author-image

Stephen Cooper

Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.

Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.

After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology

Articles by Stephen

In the late 1980’s, SNMP or the Simple Network Management Protocol first emerged as a solution for managing nodes within a network. Since then SNMP data has been used to measure the system performance of devices across countless vendors to help ensure that networks stay up and running. Today SNMP is one of the most popular networking protocols in the world and snmpwalk has become a go-to method for scanning multiple nodes at once.
By Stephen Cooper in Net Admin on April 5, 2024
Traffic analysis will give you confirmation on the successful capacity allocation for your system or highlight network segments that are experiencing bottlenecks. In this post, you will read about the best network monitoring tools that will interact with your Juniper network devices and help you to get data about your network's performance.
By Stephen Cooper in Net Admin on August 4, 2023
Your browser is an access to the point to the internet, and can also give anyone on the internet acc
By Stephen Cooper in VPN & Privacy on August 1, 2023
If you want to make sure that users on the network have access to the right tools and want to have appropriate restrictions in place, there is nothing more powerful than access rights management software. We'll show you the best access rights management software available.
By Stephen Cooper in Net Admin on March 7, 2024
An in depth look at the best network edge service providers where we review the best providers, alon
By Stephen Cooper in Cloud and Online Backup on February 14, 2024
In this ExpressVPN vs NordVPN head-to-head, we compare the two leading players in the VPN space to determine which is the best. We've extensively tested both VPNs to provide a clear breakdown of prices, speeds, and streaming support. 
By Stephen Cooper in VPN & Privacy on May 6, 2024
You can get details of the packets traveling around your network by using the tcpdump utility. Find
By Stephen Cooper in Net Admin on March 31, 2021
Find out how to manually check which permissions you’ve given to specific apps. We’ll also tell you how to revoke them and better secure your Android device in the process.
By Stephen Cooper in VPN & Privacy on September 6, 2023
Google dominates the World Wide Web. However, you don't have to use its products. Find out about sec
By Stephen Cooper in VPN & Privacy on August 2, 2023
Page 53 of 56