Stephen Cooper

Stephen Cooper

Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.

Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.

After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology

Articles by Stephen

File integrity monitoring keeps your security system safe from tampering. We assess the best FIM services.
By Stephen Cooper in Net Admin on November 18, 2025
VMware can improve the efficiency of your IT infrastructure. If your host gets damaged, you want to get your hypervisor back up quickly. So, back it up.
By Stephen Cooper in Net Admin on May 17, 2024
Head off disaster by backing up your Hyper-V implementations. We detail the best tools for the job.
By Stephen Cooper in Net Admin on December 19, 2024
Network administrators have a duty to use best practices for passwords to keep the organization’s data and resources safe.
By Stephen Cooper in Net Admin on March 13, 2025
Can you forward Windows Event logs to Syslog? Yes, you can. We will show you how.
By Stephen Cooper in Net Admin on February 11, 2025
Hyper-V offers an easy way to implement virtualization. In this article, we explain the technology.
By Stephen Cooper in Net Admin on January 14, 2025
What is UAC virtualization and when should it be deployed? We explain it in this topic.
By Stephen Cooper in Net Admin on February 18, 2025
Do you deploy Elastic Load Balancing from AWS? Do you know how it works? We explain how.
By Stephen Cooper in Net Admin on February 10, 2025
IT operations staff need remote access to endpoints. Find out in this article the best connection managers available.
By Stephen Cooper in Net Admin on July 15, 2025
Page 33 of 59