diff --git a/README.md b/README.md
index 82b7404..5e08ae2 100644
--- a/README.md
+++ b/README.md
@@ -49,14 +49,14 @@ Got tricks? Send them to root@thc.org or submit a pull request.
1. [Shred files without *shred*](#shsfwo-anchor)
1. [Restore the date of a file](#shrdf-anchor)
1. [Clean logfile](#shcl-anchor)
- 1. [Hide files from a User without root priviledges](#shhu-anchor)
+ 1. [Hide files from a User without root privileges](#shhu-anchor)
8. [Crypto](#cr-anchor)
1. [Generate quick random Password](#crgrp-anchor)
1. [Linux transportable encrypted filesystems](#crltefs-anchor)
1. [Encrypting a file](#cref-anchor)
9. [Miscellaneous](#misc-anchor)
1. [Sniff a user's SSH session](#sss-anchor)
- 1. [Sniff a user's SSH session without root priviledges](#ssswor-anchor)
+ 1. [Sniff a user's SSH session without root privileges](#ssswor-anchor)
1. [How to survive high latency connections](#hlc-anchor)
@@ -522,7 +522,7 @@ This will remove any sign of us from the log file:
```
-**7.v. Hide files from that User without root priviledges**
+**7.v. Hide files from that User without root privileges**
Our favorite working directory is */dev/shm/*. This location is volatile memory and will be lost on reboot. NO LOGZ == NO CRIME.
@@ -612,7 +612,7 @@ $ strace -e trace=read -p 2>&1 | while read x; do echo "$x" | grep '^read.
Dirty way to monitor a user who is using *ssh* to connect to another host from a computer that you control.
-**9.ii. Sniff a user's SSH session without root priviledges**
+**9.ii. Sniff a user's SSH session without root privileges**
Even dirtier way in case */proc/sys/kernel/yama/ptrace_scope* is set to 1 (strace will fail on already running SSH clients unless uid=0)