Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.
Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.
After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology
SFTP adds encryption to the more commonly used file transfer system, FTP. This command-line utility is very easy to use as long as you know the meaning of the commands. We show you how to navigate SFTP from the command-line.
Need to perform a scan to find the IP addresses of devices on your local network? We show you some manual command-line techniques, and we also take a closer look at the industry's leading port scanner and tracker tools.
Hesitant about implementing a BYOD management policy at your organization? This guide on BYOD solutions, software and management systems will keep you ahead of security threats.
Since Cisco discontinued the program, Network Magic users have found that the system has gradually slipped out of date, often doesn't work properly, and doesn't have a help desk backing it. We'll show you the best alternatives.
We provide a brief IPAM guide that includes tips, then we review the leading IPAM tools for Windows and Linux including their Pros & Cons, and and links to free trials and downloads.