Many professors offer students the option to
take their exams on a computer instead of handwriting the
exam. Students tend to prefer this method because they can
type faster than handwrite and also have access to many of
the word processing tools available on a computer.
Chicago-Kent requires special testing software called SofTest,
which students use to take their exams. Essentially, it is
a rudimentary word processor with special features to ensure
stability, security and ample backups during the final exam.
If you are taking your final on your own notebook or if you
want to have the program on your own computer at home to familiarize
yourself with its features, then you need to install the SofTest
program to your computer. You may not take your final in any
other program. More information about installation will be
available on the CLC Record page and at the Help Desk a couple
weeks prior to exams, so watch for these notices.
Chicago-Kent College of Law uses a special program,
SofTest, for taking exams on computers. The advantage of using
the SofTest program is that it increases the stability, security,
and reliability of the exam taking process. Since adopting
SofTest and its predecessor programs, we have experienced
very few problems with lost exams or corrupted exam files.
If you are taking an exam on computer, you will
write your exam using the word processing program built into
SofTest. If you are taking the exam on your laptop, please
note that you must not only download and install the SofTest
program, but must also bring certain necessary hardware components
to the exam.
Provided below is some important information
about downloading and installing the software. The process
is somewhat time-consuming, so please do not wait
until the last minute. If you have any problems or
questions, contact the Help Desk (Room 540; e-mail: HELPDESK;
Please note that you MUST come to the exam
with the SofTest program properly installed and configured.
This includes fully completing the ";registration and qualification";
process on ExamSoft's web site. Additionally, you should bring
the following hardware components with you:
(1) a power cord
(2) a network card
(3) a network cable
(4) a floppy disk drive
If you do not have the software properly installed, or are
missing any necessary equipment, you will be required to hand
write your exam.
Important Information about
Downloading and Installing SofTest:
* In order to guarantee that SofTest will function
properly on your computer, ExamSoft has implemented a software
registration and qualification procedure as part of the SofTest
download. YOU MUST COMPLETE
THE ENTIRE REGISTRATION/ QUALIFICATION PROCESS OR THE SOFTWARE
WILL NOT FUNCTION ON EXAM DAY! You have not
completed the process until you see “Registration
in the program’s first screen. Please read on for details.
* You should remove any prior versions of SofTest
or other ExamSoft software from your computer before trying
to install the new version. To do this, click on the Windows
“Start” button -> “Settings” -> “Control
Panel” ->"Add/Remove Programs," find “SofTest”
and then follow the directions to uninstall it. Reboot your
computer before proceeding after you perform this task.
* The process for obtaining and installing SofTest
requires a number of steps to be performed online at ExamSoft's
web site located at http://www.examsoft.com/chicagokentlaw.
We recommend that you download and print out the instructions
for this procedure as well as ExamSoft's list of frequently
asked questions (FAQ's) at http://www.examsoft.com/faq/faq.htm
before you begin.
* To download the program, you will be required to provide
a "Student ID."
In the “Student ID” field, please enter the five-digit
exam number previously e-mailed to you by
the Registrar’s Office. This will be your Student ID number
throughout the exams on computer testing process.
* Due to the requirement of accessing shared
network drives, Windows XP
Home Edition will not function for taking an exam on your
laptop at Chicago-Kent.
* Due to the above mentioned permissions requirements,
you can not borrow a laptop from a fellow student to take
You will receive a final registration
confirmation by email containing your student
and registration number if
you completed the registration process successfully. If you
do not receive the confirmation email, please stop by room
540 or call the Help Desk (312) 906-5300 for further assistance.
Although the program is simple to use, please
spend a few minutes reviewing the SofTest tutorial materials
that are located on the network. The tutorials are located
at: F:\SpringExams\Tutorial\tutorial.exe. Just double click
the file to begin the tutorials. You may also use SofTest
to run a practice exam from any lab computer during the exam
period (go to Start, Programs, SofTest; then click on the
“Practice” button on the lower right of the screen). Just
as on exam day, you will have to log into the Lab PC’s as
“labexam” in order to take the practice test. Please contact
the CLC Help Desk for the password.
