To assure your experience
at Chicago-Kent College of Law is a positive one,
the Center for Law and Computers is available to assist
you with your computer and technical questions and
concerns. You can reach a member of our staff by calling
(312) 906-5300 (6-5300 house phones)
or sending an email to email@example.com. We are
located in suite 540 if you would like to stop by
Messages and Attachments. Alerts, Fixes and Warning Messages
The CLC would like to remind all users of the Chicago-Kent
network of some basic email usage guidelines to help protect
yourself from viruses and other forms of Internet attacks.
Email Messages and Attachments
The CLC makes every effort to stop virus infected email
attachments from entering our email system. However, it
is still a good idea to never open any email attachments
you are either not expecting or are uncertain of the sender.
Should you receive suspicious email messages or attachments,
please contact the Help Desk for assistance.
Alerts, Fixes, and Warning Messages
It is important to keep in mind that Microsoft, McAfee,
Network Associates, Symantec, and all other major software
vendors never send updates to their users via email. These
companies may send informational alert messages but they
never send any actual files via email. This is important
to remember because some viruses spread themselves by claiming
to be fixes for other specific problems.
Additionally, it is also a good idea to keep
in mind that you should generally not follow links to Web
sites that claim to offer fixes for your computer or software
to enhance its performance. These links are almost always
advertisements (spam) that will attempt to sell you a piece
of software you likely do not need. It is even possible
that these links may lead to a malicious web site that will
try to break into your computer.
Updates to Microsoft Windows, Microsoft Office,
and Internet Explorer should only be obtained from the internal
Chicago-Kent network or these web sites:
Updates to McAfee Virus Scan antivirus software
should only be obtained from the internal Chicago-Kent network
or these web sites:
As always, feel free to call or stop by the
CLC Help Desk if you have any questions or concerns.
CLC Help Desk
Phone: (312) 906-5300
Printing accounts reset May 27th for Summer Session
Information for graduated students regarding email, network,
and printing accounts.
The Center for Law and Computers will reset printing accounts
to 400 pages May 26, 2003. For students continuing on at
C-K, anything printed on or after May 26, 2003 will count
toward your 400-page limit for the
INFORMATION FOR CONTINUING STUDENTS
You must settle your student printing account with the Bursar's
Office before receiving your 400 pages allotment for your
next semester. Students with outstanding balances will have
their Kentnet accounts deactivated until the outstanding
balance is paid-in-full.
For those of you leaving us for greater ventures, we want
to wish you the best. We'd also like to share the below
information regarding your email, network and print accounts.
- For May graduates, printing accounts will be terminated
on May 26, 2003 (day after commencement), but email
and network accounts will remain active until August
- On August 5, 2003 (first Monday after July bar), all
May 2003 graduates network, H: drive, and email accounts
will be terminated.
- *** IMPORTANT INFORMATION
FOR MAY GRADUATES:
Graduating students with a delinquent printing balance
will not receive their diplomas or be certified to the
Illinois Bar Examiners until the accounts are paid in
- For December 2002 graduates, network,
H: drive, and email accounts will be terminated on May
26, 2003 (day after commencement).
If you are at the C-K downtown campus and
need to print, we offer the option for newly graduated students
who have special projects over the summer to extend printing
privileges to labs 700, 760, and 900. Please contact the
Center for Law and Computers at (312) 906-5300 or Helpdesk@kentlaw.edu
for further information.
Best wishes to all and Good Luck to those taking the July
e-mail available to Chicago-Kent alumnae/i at kentlawalum.iit.edu.
December 2002 and May 2003 Graduates:
For those of you leaving us for greater ventures,
we would like to wish you the best. We'd also like to share
the below information with you regarding your email, network
and printing accounts
For May 2003 graduates, your printing account
will be terminated after commencement May
As a follow-up to our email dated 5/15/03, we would like
to take this opportunity to remind you that your kentlaw.edu
user account will expire August 4, 2003. Now that you have
graduated, it is time to think about closing this portion
of your law education. Please help us by removing all email
messages and files from the C-K network as soon as possible
so we can make room for the incoming students.
By being an alumnus of Illinois Institute of Technology,
Chicago-Kent Law School it is our pleasure to offer you
free (kentlawalum.iit.edu) email service. Your account will
be created by May 26, 2003, and all you need to do is activate
it by logging on to the web access link below, typing in
your current C-K user name, and then typing in the last
6 digits of your Social Security Number as your password.
Web access: http://alum.iit.edu/mail/main
Username: (same as C-K username)
Password: (Last 6 digits of SSN)
If you need additional information or have
questions regarding your alumni account please visit the
Best wishes and good luck to all!
truth about downloading and sharing music files
On April 3, 2003, Rensselaer students
Aaron Sherman and Jesse Jordan, Michigan Technological
student Joseph Nievelt, and Princeton student Daniel
Peng had a law suit filed against them. What did they
do? Something as simple as downloading and sharing music
files. Now the Recording Industry Association of America
(RIAA) is seeking damages of $150,000 for each song
file the defendants have on their Web site. Each student
operated "Napsterlike systems" that made music
files available to people on campus wide computer networks.
Be cognizant and knowledgeable before this happens to
you---downloading and sharing music and/or other
types of copyrighted media files is illegal.
To learn more about this topic review the cases and
Terms: Copyright infringement, Digital
Millennium Copyright Act, Intellectual Property Rights,
The Berne Convention for the Protection of Literary
and Artistic Works, Trade Related Aspects of Intellectual
Property Rights (The TRIPS Agreement).
o Recording Industry Association of America,
v. Daniel Peng., Civil No. 03-1441 (SRC),
filed Apr. 3, 2003. To see the complete document visit
this website: http://chronicle.com/free/documents/v49/i30/complaint.pdf
o Profile Publishing and Management Corp.
APS v. Musicmaker.com, Inc., 242 F.Supp.2d
363, S.D.N.Y. Jan 23, 2003.
o Recording Industry Association of America,
v. Verizon Internet Services, No. CIV.A.02-MS
0323(JDB)., Jan. 21, 2003.
o A&M Records, Inc. v. Napster, Inc.,
239 F.3d 1004; 2001 Copr.L.Dec. P 28, 200; 57 U.S.P.Q.2d
1729; 1 Cal. Daily Op. Serv. 1255; 2001 Daily Journal
D.A.R., 1611; 9th Cir.(Cal.), Feb 12, 2001.
o Fonovisa v. Napster, Inc., 2002
WL 398676; N.D.Cal., Jan 28, 2002.
o Aimster Copyright Litigation,
2002 WL 31006142; 2002 Copr.L.Dec. P 28, 500; N.D.Ill.,
Sep 04, 2002.
property rights and Chicago-Kent's reminder on ethical
The computer center would like to remind
you that any unethical action on your part could be
detrimental to your law school career. Please review
the following guidelines to make sure you understand
Chicago-Kent’s stance on the issues of file sharing
and using University equipment for non-academic purposes.
Chicago-Kent Student Handbook - http://www.kentlaw.edu/depts/acadadm/handbook.html#II
Section XIX. Code of Conduct, Article
II, Prohibited Conduct, §2-2 Nonacademic Misconduct,
items (j) and (k) state:
“(j) Violating published university regulations,
including regulations relating to entry and use of IIT
facilities (see, for example, IIT Bulletins, the Chicago-Kent
Bulletin and the Chicago-Kent Student Handbook, etc.)”
“(k) Violating federal, state, or municipal
laws on university premises (or in university residence
halls) in a way that adversely affects the functioning
of the university”
IIT Computer Use Policy
“Network users must not deliberately
perform an act which will disrupt the normal operation
of computers, terminals, peripherals, or networks. This
includes, but is not limited to, tampering with components
of a local area network (LAN) or the high-speed backbone
network, otherwise blocking communication lines, or
interfering with the operational readiness of a computer.“
“Network users must not run or install
on any of IIT's computer systems, or give to another,
a program which is intended to or likely to result in
the eventual damage of a file or computer system and/or
reproduction of itself. This includes, but is not limited
to, the classes of programs known as computer viruses,
bots, Trojan horses, and worms.”
IIT Definition of Unauthorized
Use - http://cns.iit.edu/policies/PAbusePolicy.html
“Unauthorized use is an activity that
adversely affects computer or network performance and/or
is not recognized as being related to IIT's educational
mission. It can even involve using IIT's system to break
the law. Unauthorized use includes, but is not limited
to port scanning, IP spoofing, network analysis, monitoring
the network without permission, hacking into IIT servers
and other off-campus servers, running traffic-generating
applications that generate unnecessary network broadcast
storms or drive large amounts of traffic to your computer
and using illegal or copyrighted software images, applications,
data, and music.”
