This document discusses seismic waves and probing the Earth's interior. It provides examples of seismic wave arrival times that can be used to estimate velocities in different layers. Specifically, it examines arrival times of PcP and ScS phases to calculate mantle velocity, and uses PKiKP and PKIKP times to find velocities in the outer and inner cores. Ray tracing exercises are also presented to further analyze seismic wave propagation and velocities at different depths within the Earth.
This document discusses considerations for passive seismic acquisition based on the author's experience. It suggests that while passive seismic is gaining popularity, the equipment and understanding of practicalities may not be fully developed like they were in the early days of active 3D land seismic. The author examines important specifications for passive equipment, such as frequency response down to 1 Hz, high dynamic range, and universal applicability for both active and passive operations. Lessons from the evolution of active seismic technology are relevant to avoid potential pitfalls as passive seismic expands.
This document discusses seismic waves and probing the Earth's interior. It provides examples of seismic wave arrival times that can be used to estimate velocities in different layers. Specifically, it examines arrival times of PcP and ScS phases to calculate mantle velocity, and uses PKiKP and PKIKP times to find velocities in the outer and inner cores. Ray tracing exercises are also presented to further analyze seismic wave propagation and velocities at different depths within the Earth.
This document discusses considerations for passive seismic acquisition based on the author's experience. It suggests that while passive seismic is gaining popularity, the equipment and understanding of practicalities may not be fully developed like they were in the early days of active 3D land seismic. The author examines important specifications for passive equipment, such as frequency response down to 1 Hz, high dynamic range, and universal applicability for both active and passive operations. Lessons from the evolution of active seismic technology are relevant to avoid potential pitfalls as passive seismic expands.
This document summarizes the Shellshock vulnerability in the Bash shell. It describes how the vulnerability works, its impact, timeline of events, and examples of attacks exploiting Shellshock through CGI scripts, DHCP, SSH, SMTP, and SUID programs. It also discusses botnets, worms, and attacks on Yahoo that used Shellshock. The document provides resources for further information on Shellshock.
İngilizce eğitimlerinde 4 yıl ve iş dünyasında 20 yılı aşkın tecrübemizle İş İngilizcesi'ni geliştirmek için neyi, nasıl, neden yapmamız gerektiğini biliyoruz. Profesyonellere profesyonel eğitimler için bizimle iletişime geçin.
Devfest istanbul'14 - Web Application Attacks and Trusting FrameworksMehmet Ince
Frameworks are undeniably one of the most important elements of frameworks. As we continue to witness a significant increase in number of framework-based attacks towards web applications each day, usage of Frameworks without considering security-related aspects continue to be the most drastic problem that developers face. Throughout the presentation; Mr. İnce will analyze one of the most commonly-used PHP web frameworks by highlighting important security considerations; followed by a real-time exploitation of discovered vulnerability in LAB environment.
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TIIsmail Fahmi
The document discusses using Kali Linux to discover vulnerabilities in an organization's IT implementation by performing scans and analysis of their network and web applications, finding multiple outdated and vulnerable WordPress plugins, as well as vulnerabilities in the organization's website through techniques like DNS zone transfers and Nmap scanning. Vulnerabilities identified include SQL injections, cross-site scripting issues, and outdated software versions.
BGA Siber Olaylara Müdehale Ekibi (SOME)
Danışmanlık & Eğitim Hizmteleri
Security Operation Center (SOC)
Açık Kaynak Kod Çözümleri
ISO 27001 Danışmanlık ve Eğitim Hizmetleri
Siber Tehdit İstihbarat - Normshield
Phising Simulator - Sinaralabs
Application of Low Frequency Passive Seismic Method for Hydrocarbon Detection...Andika Perbawa
Passive seismic survey is a geophysical method that utilizes a spectral frequency from seismicity data to identify subsurface reservoir fluids. Rock pores that contain hydrocarbon fluids show higher low-frequency amplitude between 2-4 Hz compared with those that contain water. This paper shows the feasibility study that has been done in S Field, South Sumatra Basin. Four wells were used to validate the result of the spectral data. This method is also considered as a prospect ranking tool in the vicinity of the S field.
Eighteen measurement points were collected and grouped into 6 clusters. Four clusters are located near S-1, S-2, S-3, and S-4 wells. One cluster is located on prospect K and the other one on prospect G. Standard signal processing flows were conducted such as band-pass filter, FFT, and moving average.
The result shows that the maximum amplitude low-frequency between 2-4 Hz of K and S-1 is less than 0.017. On the other hand, S-2, S-3, S-4 and G show a relatively high amplitude of more than 0.02 which indicates a greater possibility of hydrocarbon accumulation when compared with K and S-1. This result was confirmed by gas production in S-2 and oil production in S-3. S-4 has not been tested yet, but the refined well correlation it indicates that there is a limestone reservoir of about 60 feet above OWC. S-1 shows a low amplitude which indicates low potential. The completion log confirmed that the well did not penetrate the reservoir target. Prospect G which has a high amplitude of low-frequency anomaly is more interesting than prospect K.
