the pointer rules are interesting, they make also difficult use after free exploits I think, which is nice:)
the pointer rules are interesting, they make also difficult use after free exploits I think, which is nice:)