diff --git a/LDP/ref/docbook/Intrusion-INTRO.sgml b/LDP/ref/docbook/Intrusion-INTRO.sgml
index f8d3cc4d..2e597b2f 100644
--- a/LDP/ref/docbook/Intrusion-INTRO.sgml
+++ b/LDP/ref/docbook/Intrusion-INTRO.sgml
@@ -134,7 +134,7 @@
Permissions
Passwords usually come with usernames as well. A good username-and-password system will enable you to set up several roles for your computers. Each role will need different types of access, will use different programs and different data.
- If an intruder guesses or finds out one person's username and password, they will have access to any programs or data that that person usually has access to. For this reason, you might like to limit what each person is allowed to access.
+ If an intruder guesses or finds out one person's username and password, they will have access to any programs or data that person usually has access to. For this reason, you might like to limit what each person is allowed to access.
Most computer systems have something in place which does this. Under most systems, it is called 'permissions'. Your computer manual or local expert can help you set it up on your computers.