Safe Surfing: Narcissist Invades Your Computer

Uploaded 3/22/2011, approx. 4 minute read

Summary

Narcissists may use malware to log everything you type, discover your passwords, and break into your email and bank accounts. To protect yourself, never click on links or open attachments from unknown sources, and never enter personal details on unknown sites. Always check the lock icon and HTTPS address before entering personal information, and read emails in text format rather than HTML. Change your passwords frequently, update your operating system and antivirus software, and scan your computer for malware regularly. If you notice suspicious behavior, disconnect from the internet and scan your computer for malware.

Tags

My name is Sam Vaknin. I am the author of Malignant Self-Love, Narcissism Revisited.

Your narcissist is likely to haunt you and hunt you, even via your computer, your smartphone, or your personal digital assistant.

Nothing is safe, not your laptop, not your netbook, not even your iPad. The narcissist is likely to install malware, malicious software on your computer, in order to log everything you type, to discover and unearth your passwords, to break into your email accounts, and even into your bank account.

You ought to be very careful, because narcissists tend to engage in identity theft. They tend to install on your computer and other electronic devices, key loggers, trojans, viruses, worms, and other forms of malicious software.

How could you defend and protect yourself against these intrusive and yet surreptitious techniques?

By implementing 12 rules of behavior.

Number one, never click on a link that is contained in an email message, an instant message, or a post to a Usenet or some support group or a forum. Never click on links. Never open or install a program directly from the internet.

First, download the program to your hard disk, then scan it with your antivirus software, and only then, if it proves to be clean, consider installing it. Even when you install it, try to sandbox the installation process. Most antivirus and firewall products provide today the option of installing the program in a sandbox.

In other words, without interacting with the computer itself, and thus neutralizing the program’s ability to infect your computer.

Rule number three, never open or install a program directly from a USB, a CD-ROM, or a DVD. Again, first scan these devices with your antivirus software, and only then, if they and the program prove clean, consider installing it in a sandbox mode.

Never enter any personal details in forms which are housed or stored on unknown sites. Very often you visit a site which you have never visited before, and you are asked to provide a lot of personal information. Don’t. Never type your user ID or password unless you see the lock icon at the bottom or the top of the screen, and the web address must start with HTTPS.

That means secure. In most browsers, the address bar is colored yellow or green to indicate that the website is safe.

Pay attention to this trio. The lock icon at the bottom or at the top of the screen, the HTTPS address, and the coloring of the address bar.

Never click on a pop-up, no matter what the pop-up says. Do not click on a pop-up even if you just want to close it. Simply ignore the pop-up. Never open attachments that you receive by email. If you are in doubt, save the attachment to your hard disk, scan it with your antivirus software, and only then, if the attachment proves to be clean, open it.

Try to read all your email messages in text format rather than HTML. You can change the settings of your email client, your email program, to read and to write everything, all the messages in text.

Messages in text cannot infect your computer. Messages in HTML can and very often do.

Never visit unfamiliar websites.

First, go to Google, www.google.com, and check whether the site is legitimate and does not carry or is infested with malware. Only if the website is clean, visit the site for the first time using a non-Microsoft browser, preferably Firefox or Chrome, Google Chrome.

Rule number nine, change your passwords frequently.

Use complex passwords containing both numbers and letters and both capitalized letters and cursive ones. Never give your passwords to anyone. Try not to write them down on pieces of paper attached to your computer.

Update your operating system. Update your antivirus program, your firewall, your anti-spyware program, and update all the utilities on your computer. Check for updates daily. These patches are very important. They keep your computer safe and your narcissist out.

Scan your computer for malware every time you use it, after you have used it. Scanning with multiple anti-malware programs is very important.

Finally, anything suspicious happens, stop everything you’re doing. Disconnect from the computer, from the internet, and scan the computer for malware.

What do I mean when I say something suspicious?

Examples of suspicious events or behavior?

Well, persistent pop-ups. Or the computer or the connection slowed down considerably. Or repeated reboots, which you have not initiated. Or your mouse and keyboard freeze. Or you get strange messages and alerts. All these are suspicious signs.

Stop everything you’re doing. Disconnect from the internet. Scan your computer. Delete the malware. Without malware, your narcissist is helpless. There’s nothing he can obtain from you that you do not want to give him.

Malware is the narcissist’s back door into your life. He is there even when he is not there. Make sure that he is not there.

Facebook
X
LinkedIn
WhatsApp

Summary Link:

https://vakninsummaries.com/ (Full summaries of Sam Vaknin’s videos)

http://www.narcissistic-abuse.com/mediakit.html (My work in psychology: Media Kit and Press Room)

Bonus Consultations with Sam Vaknin or Lidija Rangelovska (or both) http://www.narcissistic-abuse.com/ctcounsel.html

http://www.youtube.com/samvaknin (Narcissists, Psychopaths, Abuse)

http://www.youtube.com/vakninmusings (World in Conflict and Transition)

http://www.narcissistic-abuse.com (Malignant Self-love: Narcissism Revisited)

http://www.narcissistic-abuse.com/cv.html (Biography and Resume)

Summary

Narcissists may use malware to log everything you type, discover your passwords, and break into your email and bank accounts. To protect yourself, never click on links or open attachments from unknown sources, and never enter personal details on unknown sites. Always check the lock icon and HTTPS address before entering personal information, and read emails in text format rather than HTML. Change your passwords frequently, update your operating system and antivirus software, and scan your computer for malware regularly. If you notice suspicious behavior, disconnect from the internet and scan your computer for malware.

Tags

If you enjoyed this article, you might like the following:

How You BEHAVE is NOT Who you ARE (Identity, Memory, Self)

Sam Vaknin argues that core identity (the self) is distinct from behaviors: identity is an immutable, continuous narrative formed early in life, while behaviors, choices, and roles can change across time. He discusses clinical, legal, and philosophical implications, including dissociative identity disorder, concluding that even when behavior changes dramatically the

Read More »

Unconditional Love in Adult Relationships (Family Insourcing and Outsourcing)

Professor argues that ‘unconditional love’ means accepting a person’s core identity, not tolerating all behaviors, and distinguishes loving someone as they are from trying to change or control them. He traces modern misunderstandings to Romanticism’s idealization of partners and the outsourcing/insourcing shifts that hollowed family functions while turning the home

Read More »

Sociosexual Narcissist: CRM vs. Agency Models (Clip Skopje Seminar Opening, May 2025)

The speaker opened with multilingual greetings and briefly noted living in the Czech Republic and Poland. The main content summarized models of narcissism: sociosexuality and the contextual reinforcement model (narcissists seek novelty, destabilize stable contexts, and prefer short-term interactions), and the agency model with five elements—focus on agency, inflated self-concept,

Read More »

Baited, Ejected: YOU in Narcissist’s Shared Fantasy (CLIP, University of Applied Sciences, Poland)

The speaker explained Sander’s concept of the “shared fantasy”—a mutual, addictive narrative created by narcissists and their partners that becomes a competing reality and relates to historical notions like mass psychogenic illness. The talk detailed how narcissists recruit and bind targets through stages—spotting/auditioning, exposure of a childlike self, resonance, idealization

Read More »

Psychology of Fraud and Corruption (Criminology Intro in CIAPS, Cambridge, UK)

Professor explained financial crime as a white-collar subtype, focusing on fraud and corruption and arguing that many offenders show significant psychopathology rather than ordinary greed. Key psychological features include magical thinking, impulsivity, entitlement, narcissism, psychopathy, impaired reality testing, dissociation, lack of empathy, grandiosity, and compulsive behaviors (e.g., kleptomania) that make

Read More »

Abuse Victims MUST Watch This! (with Psychotherapist Renzo Santa María)

Professor Sam Vaknin argued that narcissistic abuse causes distinct, reversible trauma by imposing the abuser’s deficits on victims—eroding identity, agency, reality testing, and inducing internalized ‘introject’ voices that perpetuate suffering. He recommended initial self-work (identifying and silencing alien internal voices, rebuilding an authentic internal friend, body-focused interventions, and delaying therapy

Read More »

“Bad” Relationships Are Opportunities (with Daria Zukowska, Clinical Psychologist)

Professor Sam Vaknin discussed dysfunctional relationships and reframed them as learning opportunities rather than “lost time,” emphasizing that growth requires emotional insight and embodiment in addition to cognitive understanding. He explained that negative self-concept arises from internalized hostile voices, can be countered by developing an authentic, supportive inner voice, and

Read More »

Narcissism: BIBLE Got There FIRST! (FULL VIDEO in Description)

The speaker discussed narcissistic traits as described in the Bible, emphasizing its detailed characterization predates modern diagnostic manuals like the DSM and ICD. They highlighted the diagnostic criteria from the DSM and the lack of narcissistic personality disorder diagnosis in the ICD, noting regional variations in terminology usage. The lecture

Read More »

Why Narcissists MUST Abuse YOU (Skopje Seminar Opening, May 2025)

The seminar, organized by the Vaknin Vangelovska Foundation, provided an in-depth, research-based exploration of pathological narcissism, its impact on victims, and the complex dynamics of the shared fantasy between narcissists and those they manipulate. Key topics included the distinction between narcissistic personality disorder and narcissistic style, the contagious nature of

Read More »