Source is @... http://www.xmailserver.org/gmm.htmlThe Guarded Memory Move tool gets handy when you have to study buffer overflows and you need to catch them together with a "good" stack image.
The GMM library uses the LD_PRELOAD capability and offers two services to the user. First of all, it avoids buffer overflow to allow the attacker to execute shell-code on your machine. Second, in case where an exploit is detected, the stack content is saved and a segmentation fault is triggered.
These package has not been adopted yet by ("slackonly" or)...