The Center for Law and Computers will be conducting
maintenance on all computer lab PC’s Wednesday, May 7th through
Friday, May 9th. The work being done is necessary to make
certain that all Lab PC’s have the proper software and configurations
necessary for final exams. CLC staff members will make all
reasonable efforts to ensure that only one computer lab is
closed for maintenance at any given time.
computer for Exams-General Computer Maintenance
Here are a couple
of things you should do to keep your computer maintained.
1. Run SCANDISK on
your computer; you can use ScanDisk to check your
hard disk for logical and physical errors. ScanDisk can
then repair the damaged areas. Start ScanDisk by clicking
Start, pointing to Programs, pointing to Accessories, pointing
to System Tools, and then clicking ScanDisk. Be sure to
select the option for a Thorough scan as opposed to the
Standard scan. This may take 30-60 minutes to complete so
please allow appropriate time.
For XP users
open My Computer-> Right Click on the C: drive ->Click properties
->Click on the Tools tab, under Error-checking->Click
Check now ->Check both the Check
disk options and then click Start.
2. Run DISK DEFRAGMENTER
on your computer; you can use Disk Defragmenter
to rearrange files and unused space on your hard disk so
that programs run faster. You can also start Disk Defragmenter
by clicking Start, pointing to Programs, pointing to Accessories,
pointing to System Tools, and then clicking Disk Defragmenter.
The program may indicate that your hard drive is not significantly
fragmented and does not need to be defragmented. It does
not hurt your computer to do this even if you get this message.
The more often you defragment your computer, the quicker
it takes on a regular basis. NOTE:
ALWAYS run ScanDisk on your computer
before you run the Disk Defragmenter program.
3. Perform DISK
CLEANUP on your computer; this will remove
temporary internet files, items in the recycle bin etc,
you can use this feature by clicking Start, pointing to
Programs, pointing to Accessories, pointing to System Tools,
and then clicking Disk Cleanup
4. Install Microsoft Windows and Office
Updates and Service Packs - It is recommended that
all users install the service packs and security patches
provided by Microsoft.
To ensure that your system has the service
packs and security updates visit the Microsoft website by
opening the Internet Explorer, click Tools then Windows
Updates. Click on the scan
for updates link.
On this page you will find “Critical updates,” “Windows
updates,” and “Driver updates.” Click on “Critical
updates” which will pull information on
the service packs and patches required on your computer.
Click the review and install
link and proceed with the directions.
It is recommended that you only perform the Critical Updates.
not download the Windows and Drivers updates, service packs
and patches if you are not sure what they will do to your
If you need assistance please visit the helpdesk
in room 540, email HELPDESK@kentlaw.edu, or call (312) 906-5300.
truth about downloading and sharing music files
On April 3, 2003, Rensselaer students Aaron
Sherman and Jesse Jordan, Michigan Technological student Joseph
Nievelt, and Princeton student Daniel Peng had a law suit
filed against them. What did they do? Something as simple
as downloading and sharing music files. Now the Recording
Industry Association of America (RIAA) is seeking damages
of $150,000 for each song file the defendants have on their
Web site. Each student operated "Napsterlike systems"
that made music files available to people on campus wide computer
networks. Be cognizant and knowledgeable before this happens
to you---downloading and sharing music and/or other
types of copyrighted media files is illegal.
To learn more about this topic review the cases and terms
Terms: Copyright infringement, Digital
Millennium Copyright Act, Intellectual Property Rights,
The Berne Convention for the Protection of Literary and
Artistic Works, Trade Related Aspects of Intellectual Property
Rights (The TRIPS Agreement).
o Recording Industry Association of America, v.
Daniel Peng., Civil No. 03-1441 (SRC), filed Apr.
3, 2003. To see the complete document visit this website:
o Profile Publishing and Management Corp. APS v.
Musicmaker.com, Inc., 242 F.Supp.2d 363, S.D.N.Y.
Jan 23, 2003.
o Recording Industry Association of America, v.
