Tech Teacher Debashree

Tech Teacher Debashree

Technical and make money online Tips

Tuesday, 16 April 2019

Fulfilling your dreams - Freelance outsourcing - Tech Teacher Debashree

April 16, 2019 0
Fulfilling your dreams - Freelance outsourcing - Tech Teacher Debashree
Fulfilling your dreams - Freelance outsourcing
Fulfilling your dreams - Freelance outsourcing

Many people want to make money  from freelancing outsourcing. Because there is a rumor that there are thousands of dollars online. Now the pockets just left. But the rumor is really true. The only problem is finding you the right road. The first time, when the Internet has the idea of ​​preparing the money, many mothers are doing PTC adfly etc. (I am not saying bad to worry about raising money, carrying out my own expenses, how good a job it carries, it does not understand why it does not, it can not even explain why it is irritating to seek money from my family again and again. ) But it can be seen that after a few days, all of them followed a false commentary. 
Those who have a little patience and know the right path, they should not have problems. Because the position of Bangladesh at Freelance Market Place proves that.Freelancing is easy and easy to use. Even without making any changes in your daily routine, freelancing can be good money.

If you do not know any work, just knowing basic computing, word processing, web surfing, then freelancing can make a good money from a general employer. And if you know how to work, you can earn more than a banker. The banker's point of view is that in Bangladesh or in the bank, the job salaries are much more. I can give many examples, which are more than $ 100 per hour salary. Now calculate one day if he works for 5 hours then how much money does the month? The more interesting thing is that he can work his / her dash for 5 hours a day.
Now it is necessary that the correct guide line or the correct path. There is no lack of way. Ask yourself what you can do. And with that you can work. You can only afford 1-5 dollars per hour by just browsing. How to ask if there is a lot of work to do in search of where the data is stored by the buyer in Excel or ward, the buyer has to give or converts from the word processor to the spreadsheet. A beautiful name is a data entry. And it seems like a simple job is not there in the world. And if you have a better sense of computing, waiting for you is a better job, better money. There is a simple task to check out the web site. The small description is that new sites are created to be checked with different web browsers. If there is a problem, make a report of it. And such a rigor is around a Bigener Web developer.
If you can not do anything then there is no problem. You have information store - internet. If you ask me what the question is, then in English I can not find anything in Bengali. Nah! The day has really changed now. Now you get all in bangladesh.
Thousands of information are waiting for you. English is not so difficult You will be able to understand yourself. And if you do not like to read English, you can see the video tutorial. YouTube is no longer a subject that has no video tutorial. Really acharya matter. I would like to tell everyone about what to do first search for YouTube. If YouTube is not available then get help from Google

Who knows freelancing? Yes, for those who can dream. And for those who are lazy, or those who do not want to stay tied in 10-5 ghee. Freelancing will get lots of fun. Why do not you have fun? You want to go to Cox's Bazar today. You said to your friend come today a little bit. Many days have passed away in Dhaka from the mind. The friend said, "I have a lot of work in my office." If you go now, you will hear the boss. But you're a little crazy type, so that's what. So you are running with your favorite laptop and modem to Cox's Bazar. Here you are hiring a freelancing site for a job. So sitting on the bus, doing some work, the rest of the rest at Sea Beach. The money is also deposited in your account. Do fun, work and turn together. Oh!! If the value of work is more than your friend then there is no word. Peace and peace Actually it's a story but it's also real. Those who freelancing can do such fun.
I have seen many people who have started freelancing from leaving their favorite jobs or there are some people who will start within a few days.There is a lot of fun. Actually, working on the internet can be much better. Much better Writing this post is just for writing a few short stories.

