Stephen Cooper

Stephen Cooper

Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.

Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.

After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology

Articles by Stephen

There are numerous data loss prevention tools on the market that can help you protect your data. We take a look at the best tools available and show you which one is right for you.
By Stephen Cooper in Data Privacy Management on December 4, 2024
You can capture packets without buying any special equipment because your switch can forward copies of passing traffic. This process is called port mirroring. Find out what it is and how to implement it.
By Stephen Cooper in Net Admin on March 20, 2023
This article will guide you through how to fix packet loss and compare top network monitoring tools that can help combat the issue.
By Stephen Cooper in Net Admin on December 12, 2024
Doxxing can be a particularly unpleasant form of attack, sometimes with dire consequences for victims. We take a look at what doxxing is and how you can stay safe from this type of attack.
By Stephen Cooper in VPN & Privacy on October 19, 2023
Exchange Server is one of the most widely deployed of Microsoft’s products. If you are considering implementing an email system for your organization, find out more about Exchange Server with this guide.
By Stephen Cooper in Net Admin on December 2, 2024
Dameware is a remote support system that helps IT departments and service providers to support users. This support software runs on-premises and installs on Windows environments.
By Stephen Cooper in Net Admin on May 21, 2024
We'll show you how to stream British TV from Spain. Whether it's BBC, ITV, Channel 4, Sky Go or British Netflix you can watch your favourite UK TV abroad if you know how.
By Stephen Cooper in VPN & Privacy on September 30, 2024
Split tunneling allows you to choose which devices, apps, or websites use a VPN connection and which use a direct connection. Find out more about this handy feature and the best VPNs for split tunneling.
By Stephen Cooper in VPN & Privacy on July 3, 2024
We take a look at the best VPNs for Safari for fast, private browsing. Use these Safari VPNs to stream international content or blocked services from any location.
By Stephen Cooper in VPN & Privacy on April 19, 2024
Page 52 of 64