Six ways to protect against the new actively exploited Java vulnerability