author-image

Stephen Cooper

Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.

Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.

After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology

Articles by Stephen

Need to perform a scan to find the IP addresses of devices on your local network? We show you some manual command-line techniques, and we also take a closer look at the industry's leading port scanner and tracker tools.
By Stephen Cooper in Net Admin on January 8, 2024
Hesitant about implementing a BYOD management policy at your organization? This guide on BYOD solutions, software and management systems will keep you ahead of security threats.
By Stephen Cooper in Net Admin on March 22, 2024
DHCP Server Guide: We provide a thorough rundown of the Dynamic Host Configuration Protocol. Learn a
By Stephen Cooper in Net Admin on May 2, 2023
SolarWinds offers a free secure file transfer facility in its SFTP/SCP Server. Copy over backups of
By Stephen Cooper in Net Admin on September 20, 2023
Since Cisco discontinued the program, Network Magic users have found that the system has gradually slipped out of date, often doesn't work properly, and doesn't have a help desk backing it. We'll show you the best alternatives.
By Stephen Cooper in Net Admin on January 4, 2024
Is your network ready to tackle persistent Remote Access Trojan threats? We show you the best RAT detection software and tools.
By Stephen Cooper in Net Admin on May 13, 2024
We guide you through the process of creating, hosting and managing a Docker network. We also review
By Stephen Cooper in Net Admin on July 19, 2023
We provide a brief IPAM guide that includes tips, then we review the leading IPAM tools for Windows and Linux including their Pros & Cons, and and links to free trials and downloads.
By Stephen Cooper in Net Admin on April 5, 2024
Everyone knows what a forest is in the real world – it is an area that is covered by trees. So, where are the trees in Active Directory? We take a closer look at the AD forest VS Domain basics and look at the five best AD Tools for the staying on top of Active Directory.
By Stephen Cooper in Net Admin on June 5, 2023
Page 48 of 56