Windows Client OS

Delete the Recycle Bin Icon from the Desktop in XP/2003

How can I delete the Recycle Bin icon from the desktop in Windows XP/2003?

To delete the Recycle Bin icon from the Windows XP/2003 desktop follow these steps:

  • Open Registry Editor.
  • In Registry Editor, navigate to the following registry key:

Sponsored Content

Maximize Value from Microsoft Defender

In this ebook, you’ll learn why Red Canary’s platform and expertise bring you the highest possible value from your Microsoft Defender for Endpoint investment, deployment, or migration.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace
  • Find the following key:

{645FF040-5081-101B-9F08-00AA002F954E}

delete recycle bin

  • Delete the above key.

Note: As always, before making changes to your registry you should always make sure you have a valid backup. In cases where youre supposed to delete or modify keys or values from the registry it is possible to first export that key or value(s) to a .REG file before performing the changes.

  • Close Registry Editor.

There is no need to reboot. Just wait a few seconds and see how the icon disappears from the desktop.

  • In order to restore the Recycle Bin icon to the desktop just re-create the missing key (or import it back to the registry in case youve exported it earlier).

In Registry Editor, navigate to the following registry key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace
  • Create the following key:

{645FF040-5081-101B-9F08-00AA002F954E}

(just copy/paste, including the brackets).

Done!

Related articles

You might also want to read the following related articles:

Links

Rename or Delete Special Folders

Related Topics:

External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by: