Safe Surfing: Narcissist Invades Your Computer

Uploaded 3/22/2011, approx. 4 minute read

Summary

Narcissists may use malware to log everything you type, discover your passwords, and break into your email and bank accounts. To protect yourself, never click on links or open attachments from unknown sources, and never enter personal details on unknown sites. Always check the lock icon and HTTPS address before entering personal information, and read emails in text format rather than HTML. Change your passwords frequently, update your operating system and antivirus software, and scan your computer for malware regularly. If you notice suspicious behavior, disconnect from the internet and scan your computer for malware.

Tags

My name is Sam Vaknin. I am the author of Malignant Self-Love, Narcissism Revisited.

Your narcissist is likely to haunt you and hunt you, even via your computer, your smartphone, or your personal digital assistant.

Nothing is safe, not your laptop, not your netbook, not even your iPad. The narcissist is likely to install malware, malicious software on your computer, in order to log everything you type, to discover and unearth your passwords, to break into your email accounts, and even into your bank account.

You ought to be very careful, because narcissists tend to engage in identity theft. They tend to install on your computer and other electronic devices, key loggers, trojans, viruses, worms, and other forms of malicious software.

How could you defend and protect yourself against these intrusive and yet surreptitious techniques?

By implementing 12 rules of behavior.

Number one, never click on a link that is contained in an email message, an instant message, or a post to a Usenet or some support group or a forum. Never click on links. Never open or install a program directly from the internet.

First, download the program to your hard disk, then scan it with your antivirus software, and only then, if it proves to be clean, consider installing it. Even when you install it, try to sandbox the installation process. Most antivirus and firewall products provide today the option of installing the program in a sandbox.

In other words, without interacting with the computer itself, and thus neutralizing the program’s ability to infect your computer.

Rule number three, never open or install a program directly from a USB, a CD-ROM, or a DVD. Again, first scan these devices with your antivirus software, and only then, if they and the program prove clean, consider installing it in a sandbox mode.

Never enter any personal details in forms which are housed or stored on unknown sites. Very often you visit a site which you have never visited before, and you are asked to provide a lot of personal information. Don’t. Never type your user ID or password unless you see the lock icon at the bottom or the top of the screen, and the web address must start with HTTPS.

That means secure. In most browsers, the address bar is colored yellow or green to indicate that the website is safe.

Pay attention to this trio. The lock icon at the bottom or at the top of the screen, the HTTPS address, and the coloring of the address bar.

Never click on a pop-up, no matter what the pop-up says. Do not click on a pop-up even if you just want to close it. Simply ignore the pop-up. Never open attachments that you receive by email. If you are in doubt, save the attachment to your hard disk, scan it with your antivirus software, and only then, if the attachment proves to be clean, open it.

Try to read all your email messages in text format rather than HTML. You can change the settings of your email client, your email program, to read and to write everything, all the messages in text.

Messages in text cannot infect your computer. Messages in HTML can and very often do.

Never visit unfamiliar websites.

First, go to Google, www.google.com, and check whether the site is legitimate and does not carry or is infested with malware. Only if the website is clean, visit the site for the first time using a non-Microsoft browser, preferably Firefox or Chrome, Google Chrome.

Rule number nine, change your passwords frequently.

Use complex passwords containing both numbers and letters and both capitalized letters and cursive ones. Never give your passwords to anyone. Try not to write them down on pieces of paper attached to your computer.

Update your operating system. Update your antivirus program, your firewall, your anti-spyware program, and update all the utilities on your computer. Check for updates daily. These patches are very important. They keep your computer safe and your narcissist out.

Scan your computer for malware every time you use it, after you have used it. Scanning with multiple anti-malware programs is very important.

Finally, anything suspicious happens, stop everything you’re doing. Disconnect from the computer, from the internet, and scan the computer for malware.

What do I mean when I say something suspicious?

Examples of suspicious events or behavior?

Well, persistent pop-ups. Or the computer or the connection slowed down considerably. Or repeated reboots, which you have not initiated. Or your mouse and keyboard freeze. Or you get strange messages and alerts. All these are suspicious signs.

