Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Adding a Web Shortcut to Your Desktop

Tip of the Week: Adding a Web Shortcut to Your Desktop

Keyboard shortcuts are great ways to make your workday just a little more efficient without much effort. Did you know that you can make a keyboard shortcut on your Windows computer that can direct you to a specific webpage? Let’s go over how you can make it happen.

There are a couple of ways you can make your keyboard Internet shortcut.

Manually

To manually make your keyboard Internet shortcut, right-click on your desktop and select New > Shortcut. When the dialog box opens, type the website URL in the box that appears, then select Next. You’ll then be prompted to give your new shortcut a name. Once you’re ready, click Finish. Your new icon will appear on your desktop.

Now, when you right-click it, you can select Properties to see information about the shortcut. From here, you can change the URL, assign a shortcut key, and change the icon. Click in the Shortcut key box, then type the key you would like to use for your new shortcut. The key combination will then appear in the box.

Click-and-Drag

To save yourself a step, you can simply click-and-drag the shortcut’s URL to your desktop to make the shortcut a bit faster and more easily. This also assigns your shortcut a name in the form of the website page’s name. From here, you can right-click the shortcut, select Properties, and see the same information that you could see in the above step.

And that’s all there is to it! Now you can make custom keyboard shortcuts for your favorite websites. Alternatively, you could just use bookmarks in your browser, but the more tools you have at your disposal, the better.

Voyage Technology can help your team best utilize its technology for the sake of productivity. To learn more, call us today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 02 August 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Efficiency Hardware Internet IT Support Malware Privacy Google Email Computer Workplace Tips Phishing IT Services Hosted Solutions Collaboration Users Mobile Device Ransomware Workplace Strategy Quick Tips Small Business Microsoft Cybersecurity Backup Passwords Communication Data Backup Saving Money Smartphone Managed Service Android VoIP Business Management Smartphones Upgrade Mobile Devices communications Disaster Recovery Data Recovery Browser Social Media Productivity Windows Microsoft Office Managed IT Services Current Events AI Remote Tech Term Network Internet of Things Artificial Intelligence Automation Facebook Cloud Computing Covid-19 Holiday Gadgets Information Server Remote Work Training Managed Service Provider Miscellaneous Outsourced IT Employee/Employer Relationship Encryption Compliance Spam Office Windows 10 Business Continuity Data Management Government IT Support Bandwidth Windows 10 Business Technology Virtualization Wi-Fi Blockchain Two-factor Authentication Vendor Mobile Office Apps Data Security BYOD Chrome Mobile Device Management Budget Gmail Apple Managed Services Voice over Internet Protocol App Networking Employer-Employee Relationship HIPAA Avoiding Downtime Office 365 Applications Marketing Access Control Tip of the week Conferencing WiFi How To BDR Computing Information Technology Hacker Router Analytics Website Office Tips Virtual Private Network Augmented Reality Health Storage Password Help Desk Bring Your Own Device Retail Healthcare Big Data Managed IT Services Operating System Risk Management Computers Vendor Management Solutions Windows 11 Physical Security 2FA Display Printer Excel Paperless Office Infrastructure Monitoring Firewall Document Management The Internet of Things Remote Workers Telephone Social Going Green Scam Data loss Cooperation Free Resource Project Management Cybercrime Windows 7 Customer Service Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Virtual Desktop Data storage LiFi Wireless Technology IT Management Meetings VPN Employees Integration Outlook Modem Supply Chain User Tip Processor Computer Repair Mobile Security Money Humor Word Holidays Data Storage Smart Technology Sports Video Conferencing Mouse Machine Learning Managed Services Provider Virtual Machines Professional Services Safety Saving Time Administration Managed IT Service Data Privacy Maintenance Downloads Antivirus iPhone Licensing Settings Entertainment Wireless Vulnerabilities Printing Content Filtering Customer Relationship Management Images 101 YouTube Multi-Factor Authentication Robot Mobility Cryptocurrency Telephone System Hacking Cost Management Presentation Outsource IT Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Google Wallet Environment Media Wasting Time Trend Micro Network Congestion Specifications Security Cameras Windows 8 IP Address Laptop Small Businesses User Error Microchip Internet Exlporer Software as a Service Fraud Drones Displays Username Managing Costs Point of Sale eCommerce Black Friday SSID Halloween Recovery Outsourcing Hard Drives Database Surveillance Virtual Assistant Domains Network Management Tech Support IT Technicians Virtual Machine Cookies Monitors Cyber Monday Medical IT Hacks Workplace Proxy Server Reviews Scary Stories Hiring/Firing Refrigeration Tactics Development Fun Hotspot Transportation Deep Learning Public Speaking Paperless Websites Mirgation Hypervisor Nanotechnology Optimization PowerPoint Lithium-ion battery Co-managed IT Shopping Technology Care SharePoint Education Addiction Entrepreneur Electronic Medical Records Language Employer/Employee Relationships Navigation Business Communications Management PCI DSS Chatbots Screen Reader Writing Distributed Denial of Service Mobile Computing Scams Lenovo Gig Economy Hybrid Work Undo Service Level Agreement Internet Service Provider Search Virtual Reality Computing Infrastructure Teamwork Evernote Best Practice Human Resources Server Management Regulations Compliance Private Cloud Identity Buisness Identity Theft Smart Tech Memes Cables Superfish Bookmark Legal IT solutions Download Net Neutrality Twitter Alerts SQL Server Business Growth Google Apps Financial Data Error History Application Connectivity IT Social Engineering Break Fix IT Maintenance Browsers Smartwatch Business Intelligence Upload Procurement Cortana Remote Computing Azure Multi-Factor Security Tech Alt Codes IBM Shortcuts Social Network Telework Cyber security CES Downtime Tablet IoT Communitications Dark Web Ransmoware Vendors Hosted Solution Trends Supply Chain Management Alert File Sharing Regulations Dark Data Google Calendar Term Typing Be Proactive Managed IT Customer Resource management FinTech Data Analysis Star Wars IT Assessment How To Microsoft Excel Workforce Google Drive Threats Competition Gamification Flexibility Knowledge Notifications Staff Value Travel Social Networking Legislation Workplace Strategies Organization Meta Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices 5G Google Docs Amazon Unified Communications Content Remote Working Experience Wearable Technology Memory Unified Threat Management Motherboard Data Breach Comparison Google Play Bitcoin Health IT Running Cable User

Blog Archive