Author: Stephen Cooper

Stephen Cooper

Stephen Cooper has taken a close interest in online security since his thesis on internet encryption in the early 90s. He believes that technology should serve the needs of people and so writing about protection from snoopers and hackers is his ideal niche. After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology.


The Best Windows Job Scheduler Tools

Scheduling tasks for out-of-hours processing is a no-brainer. There are so many admin tasks that can’t be performed while the system is busy working for its user community. Temporary files…


The Best SIEM Tools

SIEM is an established and efficient method of protecting your system. Find out about the best SIEM tools.


The Best CPU Temperature Monitors

CPU temperature monitoring is a contentious issue because different processors have different operating temperature ranges. So, recording the temperature of your processor isn’t enough. You also need to know what…


Security Testing: Techniques & Tools

There are many threats to businesses and the failure of IT assets is one of them. Left unprotected, your IT system is vulnerable to attack. This is particularly the case…


10 Best Online Port Scanners

What is an open port and why is it a problem? Find out about the best port scanner and protect your system from attack. “Port” is a confusing term in…


What is MQTT?

MQTT provides a networking system for IoT devices. Find out how IoT devices can communicate. MQTT stands for Message Queuing Telemetry Transport. It is a communication standard for IoT devices….


WhatsUp Gold Review

WhatsUp Gold is a powerful network performance monitor and it can be extended to cover all IT resources. WhatsUp Gold is a network monitoring package that is produced By Progress…

footer banner