Chicago-Kent home page Student portal Faculty portal Staff portal About The Record Current Record headlines Publication deadlines The Record archives
November 7th , 2005

 A Message from the CLC Department:

To assure your experience at Chicago-Kent College of Law is a positive one, the Center for Law and Computers is available to assist you with your computer and technical questions and concerns. You can reach a member of our staff by calling (312) 906-5300 (6-5300 house phones)
or sending an email to helpdesk@kentlaw.edu. We are located in suite 540 if you would like to stop by our offices.

FAQs and Help Links


How to transfer your existing Chicago-Kent e-mail to your new alumnae/i account.

How to download your Kentlaw account emails to your alum mail account.




Note - All alum account quota limit is 50MB, system notifies users when quota reaches 9MB. Please delete all unwanted emails prior to transferring your emails.

Note - This process moves your email messages from your Kentlaw account to your alum account, keeping a copy or removing them from the Kentlaw Account as selected. If you have more emails in your account than your alum account quota will allow, it will download emails till your quota has been filled, and it will leave the remaining on Kentlaw Account.

Note - If you fill your mail quota on the alum account, you will not be able to receive messages. It is suggested that delete messages you don't need anymore.

* To transfer your email messages you must perform the following steps:

To download your kentlaw account emails that are in your inbox subfolders to your alum mailbox move all the emails from the subfolders to the inbox and repeat the above procedure.

* Open your web browser to:http://alum.iit.edu

* Enter your login (IIT Unified Name)
* Enter your password (Last six digits of your IIT Campus Wide ID number)
* Press Login

Your IIT unified name as well as your IIT Campus Wide ID number, can be found on the welcome page of the Chicago-Kent "Web for Students" system.

*Click the Inbox, Folder, Sent Mail,or Trash tab.
*Click Collect External Mail, in the bottom right of the Inbox or Folder tabs.

*Enter the following information:

  • Pop Server: mail4.kentlaw.edu(for students)
  • POP user ID: (your Kentlaw login name)
  • Password: (your Kentlaw password)
  • Delete Messages from Server: If you want the mail you are collecting to be deleted from the server from which it's being collected, click the checkbox to select it.
  • Save to folder: From the drop-down list, choose a folder to which you want the mail copied.

* Click Collect

* If you recieve a message indicating that your alumni account is reaching its quota, please start deleting some of the emails you do not require and are of no importance. After deleting messages, click on the 'Options' tab.

* This will show you your allotted disk space (your quota) and how much you have used. It is ideal to keep at least 2MB free within your email account to ensure that you can receive all emails that are sent to you.

* After you have finished, click on the 'Logout'.



Free e-mail available to Chicago-Kent alumnae/I at alum.iit.edu

December 2004 and May 2005 Graduates:

For those of you leaving us for greater ventures, we would like to wish you the best. We'd also like to share the below information with you regarding your email, network and printing accounts
For May 2005 graduates, your printing account will be terminated after commencement May 23, 2005.

We would like to take this opportunity to remind you that your kentlaw.edu user account will expire
August 1, 2005. Now that you have graduated, it is time to think about closing this portion of your law education. Please help us by removing all email messages and files from the C-K network as soon as possible so we can make room for the incoming students.

By being an alumnus of Illinois Institute of Technology, Chicago-Kent Law School it is our pleasure to offer you free (kentlawalum.iit.edu) email service. Your account will be created by July 8 , 2005, and all you need to do is activate it by logging on to the web access link below, typing in your current C-K user name, and then typing in the last 6 digits of your Social Security Number as your password.

Web access: http://alum.iit.edu/

Username: (IIT Unified Name)
Password: (Last 6 digits of your IIT Campus Wide ID number)

Your IIT unified name as well as your IIT Campus Wide ID number, can be found on the welcome page of the Chicago-Kent "Web for Students" system.

Best wishes and good luck to all!

Speed of the Upgraded Webmail System

The new Webmail system is based on the most recent version of Microsoft's Outlook Web Access product. This new version does require a faster connection (more bandwidth) in order to take full advantage of the new features and enhancements. As a result, it is possible that users of certain dial-up Internet connections may feel as if the new Webmail system runs slowly.

A broadband Internet connection such as a cable modem or DSL will provide the optimal means by which to use Webmail to it's fullest extent. If, however, you are limited to a dial-up Internet connection, there are a few things you can do to maximize the speed of your Webmail experience.

