Skip to main content

How to Create YouTube Playlists without Logging In



Learn how to quickly create a YouTube playlist with your favorite YouTube videos but without logging into your Google Account.
How do you share a collection of YouTube videos in an email newsletter or on the social media. The best option is that you create a new YouTube playlist, add all the videos and then share the link (URL) of the playlist. The privacy of the YouTube playlist can be set to Unlisted if you would like to hide your video list from search engines.
It is easy to build playlists in YouTube but they are always connected to your YouTube channel or Google Account – you cannot create a playlist on YouTube anonymously without logging in to your account.
There’s however a simple URL hack that will let you create “virtual” playlists on YouTube – they are like regular playlists except that they are not connected to any Google account and you can still add or remove videos on the fly.
Create YouTube Playlists on the fly
All YouTube videos have a unique video ID and you can create a concatenated list of these video IDs, separated by commas, to create a new YouTube playlist from the corresponding videos.
For instance, here are 5 YouTube videos (video IDs are in red) that I would like to add to a playlist but one that is not associated with my YouTube channel:
1. www.youtube.com/watch?v=sjRTSkBHnyo
2. www.youtube.com/watch?v=fhU5y7huAY8
3. www.youtube.com/watch?v=9T_EqwQnZY0
4. www.youtube.com/watch?v=FQKvro1Wz-E
5. www.youtube.com/watch?v=BXLYIw-IU8I
All I have to do is take the video IDs and put them in the URL below:
http://www.youtube.com/watch_videos?video_ids=ID1,ID2,ID3,ID4…
So the new YouTube playlist will be located at:
https://www.youtube.com/watch_videos?video_ids=sjRTSkBHnyo,fhU5y7huAY8…
This is like any other playlist on YouTube – anyone can share it, embed it or even copy the playlist to their own Google Account.

Comments

Popular posts from this blog

Now you can breathe liquid!

DIVE DEEP The recommended absolute limit for recreational SCUBA divers is just 130 feet, and technical dives using Trimix bottom out at 330. Even then, you’ve got less than five minutes at depth before requiring monitored decompression to avoid getting the bends (the not-scary word for when nitrogen dissolves into your tissue under the massive pressure of the water column, is ejected into the bloodstream during ascent, and you die of a brain embolism). Interestingly though, once your body hits its nitrogen saturation limit, it doesn’t matter if you stay down for an hour or a month; your decompression time effectively maxes out. This technique, known as saturation diving, is how recovery divers working on the K-141 Kursk were able to spend hours 300 feet below sea level (amidst 10 atmospheres of pressure) and how the crew in The Abyss were able to do their jobs. LIQUID AIR Perhaps the best-remembered scene from the 1989 Sci-Fi classic The Abyss is when Ed Harris’ chara...

Don’t like people to know you’ve read their Whatsapp messages? Here’s how to get around it.

The honor of having one of the most misinterpreted features in the world of tech startups goes to Whatsapp – specifically, the check marks that appear next to any message sent. Many initially guessed that two check marks meant that the recipient has already read the message, but that turned out to be incorrect Here’s what those check marks really mean: one tick to show that the message has reached Whatsapp’s servers, another to inform the user that it has reached the recipient’s phone. Now, there’s a third layer of information in the form of blue check marks, indicating that the recipient has indeed read the message. In the interest of privacy, Whatsapp had not so long ago introduced the option to hide the ‘last seen’ notification that informs the other party when that person was last on the messaging platform. The introduction of the blue check marks is strange, given that this brings back the social pressure to reply – what many users consider an intrusion of privacy. ...

Can I determine if my computer has a key logger installed? – YES!!!

Detecting keyloggers is as simple as looking in the right place (which may or may not be simple depending on your viewpoint). The problem is knowing what to look for and where. What follows is a non-exhaustive few things you could do to check for keylogging modules. Firstly, the obvious easy way to build a keylogger is to use DLL Injection which can be achieved a number of ways. Most of these will result in a DLL showing up as mapped to the process’s address space. Take a look at this picture: What is the topmost entry in that list? It’s a pyd , or python extension, file. I’ve been messing with python-implemented COM servers and as a result, the DLL is loaded into Windows Explorer’s address space. DLL Injection of the keylogging variety will load its DLL into all of the target address spaces – can’t capture everything if you don’t. So one thing to look out for would be strange DLLs you cannot attribute to products whose purpose you know. They’ll show up in this list for...