For those who want to start freelancing, there will be a lot of trouble for many to choose. Because there are many good freelancing spots. ODesk is the newest ones who are good for them. Another one is Illance. I have so much to say about it because I myself. Because on other sites I did not get a response by bidding many things. But here's a few bids I got the job with the response. oDesk has beautiful navigation. Not so difficult. It can easily be done to save your own choice. If you work, payment is not a problem. The best skill test on it is the best. It is easy to find work that proves your eligibility. Where other sites have to pay a fee for the test.
And if you think about honoring your job, then the honor of freelancing is not low. A few days ago, on the way to the university, I saw a private car written by the freelance banker. Perhaps a few more days after the freelance programmer, Freelance Web Developer And yet the position of the freelance marketing managers is very strong. Because marketing is the best and the latest tool is the Internet. And the search engine offtimers have to take their place here very well.
Hopefully those who are interested in freelancing will start with no eyes. It's going to start. And if you think that getting work is hard, I do not know how to start, without knowing. Those who do not know if they are regularly visiting the freelance site then you can understand what you want to learn. There will be an interest in learning from yourself, and you can start working after learning. It's hard to find the first job first. But if you sit still, then it will not be. Those who are new to us today are old by working. So you start to bid for work and see how easy it is to work and you can become a successful freelancer.

Best wishes for everyone. Everyone can fulfill their dreams. And if you want to be a freelancer then pray that you can be a successful freelancer.

Do you want 100% instant commission?
                     Register Now


Please Subscribe to my channel

 For various government and technical updates.

Saturday, 13 April 2019

Passwords that should never be used ..& How to Convert any text to the audio ? - Tech Teacher Debashree

April 13, 2019 0
Passwords that should never be used ..& How to Convert any text to the audio ?  - Tech Teacher Debashree
Passwords that should never be used ..& How to Convert any text to the audio
Passwords that should never be used ..
How to Convert any text to the audio

Starting from computer to smartphone, all the devices have to use the password for security. Passwords need to be used to access various services on the Internet. But for the convenience of remembering we use some simple passwords most of the time. But it is very easy to break these simple passwords.
A few days ago, Splashadata publishes a list of 25 common passwords annually. These passwords are used by users. And so many people are victims of the hack. In other words these passwords are the best friends of hackers.
In 2014, 3.3 million password leaks are only '123456' due to this lazy password. Strong passwords require a combination of letters and numbers.
The following listed password should never be used -

.Convert any text to the audio ...

Ever wondered if you wrote a text and it was changed to an audio file!

And this task can be easily done using a web tool. Using this tool called vozme, you can listen to any of your text or articles online by changing it to the audio. You can also download this audio file if you want.

How to change any text in an audio file:

Go to this site at first

Its interface is very easy to login even though it is not necessary. Just type in the text (English, Spanish or Italian) or paste and click on the "Create MP3" button.

1) Click the green play button to listen to the audio.

2) To download the file, click on the "Download mp3" link.

What to do if you forget the lock pattern on Android phone?

Everyone may notice that Google's Android is very smart. And the Android phone has a pattern lock for privacy. Due to this lock the user can not access without knowing the pattern lock on the phone itself. And if you forget yourself this pattern, then there is no limit to suffering.

Without such a problem, you have no choice but to reset the mobile phone to get rid of such problems. Some people call it hard reset because it brings back factory settings. Let's see how Samsung Galaxy Y Reset -

The phone must be shut down first.
Now you have to remove the battery.
You have to put the battery again.
Together with 'up volume key', 'power button' and 'home button' you will be able to capture until the Recovery Mode Screen arrives.
Using the volume key, you will need to bring down the cursor to 'wipe data / factory reset' and press home to select it.
Now another screen will come in for sure. Remove the cursor and bring 'yes' and again select the home button.

Finally, the key features of your mobile phone must be rebooted.

Hard-Reset Side Effects

All apps installed on internal memory will be lost.
The saved contacts in the phone memory will be deleted.
You will need to install the apps you need again.

However, all data on external or SD card will remain.

Do you want 100% instant commission?
                     Register Now


Please Subscribe to my channel

 For various government and technical updates.

