Discussion:
Q: The way and applet that can enhance network security is that the applet can only run as it is told to run. Not accessing files, read or write access, etc. Can an applet be written to be malicious to a network?
Does the core issue depend on who wrote the code?