Refactoring the Chaos: A Human-AI Partnership in the Valley of FileMaker

In the Valley of FileMaker, we found complexity born not of malice — but of time. Through layered scripts, value lists, and fragile logic, we unraveled the tangle not with judgment, but with clarity. Together — a human and an AI — we refactored, simplified, and respected what came before. This is our story of rebuilding trust in the native tools of a misunderstood platform.

Read More

Master Your Server Security: Change SSH Port, Configure UFW, and Use OpenSSH with PowerShell

Learn how to enhance your server security step by step: change the default SSH port, manage UFW rules, and configure OpenSSH on Windows for seamless management via PowerShell. This comprehensive guide covers everything from opening and closing essential ports to updating the OpenSSH profile for a more secure and streamlined workflow. Perfect for anyone looking to harden their server against automated attacks while maintaining accessibility.

Read More

How a Tiny Button Saved My Sanity: Clearing FileMaker Pro Cache to Fix Connection Issues

If you’ve ever been caught in a whirlwind of frustration while troubleshooting FileMaker Pro connectivity issues, you’re not alone. Recently, I found myself on the verge of madness (let’s call it “CraZZZZZZZZzzzzzzzzzY”) while trying to resolve a mysterious problem where FileMaker Pro 20 and 21 clients could no longer connect to a FileMaker Server on port 5003. Meanwhile, FileMaker Pro 19 connected flawlessly. The culprit? Cached settings. The hero? A single Delete Cached Temp Files button.

Here’s the full story, along with step-by-step instructions to help you avoid the rabbit hole I fell into.

Read More

Practical Mitigation Steps: A Comprehensive Defense against hidden Threats in macOS.

RustyAttr trojan’s Exploitation of Extended Attributes Cyber threats are evolving rapidly, and attackers are finding increasingly sophisticated ways to bypass detection. One of the latest techniques comes from the Lazarus Group, a well-known Advanced Persistent Threat (APT) actor. Their novel approach involves hiding malicious code in macOS extended attributes (xattr), allowing them to stealthily execute

Read More