Fig 7.29  Gaining unauthorized access with SQL piggybacking