Fig 7.29
Gaining unauthorized access with SQL piggybacking