Linux Kernel Exploits

I am by no means endorsing these kind of things, but it is interesting (and important) to understand how these things are done.
Have any comments? Questions? Drop me a line!

Adventures in Computing / [email protected]