Sunday, 7 April 2019

How to hack Facebook and how to keep your account safe? - Tech Teacher Debashree

April 07, 2019 0
 How to hack Facebook and how to keep your account safe?  - Tech Teacher Debashree
 How to hack Facebook and how to keep your account safe?
 How to hack Facebook and how to keep your account safe?

I have heard rumors and stories for a long time since Facebook has been hacked. How many people on the wall wall wrote, 'My Facebook account hacked' What you see in an immoral post is because of the hacking. Also many notices. Most of which are Facebook hacking. That is why I want to give some ideas on how to hack Facebook. Of course remember. Facebook Hacking means that Facebook user account / profiles / apps are being hacked. Stay tuned for details.When a Facebook user account goes outside the control of the person, it must be understood that the hack is done. Or maybe a hack. Check out some of the symptoms of Facebook hacking.1) If Facebook is hacked then it can be published on the profile wall.

2) As soon as Facebook becomes hacked, anyone with any other friend or friend list can get some strange message. The message may be threatened by someone when it is threatened.

3) Unable to login

4) Profile picture or name change

5) There may be a lot of different types of links being published

Need to look at some of the ways that Facebook is hacked
Hacking Tools Use. Hackers have many tools. Their tools are very strange. We install some tools on our own devices. Facebook is hacked from here. If there are any files on our device, maybe not seriously. And any of those files can be, Hack Tools. Hack Tool is not just Facebook, but it can handle everything. Password Your Valued Information All of it can go away in the hands of hackers.

As a precaution, you use an updated antivirus. Or Windows Defender can take help. Regularly check scanning. Never give less importance to a common file. Delete it. The scan will help you if you do not notice it.
There is another method of stalking a foxy, hacking Facebook
Many of us no longer log out of the browser when they log in. We keep it for the next time. Later when I re-enter it does not take any more login. That does not mean to pass the password. This whole thing is in mind that the main method is in the knife system. Kookki is the server's relation with the client. The collected information can read the server. According to him the permissions are given. When it is seen that confidential information is being mixed with server login information, then it is accepted. As long as you are logged in, the cork is active. The key to the log out is the dinghy.

Now let's know how this knife can be stolen. For anyone who enters your network. Can be the same WiFi or LAN connection. Your device or client may steal while using it. Or by using any tools.

As a precaution, do not use unfamiliar WiFi. Log out of any website as well as logging out. Password change at least once a day. Be more cautious to log in or log out of Facebook. Can help you

Facebook can be hacked by stealing phone number or email id
If your phone number can be handled once you can hack through phone verification. The same situation in the email case. Although it is no longer the previous day. Sent you a link. And you went to that link and entered your password. Yet many hackers work in many old ways.

Keep in mind that any link you browse is safe. Just do not give the user name or Facebook name and password to that link. Diameter Nothing will happen to you.
You may have been hacked by installing Facebook apps
The number of people who have not used the Facebook app are very few. Whenever an app is installed, that app asks for some information. Wants permission. If you do not understand those permissions, then you can hack. That means you can post any of those apps on your wall. Avoid such apps.

There are many new methods of hacking Facebook. Hold your own system and do not listen to it. Hacker can not do all. But nowadays hackers are using some different techniques. For example, from 10 thousand accounts, it reports that this account is fake or duplicate. Then the account was blocked. These things can be familiar with the events. There is nothing to do.

Do you want 100% instant commission?
                     Register Now

Please Subscribe to my channel

 For various government and technical updates.

What is the work of hackers? Find out some methods of hacking? - Tech Teacher Debashree

April 07, 2019 0
What is the work of hackers? Find out some methods of hacking?  - Tech Teacher Debashree
What is the work of hackers? Find out some methods of hacking?
What is the work of hackers?Find out some methods of hacking

Hackers are trying to do what they want hackers, such a general user worried about those ideas. But do you know? The hacker can do everything, only depending on the client's information. You really want your own collaboration to hack. If not, he can not be hacked. The hacker usually plays with safety, and does not allow to joke anywhere if he gets a joke. Hackers are definitely a type of pundit type in particular about security issues. Let's know.
What hackers do first to hacking is the target
Observe them among those who work with them. Keeps track of their movements. And accordingly adopts the procedure accordingly. The intelligence is the biggest tool or device for hacking. Yet they use various level tools. Hackers can use any method for hacking. I'm checking some methods.
Phishing: From the beginning of the internet hacking starts to be called, and that start with phishing. Phishing is one of the ways to get rid of the client's useful information such as user ID password from the client. For this email, chatting or very simple download item is used as a bait.