To conclude, low-frequency passive seismic method was successful in distinguishing between water or no hydrocarbons. It is feasible to employ this methodology as a tool for hydrocarbon detection and also as a tool to help in prospect ranking.
This document provides instructions for hacking WiFi passwords using Kali Linux. It describes downloading and configuring Kali Linux in a virtual machine. An external USB antenna is used to monitor WiFi networks. The airodump-ng tool is used to detect networks and capture data, which is then cracked using a dictionary attack with aircrack-ng. If the network is not busy, deauthentication packets can be sent to force password transmission. Following these steps, the document claims the password for a sample network was successfully cracked.
This document summarizes the Shellshock vulnerability in the Bash shell. It describes how the vulnerability works, its impact, timeline of events, and examples of attacks exploiting Shellshock through CGI scripts, DHCP, SSH, SMTP, and SUID programs. It also discusses botnets, worms, and attacks on Yahoo that used Shellshock. The document provides resources for further information on Shellshock.
İngilizce eğitimlerinde 4 yıl ve iş dünyasında 20 yılı aşkın tecrübemizle İş İngilizcesi'ni geliştirmek için neyi, nasıl, neden yapmamız gerektiğini biliyoruz. Profesyonellere profesyonel eğitimler için bizimle iletişime geçin.
Devfest istanbul'14 - Web Application Attacks and Trusting FrameworksMehmet Ince
Frameworks are undeniably one of the most important elements of frameworks. As we continue to witness a significant increase in number of framework-based attacks towards web applications each day, usage of Frameworks without considering security-related aspects continue to be the most drastic problem that developers face. Throughout the presentation; Mr. İnce will analyze one of the most commonly-used PHP web frameworks by highlighting important security considerations; followed by a real-time exploitation of discovered vulnerability in LAB environment.
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TIIsmail Fahmi
The document discusses using Kali Linux to discover vulnerabilities in an organization's IT implementation by performing scans and analysis of their network and web applications, finding multiple outdated and vulnerable WordPress plugins, as well as vulnerabilities in the organization's website through techniques like DNS zone transfers and Nmap scanning. Vulnerabilities identified include SQL injections, cross-site scripting issues, and outdated software versions.
BGA Siber Olaylara Müdehale Ekibi (SOME)
Danışmanlık & Eğitim Hizmteleri
Security Operation Center (SOC)
Açık Kaynak Kod Çözümleri
ISO 27001 Danışmanlık ve Eğitim Hizmetleri
Siber Tehdit İstihbarat - Normshield
Phising Simulator - Sinaralabs
Application of Low Frequency Passive Seismic Method for Hydrocarbon Detection...Andika Perbawa
Passive seismic survey is a geophysical method that utilizes a spectral frequency from seismicity data to identify subsurface reservoir fluids. Rock pores that contain hydrocarbon fluids show higher low-frequency amplitude between 2-4 Hz compared with those that contain water. This paper shows the feasibility study that has been done in S Field, South Sumatra Basin. Four wells were used to validate the result of the spectral data. This method is also considered as a prospect ranking tool in the vicinity of the S field.
Eighteen measurement points were collected and grouped into 6 clusters. Four clusters are located near S-1, S-2, S-3, and S-4 wells. One cluster is located on prospect K and the other one on prospect G. Standard signal processing flows were conducted such as band-pass filter, FFT, and moving average.
The result shows that the maximum amplitude low-frequency between 2-4 Hz of K and S-1 is less than 0.017. On the other hand, S-2, S-3, S-4 and G show a relatively high amplitude of more than 0.02 which indicates a greater possibility of hydrocarbon accumulation when compared with K and S-1. This result was confirmed by gas production in S-2 and oil production in S-3. S-4 has not been tested yet, but the refined well correlation it indicates that there is a limestone reservoir of about 60 feet above OWC. S-1 shows a low amplitude which indicates low potential. The completion log confirmed that the well did not penetrate the reservoir target. Prospect G which has a high amplitude of low-frequency anomaly is more interesting than prospect K.
To conclude, low-frequency passive seismic method was successful in distinguishing between water or no hydrocarbons. It is feasible to employ this methodology as a tool for hydrocarbon detection and also as a tool to help in prospect ranking.
This document provides instructions for hacking WiFi passwords using Kali Linux. It describes downloading and configuring Kali Linux in a virtual machine. An external USB antenna is used to monitor WiFi networks. The airodump-ng tool is used to detect networks and capture data, which is then cracked using a dictionary attack with aircrack-ng. If the network is not busy, deauthentication packets can be sent to force password transmission. Following these steps, the document claims the password for a sample network was successfully cracked.
