Great work and many thanks for providing a much saner approach to gain root access. This does however highlight that HAM is broken by design and could easily be exploited by an attacker to gain root access using your method. A short term fix might be to identify the setuid executable that is used by HAM to gain root access, remove the setuid bit and then invoke it using the now secure sudo instead. This also illustrates another of Fremantle's many bad design decisions and another reason why I think the future of the N900 lies with native Debian.