Solved

Disable scripts on open?

Posted on 2004-08-17
3
334 Views
Last Modified: 2012-05-05
I have a Filemaker database created a couple of years ago by a former employee. I never met the guy and have no way of getting ahold of him. I want to make changes to the database that he created, but I don't know how to get around the scripts that he created. The database opens automatically and everything is disabled, so I can't add a field that I want to add. Is there any way that I can extract the tables from the file without running the scripts or disable the scripts so that I can get to the data?

Thanks,
John
0
Comment
Question by:johnmoed
  • 2
3 Comments
 
LVL 9

Expert Comment

by:Lieven Embrechts
ID: 11828453
I don't know what version of filemaker you're using on which platform, but generally you can press option or command (alt or windows-key) to prevent startup scripts from running.
Chances are high the database is protected too with a password, in which case you need the proper tools to find and disable that default password. (mail me at el@bulo.be, i'll help you out)
0
 
LVL 9

Accepted Solution

by:
Lieven Embrechts earned 500 total points
ID: 11835302
As you found out with filemaker 5.0 you get a password prompt when pressing the shift key.
The most effective tool to retrieve the password is indeed by using the password cracking program from Passware for Filemaker.
You will be able to detect the password then and you will be able to type it in.
Next step is to give full access to a blank password.
Now you can access scripts and get rid of the steps you don't want.

If you get stuck, let me know, i have a few other tricks if neccesary.
In filemaker 5 it is quite easy to tamper with the passwords area in the database and recover it.
Also the name of the startup script is visible so it can be disabled in hex.
Sometimes quite strange passwords are used (with lots of ctrl-cmd key combinations) so it can be a bit tricky to detect the correct password, even with passware.
0
 

Author Comment

by:johnmoed
ID: 11842736
Got it!
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Conversion Steps for merging and consolidating separate Filemaker files The following is a step-by-step guide for the process of consolidating two or more FileMaker files (version 7 and later) into a single file with multiple tables. Sometimes th…
Problem: You have a hosted FileMaker database and users are tired of having to use Open Remote or Open Recent to access the database. They say, "can't you just give us something to double-click on rather than have to go through those dialogs?" An…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now