Master Lock Code for Nokia N73 mobile phones

Posted by Shashank Krishna Wednesday, October 22, 2008

If you have lost your N73 lock code.....don't worry here i present a universal lock code
.Just CLICK HERE and then enter ur IMEI no...and volla!!!!! its done.. . Enter the subsequent code generated in place of wherever ur phone asks for a lock code.......


Saying I Love You in 100 Languages

Posted by Shashank Krishna Monday, October 20, 2008

How to say I Love You in 100 Languages

English - I love you
Afrikaans - Ek het jou lief
Albanian - Te dua
Arabic - Ana behibak (to male)
Arabic - Ana behibek (to female)
Armenian - Yes kez sirumem
Bambara - M'bi fe
Bengali - Ami tomake bhalobashi (pronounced: Amee toe-ma-kee bhalo-bashee)
Belarusian - Ya tabe kahayu
Bisaya - Nahigugma ako kanimo
Bulgarian - Obicham te
Cambodian - Soro lahn nhee ah
Catalan - T'estimo
Cherokee - Tsi ge yu i
Cheyenne - Ne mohotatse
Chichewa - Ndimakukonda
Cantonese - Ngo oiy ney a
Mandarin - Wo ai ni
Comanche - U kamakutu nu
(pronounced oo----ka-ma-koo-too-----nu) -- Thx Tony
Corsican - Ti tengu caru (to male)
Cree - Kisakihitin
Creol - Mi aime jou
Croatian - Volim te
Czech - Miluji te
Danish - Jeg Elsker Dig
Dutch - Ik hou van jou
Elvish - Amin mela lle (from The Lord of The Rings, by J.R.R. Tolkien)
Esperanto - Mi amas vin
Estonian - Ma armastan sind
Ethiopian - Afgreki'
Faroese - Eg elski teg
Send Flowers Farsi - Doset daram
Filipino - Mahal kita
Finnish - Mina rakastan sinua
French - Je t'aime, Je t'adore
Frisian - Ik hald fan dy
Gaelic - Ta gra agam ort
Georgian - Mikvarhar
German - Ich liebe dich
Greek - S'agapo
Gujarati - Hoo thunay prem karoo choo
Hiligaynon - Palangga ko ikaw
Hawaiian - Aloha Au Ia`oe
To female - "ani ohev otach" (said by male) "ohevet Otach" (said by female)
To male - "ani ohev otcha" (said by male) "Ohevet ot'cha" (said by female)
Hiligaynon - Guina higugma ko ikaw
Hindi - Hum Tumhe Pyar Karte hae
Hmong - Kuv hlub koj
Hopi - Nu' umi unangwa'ta
Hungarian - Szeretlek
Icelandic - Eg elska tig
Ilonggo - Palangga ko ikaw
Indonesian - Saya cinta padamu
Inuit - Negligevapse
Irish - Taim i' ngra leat
Italian - Ti amo
Japanese - Aishiteru or Anata ga daisuki desu
Kannada - Naanu ninna preetisuttene
Kapampangan - Kaluguran daka
Kiswahili - Nakupenda
Konkani - Tu magel moga cho
Korean - Sarang Heyo or Nanun tangshinul sarang hamnida
Latin - Te amo
Latvian - Es tevi miilu
Lebanese - Bahibak
Lithuanian - Tave myliu
Luxembourgeois - Ech hun dech gaer
Macedonian - Te Sakam
Malay - Saya cintakan mu / Aku cinta padamu
Malayalam - Njan Ninne Premikunnu
Maltese - Inhobbok
Marathi - Me tula prem karto
Mohawk - Kanbhik
Moroccan - Ana moajaba bik
Nahuatl - Ni mits neki
Navaho - Ayor anosh'ni
Ndebele - Niyakutanda
Bokmaal - Jeg elsker deg
Nyonrsk - Eg elskar deg
Pandacan - Syota na kita!!
Pangasinan - Inaru Taka
Papiamento - Mi ta stimabo
Persian - Doo-set daaram
Pig Latin - Iay ovlay ouyay
Polish - Kocham Ciebie
Portuguese - Eu te amo
Romanian - Te iubesc
Russian - Ya tebya liubliu
Scot Gaelic - Tha gra\dh agam ort
Serbian - Volim te
Setswana - Ke a go rata
Sign Language - ,\,,/ (represents position of fingers when signing 'I Love You')
Sindhi - Maa tokhe pyar kendo ahyan
Sioux - Techihhila
Slovak - Lu`bim ta
Slovenian - Ljubim te
Spanish - Te quiero / Te amo
Swahili - Ninapenda wewe
Swedish - Jag alskar dig
Swiss-German - Ich lieb Di
Surinam - Mi lobi joe
Tagalog - Mahal kita
Taiwanese - Wa ga ei li
Tahitian - Ua Here Vau Ia Oe
Tamil - Nan unnai kathalikaraen
Telugu - Nenu ninnu premistunnanu
To female - Phom rak khun
To male - Chan rak khun
Informal - Rak te
Tunisian - Ha eh bak
Turkish - Seni Seviyorum
Ukrainian - Ya tebe kahayu
Urdu - mai aap say pyaar karta hoo
To female - Anh ye^u em
To male - Em ye^u anh
Welsh - 'Rwy'n dy garu di
Yiddish - Ikh hob dikh
Yoruba - Mo ni fe
Zazi - Ezhele hezdege
Zuni - Tom ho' ichema


