• I think this article could also be listed as "how to compromise the databaseserver, when you have compromised the webserver" 😉