First, consider choosing the "basic" Webmail interface on the main Webmail login screen. The basic Webmail interface functions very closely to the previous version of Webmail. While many of the new features and enhancements are not available in the basic interface, it should run noticeably faster over a dial-up connection than the premium interface. Note that you must use Internet Explorer 5.5 or above to use the premium interface. If you use any other Web browser, you will automatically be taken to the basic interface.

Second, make certain your computer is clean of viruses and spyware. Even if a virus or piece of spyware is not causing any apparent physical harm, it can still be consuming bandwidth in your Internet connection. This may go unnoticed in a broadband connection. On a dialup connection, however, spyware and viruses can consume a significant percentage of your available bandwidth. The CLC recommends the program "Spybot Search & Destroy" from Safer Networking for detection and cleaning of spyware. A link to this program, as well as the CLC's information on virus scanning are below.

Lastly, if you must use a dial-up Internet connection, make certain that it is from an ISP that actively maintains its dial-up infrastructure in order to ensure you are getting the fastest and cleanest connection possible over your phone line.

Safer Computing (Makers of Spybot Search & Destroy)

CLC Information on Virus Scanning

Chicago-Kent's Wireless Network

**************Wireless Connectivity**************

The Chicago-Kent Library is now Wireless

The Center for Law & Computers is pleased to announce the unveiling of Chicago-Kent's Wireless Network. The implementation of the wireless infrastructure provides complete connectivity and access to all law school network resources (e.g. email, printing, and home directory) in the following areas of the building:

  • Concourse - general open seating area by the Bookstore
  • First Floor - general open seating area in the Front Lobby, Courtroom, and Classroom 155
  • Second Floor - general open seating area by the Registrar Office, and Cafeteria
  • Third Floor - Classroom 345
  • Fifth Floor - Classrooms 570, 580, 581, 583, and Student Lounge
  • Library - 6th floor, 7th floor, 8th floor, 9th floor, & 10th floor

The configuration of laptop computers and wireless cards will be automatic. The configuration process will be seamless and will happen during the normal client login to the network through the wired Ethernet connection. The wireless system at the law school uses the same username/password that Faculty\Staff\Students use to access email and other network resources.

If you do not have built-in wireless, the recommended wireless adapters shown below will be available in the bookstore by February 5th, 2005.

Cisco Aironet 802.11a/b/g Wireless CardBus Adapter
Manufacturer PartNumber: AIR-CB21AG-A-K

Linksys Dual-Band Wireless A&G Notebook Adapter
Manufacturer Part Number: WPC55AG

Please contact the CLC Help Desk at x65300 or at helpdesk@kentlaw.edu if you have questions or concerns regarding wireless access.

Loaner Laptop Policy

The CLC Help Desk does provide the service of temporarily loaning laptops to students. This service is restricted to those who have purchased their own laptop and the laptop has been serviced by a technician at the CLC Help Desk. Once the technician has determined that the laptop needs to be sent to the manufacturer for repairs or is inoperable a student will be loaned a laptop.  The laptop loans are for a one (1) week period only.  In addition, the CLC Help Desk does not loan power adaptors or any other laptop accessories for laptops. In order for this service to benefit everyone, this policy must be strictly adhered to.

Once a user returns a laptop, that same user cannot have another laptop loaned to him/her for at least two (2) consecutive weeks.

Procedure at CLC Help Desk-all students are required to show their Chicago-Kent ID card

Help Desk Procedure:  All students are required to show their Chicago-Kent ID card

Since October 11th, 2004 the CLC Help Desk has implemented a procedure that requires all students to present their Chicago-Kent ID card for service. This procedure will also apply to receiving any computer related loaner equipment. The Help Desk will make a photocopy of student's ID when loaner equipment is requested. The procedure was implemented to best serve the needs of the Chicago-Kent student's.

Thank you for your cooperation.

Anti-SPAM System for Chicago-Kent

Since August 16th, 2004 the CLC has implemented an anti-spam system for Chicago-Kent e-mail. The system is a dedicated e-mail processing server. It requires no additional software on your computer.

All incoming e-mail to @kentlaw.edu e-mail addresses will be routed to the anti-spam server. The server will analyze each message using a variety of factors and then “tag” the message as one of three possible categories: legitimate mail, possible spam, and definite spam. Messages categorized as “legitimate mail” are, of course, forwarded straight through to Chicago-Kent’s normal e-mail servers. Mail that is categorized as “definite spam” is discarded by the anti-spam server. Messages that the system is less certain about are categorized as "possible spam." These messages will have [POSSIBLE SPAM] inserted into the beginning of their subject lines.

