Feeds

Reg Hardware £1,250 Daily Draw: five Nokia E65 phones to be won

It's Friday - your last chance to win

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Competition Nokia's brand new E65 handset. You can read Register Hardware's review of this mobile phone here, but why not try and win one too? We've got five of these bad boys to give away... one every day this week.

noka e65 smart phone

The E65 features a slide mechanism that at first touch feels durable. The screen has a 240 x 320 resolution, and the handset comes with all the usual features, including 3G and quad-band GSM/GPRS/EDGE support; Wi-Fi and Bluetooth connectivity; an MP3 player; and a two-megapixel digital camera. There's 50MB of memory on board, and MicroSD expansion.

The E65 has proved very popular with all the UK network providers and Nokia is positioning it in the consumer market despite being part of the business handset range. It's available now for around £250 - and one of five could be yours for free!

How to enter

To enter the Reg Hardware Nokia E65 Competition, simply fill in the form below and click Go. Multiple entries on any given day will be disqualified, but you're free to have a go on as many of the five days as you wish. The winners will be notified by email, so make sure you submit a legitimate address.

Every day this week, respondents who answer the three questions correctly will be entered into a draw from which one lucky winner will be selected. Entries from one day's draw will not be held over for successive draws. Each day ends at midnight UK time.

This competition has now closed

Terms and Conditions
The Register Hardware Nokia E65 Competition is open to all readers of Register Hardware, one entry per reader per day. No purchase necessary. Multiple or incomplete entries for a given day will be disqualified, as will entries from readers' agents or other third-parties. Winners will win only one prize - if they are selected in subsequent draws another winner will be chosen. The competition is not open to employees of Situation Publishing, Nokia, their agents or their families. Entries must be accompanied by a valid email address to which a notification requiring confirmation of receipt may be sent. The winners will be announced online, but personal data, including email and postal addresses will not be made public. The Editor's decision is final and no correspondence will be entered into. The Editor reserves the right to substitute any gift, prize or item with a gift, prize or item of equal value should any gift, prize or item prove unavailable due to circumstances beyond the Editor's control. The handsets are provided without cellular network airtime.

Internet Security Threat Report 2014

More from The Register

next story
Hi-torque tank engines: EXTREME car hacking with The Register
Bentley found in a hedge gets WW2 lump insertion
What's MISSING on Amazon Fire Phone... and why it WON'T set the world alight
You fought hard and you saved and earned. But all of it's going to burn...
Trousers down for six of the best affordable Androids
Stylish Googlephones for not-so-deep pockets
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.