OK, sorry for being *that* kinda guy. I still have the manuals, and this speaks for itself. lol
But yeah, this can serve as proof that this exploit will be really useful even if Memory Pit is easier to use. The only real downside of this exploit is configuring a router to use the WEP protocol...