Abstract: A computer-implemented method for generating a secured software application, involves receiving a source software application which has instructions for processing by a process virtual machine. The method involves generating a secured software application comprising a first set of bytecode instructions derived from the source software application, a second set of the bytecode instructions derived from the source software application, and a security component. The first set of bytecode instructions are for processing on a first process virtual machine, in a first process, on a target processing system. The security component comprises instructions which, when executed on the target processing system, will cause the target processing system to provide a second process virtual machine in a second process where it will process instructions from the second set of bytecode instructions.
Abstract: A method of constructing a gallery in which a trench is excavated and the gallery is either constructed in or lowered into the excavation. The gallery is braced internally to withstand external loads applied. Thereafter a controlled backfill is applied around and over the gallery in such manner that with removal of the bracing the backfill acts effectively to form an arch above the gallery which together with the gallery is sufficient to support the overlying covering material up to the ground surface.