Suppose you downloaded an image, clicking on it was the first time a malware was installed on your device. You might have thought that the image may not have been downloaded for any other reason, so it has been downloaded for a second time. With such many links, hackers come to you very close. And he can know who you really are, by identifying him with many research, he can do whatever you can to the end. Phishing Emails Most of the Money There is a lot of money in the following link: You can make an account with that bank account with your bank information and we will transfer all the funds to your fund. In such a situation, the common user comes with very easy information, and the hacker's netted netting is in the net.

Caution: Do not give any important information to anyone other than a known link.
Melware: Its power is much more prominent. It can not be counted within about a month after the release of a malware that it really is. Because the antivirus works with these malware, creating detectors for it and then protecting you by sending an update to your computer. After many steps and many things, the security thing comes up to you. Sometimes security is not possible. Because the latest melware is very strong. So imagine how safe your PC can be in so many steps?

Caution: No matter how powerful Melware can be, you can not walk on your PC without walking or your help. Actually can not work. Your mailware may come due to pen drive, cd, dvd, email, software download install, web site (especially free porn site), torrent download, file transfer etc. So before considering these issues, consider what is important in your PC that is going to be at risk. Antivirus is not always able to help.
Scare-ware: The hacker scares the client in this manner. The fear that the user becomes worried. At the same time, hackers will show a solution or solution of these. The solution is to hacking weapons or tools. How is hacking? Simple, say hackers try to mislead you by describing a typical error in your PC. With an email or pop-up window, you tell that your PC is infected with a very serious malware. Just ask a tool. Which look like a very familiar antivirus If you understand very little about this, then download and install the recommended tools. The hacker was able to take control of the whole computer.

Caution: Never agree to such proposal. Does anyone know how strange that you are? Since he knows your problem, he is trying to know more. Remember, hacking your information is also known to others.
How is hacking through social engineering?
In the society you mix with different people. Everyone wants to solve any work by using someone or someone else. And for this reason, hacking was launched. That is why they are thinking, stealing and robbery. Hacking is stolen somewhere, robber somewhere, robber somewhere. The email you use can be hacked at any moment. And that might only be the people around you. Or if you do not use a strong password If the password is strong, then it may be stolen by security congestion or password recovery. Very few personal information that many people around you know, can also be hacked by your email.

Now password recovery with mobile phone text. Do not think that your mail or any related account will not be hacked. Removing mobile phone SIM is very easy. Many of us have not been registered with SIM, but many people can not get registration paper when they take the SIM. Lose it And our mobile operators give SIM very simple questions. For example, how much money has been loaded on your phone, what is FNF number? These are very easy and without logic. Anyone can call the last recharge of the phone, just as you send 10 rupees to another's SIM, you can only know. And friend and femy number? It requires little intelligence to know. In any way, it can be known. And the bigger thing is that the person who is in charge of the phone operator is also able to get SIM!

Caution: Do not inform your information in any way. Any information Do not open any other account in the internet using the intellect. Do not use the same password for all sites. Be careful Stay safe.
How is hacking with a public computer?
Just like public toilets, public computer viruses and malware are admitted. It is risky to go to these places to login to your email or any other account.

Public WiFi: Public WiFi may be a deadly trap. Hackers can command commands on your logged-in sites very easily. These documents can not be kept in any document, which always shows that you are using them. So, logging in to a site with public WiFi is inappropriate. Risky.

You can work as a prevention for yourself safely online. Going to the unwelcome site, opening an account, providing personal information and giving full banking information is at full risk. Think of yourself how hacking is happening and how you deal with it.

Do you want 100% instant commission?
                     Register Now


Please Subscribe to my channel

 For various government and technical updates.

Saturday, 6 April 2019

What is a brute force attack? And how to protect from it .What to learn as a good hacker?.- Tech Teacher Debashree

April 06, 2019 0
What is a brute force attack? And how to protect from it .What to learn as a good hacker?.- Tech Teacher Debashree
 What is a brute force attack And how to protect  from it ?
What is a brute force attack And how to protect  from it ?What to learn as a good hacker?

You want to login to somebody's computer. You do not know his password. What do you usually do? Guess a password. What if it does not login? Give another one. Then another one.It is basically the Brute-Force Attack. Guess one password after another. And password entered into the server. But software is used to provide passwords for each other.
Brute Force uses different methods for stalking:
Ever tried to make a password and login one by one. The password is too large for the password. The more number of passwords the number of times it takes more time to break. And so it is said to give a tough password.
Sometimes the dictionary is staged. The database contains a list of possible passwords for dictionary passwords. From there they have to give one by one. This password list is collected by hackers in a number of ways. Various software is also available for dictionary.
To protect yourself from the brave force attack
One. To protect yourself from the brave Force Attacks, give you a little hard password. Say tough password

  • The password is at least 8 digits
  • Enter capital or uppercase and lower case letters.
  • Give a newer numeric key (1234567890) in the password.
  • Enter a sign in the password like -! @ # $% ^ & * ()
  • Two Use different passwords for different websites. Especially with email password, do not register for any web site.
Three Manage the login form for your website.

What to learn as a good hacker?  Are You Truly Giving For Hacking? 
1. You have to be interested in. Whose help you repeatedly, but he did not care for you. Because of this, you can not give up due to anger. You will be disappointed more then you get help 
2. In English you mean, well, that would be very good. Because the hacking or high quality is all about English now.
 3. You have to be very patient. 
4. Be Qualified in Google Search (Whether Google is a search and a qualification!)
 5. You have to be skilled in running the computer.
 6. Your head processor should be speed 3.2 ghz clock speed. Make fun That means, thinking about your head should be quick. some FAQ about hacking 1 How do you know that you are a hacker? Always keep an eye on the three things. First of all, you have to keep coding well, the rules that you have between the second hackers, whether you have a different hacker team or a big hacker, if you have a hacker, then you will know that yes You hacker 
2. Do you want to teach hacking? Without asking the person, you should know that,, Security Tubes, visiting such websites, hacking topics. ★ Before becoming a hacker, know how to use Google.
3. How to start hacking? Learn the language programming language first. Then learn about securities. Some of the basics of hacking, such as: sqli, rfi are many. 
4. I started late to start?
First of all, there is no age of education. You will see how much is your strength. Both are not a factor. If you start old, and if you have the energy you want, then if you are a hacker in old age. 
5. How long does it take for my hacker? How much intelligence you have on your head, how much time you are giving behind the hacking is over.
  6. Do you have any system to hack or teach me? I'm not teaching you hacking. I'm just talking about some basics. But how to hacking it on you. If you can not do it once, try it again and again. 
7. Brother can hack a Facebook account or email account? These are all social engenering. Unless these hackers ask questions you will be prevented. 
8. I have become a hack, do you save me if hacking? I run your computer or you run. You can click on a link and hack will be there in my fault. 
9. You are a hacker, a Windows software can not fix the problem? Brother, Google has problems with your Windows software.And if you can not do Google then you do not have the right to be a hacker. 
10. Where Can I Find Real Hacker? Find out in various hack forums such as Forum Dot 
11. Who is a real hacker? Hacker is targeting a thing and he is hacking it. This is the real hacker. 
12. Does your favorite have an eBook? Yes there. Hanking for dame. Then one can read another book that can be hacking express. 
13. If I want to be a hacker, should I be good at the ring? There is a little idea about the hackers' scope for coding. 14. Which programming language will learn first? The programming language is C: One is that CIs the Mother Language of All Languages. You can learn HTML if you want but start with C. You can learn a lot. 
15.How do I use a hoodware? Are you a hacker or a carrier?

