Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (347) 830-7322

Logo

 

Tekie Geek Blogs

Tip of the Week: How to Restore the Recycle Bin Desktop Icon

Tip of the Week: How to Restore the Recycle Bin Desktop Icon

Have you ever had your Windows PC lose its Recycle Bin? This has been known to happen since the update to Windows 10, but even updates to Windows 7 and 8.1 have seen similar issues. If your Recycle Bin has pulled a Houdini, we’ll help you get it back. Read on to find out how!

Before you just assume that the Recycle Bin is totally gone, try this method. To begin, open up the Settings app (click on the Start Menu, followed by the Gear). Once you’ve done this, navigate to the Personalization tab. Under Themes, go to the Desktop Icon Settings. If checking the Recycle Bin box doesn’t bring it back, you might have to follow some other steps.

If you’re using a Windows 10 laptop, its tablet mode might be interfering with the normal desktop functionality. This can lead to your desktop icons disappearing. You can change this display mode by going through the Start menu, navigating through Settings to System, and selecting Tablet Mode. You’ll want to make sure the following buttons are turned off:

  • Hide app icons on the taskbar in tablet mode
  • Automatically hide the taskbar in tablet mode

Checking these options off should let you see your icons, even if you’re in tablet mode.

If this doesn’t work, you’ll have to recreate your Recycle Bin. To do so, follow these steps:

  • Open up the Windows File Explorer (open up a folder or This PC from the start menu).
  • Click on the View tab.
  • Select Options.
  • In the Folder Options window, click the tab once again.
  • Make sure that the Show hidden files, folders, and drives box is selected.
  • You should also turn off the option to Hide protected operating system files.
  • Go back to the File Explorer and select PC from the right-hand column.
  • Select your OS (C:) or C: Drive.
  • Right-click the .Bin and click Send To.
  • Click on Desktop to create your shortcut.

For help with other irritating aspects of technology, Recycle Bin and all, subscribe to Tekie Geek’s blog.

Have You Implemented These Security Best Practices...
Improving the Workplace Environment Through Games
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, December 14, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Computer Processor Software as a Service 3D Printing Going Green SharePoint CrashOverride IT support NYC Business Mangement Wireless App Virtualization Update Settings Cortana Mobility Physical Security computer services Chromebook Managed Service Provider Cloud computing Staten Island Username Website Hacking Gadgets IT consulting company Cybersecurity IT Consultant Social Media Evernote Advertising malware worms Tablets Deep Learning Digital Payment Law Enforcement IT Management BYOD Digital Business Metrics Upload Addiction Webcam IT Services Employer-Employee Relationship today ’s organizations VPN Corporate Profile data recovery Time Management Office Proactive IT Administrator Black Market Firewall Compliance Excel Equifax Business Technology Windows 10 managed it services Experience managed services Disaster Recovery Mouse Vendor Efficiency Google Docs IT consulting firms Private Cloud Social Encryption computer support Staten Island Remote Computing Cleaning End of Support Entertainment it support Business Growth BDR Computing Infrastructure Apple Politics Managed IT Desktop Phishing Telephone Systems Devices Computing Healthcare Word Backup and Disaster Recovery Websites Office Tips Term Hacker Startup Retail Mobile Devices LiFi Meetings Computer Malfunction Business Computing Lithium-ion battery Hack Unified Communications Recovery Innovation Workplace Tips Travel Microsoft Office Computers Sports Automobile Customer Resource management Artificial Intelligence Business Cards Freedom of Information Bitcoin Hosted Solution Virtual Assistant Windows 8 IT services Staten Island IT support New York City Software Proxy Server Laptop Botnet Tip of the week Saving Money Fake News Wireless Headphones Content Samsung Microsoft Excel Worker IT consulting Network Cabling Tech Terms Tech Term YouTube Employer Employee Relationship Bring Your Own Device computer repair tech support Staten Island IT support Staten Island Rental Service Apps Saving Time Visible Light Communication Managed Service Processors IT services New York City Multi-factor Authentication Malware Smartphone Start Menu Printers Education Bluetooth Emergency Workers Cloud Computing Health Monitors IT support Staten Islans Error data recovery Staten Island tech support Staten Isalnd Emails Unified Threat Management Printing Streaming Media Hackers Outlook Powerful Technology Solutions Privacy Downtime Data Backup Patch Management Knowledge Staffing Device security In Internet of Things datto Maintenance Mobile Device Spyware Staten Island IT consulting Ransomware Budget Navigation Antivirus tech support Miscellaneous Information Technology Microsoft malware Hard disk computer support Social Engineering Windows 10 Telephone Bandwidth Running Cable staten island managed services Data Protection Paperless Office Information Vendor Management Lenovo Accountants Printer Bookmark Language Android Disaster Cache Regulation User Tips Data Analysis Save Money Vulnerabilities Email Hacks Cost Management HTML Vulnerability Document Management Communication Laptops Big Data Tablet Monitoring Public Cloud Multi-Factor Security Mobile Technology Redundancy Staten Island computer support Windows XP Mobile Device Management PDF Text Messaging Writing Flexibility managed IT services NYC eWaste Network Management Small Business Help Desk Internet of Things Augmented Reality IT support Windows Hosted Solutions Software License Specifications User Tip IBM Distributed Denial of Service Documents Managed IT Services Telephone System Scam Best Practice Electronic Medical Records Notifications Tech Gamification Management CryptoLocker Government Music Staten Island tech support Legal Supercomputer Applications Access Control Screen Reader Automation Project Management Congratulations email scam Staten Island IT support IT consulting firm VoIP Office 365 Telephony Data Tracking Gmail File Sharing Fileless Malware Users DDoS Drones computer support firms IT consulting Staten Island Hardware Trends Scalability Business Continuity communications IT services NYC computer support NYC IT consulting Staten island Hardware Solutions Unified Threat Management IT consulting NYC Machine Learning Server Domains Administration Browser Society Conferencing Social Network managed services Staten Island Accidental deletion Safety Cryptocurrency Taxes Virtual Reality managed IT services staten island Database Nanotechnology The Internet of Things Wireless Technology Hard Drive Google Wallet Hard Drive Disposal Customer Service How To Internet Facebook Passwords Cybercrime Productivity CCTV Search Managed IT Services data loss Web Server Backup Health IT Relocation Touchscreen WiFi Content Filtering Upgrade Analytics Business Management G Suite Legislation Uninterrupted Power Supply end-user files Data Management SaaS Microchip Solid State Drive Tip of the Week Banking Robot History Thank You Google Directions Access VoIP Motion Sickness Identity Theft Productivity Hiring/Firing Twitter Smartphones Google Maps Technology Memory Network Security Piracy Virtual Desktop Downloads Managing Stress Data Breach computer repair Staten Island News Mobile Security Reliable Computing Quick Tips Work/Life Balance Displays Data storage Company Culture Wi-Fi Google Calendar IT support firms Securty Computer Care Browsers Television Flash Workstations Audit Data Security computer services Staten Island Password Blockchain Virus Network Congestion Spam Tech Support Remote Monitoring Holiday Google Drive Vendor Mangement IT Support Operating System Download ransomware attacks Business Best Practices Two-factor Authentication Comparison Regulations Cloud Money Alert Tactics Collaboration Security Training Networking Service Level Agreement Outsourced IT

Newsletter Sign Up