Recent Posts
- Blog Move
- JNLP Application Security Assessment – Part 4 : Dynamic analysis
- JNLP Application Security Assessment – Part 3 : Application decomposition / Static analysis
- JNLP Application Security Assessment – Part 2 : Runtime Mapping of a JNLP Application
- JNLP Application Security Assessment – Part 1 : Analysis of the JNLP file