Penetration Testing mailing list archives
RE: Help Exploiting MQ
From: "Dimitrov, Constantin" <cdimitrov () micros com>
Date: Wed, 1 Sep 2004 15:42:06 +0200
Yes, but MQ Series is IBM product and MSMQ is MS product. It can be used to implement solutions to both asynchronous and synchronous scenarios requiring high performance. The following list shows several places where Message Queuing can be used. -Mission-critical financial services: for example, electronic commerce. -Embedded and hand-held applications: for example, underlying communications to and from embedded devices that route baggage through airports by means of an automatic baggage system. -Outside sales: for example, sales automation applications for traveling sales representatives. -Workflow: Message Queuing makes it easy to create a workflow that updates each system. A typical design pattern is to implement an agent to interact with each system. Using a workflow-agent architecture also minimizes the impact of changes in one system on the other systems. With Message Queuing, the loose coupling between systems makes upgrading individual systems simpler. It's famous to be the most stable part of Distributed Network Architecture. -----Original Message----- From: Aditya [mailto:aditya.deshmukh () online gateway technolabs net] Sent: Wednesday, September 01, 2004 8:07 AM To: rick () livingstoncadservice com; tommy () providesecurity com Cc: pen-test () securityfocus com; webappsec () securityfocus com; full-disclosure-admin () lists netsys com Subject: RE: Help Exploiting MQ ALD > What is MQ? MQ Series of middle ware is it that what u are referring ? -aditya ________________________________________________________________________ Delivered using the Free Personal Edition of Mailtraq (www.mailtraq.com) ------------------------------------------------------------------------------ Ethical Hacking at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Check out our Advanced Hacking course, learn to write exploits and attack security infrastructure. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. http://www.infosecinstitute.com/courses/ethical_hacking_training.html -------------------------------------------------------------------------------
Current thread:
- RE: Help Exploiting MQ rick (Aug 31)
- RE: Help Exploiting MQ Aditya (Sep 01)
- RE: Help Exploiting MQ Dimitrov, Constantin (Sep 01)
- RE: Help Exploiting MQ Aditya (Sep 04)
- RE: Help Exploiting MQ Dimitrov, Constantin (Sep 01)
- RE: Help Exploiting MQ Koen Vingerhoets (Sep 01)
- RE: Help Exploiting MQ Martin G. Nystrom (Sep 01)
- RE: Help Exploiting MQ Dimitrov, Constantin (Sep 01)
- RE: Help Exploiting MQ Aditya (Sep 01)