First of all, the article does not condemn the PPTP: "They did not find flaws in PPTP, only in Microsoft's implementation of it". I do not know if the problems they report apply to the e-smith/sme implementation of PPTP.
Secondly, MS has made changes in its PPTP implementation (and how it handles pw authentication in general) since that FAQ was published. The same people did an analysis of MS new implementation (check out
www.counterpane.com/pptpv2-paper.html) and they report significant improvements.
The basic problem with PPTP is that it relies on user passwords for authentication. If the pw is easy to crack, the VPN is easy to crack (and this problem is not limited to PPTP). PPTP is definitely not the best/most secure way of remotely accessing your server. However, its relatively easy to implement and is more secure than allowing public access to your services.
Noah