Conclusion
That's about it, for now. While these attacks are more difficult, if not impossible, on modern systems there are still a number of older systems out there that are vulnerable to attacks like these. There are also a number of cases where modern systems have these protections turned off, either for a single application simply because it does things in a way that requires more leniency or system-wide due to incompetent system administration.
"Never underestimate the power of somebody with source code, a text editor, and the willingness to totally hose their system." - Rob Landley
Any feedback related to the site is appreciated - particularly if there are any errors or you feel something could be reworded to be more easily understood. Simply contact jeff@turkstra.net.
More information about the author can be found on TurkeyLand!