Stephen Cooper

Stephen Cooper

Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.

Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.

After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology

Articles by Stephen

Hesitant about implementing a BYOD management policy at your organization? This guide on BYOD solutions, software and management systems will keep you ahead of security threats.
By Stephen Cooper in Net Admin on March 7, 2025
This detailed guide explains how the Dynamic Host Configuration Protocol (DHCP) automates IP address assignment, enhancing network efficiency and reducing configuration errors.
By Stephen Cooper in Net Admin on December 16, 2024
SolarWinds offers a free SFTP/SCP Server for secure file transfers, ideal for backing up network device configurations.
By Stephen Cooper in Net Admin on February 3, 2025
Since Cisco discontinued the program, Network Magic users have found that the system has gradually slipped out of date, often doesn't work properly, and doesn't have a help desk backing it. We'll show you the best alternatives.
By Stephen Cooper in Net Admin on February 10, 2025
Is your network ready to tackle persistent Remote Access Trojan threats? We show you the best RAT detection software and tools.
By Stephen Cooper in Net Admin on November 14, 2024
Learn how to create, host, and manage a Docker network. We also review top Docker tools with download links included.
By Stephen Cooper in Net Admin on February 12, 2025
We provide a brief IPAM guide that includes tips, then we review the leading IPAM tools for Windows and Linux including their Pros & Cons, and and links to free trials and downloads.
By Stephen Cooper in Net Admin on June 18, 2024
Everyone knows what a forest is in the real world – it is an area that is covered by trees. So, where are the trees in Active Directory? We take a closer look at the AD forest VS Domain basics and look at the best AD Tools for the staying on top of Active Directory.
By Stephen Cooper in Net Admin on December 31, 2024
Port scanning helps you to tighten up system security by detecting open ports. We list the best free port scanner tools.
By Stephen Cooper in Net Admin on February 14, 2025
Page 62 of 70