--- a/INSTRUCTIONS
+++ b/INSTRUCTIONS
@@ -1,6 +1,6 @@
 Relying Party Security Technology for Internet Routing
 Installation and Usage Manual
-Version 0.2
+Version 0.3
 
 ===============================================================================
 Table of Contents
@@ -264,11 +264,11 @@
 2.2.1 Unpack the Source Code
 
 The RPKI software will have been delivered to you as a gzip-ed tarball
-named rpstir-0.2.tar.gz.  Extract the file using:
-
-    tar xvzpf rpstir-0.2.tar.gz
+named rpstir-0.3.tar.gz.  Extract the file using:
+
+    tar xvzpf rpstir-0.3.tar.gz
     
-This will create a directory named rpstir-0.2 which will contain
+This will create a directory named rpstir-0.3 which will contain
 various subdirectories.
 
 2.2.2 Configure
@@ -407,7 +407,7 @@
 
 Except for the query client, all RPKI processes should run as the RPKI
 user at regular intervals using cron jobs.  NOTE: While cron job
-configuration will be used for final deployment, this release (0.2)
+configuration will be used for final deployment, this release (0.3)
 does not include suggested crontab entries.  It is assumed that for
 trial purposes, manual execution gives the user/debugger maximum
 control.