facebook linkedin twitter

Computerware Blog

Tip of the Week: How to Restore the Recycle Bin Desktop Icon

Tip of the Week: How to Restore the Recycle Bin Desktop Icon

Have you ever had your Windows PC lose its Recycle Bin? This has been known to happen since the update to Windows 10, but even updates to Windows 7 and 8.1 have seen similar issues. If your Recycle Bin has pulled a Houdini, we’ll help you get it back. Read on to find out how!

Before you just assume that the Recycle Bin is totally gone, try this method. To begin, open up the Settings app (click on the Start Menu, followed by the Gear). Once you’ve done this, navigate to the Personalization tab. Under Themes, go to the Desktop Icon Settings. If checking the Recycle Bin box doesn’t bring it back, you might have to follow some other steps.

If you’re using a Windows 10 laptop, its tablet mode might be interfering with the normal desktop functionality. This can lead to your desktop icons disappearing. You can change this display mode by going through the Start menu, navigating through Settings to System, and selecting Tablet Mode. You’ll want to make sure the following buttons are turned off:

  • Hide app icons on the taskbar in tablet mode
  • Automatically hide the taskbar in tablet mode

Checking these options off should let you see your icons, even if you’re in tablet mode.

If this doesn’t work, you’ll have to recreate your Recycle Bin. To do so, follow these steps:

  • Open up the Windows File Explorer (open up a folder or This PC from the start menu).
  • Click on the View tab.
  • Select Options.
  • In the Folder Options window, click the tab once again.
  • Make sure that the Show hidden files, folders, and drives box is selected.
  • You should also turn off the option to Hide protected operating system files.
  • Go back to the File Explorer and select PC from the right-hand column.
  • Select your OS (C:) or C: Drive.
  • Right-click the .Bin and click Send To.
  • Click on Desktop to create your shortcut.

For help with other irritating aspects of technology, Recycle Bin and all, subscribe to Computerware’s blog.

To Backup Your Business’ Data, You Can’t Rely on T...
Improving the Workplace Environment Through Games


