You people should consider the security background as well. Some info (pro and con as well :)): http://blog.cr0.org/2009/06/bypassing-linux-null-pointer.html
You people should consider the security background as well. Some info (pro and con as well :)): http:// blog.cr0. org/2009/ 06/bypassing- linux-null- pointer. html