Skip to main content

Posts

Showing posts from July, 2011

WebSphere(R) MQ File Transfer Edition V7.0 - File Transfer Demo - Middleware News

WebSphere(R) MQ File Transfer Edition V7.0 - File Transfer Demo - Middleware News

Debugging XC130003 FDCs with MQS_ACTION_ON_EXCEPTION - Middleware News

Debugging XC130003 FDCs with MQS_ACTION_ON_EXCEPTION - Middleware News Problem(Abstract) You have an application that fails with an FDC from the xehExceptionHandler component, this happens because it received a signal like SIGBUS or SIGSEGV. You want to know how to find the cause of the failure with the MQS_ACTION_ON_EXCEPTION environment variable. Cause The MQ xehExceptionHandler function catches synchronous terminating signals such as SIGBUS (bus error), SIGSEGV (segmentation fault), SIGILL (illegal instruction) and SIGFPE (floating point error). These signals indicate a serious fault, such as dereferencing a NULL pointer, which needs to be investigated by the program developer. Resolving the problem The WebSphere MQ Application Programming Guide describes how WebSphere MQ handles signals on UNIX systems. The MQS_ACTION_ON_EXCEPTION environment variable controls what the MQ signal handler will do when it is called. MQS_ACTION_ON_EXCEPTION must be assigned one of the follow

Adding SSL certificates to a mixed z/OS and Unix queue manager environment - Middleware News

Adding SSL certificates to a mixed z/OS and Unix queue manager environment - Middleware News 1. Security Considerations IBM advises customers who are using SSL, that the most secure way to do this is to use recognized Certification Authorities to sign their certificates. Ensuring secure transfer of information is the main purpose of SSL. This integrity must be properly observed when setting up SSL. You should always be certain who has signed each of your SSL certificates, who has had and who continues to have access to them. The first secure way to generate certificates is to generate a certificate request, on each system or machine that uses SSL. This request has to be signed by an external Certification Authority before it can be used. Getting certificate requests signed by a CA is secure, because during the signing process at no point do any files contain the certificate's Private Keys. This principle is vital to SSL security. Signing certificates in this way is covered

adsrerrapop