Circle around cursor when I push Ctrl button

Posted on 2006-06-02
Last Modified: 2008-03-06
When I push my Ctrl button a cricle appears arounmy cursor.  It starts out big and shrinks around the circle.  I do not know if this is some kind of weird program running in the background I do not know about.  I ran hijack this, but it didn't seem to show anything.  I ran Adaware, spybot and Windows Defender but I stiill get the same problem.
Question by:jeffgonzales14
    LVL 10

    Accepted Solution


    It sounds like an 'hilight my mouse cursor position' feature in your mouse driver - it's pretty common and nothing to worry about!

    Have a look in Control Panel/Mouse - you should be able to control whether it's active from there or not.

    LVL 10

    Expert Comment

    ps. It's probable an option called 'Show location of mouse pointer when I press the CTRL key' on the Pointer options tab on the applet.
    LVL 23

    Expert Comment

    by:Mohammed Hamada
    Reset your mouse settings to default from control panel, this should do it.

    Also you can use tweakUI to fix it.. check out this link
    LVL 23

    Expert Comment

    by:Mohammed Hamada
    BTW: TweakUI is available for win2000 and XP.
    LVL 5

    Expert Comment

    Dear jeffgonzales14,

    Don't worry, there is no virus/spyware on your computer. Simply do the following:
    1. Go to My Computer -> Control Panel
    2. Go to Prints and Other Hardware (Category view) OR Mouse (Classic view)
    3. Search through all the tabs and untick 'Show location of mouse pointer when I press the CTRL key'
    * This varies with different mouse software.
    If you find you are unable to disable this 'feature' then simply uninstall the mouse software, repeat the steps and then re-install the drivers for the mouse.

    This may be the long way to do this, but it is much more manual and you know that you're doing it right.

    Hope this helps - GL

    ~ Nerd

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    Join & Write a Comment

    Let’s list some of the technologies that enable smooth teleworking. 
    The article will include the best Data Recovery Tools along with their Features, Capabilities, and their Download Links. Hope you’ll enjoy it and will choose the one as required by you.
    Using Adobe Premiere Pro, the viewer will learn how to set up a sequence with proper settings, importing pictures, rendering, and exporting the finished product.
    An overview on how to enroll an hourly employee into the employee database and how to give them access into the clock in terminal.

    746 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    16 Experts available now in Live!

    Get 1:1 Help Now