The system that is in place continuously “learns” which messages are spam as it analyzes the incoming e-mail to Chicago-Kent. As time passes, the system will become more and more adept at recognizing “definite” spam. It is anticipated that all users of Chicago-Kent’s e-mail will see significant reduction in the amount of erroneous e-mail messages as this process occurs. The CLC will continue to monitor and fine tune the system for optimal performance.

Please contact the CLC Help Desk if you have any questions or concerns regarding the Anti-SPAM system.

 Return to Top of Page

Web Page Naming Convention

Web File Naming Conventions

Chicago-Kent's main web pages are located on a UNIX based server and certain conventions must be followed. All files and directories (folders) must be one word; no spaces! Also, do not use any special characters such as apostrophes ('), quotes ("), exclamation points (!), etc. The use of hyphens (-) and underscores (_) is allowable. All files should end with an .html extension, not .htm

The use of spaces and special characters places an extra burden on the computing resources of the school when attempting to locate the correct file. The spaces and special characters also interfere with normal web server maintenance.

To present more readable file names, you may mix the case of the letters, use an underscore, or hyphen in the name; SomeFileName, AnotherFileName, some-file-name or another_file_name.

You should also be aware of the End-Of-Line settings. Please be sure this is set to UNIX and not Windows.

 Return to Top of Page

Top three ways to stop spam

Never respond to unsolicited email. Spammers will use your reply, even your unsubscribe messages, as evidence that the email address is valid.

Never buy anything advertised in spam. Most of it is fraudulent anyway and successful sales only encourage the practice to continue.

Never post your email address publicly on the Web. Spammers have ways to collect and use these email addresses.

Windows Update Instructions

It is critical to update your Windows operating system and Internet Explorer software regularly.

Just as it is important to update the virus definitions of your antivirus software, it is equally important to update the Windows operating system and Internet Explorer software on your computer. Just like virus definitions, Windows and Internet Explorer should be updated weekly. Fortunately, Microsoft makes this process fast and easy with their ôWindows Updateö web site.

Open your Internet Explorer web browser and click on Tools ->Windows Update.

On the Windows Update welcome screen, click the Scan for Updates link.

When your computer has finished scanning for updates, it will group the updates into three categories visible on the left side of the screen. The categories are Critical Updates and Service Packs, Windows XP (or 2000 or 98), and Driver Updates. Click on the link for Critical Updates and Service Packs. You should always install any updates Microsoft releases as ôcritical.ö Never click on the Driver Updates link!

You will now see a list of all the critical updates needed by your computer. Click on the Review and Install Updates link on the right side of the page.

Your screen will remain mostly unchanged with the list of recommended updates remaining. Click on the Install Now button.

The update files will be downloaded from Microsoft and Installed on your computer. Please note that many updates require that your computer be rebooted in order for them to take affect. In certain instances, specific updates may need to be installed by themselves. In these cases, multiple restarts may be required. Always click the OK button if asked Do want to restart now? You want to see (0) in the list of critical updates recommended for your computer. Once your computer has rebooted, the updates will be in place and your computer will be protected with the latest fixes for the Windows operating system and Internet Explorer.

As always, please feel free to contact the CLC Help Desk if you have any questions or concerns.

Network Maintenance Reminders

The Center for Law and Computers will conduct regular monthly maintenance windows on the first Tuesday of every month (5a.m. - 7a.m. in the morning) for "Patch and\or Update" management on systems that need to be rebooted.

Remember too that there may be "emergency" times when manufacturers release "critical" update patches that need to be installed immediately. The CLC will make every attempt to send out an announcement in advance when the "critical" updates need to be installed and systems rebooted (however, we cannot always guarantee advance notice since certain patches/updates need to be applied ASAP before a breach is made).

All network services including Internet access, email, webmail, network drives, and network printing will be down during the above scheduled time.

Maintenance will be conducted on the following days:
Tuesday, December 6, 2005

Chicago-Kent's Internet Service Provider (Illinois Century Network) has moved their backbone maintenance window from 12:00am - 5:00am on Sundays to 2:00am - 7:00am on Fridays. It is possible that the Downtown Campus building may experience intrmittent Internet connectivity during this maintenance window.