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, March 26, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Hackers Business Management Software Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Network Security Business Email Saving Money Malware Hosted Solutions IT Services Efficiency IT Support Google Small Business Computer Smartphones User Tips Mobile Devices Innovation Quick Tips Business Continuity Gadgets VoIP Disaster Recovery Microsoft Office Social Media Android Productivity Data Backup Network Collaboration Mobile Office Virtualization Communication Server Mobile Device Management Smartphone Data Recovery Miscellaneous communications Ransomware Windows 10 Tech Term Upgrade IT Support Unified Threat Management Windows Cybersecurity Holiday Operating System Vendor Management Remote Monitoring Passwords Facebook BYOD Managed IT services Remote Computing Mobile Computing Apps Phishing Users WiFi BDR Analytics Automation Apple Data Management The Internet of Things Mobile Device Marketing Outsourced IT History Firewall Internet of Things Managed IT Services Alert Browser Artificial Intelligence App Save Money Encryption IT Consultant Big data Antivirus Printer Gmail Bandwidth Cloud Computing Office Health Windows 10 Content Filtering Going Green Spam Office 365 Bring Your Own Device Maintenance Saving Time Tech Support Virus Search Managed IT Cybercrime Lithium-ion Battery Cost Management Best Practice Information Technology Training Windows 8 Outlook Hiring/Firing Budget Hard Drives Help Desk Wireless Technology Business Technology Two-factor Authentication Blockchain Computers VPN Travel Recovery Employer-Employee Relationship Update Phone System Hacking Healthcare IBM Access Control Money Document Management It Management Law Enforcement Administration Managed Service Mobility Twitter Government Compliance Intranet Website Data storage Education iPhone Risk Management Information Legal Networking Save Time Regulations Augmented Reality File Sharing SaaS PowerPoint Proactive IT Hard Drive Running Cable Applications Humor Customer Service Patch Management Wireless Securty DDoS Data Loss Social Engineering Solid State Drive Scam Black Market Avoiding Downtime Data Breach Flexibility Cryptocurrency Word Retail Project Management Laptop Digital Websites Current Events Password Cortana Management Business Growth Value Machine Learning Business Intelligence Excel Digital Payment Vulnerabilities Telephone Systems Hacker Router Downtime Paperless Office Customer Relationship Management Comparison Tablet Fax Server Sports Disaster Company Culture User Computing Hosted Solution Data Security Computer Repair End of Support Google Maps Social Networking Social Robot Statistics Documents Virtual Reality Programming Politics Cooperation IT service Entertainment Conferencing Automobile Vendor Network Congestion Heating/Cooling Emails Chromebook Storage Bluetooth Redundancy Computing Infrastructure Hack Monitoring How To Streaming Media Inbound Marketing Private Cloud Download Evernote eWaste Google Docs Net Neutrality Experience Pain Points Telephony Cleaning Start Menu Tech Terms User Error Microchip Taxes Monitors Chrome Co-managed IT Distributed Denial of Service Office Tips Mobile Technology Software as a Service Processors Public Cloud Uninterrupted Power Supply USB YouTube Computer Accessories Unified Communications Settings Vulnerability Lifestyle Presentation Bitcoin Trending Identity Theft Gaming Console Specifications Safety Data Protection Virtual Desktop Windows 7 Mouse Webcam Text Messaging Distribution Microserver Fiber-Optic Database In Internet of Things Bookmark WannaCry Downloads Digital Signature HTML External Harddrive Telephone System Music Corporate Profile Point of Contact Teamwork Mobile Security switches Google Play Writing Time Management Freedom of Information Multi-Factor Security Cost Scalability Microsoft 365 Thin CLient Get More Done Software License Trends Motion Sickness Processor Upgrades 3D Ebay Assessment SharePoint LiFi Medical IT Smart Phones Tip of the week Turn Key PDF Fraud Tactics Browsers Google Calendar Printer Server Devices Messenger Tracking Recycling User Tip VoIP Analytic Trojan Best Available Keyboard UTM Content Rental Service Meetings Security Cameras Touchscreen News Legislation Error Cabling Solutions Work/Life Balance Leadership Knowledge Product Reviews IT Plan Enterprise Resource Planning Web Server Navigation Deep Learning Adminstration Pirating Information Consultation Organize Domains Visible Light Communication Professional Services Memory Virtual Assistant email scam Addiction Wi-Fi Administrator Data Analysis Technology Tips Read Public Speaking Accountants A.I. Books Workers Fake News Audit Shortcut Multi-factor Authentication Supercomputer IT consulting GDPR Troubleshooting Wireless Headphones Telephone Worker Integration Entrepreneur Migration Connected Devices Tech Data Warehousing Device Management Advertising Voice over Internet Protocol Flash Emergency Hard Drive Disposal Business Managemenet Environment Network Management CIO Fileless Malware Access Content Management Webinar HIPAA Equifax Fleet Tracking Reading Samsung Microsoft Excel Electronic Payment G Suite Staffing Proxy Server Google Wallet Upselling Computer Care Competition Device security MSP Employer Employee Relationship Windows XP Modem Business Owner Nanotechnology Social Network Licensing Electronic Medical Records Society Desktop Finance Hacks Physical Security Term Displays Video Surveillance Google Drive Windows Server 2008 online Currency Relocation Tablets Recording Saving ZTime Business Cards Service Level Agreement Banking Botnet Directions Micrsooft Spyware Mobile Payment IP Address Startup Asset Tracking LinkedIn Human Resources Unified Threat Management Backup and Disaster Recovery Sync Dark Web Drones Electricity Printing Application Username SSID Screen Reader Customer Resource management Health IT Harddrive Best Practives Gamification Notifications CCTV Processing Debate Reliable Computing Permissions Logistics Language Skype Piracy Upload Business Metrics Computer Malfunction Managed IT Service GPS cache Television Archive Smart Tech Managing Stress CrashOverride Regulation Printers Capital 3D Printing Productuvuty