Safe Surfing: Narcissist Invades Your Computer

Uploaded 3/22/2011, approx. 4 minute read

Summary

Narcissists may use malware to log everything you type, discover your passwords, and break into your email and bank accounts. To protect yourself, never click on links or open attachments from unknown sources, and never enter personal details on unknown sites. Always check the lock icon and HTTPS address before entering personal information, and read emails in text format rather than HTML. Change your passwords frequently, update your operating system and antivirus software, and scan your computer for malware regularly. If you notice suspicious behavior, disconnect from the internet and scan your computer for malware.

Tags

My name is Sam Vaknin. I am the author of Malignant Self-Love, Narcissism Revisited.

Your narcissist is likely to haunt you and hunt you, even via your computer, your smartphone, or your personal digital assistant.

Nothing is safe, not your laptop, not your netbook, not even your iPad. The narcissist is likely to install malware, malicious software on your computer, in order to log everything you type, to discover and unearth your passwords, to break into your email accounts, and even into your bank account.

You ought to be very careful, because narcissists tend to engage in identity theft. They tend to install on your computer and other electronic devices, key loggers, trojans, viruses, worms, and other forms of malicious software.

How could you defend and protect yourself against these intrusive and yet surreptitious techniques?

By implementing 12 rules of behavior.

Number one, never click on a link that is contained in an email message, an instant message, or a post to a Usenet or some support group or a forum. Never click on links. Never open or install a program directly from the internet.

First, download the program to your hard disk, then scan it with your antivirus software, and only then, if it proves to be clean, consider installing it. Even when you install it, try to sandbox the installation process. Most antivirus and firewall products provide today the option of installing the program in a sandbox.

In other words, without interacting with the computer itself, and thus neutralizing the program’s ability to infect your computer.

Rule number three, never open or install a program directly from a USB, a CD-ROM, or a DVD. Again, first scan these devices with your antivirus software, and only then, if they and the program prove clean, consider installing it in a sandbox mode.

Never enter any personal details in forms which are housed or stored on unknown sites. Very often you visit a site which you have never visited before, and you are asked to provide a lot of personal information. Don’t. Never type your user ID or password unless you see the lock icon at the bottom or the top of the screen, and the web address must start with HTTPS.

That means secure. In most browsers, the address bar is colored yellow or green to indicate that the website is safe.

Pay attention to this trio. The lock icon at the bottom or at the top of the screen, the HTTPS address, and the coloring of the address bar.

Never click on a pop-up, no matter what the pop-up says. Do not click on a pop-up even if you just want to close it. Simply ignore the pop-up. Never open attachments that you receive by email. If you are in doubt, save the attachment to your hard disk, scan it with your antivirus software, and only then, if the attachment proves to be clean, open it.

Try to read all your email messages in text format rather than HTML. You can change the settings of your email client, your email program, to read and to write everything, all the messages in text.

Messages in text cannot infect your computer. Messages in HTML can and very often do.

Never visit unfamiliar websites.

First, go to Google, www.google.com, and check whether the site is legitimate and does not carry or is infested with malware. Only if the website is clean, visit the site for the first time using a non-Microsoft browser, preferably Firefox or Chrome, Google Chrome.

Rule number nine, change your passwords frequently.

Use complex passwords containing both numbers and letters and both capitalized letters and cursive ones. Never give your passwords to anyone. Try not to write them down on pieces of paper attached to your computer.

Update your operating system. Update your antivirus program, your firewall, your anti-spyware program, and update all the utilities on your computer. Check for updates daily. These patches are very important. They keep your computer safe and your narcissist out.

Scan your computer for malware every time you use it, after you have used it. Scanning with multiple anti-malware programs is very important.

Finally, anything suspicious happens, stop everything you’re doing. Disconnect from the computer, from the internet, and scan the computer for malware.

What do I mean when I say something suspicious?

Examples of suspicious events or behavior?

Well, persistent pop-ups. Or the computer or the connection slowed down considerably. Or repeated reboots, which you have not initiated. Or your mouse and keyboard freeze. Or you get strange messages and alerts. All these are suspicious signs.

Stop everything you’re doing. Disconnect from the internet. Scan your computer. Delete the malware. Without malware, your narcissist is helpless. There’s nothing he can obtain from you that you do not want to give him.

Malware is the narcissist’s back door into your life. He is there even when he is not there. Make sure that he is not there.

