facebook linkedin twitter

Tip of the Week: Change Your Default Browser's Download Folder

Tip of the Week: Change Your Default Browser's Download Folder

Windows has a dedicated folder to hold downloaded content, appropriately called the Downloads folder. However, you may not want to save your downloads there. You can change the default location of any downloads you make from the Internet, and it’s surprisingly easy. We’ll walk you through how to do it.

But first, why make this change? Let’s say that you’re downloading a particularly large file and you don’t have the space for it on your current hard drive. You might want to tell the download to go to an externally connected hard drive, or even a network drive specifically for things like this. It’s one way to make things much more convenient.

We’ll start with Google Chrome, Microsoft Edge, and Mozilla Firefox.

For Google Chrome
First, you’ll want to open up your Chrome browser and click on the three-dot icon in the top-right corner of the screen. Next, click on Settings. At the bottom of the Settings page, scroll down and click on the Advanced option. Eventually, you will see the Downloads heading. You’ll be able to change the default location for your downloads, and even toggle the option to ask for a new location when you start a download so that you can make sure that it’s going to the right location.

For Microsoft Edge
The process is similar in Microsoft Edge--just click on the three-dot menu and select Settings. A new menu will open on the right side of the screen. From here, select View Advanced Settings. From here, click the Downloads section, and you’ll be able to select the same settings that Chrome would have offered.

For Mozilla Firefox
For Firefox, click on the three-line menu in the top-right corner. Next, select Preferences and navigate to the General tab. Next, select the Choose button next to Save files to. You’ll see the same options that are used for the other browsers.

For more great tips and tricks, subscribe to our blog.

Remote IT Can Dramatically Improve Your Business’s...
In the Hands of Hackers Artificial Intelligence Ca...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, October 23, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Business Computing Hackers Microsoft Backup Managed Service Provider Workplace Tips Productivity Data Hardware Saving Money Business Email Malware Network Security IT Services IT Support Hosted Solutions Efficiency Google Small Business Computer Smartphones User Tips Gadgets Quick Tips Mobile Devices Business Continuity Disaster Recovery Innovation Mobile Office Virtualization Network Microsoft Office Android Social Media Server VoIP Mobile Device Management Smartphone Collaboration Communication Miscellaneous Upgrade Ransomware Windows 10 Data Backup Unified Threat Management Data Recovery Windows Remote Monitoring Operating System Tech Term Passwords IT Support Mobile Computing BYOD Remote Computing Productivity Managed IT services Vendor Management Holiday communications Facebook WiFi Cybersecurity Apps Marketing BDR The Internet of Things Analytics History Users Automation Apple Firewall Data Management Managed IT Services Phishing Outsourced IT Internet of Things Alert Mobile Device Big data App Browser IT Consultant Save Money Artificial Intelligence Bring Your Own Device Antivirus Spam Maintenance Gmail Bandwidth Health Content Filtering Going Green Encryption Office Windows 8 Help Desk Outlook Wireless Technology Office 365 Search Budget Hiring/Firing Printer Virus Two-factor Authentication Tech Support Hard Drives Managed IT Best Practice Information Technology Lithium-ion Battery Cybercrime Cost Management Cloud Computing Money Document Management Saving Time Computers VPN Training Recovery Travel Employer-Employee Relationship Phone System IBM Business Technology Update Hacking Regulations Save Time Administration Windows 10 SaaS Humor Customer Service Proactive IT Running Cable Law Enforcement Access Control Website Government Compliance Data storage Intranet It Management Education Hard Drive Networking Risk Management Legal Mobility Hacker Social Engineering Business Intelligence Fax Server Digital Payment Data Breach Paperless Office Downtime Sports User Project Management Computing Disaster End of Support Comparison Tablet Hosted Solution Information Avoiding Downtime Company Culture Robot Computer Repair Securty Wireless iPhone Social Networking Machine Learning DDoS Solid State Drive Telephone Systems Flexibility Excel Twitter Black Market Word Data Security Current Events Applications File Sharing Customer Relationship Management Laptop Augmented Reality Patch Management Blockchain Password Cortana Business Growth PowerPoint Data Loss Net Neutrality Politics Scam Conferencing Virtual Reality Office Tips Text Messaging Chrome Emails Redundancy Webcam Automobile Processors Lifestyle Chromebook USB YouTube Presentation Unified Communications Settings Monitoring Router Computing Infrastructure Hack Computer Accessories How To Digital Download Websites Virtual Desktop Private Cloud Specifications Safety Inbound Marketing Trending Start Menu Tech Terms Management Social Mouse Telephony IT service Documents Mobile Technology Taxes Software as a Service Heating/Cooling Entertainment Vulnerabilities Statistics Uninterrupted Power Supply Storage Pain Points Healthcare Programming Distributed Denial of Service Bluetooth Network Congestion Vendor Bitcoin Public Cloud Data Protection Retail Cryptocurrency Co-managed IT Streaming Media Identity Theft eWaste Google Docs User Error Value Experience Monitors Managed Service Google Maps Cleaning Gaming Console Debate Mobile Security HIPAA Advertising Flash Harddrive Telephone System In Internet of Things Assessment Environment CIO SharePoint GPS Software License Trends Device Management Competition Windows XP Tip of the week Multi-Factor Security Cost Electronic Payment Staffing Google Calendar Google Wallet Content Management Motion Sickness Touchscreen News Displays External Harddrive Devices Business Managemenet Scalability VoIP Business Owner Society Fraud Tactics Best Practives UTM Content Messenger Tracking Knowledge IP Address Consultation Evernote Micrsooft Proxy Server 3D Ebay IT Plan Enterprise Resource Planning online Currency Rental Service Meetings Application Virtual Assistant Thin CLient Legislation Error Technology Tips Human Resources Drones Electronic Medical Records Web Server Fake News Smart Phones Accountants A.I. Cabling Audit Microserver email scam Addiction Multi-factor Authentication LinkedIn Books Workers Permissions Language Wi-Fi Administrator Data Warehousing Dark Web Adminstration Pirating Information Migration Connected Devices Supercomputer Digital Signature Emergency Hard Drive Disposal Leadership Wireless Headphones Telephone Access Health IT Get More Done Archive Microchip Teamwork switches Microsoft Excel Writing Printer Server Equifax Fleet Tracking Skype Worker Computer Care Music Turn Key Network Management Upgrades Bookmark Trojan Device security MSP Reading Samsung Google Drive Windows Server 2008 Desktop Finance Employer Employee Relationship Vulnerability LiFi Organize Nanotechnology Social Network Point of Contact G Suite Spyware PDF Mobile Payment Service Level Agreement Hacks Physical Security Best Available Keyboard Startup Asset Tracking Licensing Electricity Printing Business Cards Windows 7 Deep Learning Browsers Username Relocation Tablets Domains Work/Life Balance Upselling Unified Threat Management Backup and Disaster Recovery Banking Botnet Video Surveillance Gamification Recycling Public Speaking Visible Light Communication Memory Screen Reader Customer Resource management Analytic Sync cache Television User Tip Piracy Upload Notifications CCTV Shortcut IT consulting Webinar Saving ZTime Smart Tech Distribution Product Reviews WannaCry Downloads Read Computer Malfunction Time Management Entrepreneur Freedom of Information Data Analysis HTML Reliable Computing Corporate Profile Troubleshooting Fiber-Optic Database Business Metrics Managing Stress Printers CrashOverride Fileless Malware Regulation Capital Productuvuty 3D Printing