Home IT Securing Legacy Applications Against Modern Threats