Tip of the Week: Change Your Default Browser's Download Folder

Tip of the Week: Change Your Default Browser's Download Folder

Windows has a dedicated folder to hold downloaded content, appropriately called the Downloads folder. However, you may not want to save your downloads there. You can change the default location of any downloads you make from the Internet, and it’s surprisingly easy. We’ll walk you through how to do it.

But first, why make this change? Let’s say that you’re downloading a particularly large file and you don’t have the space for it on your current hard drive. You might want to tell the download to go to an externally connected hard drive, or even a network drive specifically for things like this. It’s one way to make things much more convenient.

We’ll start with Google Chrome, Microsoft Edge, and Mozilla Firefox.

For Google Chrome
First, you’ll want to open up your Chrome browser and click on the three-dot icon in the top-right corner of the screen. Next, click on Settings. At the bottom of the Settings page, scroll down and click on the Advanced option. Eventually, you will see the Downloads heading. You’ll be able to change the default location for your downloads, and even toggle the option to ask for a new location when you start a download so that you can make sure that it’s going to the right location.

For Microsoft Edge
The process is similar in Microsoft Edge--just click on the three-dot menu and select Settings. A new menu will open on the right side of the screen. From here, select View Advanced Settings. From here, click the Downloads section, and you’ll be able to select the same settings that Chrome would have offered.

For Mozilla Firefox
For Firefox, click on the three-line menu in the top-right corner. Next, select Preferences and navigate to the General tab. Next, select the Choose button next to Save files to. You’ll see the same options that are used for the other browsers.

For more great tips and tricks, subscribe to our blog.

Remote IT Can Dramatically Improve Your Business’s...
In the Hands of Hackers Artificial Intelligence Ca...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, July 17, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Microsoft Business Computing Hackers Backup Managed Service Provider Workplace Tips Productivity Data Hardware Business Saving Money Malware Email IT Services IT Support Hosted Solutions Network Security Google Efficiency Small Business Smartphones Quick Tips Gadgets User Tips Mobile Devices Business Continuity Computer Disaster Recovery Mobile Office Virtualization Network Android Microsoft Office Innovation Mobile Device Management VoIP Social Media Server Smartphone Upgrade Windows 10 Miscellaneous Ransomware Unified Threat Management Windows Remote Monitoring Operating System Remote Computing Holiday Collaboration Communication Mobile Computing Passwords BYOD Managed IT services Cybersecurity WiFi Vendor Management Apps IT Support Data Backup The Internet of Things Marketing Facebook Data Recovery Users Apple Analytics Firewall History Alert Data Management BDR communications Internet of Things Productivity Tech Term Automation App Artificial Intelligence Save Money Managed IT Services IT Consultant Phishing Outsourced IT Office Content Filtering Going Green Big data Health Mobile Device Spam Bring Your Own Device Bandwidth Gmail Managed IT Maintenance Browser Printer Virus Encryption Cybercrime Tech Support Lithium-ion Battery Best Practice Information Technology Cost Management Hiring/Firing Wireless Technology Budget Hard Drives Antivirus Outlook Windows 8 Search Travel Recovery Employer-Employee Relationship Update IBM Hacking Phone System Help Desk Office 365 Money Document Management Computers VPN It Management Compliance Government Intranet Humor Training Data storage Website Business Technology Education Risk Management Hard Drive Legal Networking Windows 10 Regulations Save Time Cloud Computing SaaS Administration Proactive IT Running Cable Customer Service Law Enforcement Two-factor Authentication Saving Time Data Security Solid State Drive Avoiding Downtime DDoS Telephone Systems Twitter Black Market Patch Management Blockchain Flexibility iPhone Data Loss Word Laptop Business Growth Excel Data Breach Password Cortana Customer Relationship Management Mobility Business Intelligence Social Engineering Digital Payment Hacker Augmented Reality Project Management Paperless Office Downtime Current Events PowerPoint Disaster Comparison Tablet User Hosted Solution End of Support Company Culture Robot Computer Repair Access Control Fax Server Securty Social Networking Applications Wireless Heating/Cooling Network Congestion Inbound Marketing Distributed Denial of Service Data Protection Bluetooth Storage Public Cloud Cryptocurrency Pain Points Streaming Media Retail Google Docs Identity Theft Scam Experience Redundancy eWaste Value Cleaning Net Neutrality Google Maps Monitors Chrome Politics Office Tips Virtual Reality Emails Digital Automobile Gaming Console Websites YouTube Router Processors Chromebook USB Unified Communications Computer Accessories Settings User Error Vulnerabilities Sports Co-managed IT Computing Infrastructure Hack Start Menu Tech Terms Webcam Healthcare Mobile Technology Presentation Text Messaging How To Computing Trending Private Cloud Software as a Service Download Mouse Virtual Desktop Specifications Safety Uninterrupted Power Supply Social IT service Lifestyle Telephony Taxes Statistics Machine Learning Bitcoin Documents Programming Smart Tech Teamwork Best Practives Reading Samsung Piracy Upload Windows 7 Entertainment Upgrades Point of Contact LiFi Leadership Employer Employee Relationship Fiber-Optic cache Database Television Adminstration Pirating Information G Suite HTML Hacks Physical Security WannaCry Conferencing Downloads Licensing Mobile Security PDF Microserver Corporate Profile Multi-Factor Security Best Available Recycling Keyboard Work/Life Balance Relocation Tablets Software License Time Management Trends Freedom of Information Deep Learning Analytic Banking Botnet Visible Light Communication Memory Get More Done File Sharing Fraud Assessment Tactics SharePoint Domains Product Reviews Sync Devices Notifications CCTV Monitoring Google Calendar Public Speaking Printer Server UTM Content Tip of the week IT consulting Read Turn Key VoIP Legislation Shortcut Trojan Upselling Reliable Computing IT Plan Touchscreen Enterprise Resource Planning News Business Metrics Computer Malfunction Advertising Device Management Entrepreneur Flash email scam Consultation Addiction Evernote CIO Troubleshooting Organize Video Surveillance In Internet of Things Accountants Knowledge Saving ZTime Management Technology Tips Staffing HIPAA Google Wallet Business Managemenet Multi-factor Authentication Information Virtual Assistant Windows XP Environment Content Management Wireless Headphones Audit Society Competition Scalability Migration Connected Devices Fake News Electronic Payment Displays Motion Sickness online Currency Harddrive Messenger Tracking Network Management Data Warehousing Business Owner Micrsooft Debate Equifax Rental Service Meetings Access Drones IP Address Webinar GPS Device security Emergency Hard Drive Disposal Nanotechnology Computer Care Application LinkedIn Cabling Desktop Finance Microsoft Excel Human Resources External Harddrive Web Server Permissions Language Books Workers Business Cards Google Drive Service Level Agreement Windows Server 2008 Wi-Fi Administrator Startup Archive Thin CLient Supercomputer Unified Threat Management Spyware Backup and Disaster Recovery Mobile Payment Skype 3D Ebay Vulnerability Microchip Electricity Screen Reader Printing Digital Signature Music Worker Gamification switches Writing Smart Phones Managing Stress CrashOverride 3D Printing Capital MSP Productuvuty Username