Overview
Clicker allows you to customize mouse cursor appearances by modifying the cursors.ini
configuration file. This feature lets you personalize different cursor states with custom cursor files (.cur or .ani).
- Note
- Custom cursors are only applied when Clicker is in active mode. When Clicker is inactive, the system's default cursors will be used.
To activate/deactivate Clicker:
- Use the mode transfer key (default: Backtick key)
- Or use the activation controls in the main panel
This behavior ensures that cursor customization doesn't interfere with normal system operation when Clicker is not in use.
Configuration File
The cursor settings are managed through the cursors.ini
file, which uses a simple format to map Windows system cursor codes to custom cursor files.
File Location
<Clicker Installation Path>/cursors.ini
Directory Structure
All custom cursor files must be placed in the cursors
folder:
<Clicker Installation Path>/
└── cursors/
├── cursor1.cur
├── cursor2.ani
└── subfolder/
└── custom_cursor.ani
Cursor Configuration
Basic Format
[CURSORS]
SystemCursorCode=CursorFileName.extension
Supported File Types
- Static cursors (.cur)
- Animated cursors (.ani)
System Cursor Codes
These cursor codes are defined in Windows system (WinUser.h) and can be customized in Clicker:
Code | Cursor Type | Description |
32512 | Arrow | Standard pointer |
32513 | IBeam | Text selection |
32514 | Wait | Loading/busy |
32515 | Cross | Precision select |
32516 | UpArrow | Alternative select |
32642 | SizeNWSE | Diagonal resize (↘) |
32643 | SizeNESW | Diagonal resize (↙) |
32644 | SizeWE | Horizontal resize |
32645 | SizeNS | Vertical resize |
32646 | SizeAll | Move |
32648 | No | Unavailable |
32649 | Hand | Link select |
32650 | AppStarting | Program starting |
32651 | Help | Help selection |
For detailed information about Windows system cursors and their behaviors, see the Microsoft documentation on cursors.
Each cursor type represents a different system state or interaction mode. Choose appropriate cursor designs that clearly convey their intended function.
Usage Examples
Basic Cursor Assignment
[CURSORS]
32512=standard.cur ; Normal pointer
32649=custom_hand.ani ; Link hover
Using Subfolders
[CURSORS]
32512=theme1/normal.cur
32649=theme1/link.ani
- Complete Theme Example
[CURSORS]
32512=Rainbow normal.ani ; Standard pointer
32513=Rainbow text.ani ; Text cursor
32514=Rainbow busy.ani ; Wait cursor
32649=Rainbow link.ani ; Hand cursor
Customization Tips
- Cursor Code Behavior
- Duplicate cursor codes will use the last valid entry in the file
- You can use this behavior to override previous settings
- Example:
[CURSORS]
32512=theme1/normal.cur ; This will be ignored
32512=theme2/normal.cur ; This will be applied
- Finding Cursor Files
- Visit cursor resource websites:
- Managing Multiple Themes
- Create subfolders in the
cursors
directory for different themes
- Comment out unused cursor sets using semicolons (;)
- Applying Changes
- Save modifications to
cursors.ini
- Restart Clicker using
Alt + F9
to apply changes
- Cursor Activation
- Custom cursors only take effect when Clicker is in active mode
- Toggle Clicker activation using:
- Mode transfer key (default: Backtick key)
- Main panel activation controls
- System default cursors are used when Clicker is inactive
- Warning
- Invalid file paths or cursor codes will be ignored
- Ensure cursor files exist in the specified paths
- Use relative paths from the
cursors
folder
Security & Best Practices
When customizing cursors with third-party files (.cur
, .ani
), be aware of potential security risks such as virus infections or malicious code. Below are some guidelines to help you stay safe:
Use Trusted Sources
- Always download cursor files from reputable websites or verified communities.
- Even if the site is popular, check user reviews or reputation ratings before downloading.
Scan for Viruses
- Run a full antivirus scan on any newly downloaded cursor files.
- Keep your security software (Windows Defender, antivirus programs) up to date.
Beware of Known Vulnerabilities
- Animated cursor files (
.ani
) have historically been exploited through OS vulnerabilities.
- Update your operating system regularly to patch any known exploits.
Check File Integrity
- If a site provides checksums or hashes (MD5, SHA-256), verify them after download.
- If your OS or security software flags the file, do not ignore the warning.
Liability Disclaimer
- Third-party cursor files are beyond Clicker’s control.
- Use them at your own risk—ensure they’re safe before applying.
- We are not responsible for issues arising from unauthorized or malicious files.
Problem Resolution
- If your system behaves strangely after applying a custom cursor, remove the cursor file immediately and run a security check.
- In severe cases, reboot into Safe Mode and perform a thorough scan or consult a security expert.