Those of you interested in security, or writing web applications, may be interested in this article, which shows how SQL injection attacks work.