<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=User%3ARobert_WInkel</id>
		<title>User:Robert WInkel - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=User%3ARobert_WInkel"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Robert_WInkel&amp;action=history"/>
		<updated>2026-04-17T20:37:01Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Robert_WInkel&amp;diff=135179&amp;oldid=prev</id>
		<title>KateHartmann: Creating user page with biography of new user.</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Robert_WInkel&amp;diff=135179&amp;oldid=prev"/>
				<updated>2012-08-31T20:09:42Z</updated>
		
		<summary type="html">&lt;p&gt;Creating user page with biography of new user.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Summary:&lt;br /&gt;
I have had 18 years experience in the areas of Defence, Intelligence and Security, covering a broad range of specialist technical, liaison and managerial roles.&lt;br /&gt;
I have many years of experience with vulnerability assessments, penetration tests, threat &amp;amp; risk assessments, etc. for numerous government agencies and commercial organisations My experience includes being Director of three security consultancy companies, and CTO of a fourth.&lt;br /&gt;
Currently I am researching methods to use OSINT to track targets of interest (aka. cyberstalking). I have recently gained the PCI DSS QSA and GPEN certifications, and am studying for some other certifications (OSCP, SWSE).&lt;br /&gt;
I am a father, an entrepreneur, an ethical hacker, a sharp shooter, a body language expert, a lock picking enthusiast, a hobbyist in advanced artificial intelligence, and a Lord (in name only, not in demeanor!)&lt;br /&gt;
&lt;br /&gt;
Specialties:&lt;br /&gt;
Information Security&lt;br /&gt;
IT Security&lt;br /&gt;
Vulnerability assessment&lt;br /&gt;
Penetration testing&lt;br /&gt;
Ethical hacking&lt;br /&gt;
Threat and risk assessment&lt;br /&gt;
Social engineering&lt;br /&gt;
Digital forensics&lt;br /&gt;
OSINT&lt;br /&gt;
SIGINT&lt;br /&gt;
Reverse engineering&lt;br /&gt;
Networking protocols&lt;br /&gt;
Artificial intelligence&lt;br /&gt;
Internet research&lt;br /&gt;
Computer security&lt;br /&gt;
Compression scheme design and development&lt;br /&gt;
White hat hacking&lt;br /&gt;
Grey hat hacking&lt;br /&gt;
Corporate espionage&lt;br /&gt;
HUMINT&lt;br /&gt;
Lock picking&lt;br /&gt;
Programming in C/C++, Java, Matlab, Perl&lt;/div&gt;</summary>
		<author><name>KateHartmann</name></author>	</entry>

	</feed>