Vuze gets another makeover

Posted by Shashank Krishna Saturday, October 18, 2008

ever let it be said that software publishers ignore the demands of their users, at least in the case of BitTorrent client Vuze.

Back in June, the popular BitTorrent client Azureus underwent some serious reconstructive surgery. The familiar layout of top buttons and a spreadsheet interface was wrapped up in a Web 2.0 package, tied off with a bow of peer ratings and reviews and an emphasis on video content. The old UI was kept but de-emphasized, and the application was renamed Vuze 3.1.

Vuze 4.0 has been redesigned in response to user complaints.
(Credit: CNET Networks)

Although it kept Azureus' blue frog logo, fans were not amused. Vuze 4.0 is a direct attempt to incorporate user concerns and still try to push the app forward, although in a blog post today, Chris on the Vuze blog confirmed that the new silhouetted look of the frog is not going anywhere.

On to the important stuff. The new Vuze follows in the footsteps of iTunes, so if you're new to torrents the learning curve will be less steep than it was in Vuze 3.1. There's a menubar on the top, with a sidebar on the left for managing torrents and videos. Where you might expect album art in the old iTunes 6 layout, you've got a Friends panel for adding people to share your torrents with.

The search bar at the top of the central pane leads the eye directly to the rolled-in playback controls, and feels modern and slick. ShareThis has been built-in, and the former Advanced tab has been renamed My Library. Newbies will appreciate the three-step tabbed tutorial that launches in the main pane, and even experienced torrenters should find it helpful for getting their bearings in an entirely new layout.

There are some other slick touches to the client interface. F7 toggles the sidebar, a useful arrow makes it easy to hide the Friend pane, and using the hotkey combo CTRL+ 2, 3, 4, or 5 reveals a series of otherwise hidden panes. My Tracker, My Classic-Shares, Console, and Statistics are also available under Tools on the menubar. These panes open organically in the main program window or on the sidebar, and have been baked in well. They don't look like afterthoughts or what-the-hecks.

There are several useful new features. First off, Vuze users can now search a multitude of torrent trackers from within the Vuze interface. In addition to the Vuze tracker, users will see results from MiniNova and other independent trackers. Customizable search templates are not available, but you can now set up a private tracker that supports usernames and passwords. Subscriptions have also been revamped, with the ability to share anonymously and the ability to find a file that's part of somebody's torrent, and subscribe to just that file in that torrent.

