Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Control Where Your Downloads Are Saved

Tip of the Week: Control Where Your Downloads Are Saved

Whenever you download a file from the Internet, the file will, by default, go to an aptly-titled folder in Windows called Downloads. Unless you change the default settings, your files will always be saved here. But what if you want to make it so that your downloads go somewhere else? You can accomplish this pretty easily. We’ll walk you through how to do it for some of the most popular browsers, including Google Chrome, Microsoft Edge, and Mozilla Firefox.

You might be wondering why you would even want to make this change to your PC in the first place. After all, there must be a reason why it defaults to such a place. Let’s use the example of downloading a large file, like a video. Maybe you don’t want that file to take up so much space on your hard drive. If you have a connected hard drive or a network drive, you can tell the file to download directly to it by customizing where your downloads go. This saves you the pain of moving or copying files to the location after the fact.

For Google Chrome
Open up your Chrome browser and click on the three-dot menu that’s found in the top-right corner of the screen. You’ll then want to click on Settings. Scroll all the way down to the bottom of the settings menu to find the Advanced option. If you look far enough, you’ll see the Downloads heading. You can then change the default location for any download that you choose to start. Just make sure that you also toggle the option to ask you for the location before you start a download so that you can change the location as needed.

For Microsoft Edge
Just like Google Chrome, you’ll have to navigate through the three-dot menu that hides Edge’s Settings. This will open up a new menu that appears on the right side of the screen. Next, go to View Advanced Settings. You’ll eventually see the Downloads section, which will give you the same settings as Chrome.

For Firefox
Even for Firefox, the steps are largely the same. Open the three-line menu that is in the top-right corner and select Preferences. Once you’ve done so, make your way to the General tab. Finally, select the Choose button next to the Save files to. You’ll be given the same options that are available for the other browsers.

For more tips and tricks, subscribe to Voyage Technology’s blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 08 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Productivity Passwords Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade VoIP Smartphones Data Recovery AI Business Management Mobile Devices communications Disaster Recovery Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Miscellaneous Automation Artificial Intelligence Facebook Information Holiday Gadgets Training Cloud Computing Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Windows 10 Office Data Management Business Continuity Government Business Technology Wi-Fi Windows 10 Bandwidth Blockchain Virtualization Vendor Apps Two-factor Authentication Mobile Office Data Security App Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Mobile Device Management Networking Chrome Gmail Budget BYOD Apple Applications Access Control Computing Hacker Information Technology Conferencing Avoiding Downtime Marketing Office 365 How To BDR WiFi HIPAA Router Virtual Private Network Health 2FA Operating System Help Desk Computers Risk Management Retail Website Healthcare Analytics Office Tips Managed IT Services Augmented Reality Storage Password Bring Your Own Device Big Data Social Physical Security Display Printer Going Green Paperless Office Windows 11 Infrastructure Customer Service Monitoring Cybercrime Excel Document Management Remote Workers Telephone Scam Data loss Cooperation Free Resource Firewall Project Management Windows 7 Patch Management Save Money Microsoft 365 The Internet of Things Remote Monitoring Vulnerability End of Support Vendor Management Solutions VPN Employees Meetings Integration User Tip Modem Processor Computer Repair Mobile Security Customer Relationship Management Holidays Settings Wireless Printing Content Filtering Data Storage Hacking Smart Technology Supply Chain Presentation Video Conferencing YouTube Machine Learning Managed Services Provider Saving Time Cryptocurrency Virtual Machines Professional Services Wireless Technology Managed IT Service Maintenance Virtual Desktop Antivirus LiFi Downloads Data storage iPhone Licensing Word Outlook Entertainment Vulnerabilities Data Privacy Money Humor Images 101 Safety Telephone System Multi-Factor Authentication Robot Mobility Cost Management Sports Mouse Administration IT Management Application Best Practice Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies User Error Microchip Internet Exlporer Software as a Service Buisness Fraud Meta IT solutions Managing Costs Amazon IBM Legal Username Business Growth Point of Sale eCommerce Black Friday SSID Database Surveillance Virtual Assistant Outsource IT Tech Support IT Technicians Virtual Machine Environment Cortana Media Network Management Proxy Server Reviews Alt Codes Cookies Monitors Cyber Monday Medical IT Competition Tactics Development Downtime Hotspot Transportation Small Businesses Hosted Solution Websites Mirgation Hypervisor Displays Shopping Typing Nanotechnology Optimization PowerPoint SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Management PCI DSS User Chatbots Knowledge Navigation Google Drive Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Virtual Reality Computing Infrastructure Teamwork Hiring/Firing 5G Service Level Agreement Internet Service Provider Server Management Regulations Compliance Unified Communications Private Cloud Identity Experience Evernote Paperless IP Address Google Docs Superfish Bookmark Bitcoin Identity Theft Smart Tech Memes Running Cable Co-managed IT Twitter Alerts SQL Server Technology Care Google Wallet Download Net Neutrality Financial Data Recovery Error History Business Communications Browsers Smartwatch Hard Drives Windows 8 Connectivity IT Laptop Social Engineering Break Fix Scams Remote Computing Azure Hybrid Work Domains Drones Upload Procurement Social Network Telework Cyber security Multi-Factor Security Tech Human Resources CES Refrigeration Tablet IoT Communitications Halloween Dark Web Cables Alert Public Speaking Trends Supply Chain Management Lithium-ion battery Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps Data Analysis Hacks Star Wars IT Assessment Entrepreneur Scary Stories How To Microsoft Excel IT Maintenance Notifications Staff Value Business Intelligence Fun Gamification Flexibility Organization Deep Learning Travel Social Networking Legislation Shortcuts Techology Fileless Malware Digital Security Cameras Undo Google Maps Smart Devices Ransmoware Education Wearable Technology Memory Vendors Content Remote Working Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Unified Threat Management Directions Videos Mobile Computing Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Search

Blog Archive