8
Chicago-Kent home page Student portal Faculty portal Staff portal About The Record Current Record headlines Publication deadlines The Record archives
February 21st, 2005

 A Message from the CLC Department:

To assure your experience at Chicago-Kent College of Law is a positive one, the Center for Law and Computers is available to assist you with your computer and technical questions and concerns. You can reach a member of our staff by calling (312) 906-5300 (6-5300 house phones)
or sending an email to helpdesk@kentlaw.edu. We are located in suite 540 if you would like to stop by our offices.


FAQs and Help Links


Chicago-Kent's Wireless Network

**************Wireless Connectivity**************

The Center for Law & Computers is pleased to announce the unveiling of Chicago-Kent's Wireless Network. The implementation of the wireless infrastructure provides complete connectivity and access to all law school network resources (e.g. email, printing, and home directory) in the following areas of the building:

  • Concourse - general open seating area by the Bookstore
  • First Floor - general open seating area in the Front Lobby, Courtroom, and Classroom 155
  • Second Floor - general open seating area by the Registrar Office, and Cafeteria
  • Third Floor - Classroom 345
  • Fifth Floor - Classrooms 570, 580, 581, 583, and Student Lounge

The configuration of laptop computers and wireless cards will be automatic. The configuration process will be seamless and will happen during the normal client login to the network through the wired Ethernet connection. The wireless system at the law school uses the same username/password that Faculty\Staff\Students use to access email and other network resources.

If you do not have built-in wireless, the recommended wireless adapters shown below will be available in the bookstore by February 5th, 2005.

Cisco Aironet 802.11a/b/g Wireless CardBus Adapter
Manufacturer PartNumber: AIR-CB21AG-A-K

Linksys Dual-Band Wireless A&G Notebook Adapter
Manufacturer Part Number: WPC55AG

Please contact the CLC Help Desk at x65300 or at helpdesk@kentlaw.edu if you have questions or concerns regarding wireless access.

 




Dell laptop adapters could catch fire and cause shock

In a sweeping recall, Dell is recalling nearly 1 million AC power adapters for its Latitude, Inspiron, and Precision laptop computers because they could overheat, catch fire, and, possibly, give users an electric shock. Dell has received seven reports of adapters overheating, according to the Consumer Product Safety Commission. One resulted in a minor skin burn.

Dell says that mechanical wear is behind the hazard. Repeated bending and movement of the adapter cord may damage the joint where the AC inlet pins connect to the adapter's circuit board.

The adapters were sold via Dell's Web site and customer-service center from September 1998 to February 2002 for $30 to $70. They also came with more than two dozen models of laptop computers, including the following:

  • Latitude models: CP, CPi, CPiA, CPtC, CPiR, CPxH, CPtV, CS, CSx, CPxJ, CPtS, C500, C510, C600, C610, C800, C810, V700. They also came with the Latitude C-Dock docking station and C-Port port replicator.
  • Inspiron models 2500, 2600, 3700, 3800, 4000, 4100, 4150, 5000, 5000e, 7500, 7550, 8000, and 8100. They also came with Inspiron Advanced Port Replicator, Docking Station.
  • Precision model M40.

The model number appears on the computer itself or on a label on the bottom of the unit. The recalled adapters, manufactured by Delta Electronics, of Taiwan, have the words "DELL" and "P/N 9364U," P/N 7832D," or "P/N 4983D" printed on the back.

Dell is attempting to notify customers of the recall, but consumers can contact the company directly. Call 800-418-8590 or go to www.delladapterprogram.com. If you have one of the affected power adapters, Dell will exchange it for a free replacement. You can also write to Dell Inc., 9701 Metric Blvd., Austin, TX 78758, Attn: Adapter Program.


Dell Inspiron 1150 laptops critical performance update

The Dell Inspiron 1150 laptop has a unique problem: Its performance slows by an astonishing 90 percent when Microsoft's Windows XP Service Pack 2 security update is installed. Dell has a remedy for the problem, but you'd be hard-pressed to find it in the company's online tech-support information. We have a simple fix of our own.

The Service Pack, software added to the Windows XP operating system, is intended to make it harder for viruses, computer worms, and hackers to invade a computer. Microsoft and Dell both recommend installing Service Pack 2; so do the computer engineers at Consumers Union, publisher of Consumer Reports magazine and these e-mail alerts.

