Previous Lecture Complete and continue  

  The Hacker's Methodology (...a malicious mindset)