Who Made This Leather Case?

Friend has a fabulous-quality leather case made in South America, with no maker's name on it. There is a silver logo on the front, which is in the shape of two teardrops (or raindrops). The snap on the back is made by Fiocchi. The case flips open and has small, tight pockets (optional) for cards. The cost was over $100, and my friend THINKS the maker's name begins with a B. I can email a pic if need be.
Does anyone know who might have made this case?
Thanks in advance!

I have a similar case made by HOCO, the Royal Series, only $42.95. Really nice and well made.
http://www.iphone-cases4u.com/productinfo.php?productsid=2325
I also reviewed it here: http://discussions.apple.com/thread.jspa?threadID=2597810&tstart=0

Similar Messages

  • How to find out who made transport

    Hey There,
    Is there any transaction which I can use to find ou who made a transport? In the transport log I cann see all the tasks but not who made this.
    Thanks and best regards
    Pascal

    Please do some research before posting... That question has been answered in many occations.
    Read the "Rules of Engagement"
    Regards
    Juan

  • In April 3o,2012 and May 9,2012 some purchases of $38.75 and $24.51 were made and they were not made by me because i never spend that much. Thing is that on February 7,2012 my ipod was stolen and i havn´t gotten it back since, i need to know who did this!

    In April 3o,2012 and May 9,2012 some purchases of $38.75 and $24.51 were made and they were not made by me because i never spend that much. Thing is that on February 7,2012 my ipod was stolen and i havn´t gotten it back since, i know have a new ipod and have made some purchases but never that much. I need to know who did this !!!!!!

    The most immediate thing you need to do is to call your credit card company and report the unauthorized charges. Your card company can contact Apple if they need additional information.
    Next, log into your iTunes Store account and see if the purchases are reflected in the Purchase History. If they are, immediately change the password to your iTunes Store account, making sure it's not something easily guessed or looked up. Then go here:
    http://www.apple.com/support/itunes/contact/
    and follow the instructions to report the issue to the iTunes Store. Whether or not they'll do anything for you I don't know, particularly if you didn't change the password after your iPod was stolen.
    If the charges are not reflected in the Purchase History, then it's most likely a fraudulent charge to your credit card directly rather than an unauthorized purchase through your iTunes Store account in which case it will be up to your bank to handle.
    Regards.

  • Hi I have a Iphone4 in using. I couldn't find Safary, E-mail and notes from my phone one day. I made this mistake when I want to delete some programe from my phone. Who can help I recovery my phone please.

    Hi
    I have a Iphone4 in using. I couldn't find Safary, E-mail and notes from my phone one day. I made this mistake when I want to delete some programe from my phone. Who can help I recovery my phone please.
    Thanks

    Hello, HenryWang2103.
    Thank you for visiting Apple Support Communities.
    The Safari, Email and Notes applications are native to the iOS and is unable to be deleted.  Since this is the case, they are either in a folder on the iPhone, on another page or Restrictions are enabled.  You can also search for these Apps on the iPhone by touching the screen and sliding your finger down.  Here is some information regarding these features.  The information about folders is located in the user guide below.
    iPhone User Guide
    iOS: Understanding Restrictions (Parental Controls)
    http://support.apple.com/kb/HT4213
    Cheers,
    Jason H.

  • I've bought leather case for iPhone 4 with a magnet clip situated on the back side just above the "apple" label. Can it interfere with any signals or made other damage?

    I've bought leather case for iPhone 4 with a magnet clip situated on the back side just above the "apple" label. Can it interfere with any signals or made other damage?

    I have been using a leather case with a magnetic clasp for months.  The only side effect is that I need to recalibrate the compass app when I use it.  This is really not a problem since I don't use the compass app very often.  I haven't encountered any other interference or problems.

  • Nokia's premium leather case for the Lumia 1020

    Has anyone seen any additional information about what has been referred to as "Nokia’s premium leather case for the Lumia 1020" on some sites?
    Nokia’s premium leather case for the Lumia 1020
    This looks like the perfect case for the Lumia 1020 and is one of the few that offers protection for the camera lens.
    Is it going to be sold by Nokia? And when is it coming out?

