Would a Steel Case Protect the 4 From Waist High Drops (3ft to 4ft)?

Hi. I'd prefer a bare iPhone 4 because it looks good without a case but would this case protect the iPhone 4 from drops like an Otterbox Defender or a Ballistic HC would? Will the steel flap get in the way when I text, play games or make a call?
http://www.ryanglasgow.com/LtdTools_BackPlate.html
How about a carbon fiber case?
http://droconcepts.com/iPhone4/carbon-fiber-iphone-4-case.html
Thanks in advance. Please advice.
Gbu,
Alvin
Message was edited by: Alvin777
Message was edited by: Alvin777

Most of these cases are cosmetically designed as oppossed to being designed for durability. Being that the phone is made of GLASS and is fused to the stainless steel band Its doubtful that anything will protect it from a 5 foot fall.
Keep in mind that depending how it falls is the issue.
I would think that a hard case would absorb the shock somewhat better or perhaps the morphie battery pack case which is a rigid protective case as well as having an extra battery built in it. This morphie battery pack should be released any day.

Similar Messages

  • I recently restored my iPhone 4s from back-up after being reset. An app that I had turned off in back-up did not show up in my recent resoration. I forgot to turn that app back on. Would there be any way I would be able to get the data from that app?

    I recently restored my iPhone 4s from back-up after being reset. An app that I had turned off in back-up did not show up in my recent resoration. I forgot to turn the app back on. Would there be any way I would be able to get the data from that app onto my phone? Is it possible to put an old back-up on my phone?

    LukaPetranovic wrote:
    Hello anita4323.
    I hope this will help you with your problem:
    Back up and restore your iPhone, iPad, or iPod touch using iCloud or iTunes - Apple Support
    You can restore your backup whenever you want from iTunes or iCloud, depending where you made it.
    Let us know if you succeeded or need any further help.
    I believe you are missing the point. The OP has already restored from back up, but failed to include a specific app in the back up and is trying to recover data for it, which in this case is not possible.

  • How can I buy apple watch  for the space black stainless steel case and the black sport band for one order?

    How can I buy apple watch  for the space black stainless steel case and the black sport band for one order?

    Unfortunately no. I asked the same question when I went to the local Apple Store for my "try on" and as of now you would have to order the watch with the metal link band and the black sports band separately.

  • Protect the cell from editing (MS Project)

    is it possible to protect the cell from editing (Gantt Chart view)? 
    I try to do it through the event Application_ProjectBeforeTaskChange and setting Cancel to true 
    which method is called when the edit cell and press the ESC?

    Hi,
    Thanks for posting in MSDN forum.
    This forum is for developers discussing issues about
    apps for Office. Since the issue is more relative to Project developing, I would like to move it to
    Project Customization and Programming forum to get more effective response.
    Thanks for your understanding.
    Best regards
    Fei
    We are trying to better understand customer views on social support experience, so your participation in this interview project would be greatly appreciated if you have time. Thanks for helping make community forums a great place.
    Click
    HERE to participate the survey.

  • How Well Does the Smart Case Protect the iPad Air if Dropped?

    Would it stop the tablet's screen from cracking from a drop of, say, chest height?

    How can anyone answer that?
    Depends on so many factors. What angle the iPad lands at. What surface it is dropped onto. The exact force applied to the screen on impact.
    You could drop a dozen iPads onto a floor identically, and they'd all suffer different damage ranging from none to catastrophic.
    Due to its design the Smart Cover is more effective at protecting the screen from being struck or scratched by objects hitting the screen.
    If you are considering dropping your iPad from chest height (or any height for that matter), I'd recommend not doing so.

  • How to allow image file uploading, but protect the directory from abuse?

    I have an upload facility that allows visitors to upload their personal image (aka avatar) to my client’s site. This required me to CHMOD the assets folder to 777 which leaves the folder wide open to abuse.
    Is there a way to allow the uploading of files but protect the directory from abuse?
    I could put the images in the database but I assume that would quickly drag down the performance of the (MySQL) database.
    Any ideas?!
    Thank you in advance,
    Glenn.

    This required me to CHMOD the assets folder to 777 which leaves the folder wide open to abuse.
    Only if the abuser can get an executable file of some sort into that folder.  If you are filtering the files during upload to select only image files then I think you are pretty safe.
    I could put the images in the database but I assume that would quickly drag down the performance of the (MySQL) database.
    Definitely - you would never want to store the images as blobs unless you had a compelling reason to do so.  It's much more forward thinking to just save the image filenames in the database, and link to them as needed.

  • I would like to copy all the songs from one Ipod into another. All the songs are into my Itunes account, I tried to drag and drop the songs from the old Ipod to the new one but it doesn't work. Is there a way to do it ?

