Blog Move

Hello,

I case you missed it this blog has moved to http://www.pigadas.com .

Best regards,

./Z

JNLP Application Security Assessment – Part 4 : Dynamic analysis

JNLP Application Security Assessment – Part 3 : Application decomposition / Static analysis

JNLP Application Security Assessment – Part 2 : Runtime Mapping of a JNLP Application

JNLP Application Security Assessment – Part 1 : Analysis of the JNLP file

JNLP Application Security Assessment – Setting the scene

LUHN-10 Error Detection

The post has moved. You can find the complete post in:

http://www.pigadas.com/blog/2011/09/19/luhn-10-error-detection/

Error-Based SQL Injection in Oracle 11g

The post has moved. You can find the complete post in:

http://www.pigadas.com/blog/2011/07/24/error-based-sql-injection-in-oracle-11g/

Cloud Computing Security as its never seen before..

Application Behavioural Changes

The post has moved. You can find the complete post in:

http://www.pigadas.com/blog/2009/09/27/application-behavioural-changes/

Follow

Get every new post delivered to your Inbox.