Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.
Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.
After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology
Getting a layout of your network really helps your planning and management processes. We show you the best network mapping software which was put together to benefit network administrators.
Dynamic IP addresses can cause you problems. A dedicated IP address or static IP address is often preferred. Find out why and learn about the best VPNs for a static or dedicated IP address.
Hackers have set up bases in hotels around the world in order to gain access to corporate networks through the devices that employees carry with them on their travels. Find out more about this threat and how you can protect your business from intruder attacks.
Want a great streaming experience? We look at the best VPNs for IPTV, which keep you private and secure and allow you to stream from anywhere without sacrificing speed.
Free is always tempting, but when it comes to privacy and security, is it a risk worth taking? We review the best free VPNs for torrenting and also show you some of the best cheap VPNs as safer alternatives.
SFTP adds encryption to the more commonly used file transfer system, FTP. This command-line utility is very easy to use as long as you know the meaning of the commands. We show you how to navigate SFTP from the command-line.
Need to perform a scan to find the IP addresses of devices on your local network? We show you some manual command-line techniques, and we also take a closer look at the industry's leading port scanner and tracker tools.