home
all posts
categories
tags
about
maror security
secure, performant system software

Latest Posts

image loading failed
postedOn: 2025-12-17   updatedOn: 2025-12-17   notIncluded

I like to blog about the art of writing secure, resilient, readable, writable system software. I like to find the patterns that make software pleasant to work with, and the anti-patterns that make it treacherous to maintain and operate.

Source diving is a term borrowed from players and hackers of the rogue-like video game NetHack to describe a method of examining the source code of a system. To source dive is not merely to read through code; it is a deliberate and judicious undertaking. It requires code written deliberately and judiciously.

image loading failed
postedOn: 2024-9-21   updatedOn: 2024-9-21   notIncluded

Thank you for attending my talk, “Executing your unemployment incident response plan.” Slides will be posted eventually. Here are some resources I mentioned.

Negotiating Your Salary: How To Make $1000 a Minute on Amazon. This isn’t an affiliate link. I’m not above affiliate links, I’m just too lazy or busy to get one set up right now.

image loading failed
postedOn: 2024-9-7   updatedOn: 2024-9-7   notIncluded

First post!

Thanks for visiting my blog. I’m just getting things cranking around here, but let me explain to you who I am and what I’m up to.

I’m Mike Doyle and Maror Security is my consultancy. When I entered the computer science program at The Georgia Institute of Technology, I wanted to be a hotshot systems programmer. Back then, almost nobody was getting paid to hack the linux kernel, so I didn’t know how I was going to make this happen, but I had spunk.