Home page logo
/

pen-test logo Penetration Testing mailing list archives

RE: Help Exploiting MQ
From: "Dimitrov, Constantin" <cdimitrov () micros com>
Date: Wed, 1 Sep 2004 15:42:06 +0200

Yes, but MQ Series is IBM product and MSMQ is MS product.
It can be used to implement solutions to both asynchronous and synchronous
scenarios requiring high performance. The following list shows several
places where Message Queuing can be used. 

-Mission-critical financial services: for example, electronic commerce.

-Embedded and hand-held applications: for example, underlying communications
to and from embedded devices that route baggage through airports by means of
an automatic baggage system.

-Outside sales: for example, sales automation applications for traveling
sales representatives.

-Workflow: Message Queuing makes it easy to create a workflow that updates
each system. A typical design pattern is to implement an agent to interact
with each system. Using a workflow-agent architecture also minimizes the
impact of changes in one system on the other systems. With Message Queuing,
the loose coupling between systems makes upgrading individual systems
simpler.

It's famous to be the most stable part of Distributed Network Architecture.


-----Original Message-----
From: Aditya [mailto:aditya.deshmukh () online gateway technolabs net] 
Sent: Wednesday, September 01, 2004 8:07 AM
To: rick () livingstoncadservice com; tommy () providesecurity com
Cc: pen-test () securityfocus com; webappsec () securityfocus com;
full-disclosure-admin () lists netsys com
Subject: RE: Help Exploiting MQ


ALD >  What is MQ?

MQ Series of middle ware is it that what u are referring ?

-aditya


________________________________________________________________________
Delivered using the Free Personal Edition of Mailtraq (www.mailtraq.com)



------------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Check out our Advanced Hacking course,
learn to write exploits and attack security infrastructure. Attend a course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.

http://www.infosecinstitute.com/courses/ethical_hacking_training.html
-------------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]