacy reasons, you can create your own Eucalyptus cloud that is compatible with the Amazon tools and can be installed in a flash.
comments powered by Disqus