Facebook
X
LinkedIn
WhatsApp

Summary Link:

https://vakninsummaries.com/ (Full summaries of Sam Vaknin’s videos)

http://www.narcissistic-abuse.com/mediakit.html (My work in psychology: Media Kit and Press Room)

Bonus Consultations with Sam Vaknin or Lidija Rangelovska (or both) http://www.narcissistic-abuse.com/ctcounsel.html

http://www.youtube.com/samvaknin (Narcissists, Psychopaths, Abuse)

http://www.youtube.com/vakninmusings (World in Conflict and Transition)

http://www.narcissistic-abuse.com (Malignant Self-love: Narcissism Revisited)

http://www.narcissistic-abuse.com/cv.html (Biography and Resume)

Summary

Narcissists may use malware to log everything you type, discover your passwords, and break into your email and bank accounts. To protect yourself, never click on links or open attachments from unknown sources, and never enter personal details on unknown sites. Always check the lock icon and HTTPS address before entering personal information, and read emails in text format rather than HTML. Change your passwords frequently, update your operating system and antivirus software, and scan your computer for malware regularly. If you notice suspicious behavior, disconnect from the internet and scan your computer for malware.

Tags

If you enjoyed this article, you might like the following:

Cesspool Covert Narcissist: From Victimhood to Sadism (Vaknin Narcissism Summaries YouTube Channel)

The meeting explored the characteristics of covert narcissism, emphasizing traits such as envy, pseudo humility, victimhood, and an extensive fantasy life used to compensate for real-life ineffectiveness. It highlighted the sadistic component of narcissism, particularly how covert narcissists use passive-aggressive tactics to exert power and inflict pain while avoiding direct

Read More »

Narcissism: Birth Order, Siblings (Literature Review)

The discussion explored the likelihood of siblings developing narcissistic personality disorder, emphasizing that birth order and being an only child have minimal impact on the development of pathological narcissism, which is likely influenced more by genetic predisposition and environmental factors. Studies indicate that both overt and covert narcissism can arise

Read More »

Sexualizing Anxiety and Anxiolytic Sex: Misattribution of Arousal

The concept of misattribution of arousal, where anxiety and sexual arousal are often confused or interchangeably misidentified, impacting emotional and physiological responses. It highlighted how anxiety can be mistaken for sexual attraction and vice versa, with both conditions influencing behavior and perception, including gender roles and narcissism. Various studies were

Read More »

Artificial Human Intelligence: Brain as Quantum Computer?

The speaker discussed their new project focused on developing a mathematical specification for an implantable PLL chip that would enable the brain to perceive the entire quantum wave function, including all collapsed and non-collapsed states, effectively transforming the brain into a powerful quantum computer. They argued that the brain is

Read More »

Narcissist’s Idealization in Grandiosity Bubble

Sam Vaknin explained the concept of grandiosity bubbles as defensive fantasy constructs narcissists create to maintain an inflated self-image and avoid confronting reality, especially during transitions between sources of narcissistic supply. These bubbles serve as temporary, protective isolations where the narcissist can recover from narcissistic injury without experiencing humiliation or

Read More »

Your Defensive Identification with the Aggressor (Abuser)

The psychological concept of “identifying with the aggressor,” where victims of abuse unconsciously adopt traits and behaviors of their abusers as a defense mechanism to cope with trauma and gain a sense of control. This process, rooted in childhood development and psychoanalytic theory, often leads to maladaptive coping, perpetuates the

Read More »

Back to Our Future: Neo-Feudalism is End of Enlightenment (Starts 01:27)

The speaker discussed the ongoing societal shift from Enlightenment ideals—science, liberal democracy, and bureaucracy—toward a resurgence of feudalism characterized by theocracy, oligarchy, and totalitarianism. This regression reflects widespread disillusionment with elitism and institutional failure, leading to a nihilistic period where the masses reject Enlightenment values in favor of authoritarian models

Read More »

Healthy Self-regulation vs. Dysregulation

Sam Vaknin explores the concept of self-regulation, emphasizing that it primarily concerns controlling behavior rather than internal processes, and highlights its significance in goal attainment and impulse control. He critiques the traditional notion of the “self” in self-regulation, noting the fluidity of identity and the social context’s role, and discusses

Read More »

When YOU Adopt Slave Mentality in Narcissist’s Shared Fantasy

The speaker explored the concept of slave mentality in victims of narcissistic abuse, explaining how narcissists enforce a shared fantasy that suppresses victims’ autonomy and identity. The speaker emphasized that victims often succumb to this mentality because it offers a deceptive sense of safety, predictability, and unconditional love akin to

Read More »

10 Signs: YOU are Broken, Damaged, Scarred

Sam Vaknin discusses the psychological patterns and clinical features common among damaged and broken individuals, emphasizing the impacts of trauma, mistrust, emotional detachment, and difficulties with intimacy and boundaries. He highlights defense mechanisms such as hypervigilance, emotional numbness, conflict avoidance, perfectionism, and the harsh inner critic, explaining how these behaviors

Read More »