Consumer Reports made the Inspiron 1150 one of its Quick Pick recommended laptops and included it in the magazine's December-issue gift guide.

Until recently, Dell did not acknowledge that Inspiron 1150 models using an Intel Celeron processor had a problem running with Service Pack 2. Even now, it does not highlight the fix on its Web site. It is sending notification of the fix by e-mail to users who have elected to receive support alerts from Dell online.

Try our fix

If you own a Dell Inspiron 1150 with a Celeron processor and Service Pack 2 and it seems to be running very slowly, install the Dell security patch or follow these six steps:

  • Open the Power Options Control Panel and write down the time-out settings for the Portable/Laptop scheme (which will undoubtedly be selected).
  • Click on the Delete button to delete Dell's Portable/Laptop scheme.
  • Choose the scheme Max Battery, then click on Apply.
  • Click on the Save As button, and type "Portable/Laptop," then click on OK.
  • Change the time-out settings to match the ones you wrote down (or whatever other settings you want to use), then click on Apply.
  • Click on OK to exit the Control Panel.

You will know that the fix worked if the Task Manager (accessed when you press the Control/Alt/Delete keys simultaneously) shows only 1 percent processor usage for the taskmgr.exe process. When it's running slow, taskmgr.exe uses about 14 percent.

Finding the Dell fix

The Dell software patch, buried on the company's Web site, was posted on Oct. 13. The easiest way to locate it, we found, is to go to www.support.dell.com, then search in Technical Support for the patch's identification number, R86829.


Loaner Laptop Policy

The CLC Help Desk does provide the service of temporarily loaning laptops to students. This service is restricted to those who have purchased their own laptop and the laptop has been serviced by a technician at the CLC Help Desk. Once the technician has determined that the laptop needs to be sent to the manufacturer for repairs or is inoperable a student will be loaned a laptop.  The laptop loans are for a one (1) week period only.  In addition, the CLC Help Desk does not loan power adaptors or any other laptop accessories for laptops. In order for this service to benefit everyone, this policy must be strictly adhered to.

Once a user returns a laptop, that same user cannot have another laptop loaned to him/her for at least two (2) consecutive weeks.


New procedure at CLC Help Desk-all students are required to show their Chicago-Kent ID card

New Help Desk Procedure:  All students are required to show their Chicago-Kent ID card

Beginning October 11th the CLC Help Desk will implement a new procedure that requires all students to present their Chicago-Kent ID card for service. This new procedure will also apply to receiving any computer related loaner equipment. The Help Desk will make a photocopy of student's ID when loaner equipment is requested. The new procedure is being implemented to best serve the needs of the Chicago-Kent student's.

Thank you for your cooperation.


New anti-SPAM system for Chicago-Kent

On August 16th, the CLC will begin to implement an anti-spam system for Chicago-Kent e-mail. The system being put in place is a dedicated e-mail processing server. It requires no additional software on your computer.

All incoming e-mail to @kentlaw.edu e-mail addresses will be routed to the new anti-spam server. The server will analyze each message using a variety of factors and then “tag” the message as one of three possible categories: legitimate mail, possible spam, and definite spam. Messages categorized as “legitimate mail” are, of course, forwarded straight through to Chicago-Kent’s normal e-mail servers. Mail that is categorized as “definite spam” is discarded by the anti-spam server. Messages that the system is less certain about are categorized as "possible spam." These messages will have [POSSIBLE SPAM] inserted into the beginning of their subject lines.

The system being put in place continuously “learns” which messages are spam as it analyzes the incoming e-mail to Chicago-Kent. As time passes, the system will become more and more adept at recognizing “definite” spam. It is anticipated that all users of Chicago-Kent’s e-mail will see significant reduction in the amount of erroneous e-mail messages as this process occurs. The CLC will continue to monitor and fine tune the system for optimal performance.

Please contact the CLC Help Desk if you have any questions or concerns regarding this new system.


