{section: Introduction}
 
-What follows is an exhaustive tutorial demonstrating ways which a developer can indentify resource leaks in a process.  We use a tool called the "Application Verifier" from Microsoft.  This tool allows us to see the changes in processes� resource consumption over time. In some cases, a processes' resource consumption may grow in an unbounded manner. A resource leak may be responsible for this behavior. The rest of this document is devoted to identifying these incorrect behaviors and when they may be a problem.
+What follows is an exhaustive tutorial demonstrating ways which a developer can indentify resource leaks in a process.  We use a tool called the "Application Verifier" from Microsoft.  This tool allows us to see the changes in processes' resource consumption over time. In some cases, a processes' resource consumption may grow in an unbounded manner. A resource leak may be responsible for this behavior. The rest of this document is devoted to identifying these incorrect behaviors and when they may be a problem.
 
 {section: Conclusion}