facebook linkedin twitter

Tip of the Week: How to Restore the Recycle Bin Desktop Icon

Tip of the Week: How to Restore the Recycle Bin Desktop Icon

Have you ever had your Windows PC lose its Recycle Bin? This has been known to happen since the update to Windows 10, but even updates to Windows 7 and 8.1 have seen similar issues. If your Recycle Bin has pulled a Houdini, we’ll help you get it back. Read on to find out how!

Before you just assume that the Recycle Bin is totally gone, try this method. To begin, open up the Settings app (click on the Start Menu, followed by the Gear). Once you’ve done this, navigate to the Personalization tab. Under Themes, go to the Desktop Icon Settings. If checking the Recycle Bin box doesn’t bring it back, you might have to follow some other steps.

If you’re using a Windows 10 laptop, its tablet mode might be interfering with the normal desktop functionality. This can lead to your desktop icons disappearing. You can change this display mode by going through the Start menu, navigating through Settings to System, and selecting Tablet Mode. You’ll want to make sure the following buttons are turned off:

  • Hide app icons on the taskbar in tablet mode
  • Automatically hide the taskbar in tablet mode

Checking these options off should let you see your icons, even if you’re in tablet mode.

If this doesn’t work, you’ll have to recreate your Recycle Bin. To do so, follow these steps:

  • Open up the Windows File Explorer (open up a folder or This PC from the start menu).
  • Click on the View tab.
  • Select Options.
  • In the Folder Options window, click the tab once again.
  • Make sure that the Show hidden files, folders, and drives box is selected.
  • You should also turn off the option to Hide protected operating system files.
  • Go back to the File Explorer and select PC from the right-hand column.
  • Select your OS (C:) or C: Drive.
  • Right-click the .Bin and click Send To.
  • Click on Desktop to create your shortcut.

For help with other irritating aspects of technology, Recycle Bin and all, subscribe to Computerware’s blog.

To Backup Your Business’ Data, You Can’t Rely on T...
Improving the Workplace Environment Through Games