 Return to Top of Page


Web page naming convention

Web File Naming Conventions

Chicago-Kent's main web pages are located on a UNIX based server and certain conventions must be followed. All files and directories (folders) must be one word; no spaces! Also, do not use any special characters such as apostrophes ('), quotes ("), exclamation points (!), etc. The use of hyphens (-) and underscores (_) is allowable. All files should end with an .html extension, not .htm

The use of spaces and special characters places an extra burden on the computing resources of the school when attempting to locate the correct file. The spaces and special characters also interfere with normal web server maintenance.

To present more readable file names, you may mix the case of the letters, use an underscore, or hyphen in the name; SomeFileName, AnotherFileName, some-file-name or another_file_name.

You should also be aware of the End-Of-Line settings. Please be sure this is set to UNIX and not Windows.


 Return to Top of Page


Top three ways to stop spam

Never respond to unsolicited email. Spammers will use your reply, even your unsubscribe messages, as evidence that the email address is valid.

Never buy anything advertised in spam. Most of it is fraudulent anyway and successful sales only encourage the practice to continue.

Never post your email address publicly on the Web. Spammers have ways to collect and use these email addresses.




Windows Update Instructions

It is critical to update your Windows operating system and Internet Explorer software regularly.

Just as it is important to update the virus definitions of your antivirus software, it is equally important to update the Windows operating system and Internet Explorer software on your computer. Just like virus definitions, Windows and Internet Explorer should be updated weekly. Fortunately, Microsoft makes this process fast and easy with their ôWindows Updateö web site.

Open your Internet Explorer web browser and click on Tools ->Windows Update.

On the Windows Update welcome screen, click the Scan for Updates link.

When your computer has finished scanning for updates, it will group the updates into three categories visible on the left side of the screen. The categories are Critical Updates and Service Packs, Windows XP (or 2000 or 98), and Driver Updates. Click on the link for Critical Updates and Service Packs. You should always install any updates Microsoft releases as ôcritical.ö Never click on the Driver Updates link!

You will now see a list of all the critical updates needed by your computer. Click on the Review and Install Updates link on the right side of the page.

Your screen will remain mostly unchanged with the list of recommended updates remaining. Click on the Install Now button.

The update files will be downloaded from Microsoft and Installed on your computer. Please note that many updates require that your computer be rebooted in order for them to take affect. In certain instances, specific updates may need to be installed by themselves. In these cases, multiple restarts may be required. Always click the OK button if asked Do want to restart now? You want to see (0) in the list of critical updates recommended for your computer. Once your computer has rebooted, the updates will be in place and your computer will be protected with the latest fixes for the Windows operating system and Internet Explorer.

As always, please feel free to contact the CLC Help Desk if you have any questions or concerns.




Standard monthly network maintenance reminder

The Center for Law and Computers will conduct regular monthly maintenance windows on the first Tuesday of every month (5a.m. - 7a.m. in the morning) for "Patch and\or Update" management on systems that need to be rebooted.

Remember too that there may be "emergency" times when manufacturers release "critical" update patches that need to be installed immediately. The CLC will make every attempt to send out an announcement in advance when the "critical" updates need to be installed and systems rebooted (however, we cannot always guarantee advance notice since certain patches/updates need to be applied ASAP before a breach is made).

All network services including Internet access, email, webmail, network drives, and network printing will be down during the above scheduled time.

Maintenance will be conducted on the following days:
Tuesday, March 1, 2005
Tuesday, April 5, 2005
Tuesday, May 3, 2005
Tuesday, June 7, 2005
Tuesday, July 12, 2005


We apologize in advance for any inconvenience this may cause.


 Return to Top of Page


A word about Recent Viruses, Worms and Trojans.

McAfee is our Virus scanning application that is used throughout Chicago-Kent. According to McAfee's web site there are more then 62,000 virus threats that exist and new ones are found everyday. Viruses and backdoor Trojans can cause major disruptions and financial loss. The Melissa, I love You, Goner, Code Red and many others have impacted many organizations to the point that even Microsoft had to turn off their e-mail systems until the virus could be contained. The newer forms of viruses (Backdoor Trojans) are even more devastating by actually giving someone else complete control of your computer and access to all the information stored on them.

There are things that you can do to protect your computer. You can protect yourself by running a full virus scan of all the files on your computer periodically. Ensuring that you have the latest updates from the vendor. Avoid programs from unknown sources (Internet and Email). Never open or double-click on an attachment that is from an unknown recipient.

