Table of contents: Securing Embedded Passwords