Standard monthly network
The Center for Law and Computers will conduct regular
monthly maintenance windows on the first Tuesday of
every month (5a.m. - 7a.m. in the morning) for "Patch
and\or Update" management on systems that need
to be rebooted. The first scheduled monthly maintenance
will occur next Tuesday, March 4th, from 5 a.m. to 7a.m.
Remember too that there may be "emergency"
times when manufacturers release "critical"
update patches that need to be installed immediately.
The CLC will make every attempt to send out an announcement
in advance when the "critical" updates need
to be installed and systems rebooted (however, we cannot
always guarantee advance notice since certain patches/updates
need to be applied ASAP before a breach is made).
All network services including Internet access, email,
webmail, network drives, and network printing will be
down during the above scheduled time.
Maintenance will be conducted on the following days:
Tuesday, June 03, 2003
Tuesday, July 01, 2003
Tuesday, August 05, 2003
Tuesday, September 02, 2003
Tuesday, October 07, 2003
Tuesday, November 04, 2003
Tuesday, December 02, 2003
We apologize in advance for any inconvenience this
to Top of Page
word about Recent Viruses, Worms and Trojans.
McAfee is our Virus scanning application
that is used throughout Chicago-Kent. According to McAfee's
web site there are more then 62,000 virus threats that
exist and new ones are found everyday. Viruses and backdoor
Trojans can cause major disruptions and financial loss.
The Melissa, I love You, Goner, Code Red and many others
have impacted many organizations to the point that even
Microsoft had to turn off their e-mail systems until
the virus could be contained. The newer forms of viruses
(Backdoor Trojans) are even more devastating by actually
giving someone else complete control of your computer
and access to all the information stored on them.
There are things that you can do to protect
your computer. You can protect yourself by running a
full virus scan of all the files on your computer periodically.
Ensuring that you have the latest updates from the vendor.
Avoid programs from unknown sources (Internet and Email).
Never open or double-click on an attachment that is
from an unknown recipient.
The Center for Law and Computers posts
Virus Updates to your computer desktop as they are released
from the vendor or you can access them directly from
McAfeeÆs web site when connected to the internet through
the virus application. An ounce of protection will go
a long way in ensuring that your documents and computer
are virus free.
to Top of Page
the latest DAT
file as of 05/19/03 - is sdat4264
Center for Law and Computers Computer Specifications
RECOMMENDED COMPUTER SPECIFICATIONS:
Pentium IV (or Pentium III equivalent) 800 or
up MHz processor
2 PC Card/Card Bus Slots: network card (notebook
20GB or greater Hard Drive
3.5" Floppy Drive
CD-ROM Drive or DVD-ROM Drive
10/100 Ethernet Card (notebook only)
Windows 2000 PROFESSIONAL, XP PROFESSIONAL
*NOTE* Windows XP home edition will
not work with our network
Sound Card to support RealPlayer (or RealPlayer
17" monitor with .28mm dot pitch (desktop
12" Active Matrix or TFT display (notebook
REQUIRED COMPUTER SPECIFICATIONS:
Pentium III (or Pentium II equivalent) 500 or
up MHz processor
Available PC Card/Card Bus Slots: network card
10GB or up Hard Drive
3.5" Floppy Drive
10/100 Ethernet Card (notebook only)
Sound Card to support RealPlayer (or RealPlayer
14" or 15" color monitor .28mm dot pitch
If you have
a computer that nearly meets the minimum requirements
and is extremely costly to upgrade, please call
the Center for Law and Computers at (312) 906-5300,
so that we can assist you in determining the best
solution for both short and long-term needs.
A Word About Microsoft Operating
Beginning with Windows ME in calendar
year 2000, Microsoft began implementing a strategy
of tailoring certain versions of their Windows
operating systems specifically toward consumer
markets. Windows ME and certain future versions
of the Windows operating system include multimedia
and "ease of use" features that are
designed to make the use of a Windows based computer
a more engaging experience in the home.
While this may sound enticing, it
is important to realize that the "consumer"
versions of Windows are not designed to exist
in a corporate network environment like that at
Chicago-Kent. In fact, the "consumer"
version of Microsoft's latest operating system,
Windows XP Home Edition, does not include any
capability to connect to corporate networks.
