Position Statement
from the
UNIX Support at UNT Committee

The UNIX Support committee (composed of Travis Brown, Tim Christian, Abraham John, Rich Anderson, David Wright, Mike Hatch, and Allen Bradley) met during the months of March and April of 2002 and has established a position.  We acknowledge the current popularity of the UNIX operating system and its derivatives, both worldwide and here on the UNT campus.  Likewise, we acknowledge our responsibility to support those users on campus who require this OS. 

General Position
Because of the distributed nature of the universityís support system, each department will determine exactly which version(s) and services they will install, use and support.   Redhat Linux, with no network services installed, is the preferred, default platform when applicable. 

The committee recognizes the importance of training to the successful implementation of UNIX support at UNT and has developed a training roadmap consisting of approximately fifteen 1 to 2 hour classes.  These classes, taught by CWN and CAS (and other volunteers who have not yet stepped forward), will give the support person the skills necessary to support the UNIX OS and its services and will begin shortly. 

CWN will provide first level support for the distributed areas until the college / departmentís support personnel are fully trained and staffed or until the end of this year.  There may be exceptions in very small departments or those with a very small number of Linux users.  The intent is to kick start Linux support on campus, but the long-term goal is for CWN to provide second level support only.  Second level support will be provided by CWN to all distributed areas beginning immediately. 

The default installations of most operating systems, including UNIX and its derivatives, contain security flaws that are well known and easily exploited; fortunately, they are easily remedied in most cases.  A compromised machine can be used for purposes that violate the UNT Computer Use Policy as well as state and federal laws.  In addition, a compromised machine may result in lost data, end user down time, and a considerable expenditure of staff resources.  The person responsible for the machine is accountable for the actions of the machine as outlined by UNT policies, as well as state and federal laws as applicable.  In order to prevent an unfortunate situation and minimize damage in the event of a system compromise, we recommend the following actions be taken: