Miguel Leiva-Gomez

Miguel is an eccentric techie who loves to open up any subject to do with computers in the appropriate conversation. With more than a decade of experience, Miguel still doesn't grow tired of computers and their components. Think of a subject, and he'll have the know-how on it, even when you're talking about whether to declare a "char" pointer or "string" in C++. He now runs his own blog called The Tech Guy where he just blurts about computers in his own free time.

Follow Miguel Leiva-Gomez on Twitter, Google+

Is a VR Headset Worth Buying in 2017?

Is a VR Headset Worth Buying in 2017?

2016 is the year that virtual reality started making inroads in the gaming markets. Many people are now looking to get a VR headset in 2017. Is it worth it?

Why Did Windows 10 Flop?

Why Did Windows 10 Flop?

Even though Microsoft is actively pushing Windows 10, its market share is still far behind Windows 7. Did Windows 10 flop? How did things get this way?

The Security Caveats of NFC Payments

The Security Caveats of NFC Payments

Many people like the convenience of NFC payment but are not aware of the potential risk behind it. There are a couple of things you should know before you hop onto the bandwagon of convenience that contact-less payments provide.

MTE Explains: What Is a “Man in the Middle Attack?”

MTE Explains: What Is a “Man in the Middle Attack?”

For an attack carried out over the Internet to be successful, the hacker behind it has to be clever. And nothing demonstrates wit more clearly than the “man in the middle attack”. It’s time to make people aware of what a “man in the middle” (MiM) attack is and some best practices that could prevent it from being carried out.