Stop everything you’re doing. Disconnect from the internet. Scan your computer. Delete the malware. Without malware, your narcissist is helpless. There’s nothing he can obtain from you that you do not want to give him.

Malware is the narcissist’s back door into your life. He is there even when he is not there. Make sure that he is not there.

Facebook
X
LinkedIn
WhatsApp

Summary Link:

https://vakninsummaries.com/ (Full summaries of Sam Vaknin’s videos)

http://www.narcissistic-abuse.com/mediakit.html (My work in psychology: Media Kit and Press Room)

Bonus Consultations with Sam Vaknin or Lidija Rangelovska (or both) http://www.narcissistic-abuse.com/ctcounsel.html

http://www.youtube.com/samvaknin (Narcissists, Psychopaths, Abuse)

http://www.youtube.com/vakninmusings (World in Conflict and Transition)

http://www.narcissistic-abuse.com (Malignant Self-love: Narcissism Revisited)

http://www.narcissistic-abuse.com/cv.html (Biography and Resume)

Summary

Narcissists may use malware to log everything you type, discover your passwords, and break into your email and bank accounts. To protect yourself, never click on links or open attachments from unknown sources, and never enter personal details on unknown sites. Always check the lock icon and HTTPS address before entering personal information, and read emails in text format rather than HTML. Change your passwords frequently, update your operating system and antivirus software, and scan your computer for malware regularly. If you notice suspicious behavior, disconnect from the internet and scan your computer for malware.

Tags

If you enjoyed this article, you might like the following:

Are All Gamblers Narcissists? (+Sports Betting) (Gambling Disorder with Brian Pempus)

The discussion explored the complex psychological dynamics of gambling disorder, distinguishing it from professional gambling and emphasizing its nature as a process addiction linked to reward systems rather than impulse control or compulsion. The conversation highlighted strong associations between gambling disorder and personality disorders like narcissistic, antisocial, and borderline personality

Read More »

From Drama, Recklessness to Risk Aversion (in Psychopathic Personalities)

The discussion focused on the behavioral evolution of individuals with psychopathic and narcissistic traits, highlighting how their reckless, thrill-seeking behaviors tend to diminish with age, often transforming into more pro-social, risk-averse tendencies. This transition is theorized to involve neurobiological changes and the psychological process of sublimation, where aggressive impulses are

Read More »

Intoxicated in Narcissist’s Shared Fantasy (EXCERPTS with NATV)

The discussion focused on the isolating and manipulative nature of narcissism, describing how narcissists create a detached, idealized reality that traps their victims, cutting them off from meaningful connections and reality checks. It was highlighted that narcissism is a global, pervasive phenomenon exacerbated by societal shifts such as technological isolation,

Read More »

Young Politician? BEWARE of This! (Political Academy)

The speaker addressed young aspiring politicians, warning them about the harsh realities of politics, emphasizing the importance of staying true to oneself despite temptations of corruption and power. He outlined the different types of politicians and political strategies, while stressing that youth is a liability in politics, with limited pathways

Read More »

How Technologies Profit from Your Loneliness, Encourage It

The discussion emphasized the critical role of healthy narcissism as a foundational element of mental health, distinguishing it from pathological narcissism and highlighting its genetic basis. It was proposed that mental health should be measured not only by ego-syntonic happiness and functionality but also by a third criterion: reality testing,

Read More »

Can YOU Be an Innovator? Not So Fast!

In this meeting, San Batin emphasized that innovation requires a unique combination of psychological traits, including humility, lifelong curiosity, open-mindedness, and the ability to form novel connections between concepts. Innovators are characterized by their deep respect for existing knowledge and their persistent wonder at the mysteries of reality, which drives

Read More »

Narcissist’s Words: Problematic, Assertoric – Not Apodictic

The speaker explored the philosophical distinctions in types of speech—assertoric, problematic, and apodictic—drawing on Aristotle and Kant to analyze how narcissists employ language. Narcissists predominantly use assertoric speech, making uncompromising, unverifiable claims to support their grandiose self-image, while often presenting apodictic speech that appears revolutionary but merely redefines established concepts.

Read More »