Verizon Internet Services, No. CIV.A.02-MS 0323(JDB).,
Jan. 21, 2003.
o A&M Records, Inc. v. Napster, Inc.,
239 F.3d 1004; 2001 Copr.L.Dec. P 28, 200; 57 U.S.P.Q.2d
1729; 1 Cal. Daily Op. Serv. 1255; 2001 Daily Journal D.A.R.,
1611; 9th Cir.(Cal.), Feb 12, 2001.
o Fonovisa v. Napster, Inc., 2002 WL
398676; N.D.Cal., Jan 28, 2002.
o Aimster Copyright Litigation, 2002
WL 31006142; 2002 Copr.L.Dec. P 28, 500; N.D.Ill., Sep 04,
property rights and Chicago-Kent's reminder on ethical actions
The computer center would like to remind you
that any unethical action on your part could be detrimental
to your law school career. Please review the following guidelines
to make sure you understand Chicago-Kent’s stance on the issues
of file sharing and using University equipment for non-academic
Chicago-Kent Student Handbook - http://www.kentlaw.edu/depts/acadadm/handbook.html#II
Section XIX. Code of Conduct, Article II, Prohibited
Conduct, §2-2 Nonacademic Misconduct, items (j) and (k) state:
“(j) Violating published university regulations,
including regulations relating to entry and use of IIT facilities
(see, for example, IIT Bulletins, the Chicago-Kent Bulletin
and the Chicago-Kent Student Handbook, etc.)”
“(k) Violating federal, state, or municipal
laws on university premises (or in university residence halls)
in a way that adversely affects the functioning of the university”
IIT Computer Use Policy -
“Network users must not deliberately perform
an act which will disrupt the normal operation of computers,
terminals, peripherals, or networks. This includes, but is
not limited to, tampering with components of a local area
network (LAN) or the high-speed backbone network, otherwise
blocking communication lines, or interfering with the operational
readiness of a computer.“
“Network users must not run or install on any
of IIT's computer systems, or give to another, a program which
is intended to or likely to result in the eventual damage
of a file or computer system and/or reproduction of itself.
This includes, but is not limited to, the classes of programs
known as computer viruses, bots, Trojan horses, and worms.”
IIT Definition of Unauthorized Use
“Unauthorized use is an activity that adversely
affects computer or network performance and/or is not recognized
as being related to IIT's educational mission. It can even
involve using IIT's system to break the law. Unauthorized
use includes, but is not limited to port scanning, IP spoofing,
network analysis, monitoring the network without permission,
hacking into IIT servers and other off-campus servers, running
traffic-generating applications that generate unnecessary
network broadcast storms or drive large amounts of traffic
to your computer and using illegal or copyrighted software
images, applications, data, and music.”
Please Log Off
All Lab PC's
Please remember to log off all computers
in Labs 700, 760, and 900 when you have finished using them.
If you “walk away” from the computer without logging off,
anybody can sit down after you and read your e-mail or send
e-mail messages as if they were you. They would also have
full access to any of the files you have stored in your network
Simply go to the Windows Start Menu and choose START
-> Log Off or START -> Shut Down ->Restart. Either
option will safely close your account’s current connection
to the Chicago-Kent network.
to Top of Page
Standard monthly network maintenance
The Center for Law and Computers will conduct regular
monthly maintenance windows on the first Tuesday of every
month (5a.m. - 7a.m. in the morning) for "Patch and\or
Update" management on systems that need to be rebooted.
The first scheduled monthly maintenance will occur next
Tuesday, March 4th, from 5 a.m. to 7a.m.
Remember too that there may be "emergency" times
when manufacturers release "critical" update patches
that need to be installed immediately. The CLC will make
every attempt to send out an announcement in advance when
the "critical" updates need to be installed and
systems rebooted (however, we cannot always guarantee advance
notice since certain patches/updates need to be applied
ASAP before a breach is made).
All network services including Internet access, email,
webmail, network drives, and network printing will be down
during the above scheduled time.
