Tip of the Week: Everything You Need to Know to Create a Windows Shortcut

Creating Your Shortcut

First, you should right-click anywhere on the desktop that isn?t already filled up by an icon or application. You can then select New from the menu that appears. Next, select Shortcut.

You?ll see a new dialog box that asks you to provide a program, file, or folder that you?d like to make a shortcut for. You can use the Browse button to find the file locally. If you have found the file, folder, or program you want to open, hit the OK button. You?ll see the file path populate in the dialog box. Click the Next button, and you?ll be asked to give your shortcut a name. Once you?re ready, click Finish. That?s all there is to it!

Of course, the option to move the folder or file to your desktop also exists, but we urge you to consider who else might require access to that file or folder. For example, if you have a file stored on your network, the last thing you want is to move it from your network to your desktop, thus preventing anyone else from accessing it in their time of need.

Plus, depending on your role within your organization, you might not have permissions to do such a thing in the first place. It?s better to just make a shortcut on your desktop and use that to access the file or folder. It?s cleaner and more effective.

There are many benefits to keeping your files and folders stored in a centralized location, including the ability to back up said data in the event of a disaster.

If you?re interested in doing so, you can also pin a specific file, folder, or program to the taskbar at the bottom of your screen, also allowing easy access. To do this, just click and drag the specified file, folder, or program to the taskbar. You can then click on it to access it whenever you need to.

We hope you find some value in this tip! Be sure to keep an eye on our blog for more just like this.

Related Posts

Four Technologies You Can Use to Better Protect Your Data in Transit

Encryption Implementing strong encryption protocols works to secure data during transmission. From a technical point of view: SSL/TLS (Secure Sockets Layer/Transport Layer Security) protocols are commonly used to encrypt communication between a user's browser and a website. This added encryption ensures that any information exchanged is secure and cannot be easily intercepted by people looking to...

Browser Hijacking Attacks are a Serious Threat

Understanding Browser Hijacking Attacks Browser hijacking attacks involve the stealthy installation of malicious software onto a user's web browser. This malware can range from adware and spyware to more sophisticated forms like ransomware and keyloggers. The primary goal of these attacks is to gain unauthorized access to sensitive information or disrupt the user's browsing experience. Common Te...

Securing Your Wireless Network

Alter the Security Information on Your Router As with any account that is protected by a password, you will want to ensure that your router?s login information is changed to something much more secure than the default configuration that comes with the device. This is because any default credentials for router models can be found online and can easily be accessed by anyone that can use a Google se...

Ask a Tech: How to Choose the Right Laptop to Buy

What Should I Look For, in Terms of Specifications, When Considering a Laptop for Work Purposes? Naturally, this can vary a little based on one user?s needs as compared to another, but generally speaking, it is best to ensure that everyone?s system is running at least an i5 processor and has a minimum of eight or, ideally, 16GB of RAM (Random Access Memory). In terms of storage, you?re ideally us...