author-image

Stephen Cooper

Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.

Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.

After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology

Articles by Stephen

Unleashing WMI: Windows' Powerful Yet Overlooked Event Reporting Tool. Learn everything you need to know about it and about it and some of the best WMI Monitoring Tools.
By Stephen Cooper in Net Admin on January 12, 2024
If you are setting up your own email server then you have a choice of operating software to look thr
By Stephen Cooper in Net Admin on December 3, 2018
Cisco swtiches let you copy traffic streams for analysis, but you need to set up the facility first.
By Stephen Cooper in Net Admin on July 21, 2022
Internet Information Services and Apache HTTP Server are both widely used Web servers, so which do y
By Stephen Cooper in Net Admin on January 4, 2023
A message switched network guide with an in depth look at circuit switching, message switching and p
By Stephen Cooper in Net Admin on June 26, 2020
Multicast messaging offers a great way to create groups for video and voice chat. How does it work?
By Stephen Cooper in Net Admin on November 29, 2018
In the late 1980’s, SNMP or the Simple Network Management Protocol first emerged as a solution for managing nodes within a network. Since then SNMP data has been used to measure the system performance of devices across countless vendors to help ensure that networks stay up and running. Today SNMP is one of the most popular networking protocols in the world and snmpwalk has become a go-to method for scanning multiple nodes at once.
By Stephen Cooper in Net Admin on April 5, 2024
Traffic analysis will give you confirmation on the successful capacity allocation for your system or highlight network segments that are experiencing bottlenecks. In this post, you will read about the best network monitoring tools that will interact with your Juniper network devices and help you to get data about your network's performance.
By Stephen Cooper in Net Admin on August 4, 2023
Your browser is an access to the point to the internet, and can also give anyone on the internet acc
By Stephen Cooper in VPN & Privacy on August 1, 2023
Page 52 of 56