Stephen Cooper

Stephen Cooper

Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.

Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.

After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology

Articles by Stephen

Hesitant about implementing a BYOD management policy at your organization? This guide on BYOD solutions, software and management systems will keep you ahead of security threats.
By Stephen Cooper in Net Admin on August 15, 2024
This detailed guide explains how the Dynamic Host Configuration Protocol (DHCP) automates IP address assignment, enhancing network efficiency and reducing configuration errors.
By Stephen Cooper in Net Admin on December 16, 2024
SolarWinds offers a free secure file transfer facility in its SFTP/SCP Server. Copy over backups of
By Stephen Cooper in Net Admin on September 20, 2023
Since Cisco discontinued the program, Network Magic users have found that the system has gradually slipped out of date, often doesn't work properly, and doesn't have a help desk backing it. We'll show you the best alternatives.
By Stephen Cooper in Net Admin on July 15, 2024
Is your network ready to tackle persistent Remote Access Trojan threats? We show you the best RAT detection software and tools.
By Stephen Cooper in Net Admin on November 14, 2024
We guide you through the process of creating, hosting and managing a Docker network. We also review
By Stephen Cooper in Net Admin on July 19, 2023
We provide a brief IPAM guide that includes tips, then we review the leading IPAM tools for Windows and Linux including their Pros & Cons, and and links to free trials and downloads.
By Stephen Cooper in Net Admin on June 18, 2024
Everyone knows what a forest is in the real world – it is an area that is covered by trees. So, where are the trees in Active Directory? We take a closer look at the AD forest VS Domain basics and look at the best AD Tools for the staying on top of Active Directory.
By Stephen Cooper in Net Admin on June 5, 2023
Port scanning helps you to tighten up system security by detecting open ports. We list the best free port scanner tools.
By Stephen Cooper in Net Admin on June 13, 2023
Page 56 of 64