Maintenance will be conducted on the following days:
Tuesday, May 06, 2003
Tuesday, June 03, 2003
Tuesday, July 01, 2003
Tuesday, August 05, 2003
Tuesday, September 02, 2003
Tuesday, October 07, 2003
Tuesday, November 04, 2003
Tuesday, December 02, 2003
We apologize in advance for any inconvenience this may
to Top of Page
word about Recent Viruses, Worms and Trojans.
McAfee is our Virus scanning application that
is used throughout Chicago-Kent. According to McAfee's web
site there are more then 62,000 virus threats that exist
and new ones are found everyday. Viruses and backdoor Trojans
can cause major disruptions and financial loss. The Melissa,
I love You, Goner, Code Red and many others have impacted
many organizations to the point that even Microsoft had
to turn off their e-mail systems until the virus could be
contained. The newer forms of viruses (Backdoor Trojans)
are even more devastating by actually giving someone else
complete control of your computer and access to all the
information stored on them.
There are things that you can do to protect
your computer. You can protect yourself by running a full
virus scan of all the files on your computer periodically.
Ensuring that you have the latest updates from the vendor.
Avoid programs from unknown sources (Internet and Email).
Never open or double-click on an attachment that is from
an unknown recipient.
The Center for Law and Computers posts Virus
Updates to your computer desktop as they are released from
the vendor or you can access them directly from McAfeeĆs
web site when connected to the internet through the virus
application. An ounce of protection will go a long way in
ensuring that your documents and computer are virus free.
to Top of Page
the latest DAT file
as of 05/12/03 - is sdat4261
Center for Law and Computers Computer Specifications
RECOMMENDED COMPUTER SPECIFICATIONS:
Pentium IV (or Pentium III equivalent) 800 or up MHz
2 PC Card/Card Bus Slots: network card (notebook only)
20GB or greater Hard Drive
3.5" Floppy Drive
CD-ROM Drive or DVD-ROM Drive
10/100 Ethernet Card (notebook only)
Windows 2000 PROFESSIONAL, XP PROFESSIONAL
*NOTE* Windows XP home edition will
not work with our network
Sound Card to support RealPlayer (or RealPlayer equivalent)
17" monitor with .28mm dot pitch (desktop only)
12" Active Matrix or TFT display (notebook only)
Pentium III (or Pentium II equivalent) 500 or up MHz
Available PC Card/Card Bus Slots: network card (notebook
10GB or up Hard Drive
3.5" Floppy Drive
10/100 Ethernet Card (notebook only)
Sound Card to support RealPlayer (or RealPlayer equivalent)
14" or 15" color monitor .28mm dot pitch
If you have a
computer that nearly meets the minimum requirements
and is extremely costly to upgrade, please call the
Center for Law and Computers at (312) 906-5300, so
that we can assist you in determining the best solution
for both short and long-term needs.
A Word About Microsoft Operating
Beginning with Windows ME in calendar
year 2000, Microsoft began implementing a strategy
of tailoring certain versions of their Windows operating
systems specifically toward consumer markets. Windows
ME and certain future versions of the Windows operating
system include multimedia and "ease of use"
features that are designed to make the use of a Windows
based computer a more engaging experience in the home.
While this may sound enticing, it is
important to realize that the "consumer"
versions of Windows are not designed to exist in a
corporate network environment like that at Chicago-Kent.
In fact, the "consumer" version of Microsoft's
latest operating system, Windows XP Home Edition,
does not include any capability to connect to corporate
So where does this leave you? At the
time of these specifications writing, the Center for
Law and Computers recommends Windows 2000 Professional
or Windows XP Professional (Professional being the
KEY word here) as the best all-around operating systems
for new notebook computer purchases. If neither is
available, then Windows 98 would be the next best
choice followed by Windows ME as a last option. For
students who already own a notebook, any edition of
Windows 98 along with Windows 2000 Professional and
XP Professional can be configured to connect to the
Chicago-Kent network. Existing Windows ME notebooks
can be configured to connect to the network through
some additional work by computer support staff. Desktop
users are encouraged to remain with the operating
system that is presently on their PC.
word about MS Windows XP
On October 25, 2001, Microsoft released the
newest version of their Windows operating system called Windows
XP. This new operating system comes in two distinct editions:
Windows XP Home Edition and Windows XP Professional. Please
be aware that while Windows XP Home Edition can connect to
the Internet, it can not in any way be made to connect to
corporate networks such as the Chicago-Kent LAN. A computer
running the Home Edition of Windows XP will not be able to
access network printers, network drives such as H: home directories,
and e-mail via Microsoft Outlook.
