Search /
Advanced search  |  Help  |  Site map
Click for Layer 8! No, really, click NOW!
Networking for Small Business
Where's my gigabit Internet, anyway?
Americans cool with lab-grown organs, but not designer babies
IE6: Retired but not dead yet
Enterprise who? Google says little about Apps, business cloud services in Q1 report
DDoS Attackers Change Techniques To Wallop Sites
Can we talk? Internet of Things vendors face a communications 'mess'
AMD's profitability streak ends at two quarters
Michaels says breach at its stores affected nearly 3M payment cards
Exclusive: Google's Project Loon tests move to LTE band in Nevada
H-1B loophole may help California utility offshore IT jobs
How a cyber cop patrols the underworld of e-commerce
For Red Hat, it's RHEL and then…?
Will the Internet of Things Become the Internet of Broken Things?
Kill switches coming to iPhone, Android, Windows devices in 2015
Israeli start-up, working with GE, out to detect Stuxnet-like attacks
Galaxy S5 deep-dive review: Long on hype, short on delivery
Google revenue jumps 19 percent but still disappoints
Windows XP's retirement turns into major security project for Chinese firm
Teen arrested in Heartbleed attack against Canadian tax site
Still deploying 11n Wi-Fi?  You might want to think again
Collaboration 2.0: Old meets new
9 Things You Need to Know Before You Store Data in the Cloud
Can Heartbleed be used in DDoS attacks?
Secure browsers offer alternatives to Chrome, IE and Firefox
Linksys WRT1900AC Wi-Fi router: Faster than anything we've tested

Linux: Renegade or ally?

Here's some advice about what to do when Linux moves into your network uninvited.

Related linksToday's breaking news
Send to a friendFeedback

You may not plan to deploy Linux on your network, but that doesn't mean that your company's users won't sneak it in. As the operating system makes inroads in the enterprise, you need to decide whether you want it on your network before a renegade user brings it in unnoticed.

The use of unauthorized software and hardware has been the bane of IT's existence. When mainframes were prevalent, the PC-based Novell NetWare often moved in through the back door, led by departments that said mainframes and minicomputers didn't give operating flexibility or application capability they needed. Before long, NetWare was the dominant network operating system and IT managers complained about unauthorized Windows NT workstations and servers entering the company through that same old door. Now that Windows 2000 and NT are displacing NetWare, IT has Linux to worry about.

Linux lowdown
Technology Insider: Linux
Subscribe to the Linux newsletter

If you discover Linux on the network should you treat it like any other application added without your control, or welcome it into your overall IT plan?

The answer depends on whom you ask. Some readers Network World interviewed were starkly intolerant; others were more forgiving. In many cases, IT managers dismissed any incursion of Linux as just that - a hostile takeover of the network that shouldn't be tolerated.

ShapiroAlthough, most folks say they would slap the hands of the offenders who add anything to the network that IT hasn't approved; some would take harsher measures.

"Destroy their servers and fire them," says Jeff Shapiro, director of technology for the Kingsport, Tenn., public schools.

"IT organizations have standards and policies and renegade anythings should not be tolerated," he says. "If the company's IT structure is so weak that it's politically impossible to prevent or correct this, then it points to larger problems within the organization."

DiComoChip DiComo, network manager for shipping firm Hellman Worldwide Logistics in Miami, says, "Linux should be dealt with as any other standards violation . . . and removed."

However, DiComo concedes that he recently worked out a compromise with a group of technically adept users in Poland who are running Linux on the company's global network. "We're allowing them to run Linux as long as they allow us to manage it with Novell Directory Service," he says. The IT pros in the Polish office support the Linux box and understand that if anything goes wrong, it's up to them to fix it.

Others recommend taking this type of moderate approach and assessing how Linux fits into the IT infrastructure before you decide to rip it out. Consider the merits of the Linux operating system, such as the fact that it's free and in-house teams can develop to the source code. What's more, look at the applications and hardware your company uses. If Linux will play a part in the network, you need to find a way to support it.

"Investigate to determine if a business case has been presented to management for the offending box," says Mike Maday, network manager for the Art Institute of Chicago in Illinois. "If so, we'll be blessed with managing it. If no management approval exists, take it down quickly."

One department of the school insisted on using Linux to share about 30G bytes of Macintosh files even though IT suggested other options.

"We sat down with them and agreed that they could use their Linux box as long as our phone didn't ring when they had critical problems," Maday says. "So far, we haven't heard one thing from them since the meeting we had a few months ago."

For Mike McKinney, an IS manager for Americorp Financial in Birmingham, Mich., it's important that the rules of introducing new technology to the network be followed so you can retain control. "IS management and staff must support all operating systems and guarantee that they work on all third-party applications and other hardware we have," he says.

Americorp's IS department is thinking about using Linux for a Web server, though McKinney notes that the majority of its third-party applications don't support the operating system.

Regardless of how you feel about Linux, discovering it on your network may be more difficult than it appears. In many cases, it has been deployed on Web servers that IT may not control. That's why it's important to keep a careful watch over your own back door to see what's coming in uninvited.

Contact Senior Editor Deni Connor

Other recent articles by Connor

Reaction: Here's what some Fusion users are saying about this article: What do you think? Add your comments to the thread

Consider the choices: Find out about various versions of Linux:
Caldera Systems
SuSE Linux

The Linux Kernel Archive
The most current Linux source is here

Making Linux more secure:
Bastille Linux

Snort intrusion detection

Stay up on the OS: Sign up for our free Linux newsletter.

Technology Insider: Linux
Linux, the open source Unix variant, is making a serious run at the enterprise.

Review: Testing the Enterprise Linux Load
Caldera OpenLinux eServer 2.3 tops the list of server-side distributions.

NWFusion offers more than 40 FREE technology-specific email newsletters in key network technology areas such as NSM, VPNs, Convergence, Security and more.
Click here to sign up!
New Event - WANs: Optimizing Your Network Now.
Hear from the experts about the innovations that are already starting to shake up the WAN world. Free Network World Technology Tour and Expo in Dallas, San Francisco, Washington DC, and New York.
Attend FREE
Your FREE Network World subscription will also include breaking news and information on wireless, storage, infrastructure, carriers and SPs, enterprise applications, videoconferencing, plus product reviews, technology insiders, management surveys and technology updates - GET IT NOW.