Stephen Cooper

Stephen Cooper

Stephen Cooper has taken a close interest in online security since his thesis on Internet encryption in the early 90s. That formed part of his BSC (Hons) in Computing and Informatics at the University of Plymouth. In those days, encapsulation techniques were just being formulated and Cooper kept an eye on those methodologies as they evolved into the VPN industry. Cooper went on to study an MSC in Advanced Manufacturing Systems and Kingston University. He also holds an MSc Advanced Security and Digital Forensics from Edinburgh Napier University.

Cooper worked as a technical consultant, sitting DBA exams and specializing in Oracle Applications. With a long experience as a programmer, Cooper is able to assess systems by breaking into programs and combing through the code. Knowledge of IT development and operations working practices helps him to focus his reviews on the attributes of software that are really important to IT professionals.

After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology

Articles by Stephen

Cisco switches enable you to copy traffic streams for analysis, but you must set up the feature first. Learn how to use the SPAN port for packet sniffing
By Stephen Cooper in Net Admin on November 30, 2024
Both Internet Information Services (IIS) and Apache HTTP Server are widely used web servers—so which should you choose? What if you make the wrong decision?
By Stephen Cooper in Net Admin on December 3, 2024
How do message switched networks work? Discover their store-and-forward approach, advantages, and why they were replaced by packet switching.
By Stephen Cooper in Net Admin on March 11, 2025
Multicast IP routing improves network efficiency by delivering data to multiple recipients simultaneously. Learn how it works and its key benefits.
By Stephen Cooper in Net Admin on March 10, 2025
In the late 1980’s, SNMP or the Simple Network Management Protocol first emerged as a solution for managing nodes within a network. Since then SNMP data has been used to measure the system performance of devices across countless vendors to help ensure that networks stay up and running. Today SNMP is one of the most popular networking protocols in the world and snmpwalk has become a go-to method for scanning multiple nodes at once.
By Stephen Cooper in Net Admin on November 11, 2024
Traffic analysis will give you confirmation on the successful capacity allocation for your system or highlight network segments that are experiencing bottlenecks. In this post, you will read about the best network monitoring tools that will interact with your Juniper network devices and help you to get data about your network's performance.
By Stephen Cooper in Net Admin on March 7, 2025
Your browser is an access to the point to the internet, and can also give anyone on the internet acc
By Stephen Cooper in VPN & Privacy on August 1, 2023
If you want to make sure that users on the network have access to the right tools and want to have appropriate restrictions in place, there is nothing more powerful than access rights management software. We'll show you the best access rights management software available.
By Stephen Cooper in Net Admin on February 10, 2025
An in depth look at the best network edge service providers where we review the best providers, alon
By Stephen Cooper in Cloud and Online Backup on February 14, 2024
Page 68 of 71