It is for these reasons that the Center for
Law and Computers recommends that anyone purchasing a new
machine positively confirm the operating system with their
vendor. Computers that are available only with Windows XP
pre-installed should only be purchased if it is Windows XP
Professional, NOT Windows XP Home Edition.
Windows 98 and Windows 2000 Professional continue
to be fully compatible with the Chicago-Kent network.
As always, please feel free to contact the CLC
Help Desk if you have any questions or concerns.
A Chicago-Kent email account is setup for you.
Your username will be your first initial and last name, no
punctuation or spaces (i.e. Jane Student = jstudent) and your
initial password will be the last six digits of your Social
Security Number, no punctuation or spaces (i.e. 999999).
unnecessary files on Network
The Center for Law and Computers provides access
to the Network for Chicago-Kent students, faculty, and staff
in support of the educational mission of the university. In
recent months we have noticed an increase in the amount of
personal storage space being consumed on our network. As we
continue to maintain and scan the network drives we are noticing
numerous occurrences of non-educational types of materials
(i.e., MP3, .wav, .mov, .avi). We understand that there are
occasions when storing these types of files on the network
for educational use is legitimate.
As you may well be aware, the recent court decisions
potentially makes us liable if members of our community engage
in infringing activity. As a reminder to all students, a portion
of the IIT Computer Use Policy states, "Network users
must abide by the terms of all software licensing agreements
and copyright laws, and may not make copies of or make available
on the network copyrighted material, unless permitted by a
license. Network users must not perform acts which are deliberately
wasteful of computing resources or which unfairly monopolize
resources to the exclusion of others..." The complete
Computer User Policy can be found at:
When you save and store large music, image,
video, or other types of non-educational related material
on the network it increases the time it takes for system backups
and virus scanning; the large downloads also consume unnecessary
bandwidth. Please be considerate
of your colleagues and remove or transfer to your laptop ALL
files in violation. If files are not removed, the
Center for Law and Computers is authorized by the administration
to permanently remove them for you.
We ask that you purge all unnecessary messages
and files as often as possible from your network and email
accounts to help us preserve space on the C-K server. As a
reminder, in Outlook mail, you must delete messages from your
"Deleted Messages" folder for them to be permanently
removed from the mail server. It is also a good maintenance
procedure to delete any unneeded messages in the "Sent"
To select a new password:
from your Internet browser, (i.e. Internet Explorer)
Select the option CHANGE PASSWORD
When prompted, enter your username, password
and desired new password when successfully completed, you
will receive the message PASSWORD SUCCESSFULLY
Your new password takes effect immediately and
will give you access to your email account and network files.
Password protection is one of the most important
principles of network and e-mail security. Chicago-Kent College
of Law provides access to network and electronic mail resources
to its students, faculty, and staff, in support of the University's
mission of teaching, research, and public service. Passwords
are assigned for access to both of these resources to authenticate
a user's identity, to protect network users, and to provide
New passwords will be provided, and existing
passwords will be reset, only when the identity of the requester
can be clearly established.
- Under no circumstances will new or existing passwords
be revealed by telephone.
The Center for Law and Computers staff
will be pleased to handle requests made in one of the
1. Requests may be made in person at the
Help Desk, Room 540. Photo identification is required.
2. Requests may be faxed to Center for
Law and Computers at (312) 906- 5165. The fax must include
photo identification and signature.
If you have questions or need additional assistance,
please contact the Help Desk at (312) 906-5300
to Top of Page
CLC Main Office
(Help Desk): Room 540
Technical Support Help Desk Hours of
Monday-Thursday: 8:30 a.m. - 6:00 p.m.
Friday: 8:30 a.m. - 5:00 p.m.