    Actually, the page mentions that link as a source for a different case not pictured.
    "...we did find another company, Noreve.com, who also have a leather case in the process of being made for the 1020."
    So whatever case Noreve.com decides to make, it won't be the one pictured in the article.
    And looking at the other cases that Noreve has designed, I don't think theirs will look anything like the Nokia-branded one that is pictured.
    Any leads would be appreciated.
    scoobyman wrote:
    All the information can be found in the links that you provided for this French manufacturer of luxury leather cases with Lumia1020 being a forthcoming model: http://www.noreve.com/langue/en.html?gclid=CLWayerx0rgCFVMPtAodoxIAqw

  • IPhone 5s leather case: gone wrong because of low quality, can I get it replaced or a refund?

    I bought Apple iPhone 5s leather case, and after three weeks I noticed that is broken (it cannot be seen visually), and I suppose that this case is not the right quality as Apple ussualy provide. Do I have any chance to get a refund or simply to get it replaced to new one?
    I really like this case, and I would like to have it not broken.
    Answer please,
    Thank you,

    Apple changes the case.
    IN my situation it was that the case was broken near the earphones plug.
    BUt if you are considering whether buy or not the leather case, i can tell you that case will change its color. I dont know anout black, i have brown, it becomes more brown as i use it. I suppose the case has top layes and when you use it the top layer goes off and you have final layer.
    ON my brown case the used color is darker brown.
    I Like this case, it looks luxurious, as it is.

  • Project Server 2010 - Modification date and name of the person who made the last change in the project

    Hello everybody
    I'm with a doubt.
    I got in the business
    environment Project Server 2010 and
    would like to get the publication date,modification
    date and name
    of the person who made
    the last change in
    the project. It is possible
    to doby the native
    resources or is
    there any query in
    SQL Server to perform a
    query of this information.
    Thank you.
    Obrigado por contactar o fórum Microsoft Technet!

    Hi Hezequias,
    You can get the ProjectModifiedDate column in MSP_EPMProject_userView in the Reporting DB where you can
    get the data based on the projectUID. 
    The "last saved" date in the draft DB (be aware that querying in the draft DB is not supported by MS).
    For the "last modified by", I think it is not stored in any place.
    But you can develop custom code upon publishing the project (Event BeforePublish), writing the current
    date and username automatically into a custom enterprise field.
    Hope this helps,
    Guillaume Rouyre, MBA, MCP, MCTS |

  • Looking for a leather case for the ipod Touch 4G

    Hello everyone,
    I'm looking for a real *GENUINE LEATHER* case for the iPod Touch 4G, preferably one that has a belt clip.
    I just wasted $34 on the new Belkin "genuine leather case with belt clip" only to find out it smelled like rubber and felt nothing like what real leather would feel/smell like. Totally disappointed in Belkin advertising their cases as genuine leather when in fact they are made of cheap synthetic leather.

    You can right click your video file, go to "Get Info", and select the Video tab and change the file type to Movie, TV Show, or Music Video, and then once that video is synced to the iPod it will be sorted into the proper location.
    You can also create playlists of your video content. That would be the easiest/best way to get your genre classification system going.

  • How to find out who made inserts/updates/deletes made to a SQL Table

    I want to know WHO MAKES INSERTS/UPDATES/DELETES TO a particular SQL Table. Bascially I want to AUDIT ANY Edites made to a SQL 2008 TABLE. I need info such as WHO AMDE THE Updates i.e. the user first/lastname, When update was made, what row was updated etc...How
    can I do that with SQL 2008?

    One way to achieve that would be to use triggers to detect when a change is made to the table, and then insert a record into another table/database detailing what changed and who by.
    You'd need three triggers, one for insert, update and delete respectively, and for each of those you use the "inserted" and "deleted" tables (system tables maintained by SQL) to retrieve what has been done. To retrieve who made the change you can query IDENT_CURRENT
    which returns the last identity value for a specific table.
    See :
    Triggers -
    http://msdn.microsoft.com/en-gb/library/ms189799(v=sql.100).aspx
    Inserted & deleted tables -
    http://technet.microsoft.com/en-us/library/ms191300(v=sql.100).aspx
    INDENT_CURRENT -
    http://technet.microsoft.com/en-us/library/ms175098(v=sql.100).aspx
    There may be better / more up to date ways to do this, but I've used this method successfully in the past, albeit a long time ago (on a SQL 2000 box I think!).