The Center for Law and Computers posts Virus Updates to your computer desktop as they are released from the vendor or you can access them directly from McAfees web site when connected to the internet through the virus application. An ounce of protection will go a long way in ensuring that your documents and computer are virus free.




Note: the latest DAT file as of 2/21/05 - is sdat4429.




Computer Specification
The Center for Law and Computers Computer Specifications

RECOMMENDED COMPUTER SPECIFICATIONS:
Pentium IV (or Pentium III equivalent) 800 or up MHz processor
2 PC Card/Card Bus Slots: network card (notebook only)
512MB RAM
20GB or greater Hard Drive
3.5" Floppy Drive
CD-ROM Drive or DVD-ROM Drive
10/100 Ethernet Card (notebook only)
Windows 2000 PROFESSIONAL, XP PROFESSIONAL
*NOTE* Windows XP home edition will not work with our network
56K modem
Sound Card to support RealPlayer (or RealPlayer equivalent) feed
17" monitor with .28mm dot pitch (desktop only)
12" Active Matrix or TFT display (notebook only)

MINIMUM REQUIRED COMPUTER SPECIFICATIONS:
Pentium III (or Pentium II equivalent) 500 or up MHz processor
Available PC Card/Card Bus Slots: network card (notebook only)
256MB RAM
10GB or up Hard Drive
3.5" Floppy Drive
CD-ROM Drive
10/100 Ethernet Card (notebook only)
Windows 98
56K modem
Sound Card to support RealPlayer (or RealPlayer equivalent) feed
14" or 15" color monitor .28mm dot pitch (desktop only)

If you have a computer that nearly meets the minimum requirements and is extremely costly to upgrade, please call the Center for Law and Computers at (312) 906-5300, so that we can assist you in determining the best solution for both short and long-term needs.

A Word About Microsoft Operating Systems

Beginning with Windows ME in calendar year 2000, Microsoft began implementing a strategy of tailoring certain versions of their Windows operating systems specifically toward consumer markets. Windows ME and certain future versions of the Windows operating system include multimedia and "ease of use" features that are designed to make the use of a Windows based computer a more engaging experience in the home.

While this may sound enticing, it is important to realize that the "consumer" versions of Windows are not designed to exist in a corporate network environment like that at Chicago-Kent. In fact, the "consumer" version of Microsoft's latest operating system, Windows XP Home Edition, does not include any capability to connect to corporate networks.

So where does this leave you? At the time of these specifications writing, the Center for Law and Computers recommends Windows 2000 Professional or Windows XP Professional (Professional being the KEY word here) as the best all-around operating systems for new notebook computer purchases. If neither is available, then Windows 98 would be the next best choice followed by Windows ME as a last option. For students who already own a notebook, any edition of Windows 98 along with Windows 2000 Professional and XP Professional can be configured to connect to the Chicago-Kent network. Existing Windows ME notebooks can be configured to connect to the network through some additional work by computer support staff. Desktop users are encouraged to remain with the operating system that is presently on their PC.


A word about MS Windows XP

On October 25, 2001, Microsoft released the newest version of their Windows operating system called Windows XP. This new operating system comes in two distinct editions: Windows XP Home Edition and Windows XP Professional. Please be aware that while Windows XP Home Edition can connect to the Internet, it can not in any way be made to connect to corporate networks such as the Chicago-Kent LAN. A computer running the Home Edition of Windows XP will not be able to access network printers, network drives such as H: home directories, and e-mail via Microsoft Outlook.

It is for these reasons that the Center for Law and Computers recommends that anyone purchasing a new machine positively confirm the operating system with their vendor. Computers that are available only with Windows XP pre-installed should only be purchased if it is Windows XP Professional, NOT Windows XP Home Edition.

Windows 98 and Windows 2000 Professional continue to be fully compatible with the Chicago-Kent network.

As always, please feel free to contact the CLC Help Desk if you have any questions or concerns.




Email and Network Accounts:

A Chicago-Kent email account is setup for you. Your username will be your first initial and last name, no punctuation or spaces (i.e. Jane Student = jstudent) and your initial password will be the last six digits of your Social Security Number, no punctuation or spaces (i.e. 999999).