Gravimetri Dersi için aşağıda ki videoları izleyebilirsiniz.
Link 01: https://www.youtube.com/watch?v=HTyjVaVGx0k
Link 02: https://www.youtube.com/watch?v=fUkfgI8XaOE
The document discusses gravity anomalies and density variations in different regions based on gravity data. It shows how gravity maps reveal details about crustal thickness, tectonic features like faults and volcanic zones, and plate boundaries. Specific examples discussed include the Tibetan Plateau, Central America subduction zone, an area in Chugoku, Japan, and the state of Florida in the US. Regional gravity data can be used to model density changes associated with plate tectonics, crustal evolution, and volcanic and tectonic activity.
The USF team reviewed a geophysical investigation of the Kar Kar region conducted by WesternGeco in 2011. They found that WesternGeco's magnetotelluric (MT) data and models were of high quality. Both the WesternGeco and USF MT models identified a low resistivity zone at 300m depth that correlates with a water-bearing zone found in Borehole 4. USF performed gravity modeling which identified a north-south trending basin reaching 1500m depth, consistent with mapped faults. A preliminary hydrothermal model suggested observed temperatures could result from deep circulation of meteoric waters in the basin without needing a localized heat source. Additional geophysical data is recommended around the Jermaghbyur hot springs to
This document summarizes a study that used gravity data to delineate underground structure in the Beppu geothermal field in Japan. Analysis of Bouguer anomaly maps revealed high anomalies in the southern and northern parts of the study area that correspond to known geological formations. Edge detection filtering of the gravity data helped identify subsurface faults, including the northern edge of the high southern anomaly corresponding to the Asamigawa Fault. Depth modeling of the gravity basement showed differences between the southern and northern hot spring areas, with steep basement slopes along faults in the south and uplifted basement in the north.
This document summarizes the development of a new ultra-high resolution model of Earth's gravity field called GGMplus. Key points:
- GGMplus combines satellite gravity data from GOCE and GRACE with terrestrial gravity data and topography to achieve unprecedented 200m spatial resolution globally.
- It provides gridded estimates of gravity, horizontal and radial field components, and quasi-geoid heights at over 3 billion points covering 80% of the Earth's land.
- GGMplus reveals new details of small-scale gravity variations and identifies locations of minimum and maximum gravity, suggesting peak-to-peak variations are 40% larger than previous estimates. The model will benefit scientific and engineering applications.
Gravity measurements were taken in a region of China covering the south-north earthquake belt in 1998, 2000, 2002, and 2005. Researchers noticed significant gravity changes in the region surrounding Wenchuan and suggested in 2006 that a major earthquake could occur there in 2007 or 2008. While gravity changes were significant at some locations, more research is needed to determine if they could be considered a precursor. Uncertainties exist from measurement errors, hydrologic effects, and crustal movements. Improved data collection and analysis could enhance using gravity monitoring for earthquake research.
The document provides guidelines for implementing the H/V spectral ratio technique using ambient vibration measurements to evaluate site effects. It recommends procedures for experimental design, data processing, and interpretation. The key recommendations include measuring for sufficient duration depending on expected frequency, using multiple measurement points, avoiding disturbances, and interpreting H/V peaks in context with geological and geophysical data. Reliable H/V peaks are defined as having a clear maximum within expected frequency ranges and uncertainties. The guidelines aim to help apply the technique while accounting for its limitations.
Geopsy yaygın olarak kullanılan profesyonel bir program. Özellikle, profesyonel program deneyimi yeni mezunlarda çok aranan bir özellik. Bir öğrencim çalışmasında kullanmayı planlıyor.
1. Öncel Akademi ile Deprem
Tatbikatı
5077468311,
https://www.facebook.com/oncelacademy/
Deprem başladı. Hemen çök, kapan ve tutun. Bir
masanın altına gir. Yere kapan. Büyük bir
deprem olmuş gibi tutun. En az 60 saniye
bekleyin. Masanın altından etrafına bak. Büyük
bir depremde olacakları hayal et. Kendine ve
yakınlarına karşı sorumluluklarını gözden geçir.
Hasar gören bir şeyler olup olmadığına incele.
Depremde hasar olsaydı yaşamının nasıl
olacağını düşün. Kayıplarının azaltılması için
yapman gerekenlerin ne olduğunu düşün.
İncinme veya sakatlanma durumunda eski
haline dönmek için yapman gerekenleri hayal et.
Deprem bitti. Şimdi tek veya toplu olarak
yapılması gerekenleri uygulama zamanı.
Yakınlarınla, arkadaşlarınla ve komşularınla
iletişime geç. İletişimi önce yazılı olarak ve sonra
sözlü olarak uygulaman gerektiğini unutma.