Please Log Off
All Lab PC's
Please remember to log off all computers
in Labs 700, 760, and 900 when you have finished using
them. If you “walk away” from the computer without
logging off, anybody can sit down after you and read
your e-mail or send e-mail messages as if they were
you. They would also have full access to any of the
files you have stored in your network H: drive.
Simply go to the Windows Start Menu and choose START
-> Log Off or START -> Shut Down ->; Restart.
Either option will safely close your account’s current
connection to the Chicago-Kent network.
to Top of Page
Top 5 ways to stop
Never respond to unsolicited email.
Spammers will use your reply, even your unsubscribe
messages, as evidence that the email address is valid.
Never buy anything advertised in spam.
Most of it is fraudulent anyway and successful sales
only encourage the practice to continue.
Never post your email address publicly
on the Web. Spammers have ways to collect and use
these email addresses.
Always opt-out of company solicitations
you do not want.
Purchase a reputable anti-spam software
package from a major brand-name software vendor.
to Top of Page
Here are a
couple of things you should do to keep your computer
1. Run SCANDISK
on your computer; you can use ScanDisk to check your
hard disk for logical and physical errors. ScanDisk
can then repair the damaged areas. Start ScanDisk
by clicking Start, pointing to Programs, pointing
to Accessories, pointing to System Tools, and then
clicking ScanDisk. Be sure to select the option for
a Thorough scan as opposed to the Standard scan. This
may take 30-60 minutes to complete so please allow
2. Run DISK DEFRAGMENTER
on your computer; you can use Disk Defragmenter to
rearrange files and unused space on your hard disk
so that programs run faster. You can also start Disk
Defragmenter by clicking Start, pointing to Programs,
pointing to Accessories, pointing to System Tools,
and then clicking Disk Defragmenter. The program may
indicate that your hard drive is not significantly
fragmented and does not need to be defragmented. It
does not hurt your computer to do this even if you
get this message. The more often you defragment your
computer, the quicker it takes on a regular basis.
run ScanDisk on your computer before you run the Disk
3. Perform DISKCLEANUP
on your computer, this will remove temporary internet
files, items in the recycle bin etc, you can use this
feature by clicking Start, pointing to Programs, pointing
to Accessories, pointing to System Tools, and then
clicking Disk Cleanup
It is recommended
that users install the service packs and security
patches provided by microsoft.
To ensure that
your system has the service packs and security updates
visit the microsoft website by opening the Internet
Explorer, click-Tools-Windows Updates. Click on the
scan for updates link.
On this page
you will find critical updates, Windows updates and
driver updates. Note
you only need to perform the Critical Updates.
Click on critical updates
which will pull information on the service packs and
patches required on your computer. Click the review
and install link and proceed with the directions.
DO NOT DOWNLOAD THE SERVICE PACKS AND PATCHES IF YOU
ARE NOT SURE.
If you need assistance
please visit the helpdesk in
word about Recent Viruses, Worms and Trojans.
McAfee is our Virus scanning application
that is used throughout Chicago-Kent. According to McAfee's
web site there are more then 62,000 virus threats that
exist and new ones are found everyday. Viruses and backdoor
Trojans can cause major disruptions and financial loss.
The Melissa, I love You, Goner, Code Red and many others
have impacted many organizations to the point that even
Microsoft had to turn off their e-mail systems until
the virus could be contained. The newer forms of viruses
(Backdoor Trojans) are even more devastating by actually
giving someone else complete control of your computer
and access to all the information stored on them.
There are things that you can do to protect
your computer. You can protect yourself by running a
full virus scan of all the files on your computer periodically.
Ensuring that you have the latest updates from the vendor.
Avoid programs from unknown sources (Internet and Email).
Never open or double-click on an attachment that is
from an unknown recipient.
