Author: Stephen Cooper

Stephen Cooper

Stephen Cooper has taken a close interest in online security since his thesis on internet encryption in the early 90s. He believes that technology should serve the needs of people and so writing about protection from snoopers and hackers is his ideal niche. After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology.

Guides

7 Best Windows Job Scheduler Tools

Scheduling tasks for out-of-hours processing is a no-brainer. There are so many admin tasks that can’t be performed while the system is busy working for its user community. Temporary files…

Guides

8 Best SIEM Tools

SIEM stands for Security Information and Event Management. It is a blend of technologies that uses live data and log records to identify malicious activity. The purpose of SIEM is…

Guides

7 Best CPU Temperature Monitors

CPU temperature monitoring is a contentious issue because different processors have different operating temperature ranges. So, recording the temperature of your processor isn’t enough. You also need to know what…

Guides

Security Testing: Techniques & Tools

There are many threats to businesses and the failure of IT assets is one of them. Left unprotected, your IT system is vulnerable to attack. This is particularly the case…

Guides

10 Best Online Port Scanners

What is an open port and why is it a problem? Find out about the best port scanner and protect your system from attack. “Port” is a confusing term in…

Guides

What is MQTT?

MQTT provides a networking system for IoT devices. Find out how IoT devices can communicate. MQTT stands for Message Queuing Telemetry Transport. It is a communication standard for IoT devices….

Software

WhatsUp Gold Review

WhatsUp Gold is a powerful network performance monitor and it can be extended to cover all IT resources. WhatsUp Gold is a network monitoring package that is produced By Progress…