  • Who runs this community?

    I post a questions, the first reply start off with "You are wasting your time" and clearly does NOT answer my questions. I reply to that saying I have higher expectations for Apple than other cheaper products.
    My post gets deleted for not meeting community guidelines, and the above post which INSULTED my initial question, is marked as 'Answered my question'
    So my question for this post is - who runs this? Apple or some volunteers? Marking a post as 'Solved Problem' on my behalf that tells me "You are wasting your time" is not usefull!
    At this point I'd like to delete the original posit since clearly "I'm wasting my time" on here.
    Sheesh!
    Mac owner from MacPlus to MBP Retina since 1988

    "You are wasting your time" and clearly does NOT answer my questions.
    Actually, it does answer your question. Maybe not all that politely, but it is correct. Like virtually any other such device (iPad, Blackberry, Samsung), Apple does not make their own batteries. They get them from the same very few suppliers as everyone else. And like all such "performance" claims by manufacturers, they are based on absolute best circumstances and use. Typical use will not yield those results.
    who runs this? Apple or some volunteers?
    Apple owns and operates these boards. Other users handle almost 100% of the questions. Rarely will you see an Apple employee posting an answer. Of those, it is almost always one of the hosts explaining something related to the use of these boards, not an answer to a technical question.
    Marking a post as 'Solved Problem' on my behalf that tells me "You are wasting your time" is not useful!
    Well, only you can do that. No one else, not even the hosts can in any way mark a post Solved or Helpful. Only the person who started a topic can. So in the case of the only other topic under your name, you awarded the Solved and Helpful points. Therefore, your claim of someone else doing so "on your behalf" isn't possible.

  • Due to the rumored heat problems with the iPad 3, is there a danger in using a leather case design for it.

    I recently purchased a 64 GB Verizon LTE iPad,  along with a Bear Motion leather case designed specifically for that model. I've been reading a lot about the heat problems with the new iPad and although I haven't noticed them on mine, I'm worried that putting it in the case may cause worse problems. Is this something I should be concerned about?

    Unless you have a defective iPad you should be fine.  The only time it should be heating up is when you're running an intensive app like a game that's working the quad-core processor and the screen.  I bought a Targus leather case for mine and play InfinityBlade2 on it and haven't noticed any heating issues with mine, but the part holding the iPad is plastic, so it can disipate heat better.
    If your iPad gets too hot it'll warn you, so I'd use it for now and see what happens.  It'll shut down before it causes any permanent damage.

  • It was advised on a radio program to get Security for Macs as they are becoming a target.  Is this the case?

    It was advised on a radio program to get Security for Macs as they are becoming a target.  Is this the case?

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to take control of it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, not machine behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It can be as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Keeping track of anyone who made a deletion from a table

    Dear all;
    I thought this was going to be easy but I am yet to think of a solution to this problem. I have the following table created
    create table test_tbl
       test_id varchar2(10) not null,
       test_modifiedby varchar2(30),
       test_result number(10),
       primary key(test_id)
    );with the following insert
    insert into test_tbl
      (test_id, test_modifiedby, test_result)
    values
      ('122', 'John', 4);
    insert into test_tbl
      (test_id, test_modifiedby, test_result)
    values
      ('123', 'Jamie', 6);
    insert into test_tbl
      (test_id, test_modifiedby, test_result)
    values
      ('124', 'Katy', 8);
    insert into test_tbl
      (test_id, test_modifiedby, test_result)
    values
      ('125', 'Eric', 10);I am trying to write a simple procedure which is used for deletion and also I would like to be able to keep track on and the save the user who made the deletion and that is where I am having problems. I need to keep track on who made the deletion because I have a trigger which is used to save all deleted test_id made. See trigger below
    CREATE OR REPLACE TRIGGER test_tbl_before_delete
    BEFORE DELETE ON test_tbl
    for each row
    begin
    insert into audit_test_tbl_table
        (test_id, test_modifiedby, test_result)
    values
       (:old.test_id,
        :old.test_modifiedby,
        :old.test_result
    end;Please how do I solve this problem. All help will be appreciated. Thank you.