 Return to Top of Page

A word about Recent Viruses, Worms and Trojans.

McAfee is our Virus scanning application that is used throughout Chicago-Kent. According to McAfee's web site there are more then 62,000 virus threats that exist and new ones are found everyday. Viruses and backdoor Trojans can cause major disruptions and financial loss. The Melissa, I love You, Goner, Code Red and many others have impacted many organizations to the point that even Microsoft had to turn off their e-mail systems until the virus could be contained. The newer forms of viruses (Backdoor Trojans) are even more devastating by actually giving someone else complete control of your computer and access to all the information stored on them.

There are things that you can do to protect your computer. You can protect yourself by running a full virus scan of all the files on your computer periodically. Ensuring that you have the latest updates from the vendor. Avoid programs from unknown sources (Internet and Email). Never open or double-click on an attachment that is from an unknown recipient.

The Center for Law and Computers posts Virus Updates to your computer desktop as they are released from the vendor or you can access them directly from McAfees web site when connected to the internet through the virus application. An ounce of protection will go a long way in ensuring that your documents and computer are virus free.

Note: the latest DAT file as of 11/7/05 - is sdat4618.

Computer Specification
The Center for Law and Computers Computer Specifications

Pentium IV (or Pentium III equivalent) 800 or up MHz processor
2 PC Card/Card Bus Slots: network card (notebook only)
20GB or greater Hard Drive
3.5" Floppy Drive
CD-ROM Drive or DVD-ROM Drive
10/100 Ethernet Card (notebook only)
*NOTE* Windows XP home edition will not work with our network
56K modem
Sound Card to support RealPlayer (or RealPlayer equivalent) feed
17" monitor with .28mm dot pitch (desktop only)
12" Active Matrix or TFT display (notebook only)

Pentium III (or Pentium II equivalent) 500 or up MHz processor
Available PC Card/Card Bus Slots: network card (notebook only)
10GB or up Hard Drive
3.5" Floppy Drive
CD-ROM Drive
10/100 Ethernet Card (notebook only)
Windows 98
56K modem
Sound Card to support RealPlayer (or RealPlayer equivalent) feed
14" or 15" color monitor .28mm dot pitch (desktop only)

If you have a computer that nearly meets the minimum requirements and is extremely costly to upgrade, please call the Center for Law and Computers at (312) 906-5300, so that we can assist you in determining the best solution for both short and long-term needs.

A Word About Microsoft Operating Systems

Beginning with Windows ME in calendar year 2000, Microsoft began implementing a strategy of tailoring certain versions of their Windows operating systems specifically toward consumer markets. Windows ME and certain future versions of the Windows operating system include multimedia and "ease of use" features that are designed to make the use of a Windows based computer a more engaging experience in the home.

While this may sound enticing, it is important to realize that the "consumer" versions of Windows are not designed to exist in a corporate network environment like that at Chicago-Kent. In fact, the "consumer" version of Microsoft's latest operating system, Windows XP Home Edition, does not include any capability to connect to corporate networks.

So where does this leave you? At the time of these specifications writing, the Center for Law and Computers recommends Windows 2000 Professional or Windows XP Professional (Professional being the KEY word here) as the best all-around operating systems for new notebook computer purchases. If neither is available, then Windows 98 would be the next best choice followed by Windows ME as a last option. For students who already own a notebook, any edition of Windows 98 along with Windows 2000 Professional and XP Professional can be configured to connect to the Chicago-Kent network. Existing Windows ME notebooks can be configured to connect to the network through some additional work by computer support staff. Desktop users are encouraged to remain with the operating system that is presently on their PC.

A word about MS Windows XP

On October 25, 2001, Microsoft released the newest version of their Windows operating system called Windows XP. This new operating system comes in two distinct editions: Windows XP Home Edition and Windows XP Professional. Please be aware that while Windows XP Home Edition can connect to the Internet, it can not in any way be made to connect to corporate networks such as the Chicago-Kent LAN. A computer running the Home Edition of Windows XP will not be able to access network printers, network drives such as H: home directories, and e-mail via Microsoft Outlook.

It is for these reasons that the Center for Law and Computers recommends that anyone purchasing a new machine positively confirm the operating system with their vendor. Computers that are available only with Windows XP pre-installed should only be purchased if it is Windows XP Professional, NOT Windows XP Home Edition.