The Center for Law and Computers posts
Virus Updates to your computer desktop as they are released
from the vendor or you can access them directly from
McAfeeÆs web site when connected to the internet through
the virus application. An ounce of protection will go
a long way in ensuring that your documents and computer
are virus free.
to Top of Page
the latest DAT
file as of 02/21/03 - is sdat4248
Center for Law and Computers Computer Specifications
RECOMMENDED COMPUTER SPECIFICATIONS:
Pentium IV (or Pentium III equivalent) 800 or
up MHz processor
2 PC Card/Card Bus Slots: network card (notebook
20GB or greater Hard Drive
3.5" Floppy Drive
CD-ROM Drive or DVD-ROM Drive
10/100 Ethernet Card (notebook only)
Windows 2000 PROFESSIONAL, XP PROFESSIONAL
*NOTE* Windows XP home edition will
not work with our network
Sound Card to support RealPlayer (or RealPlayer
17" monitor with .28mm dot pitch (desktop
12" Active Matrix or TFT display (notebook
REQUIRED COMPUTER SPECIFICATIONS:
Pentium III (or Pentium II equivalent) 500 or
up MHz processor
Available PC Card/Card Bus Slots: network card
10GB or up Hard Drive
3.5" Floppy Drive
10/100 Ethernet Card (notebook only)
Sound Card to support RealPlayer (or RealPlayer
14" or 15" color monitor .28mm dot pitch
If you have
a computer that nearly meets the minimum requirements
and is extremely costly to upgrade, please call
the Center for Law and Computers at (312) 906-5300,
so that we can assist you in determining the best
solution for both short and long-term needs.
A Word About Microsoft Operating
Beginning with Windows ME in calendar
year 2000, Microsoft began implementing a strategy
of tailoring certain versions of their Windows
operating systems specifically toward consumer
markets. Windows ME and certain future versions
of the Windows operating system include multimedia
and "ease of use" features that are
designed to make the use of a Windows based computer
a more engaging experience in the home.
While this may sound enticing, it
is important to realize that the "consumer"
versions of Windows are not designed to exist
in a corporate network environment like that at
Chicago-Kent. In fact, the "consumer"
version of Microsoft's latest operating system,
Windows XP Home Edition, does not include any
capability to connect to corporate networks.
So where does this leave you? At
the time of these specifications writing, the
Center for Law and Computers recommends Windows
2000 Professional or Windows XP Professional (Professional
being the KEY word here) as the best all-around
operating systems for new notebook computer purchases.
If neither is available, then Windows 98 would
be the next best choice followed by Windows ME
as a last option. For students who already own
a notebook, any edition of Windows 98 along with
Windows 2000 Professional and XP Professional
can be configured to connect to the Chicago-Kent
network. Existing Windows ME notebooks can be
configured to connect to the network through some
additional work by computer support staff. Desktop
users are encouraged to remain with the operating
system that is presently on their PC.
If you have any questions regarding
these computer specifications or anything about
computers at Chicago-Kent, please do not hesitate
to contact the Center for Law and Computers by
calling (312) 906-5300 or emailing firstname.lastname@example.org.
word about MS Windows XP
On October 25, 2001, Microsoft released
the newest version of their Windows operating system called
Windows XP. This new operating system comes in two distinct
editions: Windows XP Home Edition and Windows XP Professional.
Please be aware that while Windows XP Home Edition can
connect to the Internet, it can not in any way be made
to connect to corporate networks such as the Chicago-Kent
LAN. A computer running the Home Edition of Windows XP
will not be able to access network printers, network drives
such as H: home directories, and e-mail via Microsoft
It is for these reasons that the Center
for Law and Computers recommends that anyone purchasing
a new machine positively confirm the operating system
with their vendor. Computers that are available only with
Windows XP pre-installed should only be purchased if it
is Windows XP Professional, NOT Windows XP Home Edition.