Phone: (312) 906-5300
Fax: (312) 906-5165
Microsoft Office 2000 Professional Edition and FrontPage:
The Center for Law and Computers has MS Office
2000 Professional Edition and FrontPage available for purchase
at a discounted educational use rate. The disks can be purchased
at the Help Desk in Room 540. Each student is allowed to purchase
only one copy for the price of $25.50. Please
bring your student or other photo ID with you to purchase
Printing on KENTNET
The Center for Law and Computers has implemented
print accounting software which allows you to:
1. Send print jobs to queue -- This feature
allows you to send print jobs to the print station at the
front of each lab where they are held in queue until you release
them. In addition, you are able to send multiple print jobs
to the queue and they are held until you release them at the
2. You are able to check the balance of your
print account -- This feature allows you to look at the number
of copies you have remaining for the term (note: each student
is allotted 400 pages per semester; additional pages beyond
the 400 are billed at $.05 per page)
Your 400 page limit is reset at the beginning
of each semester.
Make sure you have sent your print job
to the print station by confirming that your username
is shown in the Select Print job username dialogue box.
Double click your username with the mouse
to bring up network password entry box.
Enter your NETWORK PASSWORD. Highlight
job(s) to print and click the PRINT button on the top
left of the program window.
The release station
will release all print jobs sent under your username. When
your print jobs are listed you have the opportunity to delete
them before actually sending them to print.
- The printer may take a few minutes to warm up if not
You can check your page balance at the
workstation you are logged on to by double clicking on
the dollar sign icon ( $ ) on the bottom right
of your screen.
After clicking this icon you will see
a balance screen.
If the printer says toner low and the
"READY" button is not lit, push the "GO"
button so it is lit to continue to print. E-mail helpdesk
ONLY when your print job becomes faded. You will be credited
for any pages printed light due to low toner.
If you have questions,
please email HELPDESK@kentlaw.edu
or call 906-5300.
The principle printers in the KENTNET system
are Hewlett-Packard LaserJet 8000N Printers. There is one
printer in each lab 700, 760 and 900 that is set up as the
default printer when you sign on in that lab.
Individual Student Printing Accounts:
Each student receives 400 pages of printing
per semester. Any printing past 400 pages will be charged
to your student printing account at .05 per page. You must
settle your student account with the Bursar's Office before
receiving your 400 page allotment for the following semester.
Students with outstanding balances will have their Kentnet
accounts deactivated until the balance is paid. Graduating
students with a delinquent printing balance will not
receive their diplomas until the accounts are paid in full.
If you print work for a faculty member, you
must print out a detailed balance and have the faculty member
sign for their pages. Present the signed balance sheet to
the Help Desk in the Center for Law and Computers (Room 540).
Your print account will be credited accordingly.
Print jobs that are sent to the Document Center
printer (9th floor-library) require payment when picked up.
Please report any problems with printers or
printing to the Help Desk by Email: firstname.lastname@example.org
or in house phone number 6-5300.
Virus Scanning Instructions
It Is Critical to Update Your Virus Detection
As always, it is a good idea to update the virus
protection software on your personal computer periodically
to catch any new viruses lurking out there in cyber world
Since we have a volume license to McAfee Virus Scan,
each student, faculty and staff should have a copy of this
software on his/her computer. (It is free to C-K students
so...No excuse not to have it!)
The Center for Law and Computers takes a proactive
stance in trying to eradicate viruses by cleaning them as
they come through our servers, we cannot protect each individual
PC. We are asking that you also be proactive to ensure that
your PC does not become infected.
Because there are new virus outbreaks DAILY,
we want to stress the importance of having the latest virus
protection software and updated virus definition (.DAT) files.
We'd also like to remind you that regular virus scans of all
drives (weekly, if possible) are necessary in order to detect
and clean any viruses so they are not sent to friends and/or
Chicago-Kent is licensed for and supports McAfee
Virus Scan from Network Associates. According to information
on their web site, there are over 50,000+ viruses out there
and the potential for damage is continuous. We here at the
Center for Law and Computers want to make sure you have the
best possible protection for your PC. Please follow the manual
instructions below to install the latest virus definition
updates (.DAT files) for your McAfee software.
to see that you have a recent version of the virus scanning
software on your computer.
