Tip of the Week: How to Restore the Recycle Bin Desktop Icon

Tip of the Week: How to Restore the Recycle Bin Desktop Icon

Have you ever had your Windows PC lose its Recycle Bin? This has been known to happen since the update to Windows 10, but even updates to Windows 7 and 8.1 have seen similar issues. If your Recycle Bin has pulled a Houdini, we’ll help you get it back. Read on to find out how!

Before you just assume that the Recycle Bin is totally gone, try this method. To begin, open up the Settings app (click on the Start Menu, followed by the Gear). Once you’ve done this, navigate to the Personalization tab. Under Themes, go to the Desktop Icon Settings. If checking the Recycle Bin box doesn’t bring it back, you might have to follow some other steps.

If you’re using a Windows 10 laptop, its tablet mode might be interfering with the normal desktop functionality. This can lead to your desktop icons disappearing. You can change this display mode by going through the Start menu, navigating through Settings to System, and selecting Tablet Mode. You’ll want to make sure the following buttons are turned off:

  • Hide app icons on the taskbar in tablet mode
  • Automatically hide the taskbar in tablet mode

Checking these options off should let you see your icons, even if you’re in tablet mode.

If this doesn’t work, you’ll have to recreate your Recycle Bin. To do so, follow these steps:

  • Open up the Windows File Explorer (open up a folder or This PC from the start menu).
  • Click on the View tab.
  • Select Options.
  • In the Folder Options window, click the tab once again.
  • Make sure that the Show hidden files, folders, and drives box is selected.
  • You should also turn off the option to Hide protected operating system files.
  • Go back to the File Explorer and select PC from the right-hand column.
  • Select your OS (C:) or C: Drive.
  • Right-click the .Bin and click Send To.
  • Click on Desktop to create your shortcut.

For help with other irritating aspects of technology, Recycle Bin and all, subscribe to Computerware’s blog.

To Backup Your Business’ Data, You Can’t Rely on T...
Improving the Workplace Environment Through Games


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, June 22, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Hackers Business Computing Managed Service Provider Backup Productivity Workplace Tips Data Business Saving Money Hardware Malware Email IT Support IT Services Hosted Solutions Network Security Google Small Business Efficiency Smartphones Gadgets Quick Tips Business Continuity User Tips Mobile Devices Computer Disaster Recovery Mobile Office Virtualization Network Microsoft Office Android Server VoIP Social Media Innovation Mobile Device Management Smartphone Miscellaneous Upgrade Windows 10 Unified Threat Management Windows Ransomware Remote Monitoring Operating System Passwords Collaboration Communication Mobile Computing Remote Computing Holiday Apps WiFi BYOD Vendor Management Cybersecurity Marketing Facebook The Internet of Things Managed IT services Apple Firewall Analytics Users History IT Support communications Data Backup Automation Internet of Things Data Recovery Productivity Alert Data Management Artificial Intelligence Phishing Managed IT Services Outsourced IT Save Money IT Consultant App Tech Term Content Filtering Going Green Big data Mobile Device Gmail Spam BDR Bring Your Own Device Bandwidth Health Office Budget Best Practice Information Technology Lithium-ion Battery Outlook Windows 8 Maintenance Hiring/Firing Printer Browser Virus Tech Support Wireless Technology Hard Drives Cybercrime Antivirus Managed IT Search Cost Management Encryption Office 365 Update IBM Money Document Management Recovery Help Desk Employer-Employee Relationship Computers Hacking Phone System Networking Legal Risk Management Regulations Cloud Computing Customer Service Two-factor Authentication Save Time SaaS Government Website Humor Law Enforcement It Management Business Technology Administration Proactive IT Compliance Running Cable Data storage Training Saving Time VPN Intranet Travel Windows 10 Education Hard Drive iPhone Project Management Mobility Social Engineering User Paperless Office Excel Business Intelligence Fax Server Wireless Access Control Disaster Digital Payment Customer Relationship Management Hosted Solution Augmented Reality End of Support DDoS Downtime Robot PowerPoint Data Security Securty Comparison Tablet Company Culture Telephone Systems Word Computer Repair Patch Management Blockchain Solid State Drive Data Loss Social Networking Black Market Flexibility Password Cortana Data Breach Laptop Twitter Hacker Avoiding Downtime Business Growth Current Events User Error USB Digital Monitors Co-managed IT Google Maps Applications Streaming Media Cleaning Office Tips Politics Presentation Websites Pain Points Virtual Reality Start Menu Tech Terms Emails Automobile Chromebook Virtual Desktop Net Neutrality Mobile Technology YouTube Specifications Safety Social Chrome Sports Software as a Service Unified Communications Settings Lifestyle Computing Infrastructure Hack Documents Uninterrupted Power Supply Computing How To Download Heating/Cooling Private Cloud Router Computer Accessories Storage Bitcoin Gaming Console Data Protection Telephony IT service Text Messaging Taxes Trending Webcam Machine Learning Distributed Denial of Service Mouse Retail eWaste Vulnerabilities Bluetooth Programming Scam Healthcare Value Statistics Public Cloud Network Congestion Redundancy Cryptocurrency Google Docs Inbound Marketing Identity Theft Processors Experience Business Metrics Computer Malfunction Screen Reader Recycling Technology Tips Reliable Computing Gamification Business Owner Analytic Virtual Assistant Smart Tech Audit CIO Webinar Piracy Upload IP Address Product Reviews Fake News Advertising Flash In Internet of Things Human Resources Read Staffing Google Wallet Fiber-Optic Database Application Data Warehousing Windows XP HTML Motion Sickness Conferencing Access Displays Scalability Mobile Security Emergency Hard Drive Disposal Society Multi-Factor Security Device Management Computer Care Micrsooft Messenger Tracking Software License Trends Microsoft Excel Upselling Content Management Drones Rental Service Video Surveillance Meetings Fraud Tactics Digital Signature Business Managemenet Google Drive Windows Server 2008 Devices Best Practives Web Server Monitoring Teamwork Spyware Mobile Payment Saving ZTime Cabling UTM Content Entertainment Vulnerability Administrator Legislation online Currency Electricity Printing Books Workers IT Plan Enterprise Resource Planning Permissions Language Wi-Fi PDF Debate Supercomputer email scam Addiction Windows 7 Microserver Harddrive Accountants Music GPS Microchip Management Best Available Keyboard LinkedIn cache Television switches Writing Worker Multi-factor Authentication Wireless Headphones WannaCry Downloads Upgrades External Harddrive Reading Samsung Migration Connected Devices Domains Get More Done Equifax Archive Corporate Profile Printer Server Employer Employee Relationship Network Management Public Speaking Skype Time Management Freedom of Information LiFi Turn Key G Suite Trojan 3D Hacks Ebay Physical Security Shortcut Assessment SharePoint Thin CLient Licensing Device security Banking Botnet Nanotechnology Entrepreneur Google Calendar Deep Learning Organize Smart Phones Relocation Tablets Desktop Finance Troubleshooting Point of Contact Tip of the week Work/Life Balance Startup Environment VoIP File Sharing Business Cards Service Level Agreement HIPAA Touchscreen News Visible Light Communication Memory Sync Electronic Payment Knowledge Adminstration Notifications Pirating Information CCTV Unified Threat Management Backup and Disaster Recovery Competition Consultation Evernote IT consulting Leadership Capital Managing Stress Productuvuty CrashOverride 3D Printing