Windows 98 and Windows 2000 Professional
continue to be fully compatible with the Chicago-Kent
As always, please feel free to contact the
CLC Help Desk if you have any questions or concerns.
and Network Accounts:
A Chicago-Kent email account is setup for
you. Your username will be your first initial and last
name, no punctuation or spaces (i.e. Jane Student = jstudent)
and your initial password will be the last six digits
of your Social Security Number, no punctuation or spaces
unnecessary files on Network
The Center for Law and Computers provides
access to the Network for Chicago-Kent students, faculty,
and staff in support of the educational mission of the
university. In recent months we have noticed an increase
in the amount of personal storage space being consumed
on our network. As we continue to maintain and scan the
network drives we are noticing numerous occurrences of
non-educational types of materials (i.e., MP3, .wav, .mov,
.avi). We understand that there are occasions when storing
these types of files on the network for educational use
As you may well be aware, the recent court
decisions potentially makes us liable if members of our
community engage in infringing activity. As a reminder
to all students, a portion of the IIT Computer Use Policy
states, "Network users must abide by the terms of
all software licensing agreements and copyright laws,
and may not make copies of or make available on the network
copyrighted material, unless permitted by a license. Network
users must not perform acts which are deliberately wasteful
of computing resources or which unfairly monopolize resources
to the exclusion of others..." The complete Computer
User Policy can be found at:
When you save and store large music, image,
video, or other types of non-educational related material
on the network it increases the time it takes for system
backups and virus scanning; the large downloads also consume
unnecessary bandwidth. Please
be considerate of your colleagues and remove or transfer
to your laptop ALL files in violation. If files
are not removed, the Center for Law and Computers is authorized
by the administration to permanently remove them for you.
We ask that you purge all unnecessary messages
and files as often as possible from your network and email
accounts to help us preserve space on the C-K server.
As a reminder, in Outlook mail, you must delete messages
from your "Deleted Messages" folder for them
to be permanently removed from the mail server. It is
also a good maintenance procedure to delete any unneeded
messages in the "Sent" folder.
To select a new password:
from your Internet browser, (i.e. Internet Explorer)
Select the option CHANGE
When prompted, enter your username, password
and desired new password when successfully completed,
you will receive the message PASSWORD SUCCESSFULLY
Your new password takes effect immediately
and will give you access to your email account and network
Password protection is one of the most important
principles of network and e-mail security. Chicago-Kent
College of Law provides access to network and electronic
mail resources to its students, faculty, and staff, in
support of the University's mission of teaching, research,
and public service. Passwords are assigned for access
to both of these resources to authenticate a user's identity,
to protect network users, and to provide security.
New passwords will be provided, and existing
passwords will be reset, only when the identity of the
requester can be clearly established.
- Under no circumstances will new or existing passwords
be revealed by telephone.
The Center for Law and Computers
staff will be pleased to handle requests made in one
of the following ways:
1. Requests may be made in person
at the Help Desk, Room 540. Photo identification
2. Requests may be faxed to Center
for Law and Computers at (312) 906- 5165. The fax
must include photo identification and signature.
If you have questions or need additional
assistance, please contact the Help Desk at (312) 906-5300
Office (Help Desk): Room 540
Technical Support Help Desk Hours
Monday-Thursday: 8:30 a.m. - 6:00 p.m.
Friday: 8:30 a.m. - 5:00 p.m.
Phone: (312) 906-5300
Fax: (312) 906-5165
Microsoft Office 2000 Professional Edition and FrontPage:
The Center for Law and Computers has MS
Office 2000 Professional Edition and FrontPage available
for purchase at a discounted educational use rate. The
disks can be purchased at the Help Desk in Room 540. Each
student is allowed to purchase only one copy
for the price of $25.50. Please bring your student or
other photo ID with you to purchase a set.
Printing on KENTNET
The Center for Law and Computers has implemented
print accounting software which allows you to:
1. Send print jobs to queue -- This feature
allows you to send print jobs to the print station at
the front of each lab where they are held in queue until
you release them. In addition, you are able to send multiple
print jobs to the queue and they are held until you release
them at the print station.
