Previous Lecture Complete and continue  

  Extracting Sensitive Data Such As Passwords