PinnedRan Bar-ZikinCyberArk EngineeringEnabling workers to create a pull request on their first dayIn this post, You will learn how I’ve succeeded in creating a pull request — a general term that means contributing code to accompany code…Nov 8, 20221Nov 8, 20221
Ran Bar-ZikinCyberArk EngineeringWhen CSS-in-JS and CSP CollideWhen you choose your CSS-in-JS CSP policy, you should also think about your security policy.Aug 12Aug 12
Ran Bar-ZikThe Pot-Bot: Using AI and IoT to Make Your Plants Talk Back!Do some magic with RaspberryPi, Sensors, LLM, Ollama, speaker and a little bit of code.May 22May 22
Ran Bar-ZikinCyberArk EngineeringCode security in LLM on the real worldUsing LLM for coding? Great! but you know that there might be security issues with that code. Right?Aug 21, 2023Aug 21, 2023
Ran Bar-ZikinCyberArk EngineeringHow to Add Context to OpenAI GPT with LlamaIndexAlex Gelman, Ran Bar-ZikJun 8, 20231Jun 8, 20231
Ran Bar-ZikinCyberArk EngineeringDisplay output for users in BASH configuration scriptsWhen you create environment configuration scripts for users, in some cases, you have to show significant output or call for action.Apr 20, 20231Apr 20, 20231
Ran Bar-ZikWhat a humble web developer can learn from Raspberry Pi.I love Raspberry Pi, and I love tweaking with it. Raspberry Pi looks like a very nice hobby, but unrelated to my professions as a web…Aug 1, 20221Aug 1, 20221
Ran Bar-ZikinSoluto by asurionWhy jest snapshots can be harmful — practical examplesWhat are jest snapshots?Jan 27, 20222Jan 27, 20222
Ran Bar-ZikNew frontend based attack mimic blue screen in a very effective wayI think that the lowest level of attack is the front end scam attacks. It means attacks that use CSS, JS, and other front-end manipulations…Aug 20, 2018Aug 20, 2018