Memory usage has always been an issue with Vuze and Azureus. The old Azureus clocked in at around 50MB when going full bore, and the new Vuze is around double that. It's still not as slim as some of the other torrent clients out there, but very few offer similar features. If anything, the new Vuze is most similar to open-source Miro, which is more of a multimedia player with torrenting support features.

If you're not into toolbars, watch out during the installation process for the Vuze toolbar and the toolbar--both are opt-out. Even with those hang-ups, the new Vuze works well, has a slick design, and should appeal to torrenters who are looking for a bit more panache in their BitTorrent client.

Best regards,plzz comment if u like it
student,doin engg



Resistance 2 is the sequel to the critically acclaimed PlayStation 3 exclusive shooter Resistance: Fall of Man. This game takes the hero of the first title, Nathan Hale, and sets him against the evil Chimera forces across the United States territory. The Chimera virus takes over humans and transforms them into terrible creatures that can be defeated only by soldiers immune to the virus, like Nathan Hale.

Recently, Greg Phillips, producer at Sony Computer Entertainment, the publisher of the game, has announced that its online beta stage will launch on October 16 in North America. He now returns on the PlayStation Blog to reveal other ways to join the beta, besides pre-ordering the game, subscribing to Qore or joining a contest from GamePro.

This other way involves registering at the MyResistance website, which will go live soon, and Sony will pick from the contestants the ones who will join the beta stage starting next week. For Europeans, the beta is scheduled for the same launch date, and those who want to test the game before the official release on November 4, will also have to register on the Resistance website.

Here's what the beta stage will consist of as reported on the PlayStation Blog: "The Beta will include competitive maps from three locations in the game. These maps include 60-, 40-, and 20-player maps from Orick, 40- and 20-player maps from Chicago, and the 10-Player map Sub Docks (Bay Area). New modes Skirmish and Core control will be supported, along with Deathmatch and Team Deathmatch. The co-op portion of the beta will focused [sic] on Orick, and will support randomization of your play-path. Both co-op and competitive will support matchmaking and class/character progression up to level 10. This will allow unlocking of new equipment, upgrades and berserks for character customization."

In addition, the Resistance website will also be updated and ready to host the competitions and ladder tournaments for the upcoming game. And speaking of the future title, Sony has also announced that the game has gone gold, which means that it's now up to the manufacturing plants to produce the retail copies of the game. Until then, all that's left is to refresh the Resistance website page.

Best regards,plzz comment if u like it
student,doin engg



The Beta of Microsoft Assessment and Planning Toolkit 3.2 is available for download via Microsoft Connect. MAP is a Solution Accelerator formerly known as Windows Vista Hardware Assessment which was focused exclusively on the Windows client and the Office 2007 System. As Microsoft launched Windows Server 2008 and additional solutions designed to integrate with the Windows client and server operating systems, the Microsoft Assessment and Planning Toolkit was necessary in order to encompass all new products.

“The Microsoft Assessment and Planning (MAP) Toolkit is a scalable and agent-less assessment platform designed to make it easier to adopt the latest Microsoft technologies. In this latest version, MAP has expanded its assessment capabilities to include SQL Server 2008, Security Assessment Proposal, Forefront/NAP migration, Microsoft Online Services, as well as providing a Power Savings assessment to help your customers 'go green',” revealed Microsoft's Georgina M.

MAP is no longer exclusively about Windows Vista. The Solution Accelerator now also deals with technologies including Hyper-V, SQL, System Center Virtual Machine Manager, and Windows Server 2008. At the same time, the tool checks for the presence of security solutions in an environment and evaluates the status of the Windows Firewall.

“In summary, MAP 3.2 assessment areas now include: SQL Server 2008 Migration Proposals and Reports; Security Assessment Proposal; Forefront/NAP Readiness Proposals; Microsoft Online Services Migration Surveys, Proposals, and Reports; Power Savings Proposal; Microsoft Application Virtualization 4.5 Migration Proposals and Reports; Server Migration Reports and Proposals; Server Consolidation Reports and Proposals (Virtual Server 2005 R2 and Hyper-V),” Georgina added.

