RE: Help Exploiting MQ

From: Dimitrov, Constantin (cdimitrov@micros.com)
Date: Wed Sep 01 2004 - 09:42:06 EDT


Yes, but MQ Series is IBM product and MSMQ is MS product.
It can be used to implement solutions to both asynchronous and synchronous
scenarios requiring high performance. The following list shows several
places where Message Queuing can be used.

-Mission-critical financial services: for example, electronic commerce.

-Embedded and hand-held applications: for example, underlying communications
to and from embedded devices that route baggage through airports by means of
an automatic baggage system.

-Outside sales: for example, sales automation applications for traveling
sales representatives.

-Workflow: Message Queuing makes it easy to create a workflow that updates
each system. A typical design pattern is to implement an agent to interact
with each system. Using a workflow-agent architecture also minimizes the
impact of changes in one system on the other systems. With Message Queuing,
the loose coupling between systems makes upgrading individual systems
simpler.

It's famous to be the most stable part of Distributed Network Architecture.

-----Original Message-----
From: Aditya [mailto:aditya.deshmukh@online.gateway.technolabs.net]
Sent: Wednesday, September 01, 2004 8:07 AM
To: rick@livingstoncadservice.com; tommy@providesecurity.com
Cc: pen-test@securityfocus.com; webappsec@securityfocus.com;
full-disclosure-admin@lists.netsys.com
Subject: RE: Help Exploiting MQ

ALD > What is MQ?

MQ Series of middle ware is it that what u are referring ?

-aditya

________________________________________________________________________
Delivered using the Free Personal Edition of Mailtraq (www.mailtraq.com)

------------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Check out our Advanced Hacking course,
learn to write exploits and attack security infrastructure. Attend a course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.

http://www.infosecinstitute.com/courses/ethical_hacking_training.html
-------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:02 EDT