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, December 16, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Software Business Management Business Computing Hackers Microsoft Workplace Tips Managed Service Provider Data Backup Productivity Hardware Business Saving Money Email Malware Network Security IT Services IT Support Hosted Solutions Efficiency Google Small Business Computer User Tips Smartphones Quick Tips Gadgets Mobile Devices Business Continuity Disaster Recovery Innovation Microsoft Office Android Mobile Office Virtualization Network Social Media Data Backup Server Mobile Device Management Collaboration VoIP Smartphone Communication Miscellaneous Data Recovery Upgrade Ransomware Windows 10 Tech Term Productivity IT Support Unified Threat Management Windows Passwords Remote Monitoring Operating System Holiday Mobile Computing BYOD Remote Computing Cybersecurity Managed IT services Vendor Management Apps Facebook BDR WiFi communications Automation Marketing Users The Internet of Things Analytics Firewall History Outsourced IT Apple Mobile Device Phishing Alert Internet of Things Browser Save Money Managed IT Services Data Management Artificial Intelligence Big data App Encryption IT Consultant Bring Your Own Device Office Antivirus Gmail Bandwidth Spam Maintenance Printer Content Filtering Going Green Health Budget Help Desk Wireless Technology Two-factor Authentication Search Windows 8 Outlook Cybercrime Business Technology Managed IT Tech Support Virus Hiring/Firing Lithium-ion Battery Hard Drives Best Practice Information Technology Cloud Computing Cost Management Saving Time Office 365 Update Training Recovery Employer-Employee Relationship Blockchain Money Document Management Hacking IBM Computers VPN Phone System Travel Education Regulations Customer Service Administration Information Risk Management Access Control SaaS Website Government It Management Law Enforcement Save Time Hard Drive Humor Compliance Data storage Applications Proactive IT Running Cable Managed Service Windows 10 Legal Networking Intranet User Paperless Office Machine Learning Sports Telephone Systems Disaster Wireless Computing Hosted Solution DDoS Fax Server End of Support Business Intelligence Robot File Sharing Digital Payment Securty Avoiding Downtime Healthcare Data Security Downtime Solid State Drive iPhone Patch Management Google Maps Word Mobility Comparison Tablet Data Loss Social Engineering Black Market Password Cortana Company Culture Flexibility Value Cryptocurrency Excel Computer Repair Hacker Social Networking Laptop Data Breach Business Growth Customer Relationship Management Digital Project Management Augmented Reality PowerPoint Websites Twitter Current Events Telephony Co-managed IT Monitoring Start Menu Tech Terms User Error Microchip Taxes Mobile Technology Specifications Webcam Safety Streaming Media YouTube Virtual Desktop Text Messaging Unified Communications Settings Software as a Service Social Distributed Denial of Service Documents Management Uninterrupted Power Supply Net Neutrality Entertainment Public Cloud Lifestyle Heating/Cooling Chrome Storage Bitcoin Vulnerabilities Inbound Marketing Identity Theft Data Protection IT service Router Computer Accessories Retail Politics eWaste Pain Points Virtual Reality Bluetooth Emails Trending Automobile Scam Vendor Chromebook Mouse Redundancy Google Docs Computing Infrastructure Hack Evernote Statistics Experience Processors Conferencing How To Programming Download Cleaning Private Cloud Network Congestion Monitors USB Presentation Office Tips Gaming Console Application Debate UTM Content Supercomputer Data Warehousing Staffing Google Wallet Harddrive Human Resources Windows XP Enterprise Resource Planning Access Recycling Webinar Society Tech Legislation Error Emergency Worker Hard Drive Disposal Analytic Displays GPS IT Plan External Harddrive Fileless Malware Accountants A.I. Reading Samsung Microsoft Excel Product Reviews Micrsooft email scam Addiction Computer Care Digital Signature Proxy Server Multi-factor Authentication Google Drive Employer Employee Relationship Windows Server 2008 Drones G Suite Read Migration Connected Devices Hacks Spyware Physical Security Mobile Payment Thin CLient Term Wireless Headphones Telephone Vulnerability Licensing Teamwork 3D Electronic Medical Records Ebay Device Management Permissions Language Smart Phones Directions Equifax Fleet Tracking Relocation Tablets Network Management Banking Electricity Botnet Printing Dark Web Device security MSP Windows 7 Business Managemenet PDF Sync Best Practives Content Management Desktop Finance Notifications cache CCTV Television Music Leadership Nanotechnology Social Network switches Writing Best Available Keyboard Adminstration Health IT Pirating Information Computer Malfunction Downloads online Currency Domains Managed IT Service Startup Asset Tracking Reliable Computing Microserver Upgrades Business Cards Service Level Agreement Business Metrics WannaCry Public Speaking Bookmark Username Time Management Freedom of Information Unified Threat Management Backup and Disaster Recovery Corporate Profile In Internet of Things LiFi Gamification Assessment SharePoint LinkedIn Screen Reader Customer Resource management Get More Done Shortcut Motion Sickness Google Calendar Printer Server Work/Life Balance Troubleshooting Processor Smart Tech Distribution Scalability Tip of the week Turn Key Deep Learning Entrepreneur Piracy Upload HIPAA Browsers HTML Messenger Touchscreen Tracking News Skype Environment Upselling Fiber-Optic Database VoIP Trojan Archive Visible Light Communication Memory Video Surveillance Mobile Security Rental Service Consultation Meetings Organize Electronic Payment Telephone System Knowledge IT consulting Competition User Tip Web Server Technology Tips Business Owner Saving ZTime Navigation Multi-Factor Security Cost Cabling Virtual Assistant Point of Contact Software License Trends Flash IP Address Data Analysis Devices Books Workers Fake News CIO Fraud Tactics Wi-Fi Administrator Audit Advertising Printers Productuvuty Processing CrashOverride Managing Stress 3D Printing Regulation Capital