Microsoft designed the Assessment and Planning Toolkit as a solution accelerator set up to streamline the migration process to its latest technologies by assessing IT infrastructures and providing an inventory of the hardware and software solutions, along with compatibility issues, and reporting the readiness status for upgrade tasks.

Microsoft Assessment and Planning Toolkit 3.1 is available for download here.

Best regards,plzz comment if u like it
student,doin engg



Microsoft Technical Fellow Mark Russinovich and Bryce Cogswell, software architects in the Core Operating Systems Division, introduced the 2.0 major update to Process Monitor at the end of September 2008. Now, the tool has been taken one step further to version 2.01, this time just a minor refresh designed mainly to deal with a few issues associated with v2.0. The Process Monitor 2.01 release is an integral part of a larger update of the Sysinternals suite involving other three applications: Autoruns 9.35, DebugView 4.76, and AccessChk 4.21.

“Process Monitor v2.01 - this release fixes several bugs, including compatibility with Windows 2000, excessive exit delays, and adds the new networking events to the filter dialog's operations list,” explained Curtis Metz, Program Manager, Microsoft Sysinternals. Back in September, version 2.0 of Process Monitor brought real-time TCP and UDP monitoring.

Delivering network tracing capabilities to Process Monitor was Russinovich's next step in the evolution of the utility. Taking Process Monitor from version 1.0 to 2.0 involved adding new low-level capabilities, such as a stronger focus on system memory usage in addition to network tracing.

“Autoruns 9.35 - this Autoruns update adds additional autostart locations, including lsastart, s0initialization, savedumpstart, and servicecontrollerstart, and fixes several bugs,” Metz added. “DebugView 4.76 - debugview no longer truncates the last character of each line of a log file when it loads one back into the display. AccessChk 4.21 - this fixes a bug in the code that checks for malformed security descriptors that could cause spurious warnings.”

The new versions of the four updated utilities have also caused the entire Sysinternals Suite to be refreshed. As of October 16, Microsoft is serving a new release of the Sysinternals Suite now complete with all the touched-up utilities: Process Monitor 2.01, DebugView 4.76, AccessChk 4.21, Autoruns 9.35.

Process Monitor 2.01 is available for download here.

The Sysinternals Suite is available for download here.

Best regards,plzz comment if u like it
student,doin engg



Following remarks by Microsoft Chief Executive Officer Steve Ballmer during the Gartner Symposium ITxpo in Orlando, shares of Yahoo exploded on the possibility of the two giants reopening acquisition negotiations. Ballmer
indicated that the acquisition of Yahoo “would make sense economically,” pointing out that not only the Redmond company's shareholders, but also those of the Cupertino-based Internet giant would benefit from such a move. However, in an official statement later yesterday, Microsoft denied that the Yahoo deal is rematerializing.

“Our position hasn’t changed. Microsoft has no interest in acquiring Yahoo!; there are no discussions between the companies,” the software giant stated. While Ballmer's comments were interpreted as a sign that Microsoft was yet again looking to Yahoo as a fast solution to close a portion of the gap that separates the Redmond giant from Google on the search engine market. Yahoo shares, which were trading at under $11, jumped approximately 10% to $12.9 just because of Ballmer's remarks.

Still, with Microsoft saying a firm “no” to a potential marriage with Yahoo, the stock of the Cupertino Internet company is bound to continue its descendant trend. At the start of February 2008, Microsoft made an unsolicited acquisition bid for Yahoo offering $31 per share, for a transaction totaling $44.6 billion.