Remove unnecessary files on Network

The Center for Law and Computers provides access to the Network for Chicago-Kent students, faculty, and staff in support of the educational mission of the university. In recent months we have noticed an increase in the amount of personal storage space being consumed on our network. As we continue to maintain and scan the network drives we are noticing numerous occurrences of non-educational types of materials (i.e., MP3, .wav, .mov, .avi). We understand that there are occasions when storing these types of files on the network for educational use is legitimate.

As you may well be aware, the recent court decisions potentially makes us liable if members of our community engage in infringing activity. As a reminder to all students, a portion of the IIT Computer Use Policy states, "Network users must abide by the terms of all software licensing agreements and copyright laws, and may not make copies of or make available on the network copyrighted material, unless permitted by a license. Network users must not perform acts which are deliberately wasteful of computing resources or which unfairly monopolize resources to the exclusion of others..." The complete Computer User Policy can be found at:

http://cns.iit.edu/html/policies/PCompUse.html

When you save and store large music, image, video, or other types of non-educational related material on the network it increases the time it takes for system backups and virus scanning; the large downloads also consume unnecessary bandwidth. Please be considerate of your colleagues and remove or transfer to your laptop ALL files in violation. If files are not removed, the Center for Law and Computers is authorized by the administration to permanently remove them for you.

We ask that you purge all unnecessary messages and files as often as possible from your network and email accounts to help us preserve space on the C-K server. As a reminder, in Outlook mail, you must delete messages from your "Deleted Messages" folder for them to be permanently removed from the mail server. It is also a good maintenance procedure to delete any unneeded messages in the "Sent" folder.

 




Changing Your Password:

To select a new password:

Access Webmail (http://webmail.kentlaw.edu) from your Internet browser, (i.e. Internet Explorer)

Select the option CHANGE PASSWORD

When prompted, enter your username, password and desired new password when successfully completed, you will receive the message PASSWORD SUCCESSFULLY CHANGED

Your new password takes effect immediately and will give you access to your email account and network files.

Password Security:

Password protection is one of the most important principles of network and e-mail security. Chicago-Kent College of Law provides access to network and electronic mail resources to its students, faculty, and staff, in support of the University's mission of teaching, research, and public service. Passwords are assigned for access to both of these resources to authenticate a user's identity, to protect network users, and to provide security.

New passwords will be provided, and existing passwords will be reset, only when the identity of the requester can be clearly established.

  • Under no circumstances will new or existing passwords be revealed by telephone.
  • The Center for Law and Computers staff will be pleased to handle requests made in one of the following ways:

    1. Requests may be made in person at the Help Desk, Room 540. Photo identification is required.

    2. Requests may be faxed to Center for Law and Computers at (312) 906- 5165. The fax must include photo identification and signature.

If you have questions or need additional assistance, please contact the Help Desk at (312) 906-5300


 Return to Top of Page

CLC Main Office (Help Desk): Room 540

Technical Support Help Desk Hours of Operation:
Monday-Thursday: 8:30 a.m. - 6:00 p.m.
Friday: 8:30 a.m. - 5:00 p.m.

Phone: (312) 906-5300
Fax: (312) 906-5165




Obtaining Microsoft Office 2000/2002 Professional Edition and FrontPage:

The Center for Law and Computers has MS Office 2000/2002 Professional Edition and FrontPage available for purchase at a discounted educational use rate. The disks can be purchased at the Help Desk in Room 540. Each student is allowed to purchase only one copy for the price of $25.50. Please bring your student or other photo ID with you to purchase a set.




Printing on KENTNET

The Center for Law and Computers has implemented print accounting software which allows you to:

1. Send print jobs to queue -- This feature allows you to send print jobs to the print station at the front of each lab where they are held in queue until you release them. In addition, you are able to send multiple print jobs to the queue and they are held until you release them at the print station.

2. You are able to check the balance of your print account -- This feature allows you to look at the number of copies you have remaining for the term (note: each student is allotted 400 pages per semester; additional pages beyond the 400 are billed at $.05 per page)

Your 400 page limit is reset at the beginning of each semester.

PRINTING INSTRUCTIONS:

  1. Make sure you have sent your print job to the print station by confirming that your username is shown in the Select Print job username dialogue box.
  2. Double click your username with the mouse to bring up network password entry box.
  3. Enter your NETWORK PASSWORD. Highlight job(s) to print and click the PRINT button on the top left of the program window.

