Stephen Cooper

Stephen Cooper

Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.

Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.

After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology

Articles by Stephen

Free is always tempting, but when it comes to privacy and security, is it a risk worth taking? We review the best free VPNs for torrenting and also show you some of the best cheap VPNs as safer alternatives.
By Stephen Cooper in VPN & Privacy on April 17, 2024
UDP enables seamless media transfers. Once underused, it's now key for entertainment apps due to its fast, efficient delivery.
By Stephen Cooper in Net Admin on February 3, 2025
TCP/IP underpins the internet and it can also help you manage your private network. Find out more about this protocol suite.
By Stephen Cooper in Net Admin on February 14, 2025
SFTP adds encryption to the more commonly used file transfer system, FTP. This command-line utility is very easy to use as long as you know the meaning of the commands. We show you how to navigate SFTP from the command-line.
By Stephen Cooper in Net Admin on November 19, 2024
Need to perform a scan to find the IP addresses of devices on your local network? We show you some manual command-line techniques, and we also take a closer look at the industry's leading port scanner and tracker tools.
By Stephen Cooper in Net Admin on November 11, 2024
Hesitant about implementing a BYOD management policy at your organization? This guide on BYOD solutions, software and management systems will keep you ahead of security threats.
By Stephen Cooper in Net Admin on March 7, 2025
This detailed guide explains how the Dynamic Host Configuration Protocol (DHCP) automates IP address assignment, enhancing network efficiency and reducing configuration errors.
By Stephen Cooper in Net Admin on December 16, 2024
SolarWinds offers a free SFTP/SCP Server for secure file transfers, ideal for backing up network device configurations.
By Stephen Cooper in Net Admin on February 3, 2025
Since Cisco discontinued the program, Network Magic users have found that the system has gradually slipped out of date, often doesn't work properly, and doesn't have a help desk backing it. We'll show you the best alternatives.
By Stephen Cooper in Net Admin on February 10, 2025
Page 63 of 71