Yahoo CEO Jerry Yang turned down everything Microsoft threw at him, and opted to partner with Google. Unable to reach any sort of agreement, the Redmond company announced on May 3, 2008, that it was completely withdrawing its proposal to acquire Yahoo. All additional negotiations between the two companies ended up in failures, with Yahoo becoming more and more segmented, while the value of its share continued to drop. On October 16, Ballmer underlined that, in his perspective, Yahoo continues to believe that it is worth even more than $33 per share, even with its stock depreciated to almost $10 per share

Best regards,plzz comment if u like it
student,doin engg



hese days there aren’t enough ways to protect your privacy on the Internet. You can choose from a great deal of software solutions to do this but, as always, the free ones might prove to be the best. So, let’s see what you can do to be as stealth as possible during the hours (days?) of staying online.

How you can stay anonymous on the web

The first thing you might think of is a proxy. Yes, this might be a pretty good solution if it is an anonymous proxy that you can rely on but, in the long run, and if you have enough experience on the web, you will understand that you can be easily traced because of the direct connection that you will have with the proxy.

In case you didn’t already know, most of these proxies, although being out there for public use, do make logs of all connections, and this is bad news for anonymity. Also, hackers can have their own public proxies that will allow them to log everything you do online and easily steal even the most sensitive information from you without you even knowing it. How? Simply by going through the logs of unencrypted data you have sent to the web through the proxy server using a direct connection. Therefore, the proxy solution is out.

There are also websites that guarantee you an anonymous browsing experience but most of them will add their own frames containing advertising to the websites you visit. Another reason for not using such a solution is that a lot of the scripts on the web pages you will open in your web browser will completely refuse to work.

That happens because said websites do not accept all types of scripts to run through the proxies they are using to provide you with anonymity. And, again, the logs come up for discussion. If you do believe that your privacy is the most important thing to you or you simply have something to hide, such websites are not the answer.

You can also go for the paid services that can get you browsing anonymously on the web in an instant. All you have to do is install the software they send you and the software takes care of everything for you (after you set up your browser, instant messenger or whatever other app you want to be stealth to use the paid anonymous service).

Such solutions will allow you to use encrypted connections to their servers, which will then connect to the web and retrieve the information you want for you, sending it back in the same encrypted form. Sounds very good and indeed it is quite a nice thing to go for if you’re in need of online privacy. If you are ready to go for the paid approach, such solutions might be Hotspot Shield or WebGhost, but why not go for the free ones?

The things you should go for

What are the free options you ask? Well, as most people who have used them agree, they are probably better than the paid ones and you will see immediately why that is.

The two online free anonymity providing solutions that just stand out from the crowd are Tor and JAP. While Tor is widely used and known, JAP might just be a new one for you, although, despite its lack of popularity as compared to the former, during our tests it has delivered on all it had promised. In fact I’m using it right now while writing this article and, despite a small delay after hitting enter, everything is loading in my browser as smoothly as possible (truth be said, the connection speed may vary but it has never failed me while using it – actually I’m quite impressed, to say the least, because at the moment I totally forgot I was using JAP at all).

What Tor is and how it works

Let’s start with Tor. I would want to personally let you in on what Tor does to protect your privacy and how it does it, but this has already been covered by the Tor Team on their website and so I will let them explain what it is all about: "Tor is a software project that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol."

Vidalia's Control Panel, the GUI that helps the user manage Tor
Enlarge picture
What this means is that Tor actually uses an anonymous, distributed network of relays through which your traffic will be redirected and encrypted using random virtual tunnels so that no one, not even the ones that run those relays, will know what data you send and from where or to where your data travels on the Internet.

The fact that each network node is able to see no more than one single hop of all of your paths to the end point of the circuit means that those who would want to capture and analyze the data you are sending and receiving to and from the Internet will miserably fail in their attempts. And this brings us to the point. Top notch privacy on the web for free!

The only thing that you might want to be careful with while using Tor to make your browsing experience as secure as possible is make sure that you set your browser not to exchange cookies with the websites you visit and remember not to give out any information concerning your identity.

The inner works of JAP

JAP on the other hand, does not rely as much on the random factor as Tor but still manages to come on top of the class. It will help you take a little detour from the conventional way to the server hosting the website you want to visit by telling your browser to connect through a network of several intermediary servers aka Mixes, which form a sequence named Mix Cascade. These types of server arrays through which you can connect to the web are predetermined and you can choose from a bunch of them using the JAP interface.

