Error
  • Error loading component: com_advancedmodules, 1

Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Restore the Recycle Bin Desktop Icon

Tip of the Week: How to Restore the Recycle Bin Desktop Icon

Have you ever had your Windows PC lose its Recycle Bin? This has been known to happen since the update to Windows 10, but even updates to Windows 7 and 8.1 have seen similar issues. If your Recycle Bin has pulled a Houdini, we’ll help you get it back. Read on to find out how!

Before you just assume that the Recycle Bin is totally gone, try this method. To begin, open up the Settings app (click on the Start Menu, followed by the Gear). Once you’ve done this, navigate to the Personalization tab. Under Themes, go to the Desktop Icon Settings. If checking the Recycle Bin box doesn’t bring it back, you might have to follow some other steps.

If you’re using a Windows 10 laptop, its tablet mode might be interfering with the normal desktop functionality. This can lead to your desktop icons disappearing. You can change this display mode by going through the Start menu, navigating through Settings to System, and selecting Tablet Mode. You’ll want to make sure the following buttons are turned off:

  • Hide app icons on the taskbar in tablet mode
  • Automatically hide the taskbar in tablet mode

Checking these options off should let you see your icons, even if you’re in tablet mode.

If this doesn’t work, you’ll have to recreate your Recycle Bin. To do so, follow these steps:

  • Open up the Windows File Explorer (open up a folder or This PC from the start menu).
  • Click on the View tab.
  • Select Options.
  • In the Folder Options window, click the tab once again.
  • Make sure that the Show hidden files, folders, and drives box is selected.
  • You should also turn off the option to Hide protected operating system files.
  • Go back to the File Explorer and select PC from the right-hand column.
  • Select your OS (C:) or C: Drive.
  • Right-click the .Bin and click Send To.
  • Click on Desktop to create your shortcut.

For help with other irritating aspects of technology, Recycle Bin and all, subscribe to Voyage Technology’s blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 29 November 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Productivity Cybersecurity Smartphone Managed Service Data Backup Android Upgrade AI Business Management VoIP Smartphones Data Recovery Mobile Devices communications Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Internet of Things Tech Term Information Automation Artificial Intelligence Facebook Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Wi-Fi Blockchain Vendor Apps Data Security Two-factor Authentication Mobile Office Mobile Device Management Chrome Tip of the week Gmail Budget Apple Networking App Employer-Employee Relationship Managed Services Voice over Internet Protocol BYOD HIPAA Applications WiFi How To BDR Conferencing Computing Hacker Information Technology Avoiding Downtime Marketing Office 365 Access Control Analytics Office Tips Router Augmented Reality Storage Retail Password Bring Your Own Device Help Desk Big Data Managed IT Services 2FA Operating System Computers Healthcare Risk Management Virtual Private Network Website Health Microsoft 365 Firewall Document Management Solutions The Internet of Things Monitoring Scam Data loss Social Going Green Windows 11 Patch Management Telephone Save Money Customer Service Remote Monitoring Remote Workers Cybercrime End of Support Excel Vulnerability Vendor Management Cooperation Physical Security Display Free Resource Printer Project Management Windows 7 Paperless Office Infrastructure Multi-Factor Authentication Data Privacy Mobility Outlook Money Humor Machine Learning User Tip Modem Mobile Security Safety Processor Employees Sports Integration Mouse Maintenance Antivirus Administration Smart Technology Holidays Saving Time Data Storage Video Conferencing Customer Relationship Management Managed Services Provider Managed IT Service Settings Robot Virtual Machines Professional Services Printing Wireless Supply Chain Downloads Content Filtering Licensing Hacking YouTube Presentation IT Management Entertainment iPhone VPN Cryptocurrency Meetings Wireless Technology Vulnerabilities Telephone System Virtual Desktop Computer Repair Data storage LiFi Cost Management Images 101 Word Permissions Directions Websites Organization Assessment Digital Security Cameras Halloween Smart Devices Google Apps Refrigeration SharePoint Electronic Medical Records Remote Working Memory IT Maintenance Specifications Public Speaking Data Breach Business Intelligence Fraud Lithium-ion battery Google Play Microchip Internet Exlporer Videos Username Scary Stories Writing Electronic Health Records Shortcuts Lenovo Entrepreneur Hacks Virtual Reality Fun Wasting Time Ransmoware Black Friday Trend Micro Vendors Security Cameras Server Management Deep Learning Private Cloud Database Identity Theft Software as a Service IT Technicians Be Proactive Undo Superfish Proxy Server Education Twitter Cookies Managing Costs Workforce Cyber Monday eCommerce Threats Hotspot SSID Error Tactics Social Engineering Surveillance Mirgation Virtual Assistant Workplace Strategies Mobile Computing Remote Computing Nanotechnology Search Virtual Machine Meta Amazon Language Medical IT Application Best Practice Reviews Addiction Tablet Management Buisness Development Chatbots Transportation Legal IT solutions Alert Screen Reader Hypervisor Outsource IT Distributed Denial of Service IBM Dark Data Optimization Environment Computing Infrastructure PowerPoint Media Managed IT Business Growth File Sharing Shopping Service Level Agreement How To Identity Employer/Employee Relationships Navigation Bookmark Notifications PCI DSS Smart Tech Cortana Small Businesses Download Displays Alerts Alt Codes Travel Gig Economy Google Maps Downtime Internet Service Provider Teamwork Competition Techology Outsourcing Break Fix Evernote Browsers Hosted Solution Regulations Compliance Connectivity Upload Memes Typing Unified Threat Management Social Network Net Neutrality SQL Server Workplace Multi-Factor Security Unified Threat Management History Hiring/Firing Dark Web User Google Drive Financial Data IoT Knowledge Smartwatch Trends Network Congestion IT Paperless Customer Resource management Procurement Regulations 5G Azure Co-managed IT Google Calendar User Error Cyber security Technology Care Microsoft Excel IP Address Tech Google Docs Data Analysis Unified Communications Telework Star Wars Experience CES Gamification Running Cable Communitications Staff Business Communications Bitcoin Point of Sale Google Wallet Supply Chain Management Social Networking Scams Legislation Hybrid Work Term Recovery Network Management Fileless Malware Tech Support FinTech Content Laptop Monitors IT Assessment Wearable Technology Human Resources Hard Drives Windows 8 Drones Health IT Flexibility Motherboard Value Cables Comparison Domains

Blog Archive