So where does this leave you? At
the time of these specifications writing, the
Center for Law and Computers recommends Windows
2000 Professional or Windows XP Professional (Professional
being the KEY word here) as the best all-around
operating systems for new notebook computer purchases.
If neither is available, then Windows 98 would
be the next best choice followed by Windows ME
as a last option. For students who already own
a notebook, any edition of Windows 98 along with
Windows 2000 Professional and XP Professional
can be configured to connect to the Chicago-Kent
network. Existing Windows ME notebooks can be
configured to connect to the network through some
additional work by computer support staff. Desktop
users are encouraged to remain with the operating
system that is presently on their PC.
word about MS Windows XP
On October 25, 2001, Microsoft released
the newest version of their Windows operating system called
Windows XP. This new operating system comes in two distinct
editions: Windows XP Home Edition and Windows XP Professional.
Please be aware that while Windows XP Home Edition can
connect to the Internet, it can not in any way be made
to connect to corporate networks such as the Chicago-Kent
LAN. A computer running the Home Edition of Windows XP
will not be able to access network printers, network drives
such as H: home directories, and e-mail via Microsoft
It is for these reasons that the Center
for Law and Computers recommends that anyone purchasing
a new machine positively confirm the operating system
with their vendor. Computers that are available only with
Windows XP pre-installed should only be purchased if it
is Windows XP Professional, NOT Windows XP Home Edition.
Windows 98 and Windows 2000 Professional
continue to be fully compatible with the Chicago-Kent
As always, please feel free to contact the
CLC Help Desk if you have any questions or concerns.
and Network Accounts:
A Chicago-Kent email account is setup for
you. Your username will be your first initial and last
name, no punctuation or spaces (i.e. Jane Student = jstudent)
and your initial password will be the last six digits
of your Social Security Number, no punctuation or spaces
unnecessary files on Network
The Center for Law and Computers provides
access to the Network for Chicago-Kent students, faculty,
and staff in support of the educational mission of the
university. In recent months we have noticed an increase
in the amount of personal storage space being consumed
on our network. As we continue to maintain and scan the
network drives we are noticing numerous occurrences of
non-educational types of materials (i.e., MP3, .wav, .mov,
.avi). We understand that there are occasions when storing
these types of files on the network for educational use
As you may well be aware, the recent court
decisions potentially makes us liable if members of our
community engage in infringing activity. As a reminder
to all students, a portion of the IIT Computer Use Policy
states, "Network users must abide by the terms of
all software licensing agreements and copyright laws,
and may not make copies of or make available on the network
copyrighted material, unless permitted by a license. Network
users must not perform acts which are deliberately wasteful
of computing resources or which unfairly monopolize resources
to the exclusion of others..." The complete Computer
User Policy can be found at:
When you save and store large music, image,
video, or other types of non-educational related material
on the network it increases the time it takes for system
backups and virus scanning; the large downloads also consume
unnecessary bandwidth. Please
be considerate of your colleagues and remove or transfer
to your laptop ALL files in violation. If files
are not removed, the Center for Law and Computers is authorized
by the administration to permanently remove them for you.
We ask that you purge all unnecessary messages
and files as often as possible from your network and email
accounts to help us preserve space on the C-K server.
As a reminder, in Outlook mail, you must delete messages
from your "Deleted Messages" folder for them
to be permanently removed from the mail server. It is
also a good maintenance procedure to delete any unneeded
messages in the "Sent" folder.
To select a new password:
from your Internet browser, (i.e. Internet Explorer)
Select the option CHANGE
When prompted, enter your username, password
and desired new password when successfully completed,
you will receive the message PASSWORD SUCCESSFULLY
Your new password takes effect immediately
and will give you access to your email account and network
Password protection is one of the most important
principles of network and e-mail security. Chicago-Kent
College of Law provides access to network and electronic
mail resources to its students, faculty, and staff, in
support of the University's mission of teaching, research,
and public service. Passwords are assigned for access
to both of these resources to authenticate a user's identity,
to protect network users, and to provide security.
New passwords will be provided, and existing
passwords will be reset, only when the identity of the
requester can be clearly established.
- Under no circumstances will new or existing passwords
be revealed by telephone.