JAP's interface that will help you choose one of the mix cascades and the proof that it works

The smart thing lies in the fact that if the number of users using a certain mix cascade is larger, the anonymity level provided by it is higher. Why? Because the connections created by the users between the mixes will mingle and no one will ever be able to understand a thing through all that mumbo jumbo going around there. This means that users are completely safe because it is impossible to determine which connection belongs to which user.

If you are worried about the mix providers, here’s a hint: you shouldn’t be. Why? Because each of these mixes are provided by institutions that will be asked to officially declare that they will not exchange the data they can log on their servers with other mix providers from the network or even keep log files at all.

The Network settings in Firefox
Enlarge picture
And, now, the best part of all this: all information about these providers is made public and verified by the JAP Team and, based on this information, users will be able to choose the mix cascade they trust the most.

Both Tor and JAP can be downloaded from Softpedia and their installation is pretty much self-explanatory. To configure them so that they will work with your favorite browser you will just have to open the Preferences window, go to the Network Settings and enter as the proxy IP address and 8118 as the port for Tor or 4001 for JAP.

Tor will, however, allow you to further customize the settings for your proxy by going to the Advanced tab in the Settings window that you can open from its Control Panel. On the Advanced tab you can manage the password to be used for authenticating to the Tor network, select a custom configuration file or the data directory and even set the run permissions.

The Advanced tab on Vidalia's Preferences window

In case you manage to lose yourself in the sea of Nexts when installing and/or configuring Tor or JAP, these are the how-tos on installing and configuring them on your Mac: HERE for Tor and HERE for JAP.

One last reminder: you have to remember that there are no perfect anonymity solutions out there. The best thing to do if you really care about your privacy is to be careful which websites you exchange information with and pay attention to what type of information you disclose about yourself when online.

Do you know of other anonymity protection solutions that we missed? Do you know of other ways one can protect one’s privacy online? Then leave us a word in the comments.

Best regards,plzz comment if u like it
student,doin engg



Evernote 1.1.5 Beta Released for Mac OS X

Posted by Shashank Krishna

Evernote, a free application that allows users to capture information in any environment making it accessible at any time, has been updated to version 1.1.5. The software is still in beta, but now adds AppleScript support, as well as support for exporting and importing notes to and from XML.

vernote lets you capture stuff like webpages, whiteboards, scribbles, to-dos, even photos and music. As soon as you add a file to your account, you can assign it a name, or a tag, or more names and tags, and you'll be able to find it later on without any trouble, even if you can only remember a few characters. It brings up everything you might have once stored for safe keeping using tags and even text recognition. All you have to do is just search for an inside Evernote just like you remember it. The text recognition technology allows you to search for text within images, even handwritten text. If there's but one thing you can remember about a certain item, you'll most likely get to it as Evernote is an expert at narrowing down a search. Best of all, the service is available for all your devices, Mac, PC and mobile phone, as long as you can connect to the Internet with them.

Evernote 1.1.5 Beta brings the following new enhancements:

- Support for exporting and importing notes to and from a well-defined XML format.
- AppleScript support.
- Fix a bug where note parsing errors could overwrite note content with the error message.
- When plain-text is pasted into a note it is no longer surrounded with a tag.
- List, Mixed and Thumbnail view should all remember their layouts between application launches now.
- Fix a bug where creating a tag with just a double-quote (") for the name would cause a crash.
- Some spiffy new toolbar and sidebar icons.

A native iPhone client for Evernote has also been released via the iTunes App Store. Evernote for iPhone is location-aware, it lets you send e-mails from within the app, it securely decrypts notes and it provides to-dos and clickable URLs and e-mail addresses. Evernote for iPhone is currently at version 1.3 and can be acquired here.

To upgrade your desktop client, use the link below.

Evernote 1.1.5 Beta for Mac (Free Download).

