Previous Lecture Complete and continue  

  1.9 Email Harvesting, DNS Harvesting, and Phishing Techniques