The Center for Law and Computers
staff will be pleased to handle requests made in one
of the following ways:
1. Requests may be made in person
at the Help Desk, Room 540. Photo identification
2. Requests may be faxed to Center
for Law and Computers at (312) 906- 5165. The fax
must include photo identification and signature.
If you have questions or need additional
assistance, please contact the Help Desk at (312) 906-5300
to Top of Page
Office (Help Desk): Room 540
Technical Support Help Desk Hours
Monday-Thursday: 8:30 a.m. - 6:00 p.m.
Friday: 8:30 a.m. - 5:00 p.m.
Phone: (312) 906-5300
Fax: (312) 906-5165
Microsoft Office 2000 Professional Edition and FrontPage:
The Center for Law and Computers has MS
Office 2000 Professional Edition and FrontPage available
for purchase at a discounted educational use rate. The
disks can be purchased at the Help Desk in Room 540. Each
student is allowed to purchase only one copy
for the price of $25.50. Please bring your student or
other photo ID with you to purchase a set.
Printing on KENTNET
The Center for Law and Computers has implemented
print accounting software which allows you to:
1. Send print jobs to queue -- This feature
allows you to send print jobs to the print station at
the front of each lab where they are held in queue until
you release them. In addition, you are able to send multiple
print jobs to the queue and they are held until you release
them at the print station.
2. You are able to check the balance of
your print account -- This feature allows you to look
at the number of copies you have remaining for the term
(note: each student is allotted 400 pages per semester;
additional pages beyond the 400 are billed at $.05 per
Your 400 page limit is reset at the beginning
of each semester.
Make sure you have sent your print
job to the print station by confirming that your username
is shown in the Select Print job username dialogue
Double click your username with the
mouse to bring up network password entry box.
Enter your NETWORK PASSWORD. Highlight
job(s) to print and click the PRINT button on the
top left of the program window.
station will release all print jobs sent under your username.
When your print jobs are listed you have the opportunity
to delete them before actually sending them to print.
- The printer may take a few minutes to warm up if
not recently used.
You can check your page balance at
the workstation you are logged on to by double clicking
on the dollar sign icon ( $ ) on the bottom
right of your screen.
After clicking this icon you will
see a balance screen.
If the printer says toner low and
the "READY" button is not lit, push the
"GO" button so it is lit to continue to
print. E-mail helpdesk ONLY when your print job becomes
faded. You will be credited for any pages printed
light due to low toner.
If you have questions,
please email HELPDESK@kentlaw.edu
or call 906-5300.
The principle printers in the KENTNET system
are Hewlett-Packard LaserJet 8000N Printers. There is
one printer in each lab 700, 760 and 900 that is set up
as the default printer when you sign on in that lab.
Individual Student Printing Accounts:
Each student receives 400 pages of printing
per semester. Any printing past 400 pages will be charged
to your student printing account at .05 per page. You
must settle your student account with the Bursar's
Office before receiving your 400 page allotment for
the following semester. Students with outstanding balances
will have their Kentnet accounts deactivated until the
balance is paid. Graduating students with a delinquent
printing balance will not receive their diplomas
until the accounts are paid in full.
If you print work for a faculty member,
you must print out a detailed balance and have the faculty
member sign for their pages. Present the signed balance
sheet to the Help Desk in the Center for Law and Computers
(Room 540). Your print account will be credited accordingly.
Print jobs that are sent to the Document
Center printer (9th floor-library) require payment when
Please report any problems with printers
or printing to the Help Desk by Email: firstname.lastname@example.org
or in house phone number 6-5300.
It Is Critical to Update Your Virus
Detection Software Regularly:
As always, it is a good idea to update the
virus protection software on your personal computer periodically
to catch any new viruses lurking out there in cyber world
Since we have a volume license to McAfee Virus Scan,
each student, faculty and staff should have a copy of
this software on his/her computer. (It is free to C-K
students so...No excuse not to have it!)
The Center for Law and Computers takes a
proactive stance in trying to eradicate viruses by cleaning
them as they come through our servers, we cannot protect
each individual PC. We are asking that you also be proactive
to ensure that your PC does not become infected.
Because there are new virus outbreaks DAILY,
we want to stress the importance of having the latest
virus protection software and updated virus definition
(.DAT) files. We'd also like to remind you that regular
virus scans of all drives (weekly, if possible) are necessary
in order to detect and clean any viruses so they are not
sent to friends and/or colleagues.
