Miguel Leiva-Gomez

Miguel is an eccentric techie who loves to open up any subject to do with computers in the appropriate conversation. With more than a decade of experience, Miguel still doesn't grow tired of computers and their components. Think of a subject, and he'll have the know-how on it, even when you're talking about whether to declare a "char" pointer or "string" in C++. He now runs his own blog called The Tech Guy where he just blurts about computers in his own free time.

Follow Miguel Leiva-Gomez on Twitter, Google+

The Security Caveats of NFC Payments

The Security Caveats of NFC Payments

Many people like the convenience of NFC payment but are not aware of the potential risk behind it. There are a couple of things you should know before you hop onto the bandwagon of convenience that contact-less payments provide.

MTE Explains: What Is a “Man in the Middle Attack?”

MTE Explains: What Is a “Man in the Middle Attack?”

For an attack carried out over the Internet to be successful, the hacker behind it has to be clever. And nothing demonstrates wit more clearly than the “man in the middle attack”. It’s time to make people aware of what a “man in the middle” (MiM) attack is and some best practices that could prevent it from being carried out.

Is Google Competing Unfairly?

Is Google Competing Unfairly?

Google is constantly facing litigation for unfair competition, so do you think Google is competing unfairly or it is clear of any wrongdoing?

Are Air-Gapped Computers Hacker-Proof?

Are Air-Gapped Computers Hacker-Proof?

One of the simplest approaches to security is air-gapping (disconnecting the system from the Internet entirely). But, is an air-gapped computer hacker-proof? Let’s find out.

Is Thinner Hardware “Better”?

Is Thinner Hardware “Better”?

Many hardware manufacturers have pushed their research departments to come up with ways to fit more hardware into smaller spaces. Is this a good thing?