The release station will release all print jobs sent under your username. When your print jobs are listed you have the opportunity to delete them before actually sending them to print.

NOTES:

  • The printer may take a few minutes to warm up if not recently used.
  • You can check your page balance at the workstation you are logged on to by double clicking on the dollar sign icon ( $ ) on the bottom right of your screen.
  • After clicking this icon you will see a balance screen.
  • If the printer says toner low and the "READY" button is not lit, push the "GO" button so it is lit to continue to print. E-mail helpdesk ONLY when your print job becomes faded. You will be credited for any pages printed light due to low toner.

If you have questions, please email HELPDESK@kentlaw.edu or call 906-5300.

Equipment:

The principle printers in the KENTNET system are Hewlett-Packard LaserJet 8000N Printers. There is one printer in each lab 700, 760 and 900 that is set up as the default printer when you sign on in that lab.

Individual Student Printing Accounts:

Each student receives 400 pages of printing per semester. Any printing past 400 pages will be charged to your student printing account at .05 per page. You must settle your student account with the Bursar's Office before receiving your 400 page allotment for the following semester. Students with outstanding balances will have their Kentnet accounts deactivated until the balance is paid. Graduating students with a delinquent printing balance will not receive their diplomas until the accounts are paid in full.

If you print work for a faculty member, you must print out a detailed balance and have the faculty member sign for their pages. Present the signed balance sheet to the Help Desk in the Center for Law and Computers (Room 540). Your print account will be credited accordingly.

Print jobs that are sent to the Document Center printer (9th floor-library) require payment when picked up.

Please report any problems with printers or printing to the Help Desk by Email: helpdesk@kentlaw.edu or in house phone number 6-5300.




Virus Scanning Instructions

It Is Critical to Update Your Virus Detection Software Regularly:

As always, it is a good idea to update the virus protection software on your personal computer periodically to catch any new viruses lurking out there in cyber world Since we have a volume license to McAfee Virus Scan, each student, faculty and staff should have a copy of this software on his/her computer. (It is free to C-K students so...No excuse not to have it!)

The Center for Law and Computers takes a proactive stance in trying to eradicate viruses by cleaning them as they come through our servers, we cannot protect each individual PC. We are asking that you also be proactive to ensure that your PC does not become infected.

Because there are new virus outbreaks DAILY, we want to stress the importance of having the latest virus protection software and updated virus definition (.DAT) files. We'd also like to remind you that regular virus scans of all drives (weekly, if possible) are necessary in order to detect and clean any viruses so they are not sent to friends and/or colleagues.

Chicago-Kent is licensed for and supports McAfee Virus Scan from Network Associates. According to information on their web site, there are over 50,000+ viruses out there and the potential for damage is continuous. We here at the Center for Law and Computers want to make sure you have the best possible protection for your PC. Please follow the manual instructions below to install the latest virus definition updates (.DAT files) for your McAfee software.

Manual Instructions:

FIRST: Check to see that you have a recent version of the virus scanning software on your computer.

NOTE: For Windows XP and 2000 users only

You can do this by clicking on the small blue and red "VShield " icon in the lower right corner of your screen with the right mouse button. When you do, a small menu will pop up. Select the "About VirusScan Enterprise" choice in this menu by clicking on it once with the left mouse button.


After clicking "About VirusScan Enterprise" you will get a box that displays several numbers. There are two important numbers that you should be concerned with. The first number is in boldface and located next to the phrase “VirusScan Enterprise" toward the top. This number tells you what version of the Virus Scan product or "engine" you are running. You should be running some version of 7.x for windows xp professional and windows 2000. The second number you should be concerned with in the "About VirusScan Enterprise" box is the number next to the phrase "Virus definitions." The last four digits of this number tell you the version of the ".DAT" you are running. As an example, the picture below is from a PC that is running version 7.1.0 of the Virus Scan product and version 4281 of the virus definitions (.DAT files).


NOTE: For Windows 98 and ME users only

You can do this by clicking on the small blue and red "VShield" icon in the lower right corner of your screen with the right mouse button. When you do, a small menu will pop up. Select the "About" choice in this menu by clicking on it once with the left mouse button.