    Unfortunately Rob, I wouldnt be able to do that because I am using a web development tool called Asp.net which is linked to our oracle database and from the web development tool, users are able to login into the application I am designing and based on their login creditials, they are able to carryout tasks like deletions, insertions, etc. Now I am able to get the user name and info directly from the web development and able to pass it into my deletion procedure. See procedure below
    procedure deletefromtest_tbl(delete_testid in varchar2, delete_modifieruser in varchar2)
      AS
    temp_cnt number;
    BEGIN
    select count(*) into temp_cnt from test_tbl td
    where td.test_id = delete_testid
    if(temp_cnt != 0) then
        delete test_tbl pk
        where pk.test_id = delete_testid
      commit;
        end if;
    end deletefromtest_tbl;From the procedure, I really don't know how to apply the delete_modifieruser (which contains the information of the user that perform the delete) so that information gets saved in the audit_test_tbl_table.

  • LEATHER CASE AND  CHEAPEST SCREEN PROTECTOR!

    I bought an apple ipod video 30gb black and i kept the plastic screen on for a long time and i decided to find a case.
    There were no cases available at the time in stores so i started looking for one on the web. No luck there, only pre-orders and such. I went to ebay and looked for one and found a good one. http://cgi.ebay.com/Leather-Case-for-iPod-5G-Video-30GB-60GB-Flip-White-v1_W0QQi temZ5830002084QQcategoryZ27966QQrdZ1QQcmdZViewItem
    This is leather case which fits the ipod nicely. And i bought one.
    Luckily it is free shipping because i live in Toronto,Canada and i thought the shipping would be alot from Hong Kong.
    My case arrived in 6 days and all postage stamps on the outside of the package came out to $27.40, and i only paid $27 for it.
    I could finally take off the plastic tape that came with the ipod which was peeling on the sides and i put it into my case, VERY NICE!
    Anyways i still did not want it to get scratched so i was looking for a screen protector (eg, invisible sheild) but then i realized that if i had it in a case the whole time then i could just use saran rap and used a little bit of tape on the back.
    It works perfectely and only 0.00001 cents per inch.
    Cheapest way to protect your screen!
    GOOD IDEA FOR ALL YOU CHEAP PEOPLE OUT THERE WITH A CASE!

    @MissyO
    If you put you GNx in you purse or have it in a good Case you should be fine I looked on CORNING's web site to see if it had Gorilla Glass it did'nt show that the GNx. did but you can call them an ask to see if it's got it installed or not.
    Here's the Link to there Website:
    http://www.corninggorillaglass.com/products-with-gorilla/samsung
    But what i use for my droids when i dont have them in there leather cases is a Oakly Glasses Bag there are two things it's good for 1. If your storing it in your purse with it being in the glass bag it will keep stuff off the phone. An the bag won't limit the sound's from your phone it'll stay the same. 2 The bag not only protects it's contents that are inside you can clean you phones screen with the bag as well just flip the bag inside out. Then you can clean the screen when finised reverse the bag.  Give em a try as they don't cost that much. you can get one for one Around $7.00 B33   

Maybe you are looking for

  • HP Color Laserjet 5550dtn Printer problem

    The printer keeps printing out the same two color copies on 11x17 paper then follows with page after page of code that will not stop.  Any idea of how to stop this would be helpful...

  • HT201310 what do you do when apple tv says mode not supported

    My apple tv stopped working and the tv says either no signal or mode not supported.  I have restarted, unplugged the HDMI cables and restarted again.  I have not updated any software.  This Apple tv is new since December 14.  The TV I have is older S

  • ZMM Profile on IOS 7.1 will not install with ZMM 3.0

    Anybody experiencing the same issue as I have? When using ZMM server version 3.0, iPhone devices with IOS 7.1 will not receive profiles. The only thing they do receive is one MDM profile. However, I expect at least 5 ZMM profiles on the iPhone device

  • PROBLEMS IN MAKE TO ORDER PRODUCTION CYCLE

    Dear Sir When i m making make to order cycle for a material i hv maintained stratergy 20 for the material.then i created sales order for that material.then i run MRP using MD50.Then iwent to MD04.Then i converted planned order into production order i

  • Writing to parallel port

    i need to be able to write to the parallel port on a desktop computer to control a stepper motor.  I need to be able to write logic high and low at certain pins that go to a stepper motor driver.  The writing to the port needs to be done so many time