It takes a lot of powerful hoodware when it comes to the carrier. But if hacking does not take much more power, then it will not work again. 16. I want to join you, can you give me any problems? A hacker will never want to share his problem with you. If you have a good relation with a hacker, then he may also give you problems. But try to solve problems manually. 17. What happens if a hacker comes from a Linux user? In fact, it's a bit of a lot of excerpts. Because Linux has more advantages.
Programming is to create a program or make software or a small (or big!) Tool for the computer, so you can do a lot of things. This is basically a definition of programming. The programming language is what you create your program, which means that the program will create the program. Programmers tell them to write programs. Because you have to write the program with a programming language and write it down. Do you think the question might arise in the program? You can do a lot of things by making the program. You can sell your made software. You can also use for freelancing. Can make viruses. You can solve mathematical problems. You can use your own preferences.

Do you want 100% instant commission?
                     Register Now


Please Subscribe to my channel

 For various government and technical updates.

Follow these tips to protect against the suspension of Adsense account - Tech Teacher Debashree

April 06, 2019 0
Follow these tips to protect against the suspension of Adsense account - Tech Teacher Debashree
Follow these tips to protect against the suspension of Adsense account.

Follow these tips to protect against the suspension of Adsense account
We all know very well that the main way to earn money from any website or blog is to display advertisements and the company that is most likely to do so, Google Google can offer this opportunity to any website or blog owner through their adsense. (If it is appropriate) but Google Adsense is approved for your site, then there are some restrictions that will be prohibited. You can earn money from the money and if you do not eat the ban. There are many reasons for eating bananas, among which I am sharing some tips with you today that can be used to protect you from being a Google Adsense banner. So let's look at the tips without delay.

1. You never use PTC related ad websites or blogs.

2. Never hide the Adsense ad-on, below your site menu, the slider or the image. Because the account will be banned by clicking on Visitor Accidental Ad.

3. Do not tell anyone on a social network to click on your ad because AdSense always tracks where the click comes from.

4. At least 70% of visitors visit your blog or web site or search engine or organic. If your visitor comes from social sites, then the account is likely to close.

5. Never copy and post a post from another web site or blog.

6. Never use AdSense Add Page on page, contact page, About us / me page, Privacy policy, etc.

7. Try using good quality keywords Hacking or Drugs Do not use keywords in this type because they are not acceptable to Google.

8. Do not try Black Hat SEO.

9. Do not exchange linked links without the related sites. This means that you can share links to those sites that match the content of your site.

10. Do not place adult content or pornography on the site.

11. Do not use any other low-quality advertising network with Adsense.

12. Do not write anything that indicates visitors are adcycled.

13. Never try to edit the add code. You will use the way Adsense will give you the same way.

14. AdSense hates spam, so do not keep your link in any sites spammed.

15. Do not use pop-ups on your blog or site because AdSense hate it.

16. Posting on your blog or on the website of the web site, the post that each of the posts will be of value. Just like Edsens was before.

Do you want 100% instant commission?
                     Register Now

Please Subscribe to my channel

 For various government and technical updates.

Tuesday, 2 April 2019

Apart from getting jobs,You can starting an online home based independent business - Tech Teacher Debashree

April 02, 2019 0
Apart from getting jobs,You can starting an online home based independent business - Tech Teacher Debashree
Apart from getting jobs,You can starting an online home based independent business
Apart from getting jobs,You can starting an online home based independent business 

After doing the graduation, our first aim is to find a job. Many people started searching for jobs before graduation. The need to enter the job before the completion of the reading. And the name continues to sell invaluable times of his life at just the price.Common questions are available from known strangers to everyone. What are you doing? If I was admitted to an institution, I would say, study. Although the Institute does not need to be written to read.

