Linux Kernel Exploits

I am by no means endorsing these kind of things, but it is interesting (and important) to understand how these things are done.
Have any comments? Questions? Drop me a line!

Adventures in Computing / tom@mmto.org