Windows 98 and Windows 2000 Professional continue to be fully compatible with the Chicago-Kent network.

As always, please feel free to contact the CLC Help Desk if you have any questions or concerns.

Email and Network Accounts:

A Chicago-Kent email account is setup for you. Your username will be your first initial and last name, no punctuation or spaces (i.e. Jane Student = jstudent) and your initial password will be the last six digits of your Social Security Number, no punctuation or spaces (i.e. 999999).

Remove unnecessary files on Network

The Center for Law and Computers provides access to the Network for Chicago-Kent students, faculty, and staff in support of the educational mission of the university. In recent months we have noticed an increase in the amount of personal storage space being consumed on our network. As we continue to maintain and scan the network drives we are noticing numerous occurrences of non-educational types of materials (i.e., MP3, .wav, .mov, .avi). We understand that there are occasions when storing these types of files on the network for educational use is legitimate.

As you may well be aware, the recent court decisions potentially makes us liable if members of our community engage in infringing activity. As a reminder to all students, a portion of the IIT Computer Use Policy states, "Network users must abide by the terms of all software licensing agreements and copyright laws, and may not make copies of or make available on the network copyrighted material, unless permitted by a license. Network users must not perform acts which are deliberately wasteful of computing resources or which unfairly monopolize resources to the exclusion of others..." The complete Computer User Policy can be found at:


When you save and store large music, image, video, or other types of non-educational related material on the network it increases the time it takes for system backups and virus scanning; the large downloads also consume unnecessary bandwidth. Please be considerate of your colleagues and remove or transfer to your laptop ALL files in violation. If files are not removed, the Center for Law and Computers is authorized by the administration to permanently remove them for you.

We ask that you purge all unnecessary messages and files as often as possible from your network and email accounts to help us preserve space on the C-K server. As a reminder, in Outlook mail, you must delete messages from your "Deleted Messages" folder for them to be permanently removed from the mail server. It is also a good maintenance procedure to delete any unneeded messages in the "Sent" folder.

Changing Your Password:

To select a new password:

Access Webmail (http://webmail.kentlaw.edu) from your Internet browser, (i.e. Internet Explorer)

Select the option CHANGE PASSWORD

When prompted, enter your username, password and desired new password when successfully completed, you will receive the message PASSWORD SUCCESSFULLY CHANGED

Your new password takes effect immediately and will give you access to your email account and network files.

Password Security:

Password protection is one of the most important principles of network and e-mail security. Chicago-Kent College of Law provides access to network and electronic mail resources to its students, faculty, and staff, in support of the University's mission of teaching, research, and public service. Passwords are assigned for access to both of these resources to authenticate a user's identity, to protect network users, and to provide security.

New passwords will be provided, and existing passwords will be reset, only when the identity of the requester can be clearly established.

  • Under no circumstances will new or existing passwords be revealed by telephone.
  • The Center for Law and Computers staff will be pleased to handle requests made in one of the following ways:

    1. Requests may be made in person at the Help Desk, Room 540. Photo identification is required.

    2. Requests may be faxed to Center for Law and Computers at (312) 906- 5165. The fax must include photo identification and signature.

If you have questions or need additional assistance, please contact the Help Desk at (312) 906-5300

 Return to Top of Page

CLC Main Office (Help Desk): Room 540

Technical Support Help Desk Hours of Operation:
Monday-Thursday: 8:30 a.m. - 6:00 p.m.
Friday: 8:30 a.m. - 5:00 p.m.

Phone: (312) 906-5300
Fax: (312) 906-5165

Obtaining Microsoft Office 2000/2002 Professional Edition and FrontPage:

The Center for Law and Computers has MS Office 2000/2002 Professional Edition and FrontPage available for purchase at a discounted educational use rate. The disks can be purchased at the Help Desk in Room 540. Each student is allowed to purchase only one copy for the price of $25.50. Please bring your student or other photo ID with you to purchase a set.

Printing on KENTNET

The Center for Law and Computers has implemented print accounting software which allows you to:

1. Send print jobs to queue -- This feature allows you to send print jobs to the print station at the front of each lab where they are held in queue until you release them. In addition, you are able to send multiple print jobs to the queue and they are held until you release them at the print station.