After clicking "About" you will get a box that displays several numbers. There are two important numbers that you should be concerned with. The first number is in boldface and located next to the phrase "McAfee Virus Scan" toward the top of the box's gray area. This number tells you what version of the Virus Scan product or "engine" you are running. You should be running some version of 4.x. Any version of 3.x is too old and should be updated to a later version, please call the Help Desk to schedule an update. The second number you should be concerned with in the "About" box is the number next to the phrase "Virus definitions." The last four digits of this number tell you the version of the ".DAT" you are running. As an example, the picture below is from a PC that is running version 4.5.1 of the Virus Scan product (engine) and version 4250 of the virus definitions (.DAT files).


SECOND: Install the latest virus definition updates on your computer.

Warning

These procedures may force a reboot of your computer. In order to avoid loss of data, close all programs except Outlook before completing any of the following steps.

While signed on to the C-K network, run the update with the following three steps:

  • Find the icon called "virus updates" on your desktop



  • Double click the icon a box will appear as seen below



  • Double click on the "globe" that will begin with the letters sdat




  • Another box will appear that will guide you through the update process

    Or you can update the dat by following steps below
  • Click on "Run" in the Start Menu
  • Click on the Windows "Start Menu" in the lower left hand side of your screen.
  • Click on "Run" in the Start Menu.
  • In the space next to the word "Open:" enter the following text,
    P:\Virus\Network\SDAT-Latest.lnk (that's a lower case "l" n k not an upper case "I" n k)
    OR
  • While signed on to the C-K network, run the update with the following three steps:
  • Double Click on the folder named VirusUpdates located on your Desktop.
  • Double Click on the file sdatXXXX.exe. Where XXXX is the number of the dat file.

Once the "SuperDat" update program starts, click on "Next."

You may be prompted to restart your computer.

THIRD: Run a virus scan on your PC.

  • Click on the "Start Menu" button.
  • Click on "Programs.
  • Click on "Network Associates" or " McAfee Virus Scan."
  • Drop down to "Virus Scan.
  • A window will open that gives you options to run a virus scan on your drives.
  • Click on "Where & What" tab.
  • Make sure "Include subfolders" box is checked and click the radio button next to "All files."
  • Click on "Action" tab.
  • Click on down arrow and select "Clean infected files automatically.
  • Click "Scan now."

This will begin the scanning process. It will check all the files on the drive you designated. It may take a few minutes to several hours depending on the speed of your computer and the number of files you have. Your patience will pay off, remember you will be preventing problems in the future.

Note: The above procedures can be used in the future to update your .DAT files.

A great source for additional information about viruses is the Network Associates site:

http://us.mcafee.com/virusInfo/default.asp

As always, if you have questions or need additional assistance, please feel free to contact the help desk at (312) 906-5300.




Email Stations:

The Email stations located throughout the building are intended to allow students convenient and quick access to Email and the Record. Please be considerate to your fellow students when using these stations. If you want to compose many or long messages, or browse the Internet at length, please use one of the 3 computer labs in the library. Thank you for your cooperation.




Computer Labs

Lab 900 is on the ninth floor of the library at the west end of the building and has 12 computers. Turn left when you enter the library through the ninth floor entrance. The printer for the ninth floor lab is in Room 986, in the corner of the area.

Lab 700, the large, glass-walled room on the seventh floor of the library, is the largest lab, with 30 computers. This lab is sometimes used for larger research classes and it is always used for exams. LEXIS-NEXIS and WESTLAW representatives conduct office hours in Lab 700. The schedule of their office hours will be posted weekly in the Record. They can help you with online research questions.

Lab 760, also on the seventh floor of the library, is equipped with 20 computers. It is often used for research classes.

From time to time, the law school schedules classes or exams in the labs. When this occurs, a sign will be posted outside the door of the lab. Please be considerate and use one of the other labs during these scheduled activities.

If you have any problems getting onto KENTNET from any computer, call the CLC at extension 6-5300 from any black house phone located between the public telephones on every floor.


CALENDARS

.: Main Chicago-Kent event
   calendar

.: Academic calendar

.: CLE calendar

.: Alumnae/I event calendar

.: Admissions calendar

COMPUTER NEWS

Chicago-Kent home page Student portal Faculty portal Staff portal About The Record Current Record headlines Publication deadlines The Record archives