    Hello everybody,
    I would like to copy all the songs from one Ipod into another. All the songs are into my Itunes account, I tried to drag and drop the songs from the old Ipod to the new one but it doesn't work. Is there a way to do it ?
    I share one Itunes account with other people from my family and one person would like to keep the same songs on the new Ipod as the ones which were on the old one.
    Thanks in advance for your answer.
    Yan

    Hello Chris,
    Thanks for your answer. I was hoping for an easier answer. Too bad there is no drag and drop solution, it would have been much easier.
    Thanks for answering so fast.
    Bye.
    Yan

  • Application Security - Protecting the files from direct access

    I am working on my application. I have a Flex app that
    everyone will access but to do the work, I have it calling on
    several PHP files. The Flex app has a login system and only allows
    advanced functionality after login. This protects the Flex portion,
    but does not really account for the PHP side of things.... The PHP
    files do a variety of things, mostly SQL calls, but also run a few
    system commands.
    How do you set up the PHP files or use an htaccess file to
    only allow the Flex app to call the PHP files? I'd like to set it
    up so that the users can't directly access the PHP files. However,
    I'm sure the client workstation is still making the request when
    called by the Flex app, right?
    Has anyone done this? Does anyone have any thoughts or
    suggestions on this?
    Thanks,
    Chris

    Hi csawall,
    These are just some off the top ideas, you can extrapolate
    and create a solution that might work:
    Since the client has access to the data stream to/from the
    server, there is no way to guarantee that someone won't use some
    kind of sniffer program to find what file the flex app is talking
    to, but that doesn't mean that you can't obfuscate it as much as
    possible to make it not worth trying.
    One idea was to use a single index and use _GET to control
    what content is being served, using includes on the php side to
    serve the proper file/content.
    Since the content you are delivering I would assume requires
    authentication, you'll have a unique session ID to work in. While
    the actual php file could be accessed in real time if you watched
    the data stream, if the user is already authenticated, what diff
    does it make? Set up specific rules inside your php file, so that
    it must receive data using a specific protocol, one that you can
    obfuscate using crypt and base it on variables that are unique,
    such as SSID + date + time, etc. When you first authenticate with
    the server from the flex app, have the php login script return the
    required protocol rules back to the flex app that would be unique
    to the session. The _SESSION variables on the server would contain
    the unique protocol rules as well. This gives you server side
    control over talking to the flex app... then all you would need to
    do, if you wanted to keep a tighter lid on the access to your
    script, is just rotate the protocol from time to time.
    Add on top of this, script name obfuscation that you store
    server side and transfer only withing the validated session, such
    as e.g. fstrs4adadst4_somefile.php etc etc, where your randomized
    key is the prefix (or suffix whichever you prefer) of your index.
    Your code of course would use the current protocol keys to match
    the current index, and all you need do is control the .htaccess
    file so that it relays any $_somefile.php to the proper
    file/directory etc which would be a name that would never be
    revealed to the public, and only used inside your .htaccess file or
    on the server side itself.
    Taking it a step further, if you create some kind of pulsing
    authentication system using the above methods, you can rotate the
    keys fast enough, so that someone would have to work really hard to
    figure out the protocol to talk to your server
    Just my 2 cents...
    RFX

  • Is there any way to password protect the ipad from syncing with a computer? Or Blocking it from a computer?

    My brother borrows it and always adds music to it. I want to prevent this from happening.

    Password protect the iPad and he won't be able to use it at all. Seems like the appropriate response if someone is using your belongings in a way you've requested they should not.

  • How to protect the phone from attacks?

    Hi there,
    I just found an interesting and dangerous tool:
    http://www.getjar.com/products/15782/MagicBlueHack
    It says you can make free calls and send free SMS just by connecting to any other Bluetooth enabled mobile phone, the other phone even does not need to install this software...
    How can one protect his phone from such attacks besides turning off Bluetooth?

    Exactly. Your best line of defence is common sense.
    Firstly, don't leave bluetooth on unless you need to use it.
    When you do need it, don't leave your phone as discoverable. Leave it as "hidden". You only need it to be discoverable if trying to pair another device with it.
    If a pairing request comes in while the phone is discoverable, ask yourself if you were responsible for it. If in doubt, don't accept the request.
    Was this post helpful? If so, please click on the white "Kudos!" star below. Thank you!

  • WE NEED NEW LAWS TO PROTECT THE PUPLIC FROM THE BT...

    We the public need new laws to protect us from BT GREED. your spreading yourself very thin, but you expect us to still pay for 8.0mb when your only giving us 0.6 and to you its acceptable!!!!!!
    its nothing more than a scam and would be classed at a scam if joe puplic tried to run a business that way but big companies like BT are a law unto themselves. no one has the balls to do anything.
    SLOW SLOW BT CONGESTED EXCHANGE THAT I SEEM STUCK WITH HOWEVER AT PEEK TIMES WHEN I HIT A VERY SLOW 1MB ON MY BT LAND LINE THAT COST ME AN ARM AND A LEG I CAN JUST DISCONNECT FROM IT AND CONNECT TO NEXT DOORS VIRGIN MEDIA UNSECURED D-LINK ROUTER AND GET A 2.6 CONNECTION. HOW ???????????????????? AND WHY????????????????? IF ITS CONGESTED HOW IS THAT EVEN POSSIBLE OR DO VIRGIN PAY BT A **bleep** LOAD OF MONEY.