Best regards,plzz comment if u like it
student,doin engg



GLOBAL MARKET CRISIS....second great depression

Posted by Shashank Krishna Thursday, October 16, 2008

The panic in world credit markets reached historic intensity on Wednesday, prompting a flight to safety of the kind not seen since the second world war.

Barometers of financial stress hit record peaks across the world. Yields on short-term US Treasuries hit their lowest level since the London Blitz, while gold had its biggest one-day gain ever in dollar terms. Lending between banks, in effect, stopped.

Speculation mounted that the Federal Reserve, which refused to cut rates on Tuesday, could be forced into an embarrassing U-turn or might further expand its market liquidity operations.

The $85bn emergency Fed loan for the troubled insurance group AIG, announced on Tuesday night, failed to curb the surge in risk aversion. Instead, markets were hit by a fresh wave of anxiety.

One cause for fear came when shares in a supposedly safe money market mutual fund fell below par value – or “broke the buck” – owing to losses on debt in Lehman Brothers, which filed for bankruptcy protection on Monday. This raised the risk that retail investors in other such funds could panic and pull out their money.

All thought of profit was abandoned as traders piled in to the safety of short-term Treasuries, with the yield on three-month bills falling as low as 0.02 per cent – rates that characterised the “lost decade” in Japan. The last time US Treasuries were this low was January 1941.

Morgan Stanley

Shares in the two largest independent US investment banks left standing – Morgan Stanley and Goldman Sachs – fell 24 per cent and 14 per cent, respectively, as the cost of insuring their debt soared, threatening their ability to finance themselves .

Morgan Stanley was holding preliminary merger talks with Wachovia, a troubled regional lender, and could approach other banks and look at other options in the coming days, people familiar with the situation said. Washington Mutual, another regional lender, has hired Goldman Sachs to contact potential buyers.

HBOS, a leading UK mortgage lender pressed into sales talks by the government after its share price halved this week, agreed to a £12bn takeover by Lloyds TSB.

A key measure of fear in the fixed-income markets - the so-called Ted spread, which tracks the difference between three-month Libor and Treasury bill rates - moved above 3 per cent, higher than the record close after the Black Monday stock market crash of 1987.

US authorities fired back with the Treasury announcing it was borrowing $40bn to give to the Fed to use for its emergency lending – in essence removing balance sheet constraints on the size of this assistance.

One-month US Trasury bill yield

The Securities and Exchange Commission announced new curbs on short selling.

Some analysts have criticised US authorities for adopting an arbitrary approach to rescues - saving AIG, but not Lehman - that was impossible for investors to predict and therefore did not boost confidence.

The S&P 500 fell 4.7 per cent, led by a 8.9 per cent slump in financials. Equity volatility was near its highest level since March. The dollar fell against other major currencies.

Gold benefited from safe-haven buying, with prices rising 11.2 per cent to a three-week high of $866.47 a troy ounce.

Andrew Brenner, co-head of structured products and emerging markets at MF Global, said: “It feels like no one wants to take anyone’s feels like we are on a precipice.”

Best regards,plzz comment if u like it

student,doin engg



Need for Speed: Undercover....latest instalment from EA

Posted by Shashank Krishna Wednesday, October 1, 2008

Need for Speed: Undercover is the twelfth installment of the popular racing video game series Need for Speed, developed by EA Black Box and published by Electronic Arts. It is set for release on the PlayStation 2, PlayStation 3, Xbox 360, Nintendo DS, Wii, PC, PlayStation Portable, iPod Touch, iPhone and mobile phone on 18 November 2008.GET READY FROM FROM HIGH ADRENALINE PUMPING ACTION............


Best regards,plzz comment if u like it

student,doin engg



Are You Planning on Quitting Facebook? Why?


About Me

My Photo
Shashank Krishna
Bangalore, up, India
nothin much to say.........doin in IIIT allahabad loves bloggingn hacking.... :) and loooves blogging
View my complete profile