Fuse Networks Blog

Tip of the Week: How to Restore the Recycle Bin Desktop Icon

Tip of the Week: How to Restore the Recycle Bin Desktop Icon

Have you ever had your Windows PC lose its Recycle Bin? This has been known to happen since the update to Windows 10, but even updates to Windows 7 and 8.1 have seen similar issues. If your Recycle Bin has pulled a Houdini, we’ll help you get it back. Read on to find out how!

Before you just assume that the Recycle Bin is totally gone, try this method. To begin, open up the Settings app (click on the Start Menu, followed by the Gear). Once you’ve done this, navigate to the Personalization tab. Under Themes, go to the Desktop Icon Settings. If checking the Recycle Bin box doesn’t bring it back, you might have to follow some other steps.

If you’re using a Windows 10 laptop, its tablet mode might be interfering with the normal desktop functionality. This can lead to your desktop icons disappearing. You can change this display mode by going through the Start menu, navigating through Settings to System, and selecting Tablet Mode. You’ll want to make sure the following buttons are turned off:

  • Hide app icons on the taskbar in tablet mode
  • Automatically hide the taskbar in tablet mode

Checking these options off should let you see your icons, even if you’re in tablet mode.

If this doesn’t work, you’ll have to recreate your Recycle Bin. To do so, follow these steps:

  • Open up the Windows File Explorer (open up a folder or This PC from the start menu).
  • Click on the View tab.
  • Select Options.
  • In the Folder Options window, click the tab once again.
  • Make sure that the Show hidden files, folders, and drives box is selected.
  • You should also turn off the option to Hide protected operating system files.
  • Go back to the File Explorer and select PC from the right-hand column.
  • Select your OS (C:) or C: Drive.
  • Right-click the .Bin and click Send To.
  • Click on Desktop to create your shortcut.

For help with other irritating aspects of technology, Recycle Bin and all, subscribe to Fuse Networks’s blog.

Have You Implemented These Security Best Practices...
Improving the Workplace Environment Through Games


Comments are not available for public users. Please login first to view / add comments.

Newsletter Sign Up

  • No-Spam Guarantee: We hate spam as much or more than you do and will NEVER rent, share or give your information away to anyone else. We will only use your information to communicate with you direct, and you can also remove yourself from our list at any time with a simple click..
  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Tech Term Best Practices Privacy Network Security Hackers Android Business Computing Innovation Data recovery Collaboration Software Data Backup IT Support Cybersecurity User Tips Computer Communication Data Malware Productivity Email Communications Small Business Cybercrime Business Management Office 365 Mobile Device Backup Cost Management Google Artificial Intelligence Efficiency Internet Business Technology Smartphone Passwords Blockchain Browser IT Services Maintenance Applications Saving Money Ransomware Business Hardware Mobile Device Management Access Control Data Security Two-factor Authentication Information Conferencing Tech Terms Document Management Cloud Bitcoin Network Apps Phishing Vendor Bandwidth Data Breach Microsoft Office Alert Patch Management BDR Social Engineering Internet of Things Vulnerability Hacking Remote Monitoring Managed Service Scam Update Vulnerabilities Data loss Smartphones Managed IT services Facebook Social Media Gmail Holiday Monitoring Networking Compliance Augmented Reality Startup Going Green NCSAM Desktop Travel Cortana Mobility email scam HTML Machine Learning Analytics News Mobile Technology Operating System Workplace Tips Digital Multi-factor Authentication Paperless Office Customer Resource management Television project management Piracy Bluetooth WiFi Management Business Continuity Google Docs Business Cards Regulations Download Managed Service Provider Unified Communications IT Username Disaster eWaste VPN Network Management Audit Proxy Server Fake News Virtual Reality Gadgets Budget Virtual Assistant Device security Database Telephone System Mouse Sports Money Software License Wireless Headphones Content Antivirus Chromebook Computing Upload Printing Support Excel Fuse Networks Emergency IT Management Robot Data Protection Website Accountants Encryption Help Desk Microsoft Excel Company Culture Disaster Recovery Miscellaneous Tactics Electronic Medical Records Google Maps Cleaning BYOD Tip of the week Backup and Disaster Recovery Error Legislation Trends Government CIO App Training Computer Care Vendor Management Identity Theft Hard Drive Addiction Cloud Computing User Tip Distributed Denial of Service Information Technology Spam Computers Virtualization Managed IT Services Mobile Security Telephone Comparison Windows 10 Apple Gamification Legal Bookmark Screen Reader Knowledge Google Calendar Computing Infrastructure Devices Mobile Devices Equifax Service Level Agreement Saving Time Cryptocurrency Laptop VoIP Downloads Hard Drive Disposal Automation Freedom of Information Nanotechnology Browsers Websites Printer Social Network Specifications Health IT SharePoint Downtime Microsoft Emails Law Enforcement Wireless Technology 5G Tech Support Safety IBM Managing Stress Marketing Hacker The Internet of Things Productivity Multi-Factor Security Entertainment Competition Customer Relationship Management Hiring/Firing IP Address Big Data Fun Users Data Analysis Quick Tips Customer Service Employer-Employee Relationship Mobile Office Upgrade Domains Wireless Twitter Hard Drives Regulation Public Speaking Search Server Presentation Wi-Fi Printers Lithium-ion battery Windows 10 Hosted Solutions