2. You are able to check the balance of your print account -- This feature allows you to look at the number of copies you have remaining for the term (note: each student is allotted 400 pages per semester; additional pages beyond the 400 are billed at $.05 per page)

Your 400 page limit is reset at the beginning of each semester.


  1. Make sure you have sent your print job to the print station by confirming that your username is shown in the Select Print job username dialogue box.
  2. Double click your username with the mouse to bring up network password entry box.
  3. Enter your NETWORK PASSWORD. Highlight job(s) to print and click the PRINT button on the top left of the program window.

The release station will release all print jobs sent under your username. When your print jobs are listed you have the opportunity to delete them before actually sending them to print.


  • The printer may take a few minutes to warm up if not recently used.
  • You can check your page balance at the workstation you are logged on to by double clicking on the dollar sign icon ( $ ) on the bottom right of your screen.
  • After clicking this icon you will see a balance screen.
  • If the printer says toner low and the "READY" button is not lit, push the "GO" button so it is lit to continue to print. E-mail helpdesk ONLY when your print job becomes faded. You will be credited for any pages printed light due to low toner.

If you have questions, please email HELPDESK@kentlaw.edu or call 906-5300.


The principle printers in the KENTNET system are Hewlett-Packard LaserJet 8000N Printers. There is one printer in each lab 700, 760 and 900 that is set up as the default printer when you sign on in that lab.

Individual Student Printing Accounts:

Each student receives 400 pages of printing per semester. Any printing past 400 pages will be charged to your student printing account at .05 per page. You must settle your student account with the Bursar's Office before receiving your 400 page allotment for the following semester. Students with outstanding balances will have their Kentnet accounts deactivated until the balance is paid. Graduating students with a delinquent printing balance will not receive their diplomas until the accounts are paid in full.

If you print work for a faculty member, you must print out a detailed balance and have the faculty member sign for their pages. Present the signed balance sheet to the Help Desk in the Center for Law and Computers (Room 540). Your print account will be credited accordingly.

Print jobs that are sent to the Document Center printer (9th floor-library) require payment when picked up.

Please report any problems with printers or printing to the Help Desk by Email: helpdesk@kentlaw.edu or in house phone number 6-5300.

Virus Scanning Instructions

It Is Critical to Update Your Virus Detection Software Regularly:

As always, it is a good idea to update the virus protection software on your personal computer periodically to catch any new viruses lurking out there in cyber world Since we have a volume license to McAfee Virus Scan, each student, faculty and staff should have a copy of this software on his/her computer. (It is free to C-K students so...No excuse not to have it!)

The Center for Law and Computers takes a proactive stance in trying to eradicate viruses by cleaning them as they come through our servers, we cannot protect each individual PC. We are asking that you also be proactive to ensure that your PC does not become infected.

Because there are new virus outbreaks DAILY, we want to stress the importance of having the latest virus protection software and updated virus definition (.DAT) files. We'd also like to remind you that regular virus scans of all drives (weekly, if possible) are necessary in order to detect and clean any viruses so they are not sent to friends and/or colleagues.

Chicago-Kent is licensed for and supports McAfee Virus Scan from Network Associates. According to information on their web site, there are over 50,000+ viruses out there and the potential for damage is continuous. We here at the Center for Law and Computers want to make sure you have the best possible protection for your PC. Please follow the manual instructions below to install the latest virus definition updates (.DAT files) for your McAfee software.

Manual Instructions:

FIRST: Check to see that you have a recent version of the virus scanning software on your computer.

NOTE: For Windows XP and 2000 users only

You can do this by clicking on the small blue and red "VShield " icon in the lower right corner of your screen with the right mouse button. When you do, a small menu will pop up. Select the "About VirusScan Enterprise" choice in this menu by clicking on it once with the left mouse button.

After clicking "About VirusScan Enterprise" you will get a box that displays several numbers. There are two important numbers that you should be concerned with. The first number is in boldface and located next to the phrase “VirusScan Enterprise" toward the top. This number tells you what version of the Virus Scan product or "engine" you are running. You should be running some version of 7.x for windows xp professional and windows 2000. The second number you should be concerned with in the "About VirusScan Enterprise" box is the number next to the phrase "Virus definitions." The last four digits of this number tell you the version of the ".DAT" you are running. As an example, the picture below is from a PC that is running version 7.1.0 of the Virus Scan product and version 4281 of the virus definitions (.DAT files).

