Index: doc/theses/mike_brooks_MMath/uw-ethesis-frontpgs.tex
===================================================================
--- doc/theses/mike_brooks_MMath/uw-ethesis-frontpgs.tex	(revision 0d6fd219cc807efacb0b1dc77e0b518625bf55fc)
+++ doc/theses/mike_brooks_MMath/uw-ethesis-frontpgs.tex	(revision 4205c07430282f54da6322e346312ba528bf99c2)
@@ -132,5 +132,5 @@
 Often array is part of the programming language, while linked-list is built from (recursive) pointer types, and string from a combination of array and linked-list.
 For all three types, languages and/or their libraries supply varying degrees of high-level mechanisms for manipulating these objects at the bulk and component level, such as copying, slicing, extracting, and iterating among elements.
-Unfortunately, these three aspects of C cause 60\%--70\% of the reported software vulnerabilities involved memory errors, and 70\%-80\% of hacker attack-vectors target these types.
+Unfortunately, these three aspects of C cause 60\%--70\% of the reported software vulnerabilities involved memory errors, and 70\%--80\% of hacker attack-vectors target these types.
 Therefore, hardening these three C types goes a long way to make the majority of C programs safer.
 
