Hacker found that original form submitted to
http://webdev.iyaclasses.com/~dent/demos/security_formsample.php
and so wrote a LOCAL form on
their computer/server that submits directly to above.
They would not actually need to build the form, but a hacking program could
generate a form submission and post it directly there. But
to give you an example of what they could do...