NOTE: For Windows 98 and ME users only

You can do this by clicking on the small blue and red "VShield" icon in the lower right corner of your screen with the right mouse button. When you do, a small menu will pop up. Select the "About" choice in this menu by clicking on it once with the left mouse button.

After clicking "About" you will get a box that displays several numbers. There are two important numbers that you should be concerned with. The first number is in boldface and located next to the phrase "McAfee Virus Scan" toward the top of the box's gray area. This number tells you what version of the Virus Scan product or "engine" you are running. You should be running some version of 4.x. Any version of 3.x is too old and should be updated to a later version, please call the Help Desk to schedule an update. The second number you should be concerned with in the "About" box is the number next to the phrase "Virus definitions." The last four digits of this number tell you the version of the ".DAT" you are running. As an example, the picture below is from a PC that is running version 4.5.1 of the Virus Scan product (engine) and version 4250 of the virus definitions (.DAT files).

SECOND: Install the latest virus definition updates on your computer.


These procedures may force a reboot of your computer. In order to avoid loss of data, close all programs except Outlook before completing any of the following steps.

While signed on to the C-K network, run the update with the following three steps:

  • Find the icon called "virus updates" on your desktop

  • Double click the icon a box will appear as seen below

  • Double click on the "globe" that will begin with the letters sdat

  • Another box will appear that will guide you through the update process

    Or you can update the dat by following steps below
  • Click on "Run" in the Start Menu
  • Click on the Windows "Start Menu" in the lower left hand side of your screen.
  • Click on "Run" in the Start Menu.
  • In the space next to the word "Open:" enter the following text,
    P:\Virus\Network\SDAT-Latest.lnk (that's a lower case "l" n k not an upper case "I" n k)
  • While signed on to the C-K network, run the update with the following three steps:
  • Double Click on the folder named VirusUpdates located on your Desktop.
  • Double Click on the file sdatXXXX.exe. Where XXXX is the number of the dat file.

Once the "SuperDat" update program starts, click on "Next."

You may be prompted to restart your computer.

THIRD: Run a virus scan on your PC.

  • Click on the "Start Menu" button.
  • Click on "Programs.
  • Click on "Network Associates" or " McAfee Virus Scan."
  • Drop down to "Virus Scan.
  • A window will open that gives you options to run a virus scan on your drives.
  • Click on "Where & What" tab.
  • Make sure "Include subfolders" box is checked and click the radio button next to "All files."
  • Click on "Action" tab.
  • Click on down arrow and select "Clean infected files automatically.
  • Click "Scan now."

This will begin the scanning process. It will check all the files on the drive you designated. It may take a few minutes to several hours depending on the speed of your computer and the number of files you have. Your patience will pay off, remember you will be preventing problems in the future.

Note: The above procedures can be used in the future to update your .DAT files.

A great source for additional information about viruses is the Network Associates site:


As always, if you have questions or need additional assistance, please feel free to contact the help desk at (312) 906-5300.

Email Stations:

The Email stations located throughout the building are intended to allow students convenient and quick access to Email and the Record. Please be considerate to your fellow students when using these stations. If you want to compose many or long messages, or browse the Internet at length, please use one of the 3 computer labs in the library. Thank you for your cooperation.

Computer Labs

Lab 900 is on the ninth floor of the library at the west end of the building and has 12 computers. Turn left when you enter the library through the ninth floor entrance. The printer for the ninth floor lab is in Room 986, in the corner of the area.

Lab 700, the large, glass-walled room on the seventh floor of the library, is the largest lab, with 30 computers. This lab is sometimes used for larger research classes and it is always used for exams. LEXIS-NEXIS and WESTLAW representatives conduct office hours in Lab 700. The schedule of their office hours will be posted weekly in the Record. They can help you with online research questions.

Lab 760, also on the seventh floor of the library, is equipped with 20 computers. It is often used for research classes.

From time to time, the law school schedules classes or exams in the labs. When this occurs, a sign will be posted outside the door of the lab. Please be considerate and use one of the other labs during these scheduled activities.

If you have any problems getting onto KENTNET from any computer, call the CLC at extension 6-5300 from any black house phone located between the public telephones on every floor.



.: Main Chicago-Kent event

.: Academic calendar

.: CLE calendar

.: Alumnae/I event calendar

.: Admissions calendar


Chicago-Kent home page Student portal Faculty portal Staff portal About The Record Current Record headlines Publication deadlines The Record archives