DJs and KJs:

Display your karaoke list on singers' phones
& receive song requests.

Used in over 100 countries.

FREE 30 Day Trial
(no credit card required)...

DJs: SIGN UP HERE

Quick Start video for DJs:

Kiosk Instructions:

Click the 'Browse' button to browse by letter, or enter an artist or title and hit SEARCH →

When you find your song, click the SING button next to it:

DJs and KJs...

Hit F11 to fullscreen your browser, then Ctrl+ (or command+ on Macs) to enlarge the kiosk until you are happy with the size.

Then click the HIDE button above to replace these instructions with a "Quick Start' guide for your singers.

ctrl + alt + h takes you out of kiosk mode and back to the home screen

FREE for the public to see & request your songs on their phone or your walk-up Kiosk.
Set up your song book with our FREE desktop app - SongbookDB Pal.
Receive song requests live on your phone or tablet with our Requests Hoster app, on your laptop with SongbookDB Pal, or in PCDJ™ Karaoki or MTU Hoster®:
How SongbookDB Works

Get the SongbookDB app on your phone!

Go to songbookdb.com or scan the QR code below.

Once there, tap the INSTALL button.

Ssis885 — Verified

Lena now operates in the gray, her old tag discarded. With the collective, she builds an open-source identity network— UnVerified —where humanity’s worth isn’t measured by an algorithm. The VeriChain still looms, but Lena’s seed has taken root: a future where trust isn’t algorithmic, but human. Thematic Notes: The story explores the duality of verification systems as tools of both security and oppression. Lena’s journey mirrors real-world debates about AI governance, digital identity, and the ethics of technocratic control. "ssis885 verified" becomes a relic, not of trust, but of a flawed system people once feared—and a rebellion that rose from its weaknesses.

I should add some tension: someone's tracking her, the AI might detect her hack. The climax could involve her successfully hacking the system but leaving a backdoor for future use. Maybe she realizes the system is corrupt and wants to expose it later. ssis885 verified

Lena discovers a vulnerability in the AI: a 0.0006% lag when cross-referencing identities under stress. She realizes she can temporarily "reboot" Maris’ status by mimicking her own verified profile. But the risk is colossal. Any misstep would trigger a red flag, alerting the Corporation, the faceless entity behind the VeriChain—and their enforcers, the Audit Shadows , who erase non-verified citizens with chilling efficiency. Lena now operates in the gray, her old tag discarded

Maris is cured. But Lena’s hack is discovered. The Audit Shadows descend, their drones scanning for "ssis885 verified" . Lena flees, aided by a hacker collective who’ve heard whispers of the backdoor she left. Though branded a terrorist, she finds purpose: the V-System isn’t just corrupt—it’s a cage. Her code, she learns, has already spread, replicated by users who weaponized her loophole. The world is beginning to unravel the Verified Veil. Thematic Notes: The story explores the duality of

I need a conflict. Perhaps the verification system is part of a government or corporation controlling access to resources. The protagonist's verified status might be in jeopardy, or there's a hack. Maybe the character works in cybersecurity or data integrity. Let me outline a plot where someone's identity is at stake.

In a near-future world where digital identity and verification systems control access to resources, opportunities, and even societal rights, "ssis885 verified" is a moniker that can elevate or ruin lives. For LENA VOSS, a 28-year-old cybersecurity prodigy, this tagline represents a labyrinth of power—and a key to saving her sister’s life. Chapter 1: The Chip on the Shoulder The VeriChain, a blockchain-based AI system, governs global trust. Every citizen is assigned a "verified" status, determining their access to housing, healthcare, and even freedom of movement. Lena’s own status shines gold: "ssis885 verified" is her professional tag, a symbol of her elite rank in the corporate cybersecurity sector. Yet, her sister, MARIS, languishes in a remote clinic, her status revoked after a cyberattack corrupted her medical records. Without verification, Maris is invisible to the system—eligible for treatment only if Lena can crack the VeriChain’s encryption.