Stephen Cooper

Stephen Cooper

Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.

Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.

After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology

Articles by Stephen

Tanium Protect was an endpoint protection package that is no more. The platform was the product of some exceptionally clever cybersecurity specialists who, unfortunately, overlooked the fundamentals of system protection in the service’s design.
By Stephen Cooper in Net Admin on March 10, 2025
Nessus Vulnerability Scanner by Tenable is a growing challenger in the cybersecurity market. It has been dubbed an industry leader by some cybersecurity analysts, but it is still not a well-known name and its sales don’t match those of industry giants, such as Trend Micro and Symantec. Find out more about this system protection package.
By Stephen Cooper in Net Admin on January 14, 2025
Read our full review Symantec's Endpoint Protection solution, how the company's approach and products have evolved over the decades, their pivot from mainframes to PCs, their use of AI for achieving near real-time results, and who their main rivals are.
By Stephen Cooper in Net Admin on March 5, 2025
We look at breach detection systems and solutions, provide in depth reviews of the top tools. We also explore how they differ from IPS & IDS systems.
By Stephen Cooper in Net Admin on February 3, 2025
Microsoft Access is a time-worn relational database management system. It was innovative in its day but it faces a lot more competition in the RDBMS market today. Is it worth learning Access’s foibles to set up a personal database? Aren’t there better alternatives and newer options available? This topic has become increasingly divisive with industry opinions being quite split. We investigate.
By Stephen Cooper in Net Admin on November 12, 2024
You may work on AWS systems or you might have got into the Amazon Web Services to support your own hobbies. However, did you know you can monetize your knowledge by getting AWS certified? Show potential employers that you know what you’re doing by following the AWS certification program.
By Stephen Cooper in Net Admin on March 14, 2025
Searching for the right website monitoring tools and researching performance reviews takes a lot of time that you probably don’t have. This review will cut out all of that work and help you focus on expanding your business.
By Stephen Cooper in Net Admin on June 17, 2024
“AWS” stands for Amazon Web Services. This is a division of Amazon, the online selling platform. The term applies to a cloud platform that offers businesses server space for rent. The company doesn’t just offer server space, it includes access to 165 services.
By Stephen Cooper in Net Admin on March 4, 2025
Until very recently, containerization was an obscure technology, only known to a few specialists. Today, however, the methodologies of containerization have become mainstream and every networking professional needs to understand what the term means.
By Stephen Cooper in Net Admin on September 2, 2024
Page 55 of 70