Well I signed up at the site after I seen they posted on of my howtos which I am thankful for. It was the one on the grsecurity patched kernel. I think it should help quite a few people as there are so many local root exploits out now and most distro's security and dev teams are doing nothing about it. I know I went in centos irc and they was like, "well the 2.6.9-34.0.2.EL kernel is patched against the prctl exploit but not the /proc exploit" They advised me to enable selinux but I was afraid it would interfere with my control panel software and scripts i have running. I asked when they would have the new kernel they said they were working on it. that was about a week ago now.
But as I found out there is no centos dev team, at least not that I know of. All they do is rip redhat's packages and that's is. Which isn't such a bad thing as you are getting an enterprise os for free.
I have tried all local root exploits lately against the latest grsecurity kernel and none worked. Which I do have /proc mounted as nosuid as a precaution. Next is to learn how to use the acl and other features of grsecurity.