- DB2+MQ+docker; enable_MQFunctions - Error while connecting to database – stackoverflow.com
- How to connect to mq queue with python and bindings file? – stackoverflow.com
- Even Load Distribution of JMS Queue listeners not happening – stackoverflow.com
- DB2+MQ, cannot create db2mq.tmp: Permission denied... but /tmp has my user – stackoverflow.com
- ActiveMQ 5.x and DurableConsumer – stackoverflow.com
Follow me on TwitterMy Tweets
Category Archives: Security
Every now and then we hear that a cipher algorithm has fallen to a new cracking technique. This cascades into a new round of deprecating any ciphersuites that rely on the newly cracked algorithms. Over the years we’ve moved from … Continue reading
In case you hadn’t noticed yet, IBM has quietly changed the format of the stash file so that the various unstash programs no longer work. In this post I’ll discuss some of the security implications of that change and, since … Continue reading
As of v8.0, MQ now can natively validate user IDs by checking the password against the Operating System or LDAP. Checking against Pluggable Authentication Module (PAM) was added in v22.214.171.124. Prior to v8.0 it was necessary to use a channel … Continue reading
This is a quick note to tell folks a bit about my virtual absence of late, current events and plans for what’s coming up. Whatever happened to… I’m not exactly a candidate for VH1’s Where Are They Now but I … Continue reading
My sessions and downloadable scripts from MQTC 2.0.15 are now up on the Links page.
Outstanding RFEs and feature requests have been a hot topic on the MQ list server of late. Looking at the RFEs that have been posted and discussed, there’s a general architectural requirement many of them seem to have in common: … Continue reading
A viewer of the Zero to Hello World video recently challenged me to do a similar video for SSL. Challenge accepted!
Over the years I have often been asked for security templates and other canned assets to help make MQ security planning, implementation, and operation easier. These often become the source material for conference presentations, articles and videos. Some of these … Continue reading