- Subscription name starts with XMS: instead of JMS: when using IBM.XMS unmanaged client for .NET 4.7.2 – stackoverflow.com
- What happens when there are more than one @JmsListener in an application? (in terms of concurrency) – stackoverflow.com
- How to display local queues where curdepth reached its maxdepth in ibm mq – stackoverflow.com
- MQHeaderList size is 0, but reading a specific MQRFH2 works – stackoverflow.com
- can multiple producers send message to Queue at the same time from different java applications – stackoverflow.com
Follow me on TwitterMy Tweets
Category Archives: Security
Every now and then we hear that a cipher algorithm has fallen to a new cracking technique. This cascades into a new round of deprecating any ciphersuites that rely on the newly cracked algorithms. Over the years we’ve moved from … Continue reading
In case you hadn’t noticed yet, IBM has quietly changed the format of the stash file so that the various unstash programs no longer work. In this post I’ll discuss some of the security implications of that change and, since … Continue reading
As of v8.0, MQ now can natively validate user IDs by checking the password against the Operating System or LDAP. Checking against Pluggable Authentication Module (PAM) was added in v22.214.171.124. Prior to v8.0 it was necessary to use a channel … Continue reading
This is a quick note to tell folks a bit about my virtual absence of late, current events and plans for what’s coming up. Whatever happened to… I’m not exactly a candidate for VH1’s Where Are They Now but I … Continue reading
My sessions and downloadable scripts from MQTC 2.0.15 are now up on the Links page.
Outstanding RFEs and feature requests have been a hot topic on the MQ list server of late. Looking at the RFEs that have been posted and discussed, there’s a general architectural requirement many of them seem to have in common: … Continue reading
A viewer of the Zero to Hello World video recently challenged me to do a similar video for SSL. Challenge accepted!
Over the years I have often been asked for security templates and other canned assets to help make MQ security planning, implementation, and operation easier. These often become the source material for conference presentations, articles and videos. Some of these … Continue reading