2. You are able to check the balance of
your print account -- This feature allows you to look
at the number of copies you have remaining for the term
(note: each student is allotted 400 pages per semester;
additional pages beyond the 400 are billed at $.05 per
Your 400 page limit is reset at the beginning
of each semester.
Make sure you have sent your print job to the print
station by confirming that your username is shown in
the Select Print job username dialogue box.
Double click your username with the
mouse to bring up network password entry box.
Enter your NETWORK PASSWORD. Highlight
job(s) to print and click the PRINT button on the
top left of the program window.
station will release all print jobs sent under your username.
When your print jobs are listed you have the opportunity
to delete them before actually sending them to print.
- The printer may take a few minutes to warm up if
not recently used.
You can check your page balance at
the workstation you are logged on to by double clicking
on the dollar sign icon ( $ ) on the bottom
right of your screen.
After clicking this icon you will
see a balance screen.
If the printer says toner low and
the "READY" button is not lit, push the
"GO" button so it is lit to continue to
print. E-mail helpdesk ONLY when your print job becomes
faded. You will be credited for any pages printed
light due to low toner.
If you have questions,
please email HELPDESK@kentlaw.edu
or call 906-5300.
The principle printers in the KENTNET system
are Hewlett-Packard LaserJet 8000N Printers. There is
one printer in each lab 700, 760 and 900 that is set up
as the default printer when you sign on in that lab.
Individual Student Printing Accounts:
Each student receives 400 pages of printing
per semester. Any printing past 400 pages will be charged
to your student printing account at .05 per page. You
must settle your student account with the Bursar's
Office before receiving your 400 page allotment for
the following semester. Students with outstanding balances
will have their Kentnet accounts deactivated until the
balance is paid. Graduating students with a delinquent
printing balance will not receive their diplomas
until the accounts are paid in full.
If you print work for a faculty member,
you must print out a detailed balance and have the faculty
member sign for their pages. Present the signed balance
sheet to the Help Desk in the Center for Law and Computers
(Room 540). Your print account will be credited accordingly.
Print jobs that are sent to the Document
Center printer (9th floor-library) require payment when
Please report any problems with printers
or printing to the Help Desk by Email: email@example.com
or in house phone number 6-5300.
It Is Critical to Update Your Virus
Detection Software Regularly:
As always, it is a good idea to update the
virus protection software on your personal computer periodically
to catch any new viruses lurking out there in cyber world
Since we have a volume license to McAfee Virus Scan,
each student, faculty and staff should have a copy of
this software on his/her computer. (It is free to C-K
students so...No excuse not to have it!)
The Center for Law and Computers takes a
proactive stance in trying to eradicate viruses by cleaning
them as they come through our servers, we cannot protect
each individual PC. We are asking that you also be proactive
to ensure that your PC does not become infected.
Because there are new virus outbreaks DAILY,
we want to stress the importance of having the latest
virus protection software and updated virus definition
(.DAT) files. We'd also like to remind you that regular
virus scans of all drives (weekly, if possible) are necessary
in order to detect and clean any viruses so they are not
sent to friends and/or colleagues.
Chicago-Kent is licensed for and supports
McAfee Virus Scan from Network Associates. According to
information on their web site, there are over 50,000+
viruses out there and the potential for damage is continuous.
We here at the Center for Law and Computers want to make
sure you have the best possible protection for your PC.
Please follow the manual instructions below to install
the latest virus definition updates (.DAT files) for your
Check to see that you have a recent version of the virus
scanning software on your computer.
You can do this by clicking on the small
blue and red "VShield" icon in the lower right
corner of your screen with the right mouse button. When
you do, a small menu will pop up. Select the "About"
choice in this menu by clicking on it once with the left
After clicking "About" you will get a box that
displays several numbers. There are two important numbers
that you should be concerned with. The first number is
in boldface and located next to the phrase "McAfee
Virus Scan" toward the top of the box's gray area.