You can do this by clicking on the small blue
and red "VShield" icon in the lower right corner
of your screen with the right mouse button. When you do, a
small menu will pop up. Select the "About" choice
in this menu by clicking on it once with the left mouse button.
After clicking "About" you will get a box that displays
several numbers. There are two important numbers that you
should be concerned with. The first number is in boldface
and located next to the phrase "McAfee Virus Scan"
toward the top of the box's gray area. This number tells you
what version of the Virus Scan product or "engine"
you are running. You should be running some version of 4.x.
Any version of 3.x is too old and should be updated to a later
version, please call the Help Desk to schedule an update.
The second number you should be concerned with in the "About"
box is the number next to the phrase "Virus definitions."
The last four digits of this number tell you the version of
the ".DAT" you are running. As an example, the picture
below is from a PC that is running version 4.0.3 of the Virus
Scan product (engine) and version 4115 of the virus definitions
SECOND: Install the latest
virus definition updates on your computer.
These procedures may force
a reboot of your computer. In order to avoid loss of data,
close all programs except Outlook before completing any of
the following steps.
While signed on to the C-K network, run the
update with the following three steps:
Find the icon called "virus updates"
on your desktop
- Double click the icon a box will appear as seen below
- Click on "Run" in the Start Menu
- Click on the Windows "Start Menu" in the lower
left hand side of your screen.
- Click on "Run" in the Start Menu.
- In the space next to the word "Open:" enter
the following text,
(that's a lower case "l" n k not
an upper case "I" n k)
- While signed on to the C-K network, run the update with
the following three steps:
- Double Click on the folder named VirusUpdates located
on your Desktop.
- Double Click on the file sdatXXXX.exe. Where XXXX is
the number of the dat file.
Once the "SuperDat" update program
starts, click on "Next."
You may be prompted to restart your computer.
a virus scan on your PC.
- Click on the "Start Menu" button.
- Click on "Programs.
- Click on "Network Associates" or " McAfee
- Drop down to "Virus Scan.
- A window will open that gives you options to run a virus
scan on your drives.
- Click on "Where & What" tab.
- Make sure "Include subfolders" box is checked
and click the radio button next to "All files."
- Click on "Action" tab.
- Click on down arrow and select "Clean infected
- Click "Scan now."
This will begin the scanning process. It will
check all the files on the drive you designated. It may take
a few minutes to several hours depending on the speed of your
computer and the number of files you have. Your patience will
pay off, remember you will be preventing problems in the future.
Note: The above procedures can be used in the
future to update your .DAT files.
A great source for additional information about
viruses is the Network Associates site:
As always, if you have questions or need additional
assistance, please feel free to contact the help desk at (312)
The Email stations located throughout the building
are intended to allow students convenient and quick access
to Email and the Record. Please be considerate to your fellow
students when using these stations. If you want to compose
many or long messages, or browse the Internet at length, please
use one of the 3 computer labs in the library. Thank you for
Lab 900 is on the ninth floor of the library
at the west end of the building and has 12 computers. Turn
left when you enter the library through the ninth floor entrance.
The printer for the ninth floor lab is in Room 986, in the
corner of the area.
Lab 700, the large, glass-walled room on the
seventh floor of the library, is the largest lab, with 30
computers. This lab is sometimes used for larger research
classes and it is always used for exams. LEXIS-NEXIS and WESTLAW
representatives conduct office hours in Lab 700. The schedule
of their office hours will be posted weekly in the Record.
They can help you with online research questions.
Lab 760, also on the seventh floor of the library,
is equipped with 20 computers. It is often used for research
From time to time, the law school schedules
classes or exams in the labs. When this occurs, a sign will
be posted outside the door of the lab. Please be considerate
and use one of the other labs during these scheduled activities.
If you have any problems getting onto KENTNET
from any computer, call the CLC at extension 6-5300 from any
black house phone located between the public telephones on