Author: Stephen Cooper

Stephen Cooper

Stephen Cooper has taken a close interest in online security since his thesis on internet encryption in the early 90s. He believes that technology should serve the needs of people and so writing about protection from snoopers and hackers is his ideal niche. After working as an IT consultant across Europe and the USA, he has become adept at explaining complicated technology in everyday terms. He is a people person with an interest in technology.

Comparisons

The Best Endpoint Management Tools

Looking after the endpoints on your system involves cybersecurity and access controls, as well as software management and capacity planning. The term “endpoint” describes workstations and servers. Those devices hold…

Guides

The Best Windows Job Scheduler Tools

Scheduling tasks for out-of-hours processing is a no-brainer. There are so many admin tasks that can’t be performed while the system is busy working for its user community. Temporary files…

Guides

The Best SIEM Tools

SIEM is an established and efficient method of protecting your system. Find out about the best SIEM tools.

Guides

The Best CPU Temperature Monitors

CPU temperature monitoring is a contentious issue because different processors have different operating temperature ranges. So, recording the temperature of your processor isn’t enough. You also need to know what…

Guides

Security Testing: Techniques & Tools

There are many threats to businesses and the failure of IT assets is one of them. Left unprotected, your IT system is vulnerable to attack. This is particularly the case…

Guides

The Best Online Port Scanners

What is an open port and why is it a problem? Find out about the best port scanner and protect your system from attack. “Port” is a confusing term in…