    Hi,
    A mailbox user can have only one managed folder mailbox policy applied. I recommend you remove the managed folder mailbox policy from this mailbox user and then apply a new managed folder mailbox policy to this user.
    To remove the managed folder mailbox policy from the mailbox user run the following PowerShell command:
    Set-Mailbox -Identity test -ManagedFolderMailboxPolicy $null
    Best regards,
    Belinda
    Belinda Ma
    TechNet Community Support

  • Would iPad Mini cases fit the iPad mini 2?

    Probably sounds silly as they are virtually the same and no difference in size or dimensions were mentioned but I compared iPad models and the iPad Mini 2 is thicker by 0.3mm. Now this might sound miniscule but cases are made to fit perfectly and I'm afraid even 0.3mm would make a difference in using a case? Am I paying too much attention or should I get cases specifically said to be compatible with iPad Mini 2?

    I think it depends. If you're looking for a tight fitting snap case then you may want to look for Mini 2 cases specific, or get it from a place with a good return policy. If it's a portfolio case or a silicone case you should be fine because they  have more wiggle room.
    i've found that some retailers don't care if you 'try it on' in the store, you just have to ask for their help or be very careful when you open the packaging so that it is still resellable.
    I have a Touch 5 and have found that iPhone 5 cases fit it, the bits of millimeters in difference doesn't pose a problem (Biggest issue I have is buttons being in different places, not case size)

  • Security can protect the client, what about protecting the app from client?

    This is not about code obfuscation or preventing decompilation.
    I'm actually interested in trying to build an extensible application without a managed full-time server (the clients may go mobile and become disconnected) that can protect itself from not necessarily a malicious user, but more like an incompetent one.
    As I looked into using Eclipse RCP, I realised that this is going to be too fragile (delete a single file and it's all going to fail) or even worse, an unapproved plugin could be installed.
    As a client, I can require that jars be signed and everything, but how as an application can I require that the client VM is running secure?
    Short of Sun's "Sun Secure Global Desktop" product, does anyone see any obvious solutions?
    Thanks in advance.

    300+ users that, honestly, can break a bowling ball in 500 ways. This is a perfect reason to use a web app, until you find out that we've been asked to provide offline capability.
    Most frameworks/environments (hibernate/cayenne, RCP, JPF) all have configuration files that can be messed up by well meaning users and support staff. In a way, I'd love to have that info available from a web server, but we're back to offline support.
    A possible solution is a local (in office) server to manage the apps for local clients, I'd just like to make sure we've thought about everything before we commit resources and staff. To properly support offline, we're probably going to need this anyway.
    I'm just wondering if anyone's managed to begin to address any of these kinds of issues.

  • Can I sync my 3rd generation Ipad with four (4) wireless keyboards. I see patients is four (4) different exam rooms? I would like to just carry the Ipad from room to room,

    Is it possible to use multiple wireless keyboards with my new Ipad. I would be moving from room to room and just using the keyboard in that room. If this helps, the same medical app will be running to access each patients chart.
    Thank for any help

    The app is irrelevant. Assuming each is compatable with the iPad, you should.

  • A mini disc will not work in superdrive.  How would you suggest I retrieve the data from a mini disc to my macbook air?

    Reading the previous comments, I understand the last thing I want to do is stick a mini-disc in my superdrive.  Not too super, but never mind.
    Any suggestions as to how I can read it?  It has the user's manual for my new actioncam.

    buy a tray loading LG DVD drive from best buy or amazon.com
    theyre only $30
    they work perfect on the Air (i know)  and have a MUCH longer cable for ease of use than does the superdrive.

Maybe you are looking for

  • 2nd gen Shuffle gets unmounted by iTunes 7.5.0.20 (doesn't sync) workaround

    My cousin recently gave me his Shuffle because it was not working for him on his XP Pro machine. He bought a new Nano. I have used the separate "iPod reset utility" to restore my Shuffle. The first time that iTunes sees it, when you assign a name, if

  • How many software components can create maintenance requests/notifications? So far, I count three...

    These are all in EA-PLM ILM_UI 'Basic Maintenance Processing: User Interface' RPLM_QIMT 'Quality Inspector and Maintenance Technician Roles' EAM_SIMPL'Simplification Project in Enterprise Asset Management' I can find portal business packages for iVie

  • Damaged domain in sites folder

    Created web site and published to site folder on local machine then uploaded to web site. Local "domain" in the site folder where iWeb saves some how got corrupted. Downloaded web site thinking I could rebuild it using iWeb. Not so lucky. Is there a

  • Why will macbook randomly cause chargers to stop working?

    Hello all, first sorry for any grammar errors i may have i am reduced to typing this on my iphone. Heres my issue. Both me and my wife own macbooks. Mine is a mc207 and hers is a mc700. The issue is her macbook will randomly every couple months cause

  • Attribute Set in standar CRM extractor

    Hello all, I have to get reporting about Marketing attributes in CRM. I´m using business content extractors for this information: 0CRM_MKTATTR_ATTR      0CRM_MKTATTR_TEXT      0CRM_MKTMETA_ATTR (metadata) 0CRM_MKTMETA_TEXT (metadata) But the standard