Fuse Networks Blog

Fuse Networks has been serving the Tukwila area since 2009, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Restore the Recycle Bin Desktop Icon

Tip of the Week: How to Restore the Recycle Bin Desktop Icon

Have you ever had your Windows PC lose its Recycle Bin? This has been known to happen since the update to Windows 10, but even updates to Windows 7 and 8.1 have seen similar issues. If your Recycle Bin has pulled a Houdini, we’ll help you get it back. Read on to find out how!

Before you just assume that the Recycle Bin is totally gone, try this method. To begin, open up the Settings app (click on the Start Menu, followed by the Gear). Once you’ve done this, navigate to the Personalization tab. Under Themes, go to the Desktop Icon Settings. If checking the Recycle Bin box doesn’t bring it back, you might have to follow some other steps.

If you’re using a Windows 10 laptop, its tablet mode might be interfering with the normal desktop functionality. This can lead to your desktop icons disappearing. You can change this display mode by going through the Start menu, navigating through Settings to System, and selecting Tablet Mode. You’ll want to make sure the following buttons are turned off:

  • Hide app icons on the taskbar in tablet mode
  • Automatically hide the taskbar in tablet mode

Checking these options off should let you see your icons, even if you’re in tablet mode.

If this doesn’t work, you’ll have to recreate your Recycle Bin. To do so, follow these steps:

  • Open up the Windows File Explorer (open up a folder or This PC from the start menu).
  • Click on the View tab.
  • Select Options.
  • In the Folder Options window, click the tab once again.
  • Make sure that the Show hidden files, folders, and drives box is selected.
  • You should also turn off the option to Hide protected operating system files.
  • Go back to the File Explorer and select PC from the right-hand column.
  • Select your OS (C:) or C: Drive.
  • Right-click the .Bin and click Send To.
  • Click on Desktop to create your shortcut.

For help with other irritating aspects of technology, Recycle Bin and all, subscribe to Fuse Networks’s blog.

Have You Implemented These Security Best Practices...
Improving the Workplace Environment Through Games


Comments are not available for public users. Please login first to view / add comments.

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Tip of the Week Security Best Practices Technology Privacy Tech Term Network Security Cybersecurity Hackers Android Cost Management Artificial Intelligence Smartphone Business Computing Innovation User Tips Internet Malware Ransomware Business Technology Backup Collaboration Saving Money Data recovery IT Support Email Cybercrime Small Business Google Data Security Business Blockchain Patch Management Internet of Things Software Maintenance Vulnerability Data Backup Vulnerabilities Access Control Office 365 Remote Monitoring Scam Holiday Smartphones Communications Mobile Device Management Hardware Phishing Tech Terms Mobile Device Hacking Social Engineering Bandwidth Update Data Breach Productivity Gmail Business Management Bitcoin Applications Network Data loss Computer Passwords Alert Conferencing Websites Robot Machine Learning Compliance Bluetooth Disaster Tip of the week Multi-factor Authentication Microsoft Office Information Technology Distributed Denial of Service Computer Care Network Management Regulations Wireless Headphones Emergency Managed IT Services Computing Infrastructure Website Comparison Chromebook Device security Accountants Freedom of Information Encryption Downloads Cleaning Networking Specifications Backup and Disaster Recovery Disaster Recovery Training Mobile Technology Spam News Managed IT services Mobility Computers Knowledge Digital Business Cards Television Mobile Devices Equifax Virtual Reality Two-factor Authentication Fake News Unified Communications Service Level Agreement Nanotechnology Laptop Virtual Assistant Augmented Reality Data Mouse Printer Startup Company Culture Microsoft Excel Printing Going Green Apps IT Management Operating System Business Continuity Desktop Google Maps Paperless Office HTML Identity Theft Budget Facebook Gadgets Government Download Browser Hard Drive Database VPN Cryptocurrency Legal Upload Google Calendar Antivirus Hard Drive Disposal Downtime SharePoint Tactics Data Protection Legislation Virtualization Social Media Law Enforcement Trends Document Management App email scam Piracy Windows 10 project management Addiction Apple VoIP WiFi Gamification Google Docs Screen Reader Mobile Security eWaste Software License Money Audit Automation Devices Emails Cortana Communication Excel Wireless Technology 5G Managed Service Provider IBM Hacker Marketing Managing Stress IT Services Customer Relationship Management Content IP Address Customer Service Mobile Office Domains Hard Drives Public Speaking Twitter Hosted Solutions Lithium-ion battery Tech Support Safety Productivity The Internet of Things Hiring/Firing Competition Multi-Factor Security Fun Big Data BDR Employer-Employee Relationship Users Miscellaneous Upgrade Wireless Search Server Presentation Wi-Fi Cloud Microsoft Windows 10