If I do not read anything, then I do not say anything. Then the question of the master does not look good.  if the answer is the job, in that company, then surely the suggestion looks great. But there is a lot better to do than get jobs. If the job means to make money, then there are many beautiful ways to earn money honestly.

As long as the job is done, money is still there. Work is closed and money is closed. And at the end of the month an AMOUNT. Which ended in the first week. The rest of the month have to be done again and again.
What happens if you earn money all the time? Even if you did not work? Is it impossible to make money? Of course not. There are many beautiful paths. Doing business, investing, doing creative work such as designing, developing, writing / blogging, photography, and more. From these, royalty income continues to come. The first time is to give first time. After that, there is no time to spare. The first time you have to give, it is less than the time of finding a job. Much less trouble

If you work, your salary will not increase. Two times a year, a little something is raised. But if you do your own work, then the salary can be increased. It's only a little bit of effort.

Many people take a lot of training for job search, or read many books. But if we did not take that book or training to increase our skills, we would have learned a lot. Those things can be used to do better.If people are employed, the experience of the people is on one subject. Everything is changing day by day. Once upon a time to work on a new topic, it can not adapt itself. Many of them have to quit the job.

There is always a thought in mind, is everything right? The job will not go away. Boss will not be angry. Etc. But there is no point in thinking about these things.

Well, the job does not help to make the person inelastic? At the end of the month, you get a little bit of money. Many of them may have been in that little amount.. Those who can be honest, they try to do extra work. And no, many sell their honesty. Destruction of human freedom The most worthwhile thing.

Apart from this, you can not spend the holiday as you wish. Many times the holidays are not available during the time of need. In these cases, freelancers get a good advantage. Vacations can be done when needed. But the freelancers have to work all the time. If you do not work for a week, you do not have the money to spend the next week, unless you save it before. And the best way is to create a passive income path. An income will come even when not working. But he must work harder.

Not neglected to work. But many people do a lot to get jobs. It gets frustrated without getting a job. To waste the time, give an offer to submit the CV from one offshore to another. Even the evil ways also follow. But to write about something that can be done better than doing this job.

I am writing about many ways, besides being employed, write about them. At first I was writing about business. I have no business experience. Business is certainly better than employing. If you do not have the experience of doing business, those who have sufficient knowledge can be invented with partner.

If there is no money to invest? There are many more ways. There might be a lot of ways to do offline. I do not write because I do not know. Writing about the things that can be done online. Among them one of the designing.


Designing your own designs can be uploaded on many sites online. If you later sell the money in your account, then the money is being deposited. At first there may not be much money, but once a month, a good revenue will come. Which will continue to grow slowly.

Web development:

Web sites can be created when web development is known. Creating a web site on a particular topic can easily be earned from it. Through advertise or affiliate Here is a good time after a certain time after the first few days have come good revenues.

If web development is well-known, then templates can be created for web site. You will get A good royalty income can be generated by selling those.

Make video:

If a person is able to learn something else, then learn how to do another, create videos and easily generate revenue. YouTube is a beautiful place There are also many web sites like Coursera. Where to create a tutorial on any topic. Making videos is not a difficult task.

Besides, there is also a video of a place to earn from it also. You can create video on any place in your area. Not everyone can go there. But many people want to go or see or want to see. So, making such a video can be something better done. Simple, but good revenues.

Software development:

Software development can be made if you know the development. If you have good ideas and  you can create a good software, there will be enough revenue from a software. It is not always possible to do any big project, it is possible to do something good with something but simple but effective. Creating a small but shoddy work software is not so difficult.

Mobile App Development:

Besides,in mobile markets, now there are good career . An app for Android, iPhone or Windows Phone can be made. In the short period of time, these development skills can be learned from the time people search for jobs. One night, there are many beautiful stories like Millionaires, mobile apps. App selling for royalty income is a nice and good way. It is very easy to learn and earn quickly.

Do you want 100% instant commission?
                     Register Now


Please Subscribe to my channel

 For various government and technical updates.