If you have never used the course's fileserver before (i.e., this is the first time you've been in the COS 111 lab!), your TA should demonstrate how to briefly log on and run a setup script on your CIT UNIX account. This script will allow you to have access to software we will be providing throughout the course of the labs.
You only have to run this script once. So, if this is not your first time in the COS 111 lab, you probably don't have to run the script. You can proceed directly to the general directions:
Now close the Chooser. There should now be icons labelled "My Work" and "COS 111 Software" on the desktop, near the hard drive icon. You can treat these icons just as if they were hard drives, though be warned that all operations with the fileserver are likely to be very slow.
When you are done with the lab module and preparing to leave the lab, dismount the fileserver (make it unaccessible again) by dragging the "My Work" and "COS 111 Software" icons to the trash can. If you do not do this, your files will remain available to everyone else who uses the machine, and may be damaged.
Every time you perform this login procedure, you must remember to UNCHECK THE BOX that asks you whether you want to save your password. Otherwise, anyone who walks into the lab can gain complete access to your personal files and email. If you do not see the password panel at this point in the procedure, it means you have already compromised your account in this way, and you should change your CIT UNIX password. Ask your lab TA for assistance if this is the case.
After UNCHECKING THE BOX that asks whether you want to save your password, enter your CIT UNIX password and click OK.
When you are done with the lab module and are preparing to leave the lab, restart the computer again, by once again selecting "Quit all programs and log in as another user". You don't have to log in again, just leave it sitting. Better yet, shut down Win95 and turn the computer off completely. If you don't do one of these things, your files will remain accessible to other people using that computer, and they may be damaged.