Chicago-Kent is licensed for and supports
McAfee Virus Scan from Network Associates. According to
information on their web site, there are over 50,000+
viruses out there and the potential for damage is continuous.
We here at the Center for Law and Computers want to make
sure you have the best possible protection for your PC.
Please follow the manual instructions below to install
the latest virus definition updates (.DAT files) for your
Check to see that you have a recent version of the virus
scanning software on your computer.
You can do this by clicking on the small
blue and red "VShield" icon in the lower right
corner of your screen with the right mouse button. When
you do, a small menu will pop up. Select the "About"
choice in this menu by clicking on it once with the left
After clicking "About" you will get a box that
displays several numbers. There are two important numbers
that you should be concerned with. The first number is
in boldface and located next to the phrase "McAfee
Virus Scan" toward the top of the box's gray area.
This number tells you what version of the Virus Scan product
or "engine" you are running. You should be running
some version of 4.x. Any version of 3.x is too old and
should be updated to a later version, please call the
Help Desk to schedule an update. The second number you
should be concerned with in the "About" box
is the number next to the phrase "Virus definitions."
The last four digits of this number tell you the version
of the ".DAT" you are running. As an example,
the picture below is from a PC that is running version
4.0.3 of the Virus Scan product (engine) and version 4115
of the virus definitions (.DAT files).
SECOND: Install the
latest virus definition updates on your computer.
These procedures may
force a reboot of your computer. In order to avoid loss
of data, close all programs except Outlook before completing
any of the following steps.
While signed on to the C-K network, run
the update with the following three steps:
Find the icon called "virus
updates" on your desktop
- Double click the icon a box will appear as seen
- Click on "Run" in the Start Menu
- Click on the Windows "Start Menu" in the
lower left hand side of your screen.
- Click on "Run" in the Start Menu.
- In the space next to the word "Open:"
enter the following text,
(that's a lower case "l" n k
not an upper case "I" n k)
- While signed on to the C-K network, run the update
with the following three steps:
- Double Click on the folder named VirusUpdates located
on your Desktop.
- Double Click on the file sdatXXXX.exe. Where XXXX
is the number of the dat file.
Once the "SuperDat" update program
starts, click on "Next."
You may be prompted to restart your computer.
Run a virus scan on your PC.
- Click on the "Start Menu" button.
- Click on "Programs.
- Click on "Network Associates" or "
McAfee Virus Scan."
- Drop down to "Virus Scan.
- A window will open that gives you options to run
a virus scan on your drives.
- Click on "Where & What" tab.
- Make sure "Include subfolders" box is
checked and click the radio button next to "All
- Click on "Action" tab.
- Click on down arrow and select "Clean infected
- Click "Scan now."
This will begin the scanning process. It
will check all the files on the drive you designated.
It may take a few minutes to several hours depending on
the speed of your computer and the number of files you
have. Your patience will pay off, remember you will be
preventing problems in the future.
Note: The above procedures can be used in
the future to update your .DAT files.
A great source for additional information
about viruses is the Network Associates site:
As always, if you have questions or need
additional assistance, please feel free to contact the
help desk at (312) 906-5300.
The Email stations located throughout the
building are intended to allow students convenient and
quick access to Email and the Record. Please be considerate
to your fellow students when using these stations. If
you want to compose many or long messages, or browse the
Internet at length, please use one of the 3 computer labs
in the library. Thank you for your cooperation.
Lab 900 is on the ninth floor of the library
at the west end of the building and has 12 computers.
Turn left when you enter the library through the ninth
floor entrance. The printer for the ninth floor lab is
in Room 986, in the corner of the area.
Lab 700, the large, glass-walled room on
the seventh floor of the library, is the largest lab,
with 30 computers. This lab is sometimes used for larger
research classes and it is always used for exams. LEXIS-NEXIS
and WESTLAW representatives conduct office hours in Lab
700. The schedule of their office hours will be posted
weekly in the Record. They can help you with online research
Lab 760, also on the seventh floor of the
library, is equipped with 20 computers. It is often used
for research classes.
From time to time, the law school schedules
classes or exams in the labs. When this occurs, a sign
will be posted outside the door of the lab. Please be
considerate and use one of the other labs during these
If you have any problems getting onto KENTNET
from any computer, call the CLC at extension 6-5300 from
any black house phone located between the public telephones
on every floor.