Minimising the Threat from Java-based Intrusions