Linking static applications with Statifier and Ermine
The current workaround is to temporarily disable ASLR. To do so, become a root-equivalent user, write a 0 to the virtual file in question, then output the file to see that the settings are okay:
# echo 0 > /proc/sys/kernel/randomize_va_space # cat /proc/sys/kernel/randomize_va_space 0
Now create the program again with Statifier. Unfortunately, you also need to disable ASLR on any systems on which you want to work with the statically linked version. I will leave it up to you to decide whether this compensates for the vulnerability it creates.
Statifier and the light version of Ermine will only link in dynamic libraries (Statifier will not do this for the critical NSS (Name Service Switch) and Gconv (character set conversion) libraries). However, games in particular typically include material such as images or audio files, whereas application programs tend to offload translations into numerous .mo files. All of these files need to be moved to the new computer. Ermine Pro is the only program to include platform-independent files in the statically linked program. On top of this, the most expensive program in the field can combine multiple programs to create a single statically linked binary.
Because of its many bugs, Statifier is recommended only for smaller command-line tools. Unfortunately, the alternative, Ermine, costs money – how much exactly is open to negotiation with the vendor.
Private users are probably better off putting together a complete Live system. Fedora, Ubuntu, and other distributions include tools to help you build your own system; many rescue disks and other Live systems are also available on the Internet.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems