PinnedRan Bar-ZikinCyberArk EngineeringEnabling workers to create a pull request on their first dayIn this post, You will learn how I’ve succeeded in creating a pull request — a general term that means contributing code to accompany code…4 min read·Nov 8, 2022--1--1
Ran Bar-ZikinCyberArk EngineeringCode security in LLM on the real worldUsing LLM for coding? Great! but you know that there might be security issues with that code. Right?5 min read·Aug 21, 2023----
Ran Bar-ZikinCyberArk EngineeringHow to Add Context to OpenAI GPT with LlamaIndexAlex Gelman, Ran Bar-Zik6 min read·Jun 8, 2023--1--1
Ran Bar-ZikinCyberArk EngineeringDisplay output for users in BASH configuration scriptsWhen you create environment configuration scripts for users, in some cases, you have to show significant output or call for action.4 min read·Apr 20, 2023--1--1
Ran Bar-ZikWhat a humble web developer can learn from Raspberry Pi.I love Raspberry Pi, and I love tweaking with it. Raspberry Pi looks like a very nice hobby, but unrelated to my professions as a web…4 min read·Aug 1, 2022--1--1
Ran Bar-ZikinSoluto by asurionWhy jest snapshots can be harmful — practical examplesWhat are jest snapshots?6 min read·Jan 27, 2022--2--2
Ran Bar-ZikNew frontend based attack mimic blue screen in a very effective wayI think that the lowest level of attack is the front end scam attacks. It means attacks that use CSS, JS, and other front-end manipulations…2 min read·Aug 20, 2018----
Ran Bar-ZikThe new HTML5 video\audio API has privacy issues on desktop ChromeHTML 5 new API allows us to grab the audio\video output right from the browser. No need for cumbersome native Windows interfaces or weird…3 min read·May 28, 2017----