Skip to main content

Do You Know Why There Is a Cylinder At The End Of Your Charger?

Do You Know Why There Is a Cylinder At The End Of Your Charger?
  

Do You Know Why There Is a Cylinder At The End Of Your Charger?

What Is This Cylinder On Your Charger For?

While my laptop charger has never bugged me, but I always felt strange at times to see a bump in my laptop charger right after it connects to the laptop. I always use to wonder why the charger has a bump and what purpose does it serve?
You normally see these “bumps” on the mouse, keyboard and monitor cables in a typical computer system found in a home or office. You can also find them on power supply wires when a device (like a printer or scanner) uses an external transformer.
It turns out that these bumps are called ferrite bead. It may also be called blocks, core, rings, EMI (electromagnetic interference) filters, or chokes. A ferrite bead has the property of eliminating broadcast signals and prevents energy loss of the same type within the charger. This makes the charger much more effective and helps charge your computer more quickly. Their purpose is to reduce EMI and RFI (radio-frequency interference). These cylinders are responsible for stopping very large deviation of power over supply through the cable and power surges in currents that pass through the cable and prevent ‘choke’ within the wire to make it any further supply the current to the device. The blocking is most effective when it is near the source of the EMI, that’s why you will only find these ferrite beads near the end of the cables.
It also acts as a choke or inductor that blocks high frequency noise in electronic circuits. Ferrite bead employs the dissipation of high frequency currents in a ferrite ceramic to build high frequency noise suppression devices.
The bead is made up of ceramic compounds, derived from iron oxide and/or oxides of other transition metals. It helps to prevent the wire behave on over floating current like aerials. It slips over the cable when the cable is made, or it can be snapped around the cable in two pieces after the cable is made. The bead is encased in plastic — if you cut the plastic, all that you would find inside is a black metal cylinder. This metal wire can possibly serve as an antenna by absorbing or releasing any radiation while passing current around it.
The radiation released by the wires without the bead could cause interference with other electronic objects around them, which act as receivers of this radiation, for instance, causing noise in speakers. This phenomenon’s example can be seen when cell phones interfere with the signal devices such as radios and speakers, producing a recurring noise well known for electronic users.

Popular posts from this blog

Hidden Wiki

Welcome to The Hidden WikiNew hidden wiki url 2015 http://zqktlwi4fecvo6ri.onion Add it to bookmarks and spread it!!!
Editor's picks Bored? Pick a random page from the article index and replace one of these slots with it.
The Matrix - Very nice to read. How to Exit the Matrix - Learn how to Protect yourself and your rights, online and off. Verifying PGP signatures - A short and simple how-to guide. In Praise Of Hawala - Anonymous informal value transfer system. Volunteer Here are five different things that you can help us out with.
Plunder other hidden service lists for links and place them here! File the SnapBBSIndex links wherever they go. Set external links to HTTPS where available, good certificate, and same content. Care to start recording onionland's history? Check out Onionland's Museum Perform Dead Services Duties. Introduction PointsAhmia.fi - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database). DuckDuckGo - A Hidden S…

[SOLVED] IDM WAS REGISTERED WITH A FAKE SERIAL NUMBER

[SOLVED] IDM WAS REGISTERED WITH A FAKE SERIAL NUMBER
Good News [May 08, 2015]: IDM developers got smarter, but the crackers are always a step ahead. Follow this article and send an email to uglyduckblog@gmail.com if you are desperate. I can NOT post any crack here for legal reasons. Happy Downloading with IDM. ;) *********** first tip is to use latest crack for idm from  onhax.net idm universal web crack and make sure u are using all latest vers I am sure many of us are too much dependent on Internet Download Manager a.k.a. IDM. The main reason didn’t permanently switch to linux was IDM. I mainly use it for batch downloading and download streaming videos. Till yesterday, IDM was working fine with me (of course with fake serial numbers, keygen, crack, patch etc. which could be found with little effort). But few days ago, with the latest update version 6.18 build 7 (released on Nov 09, 2013) Internet Download Manager was literally had a breakthrough and crushed all the serial numbers, …

DoubleAgent Attack Turns Your Antivirus Into Malware And Hijacks Your PC



Short Bytes: Cybellum security researchers have uncovered a new attack mechanism that can be used to take control of your antivirus and turn it into a malware. Called DoubleAgent, this attack exploits an old and undocumented vulnerability in Windows operating system. This Zero Day code injection technique affects all major antivirus vendors and has the power to hijack permissions. The security researchers from Cybellum have found a new technique that can be used by the cybercriminals to hijack your computer by injecting malicious code. This new Zero-Day attack can be used to take full control over all the major antivirus software. Instead of hiding from the antivirus, this attack takes control of the antivirus itself. Called DoubleAgent, this attack makes use of a 15-year-old legitimate feature of Windows (read vulnerability)–that’s why it can’t be patched. It affects all versions of Microsoft Windows. Cybellum blog mentions that this flaw is still unpatched by most antivirus v…