lichess.org
Donate

How do I get the knight cursors?

When you go to board editor, and you pick the knight, the cursor looks cool. is there any way I can actually get this cursor?
How do I get the knight cursors?

If you knock them there knights off of their horses they'll give you a good tongue lashin' sonny !
@ImmortalChess1400 said in #1:
> When you go to board editor, and you pick the knight, the cursor looks cool. is there any way I can actually get this cursor?

I suppose if you're on Windows, you could replace the appropriate cursor files (.cur files) with custom files, including the knight cursor you want.

As a quick note, you may need to use a command that runs takeown.exe with proper parameters in order to take ownership of the files if they are system-protected.
@DragonGamer231 said in #3:
> I suppose if you're on Windows, you could replace the appropriate cursor files (.cur files) with custom files, including the knight cursor you want.
>
> As a quick note, you may need to use a command that runs takeown.exe with proper parameters in order to take ownership of the files if they are system-protected.

ok but can I get a step by step on how to do that? Also I mean how to get the cursor style because idk how.
@ImmortalChess1400 said in #4:
> ok but can I get a step by step on how to do that? Also I mean how to get the cursor style because idk how.
Although I know the actions needed for carrying this out, I don't know the steps to performing them. I actually learned a good portion of this by simply going through the various folders and seeing what files there are (and Googling file types I haven't heard of, like SCCD). I also heard mention of a few different things from FlyTech Videos, a master at breaking the operating system. As far as I know, to get a custom cursor (there are different cursor files for different situations), you would either need to copy in a pre-made image (perhaps even a screenshot with some edits) or create one yourself. I also don't know the proper parameters for takeown.exe or if there are additional steps to taking ownership of a protected system file, in the event the cursor files are system-protected. However, you could probably search some methods on Google or YouTube.

This topic has been archived and can no longer be replied to.