This number tells you what version of the Virus Scan product
or "engine" you are running. You should be running
some version of 4.x. Any version of 3.x is too old and
should be updated to a later version, please call the
Help Desk to schedule an update. The second number you
should be concerned with in the "About" box
is the number next to the phrase "Virus definitions."
The last four digits of this number tell you the version
of the ".DAT" you are running. As an example,
the picture below is from a PC that is running version
4.0.3 of the Virus Scan product (engine) and version 4115
of the virus definitions (.DAT files).
SECOND: Install the
latest virus definition updates on your computer.
These procedures may
force a reboot of your computer. In order to avoid loss
of data, close all programs except Outlook before completing
any of the following steps.
While signed on to the C-K network, run
the update with the following three steps:
Find the icon called "virus
updates" on your desktop
- Double click the icon a box will appear as seen
- Click on "Run" in the Start Menu
- Click on the Windows "Start Menu" in the
lower left hand side of your screen.
- Click on "Run" in the Start Menu.
- In the space next to the word "Open:"
enter the following text,
(that's a lower case "l" n k
not an upper case "I" n k)
- While signed on to the C-K network, run the update
with the following three steps:
- Double Click on the folder named VirusUpdates located
on your Desktop.
- Double Click on the file sdatXXXX.exe. Where XXXX
is the number of the dat file.
Once the "SuperDat" update program
starts, click on "Next."
You may be prompted to restart your computer.
Run a virus scan on your PC.
- Click on the "Start Menu" button.
- Click on "Programs.
- Click on "Network Associates" or "
McAfee Virus Scan."
- Drop down to "Virus Scan.
- A window will open that gives you options to run
a virus scan on your drives.
- Click on "Where & What" tab.
- Make sure "Include subfolders" box is
checked and click the radio button next to "All
- Click on "Action" tab.
- Click on down arrow and select "Clean infected
- Click "Scan now."
This will begin the scanning process. It
will check all the files on the drive you designated.
It may take a few minutes to several hours depending on
the speed of your computer and the number of files you
have. Your patience will pay off, remember you will be
preventing problems in the future.
Note: The above procedures can be used in
the future to update your .DAT files.
A great source for additional information
about viruses is the Network Associates site:
As always, if you have questions or need
additional assistance, please feel free to contact the
help desk at (312) 906-5300.
The Email stations located throughout the
building are intended to allow students convenient and
quick access to Email and the Record. Please be considerate
to your fellow students when using these stations. If
you want to compose many or long messages, or browse the
Internet at length, please use one of the 3 computer labs
in the library. Thank you for your cooperation.
Lab 900 is on the ninth floor of the library
at the west end of the building and has 12 computers.
Turn left when you enter the library through the ninth
floor entrance. The printer for the ninth floor lab is
in Room 986, in the corner of the area.
Lab 700, the large, glass-walled room on
the seventh floor of the library, is the largest lab,
with 30 computers. This lab is sometimes used for larger
research classes and it is always used for exams. LEXIS-NEXIS
and WESTLAW representatives conduct office hours in Lab
700. The schedule of their office hours will be posted
weekly in the Record. They can help you with online research
Lab 760, also on the seventh floor of the
library, is equipped with 20 computers. It is often used
for research classes.
From time to time, the law school schedules
classes or exams in the labs. When this occurs, a sign
will be posted outside the door of the lab. Please be
considerate and use one of the other labs during these
If you have any problems getting onto KENTNET
from any computer, call the CLC at extension 6-5300 from
any black house phone located between the public telephones
on every floor.
and Proper Shutdown of Lab Computers
In order to secure your login name and password,
it is important to log out completely. Prior to leaving
any of the computer labs, logout and close all programs
to do this---click START (located on tool bar in the bottom
left corner of the screen) Logoff . A box will appear
confirming your logoff. If the system is successfully,
the next individual who sits at that lab computer will
be prompted to enter his or her own login name and password.