How to Run Your Computer Without Security Software

Consider using a non-standard operating system., Create a second account that has very little privileges., Use a non-standard web browser., Use a non-standard mail application., Never open e-mails that look remotely suspicious., Always hover-over...

7 Steps 1 min read Medium

Step-by-Step Guide

  1. Step 1: Consider using a non-standard operating system.

    A large majority of viruses are written for Windows because of the fact that most people use Windows.

    Using a Mac or Linux operating system will drastically reduce your chances of getting a virus.
  2. Step 2: Create a second account that has very little privileges.

    Using a guest account instead of your main account will typically limit exposure of your system to non-essential areas of your operating system. , Again, because a large majority of people use Internet Explorer, most viruses exploit its vulnerabilities more often than Firefox, Safari, or Chrome. , Do not use Microsoft Outlook or Outlook Express. , If a friend of yours sends an e-mail with the subject "Very funny" and the like, you may want to call them to verify that they did indeed send you an e-mail.

    If you do not have their phone number, it may be best for you to delete it to be safe. , Note that there are vulnerabilities associated with links, even if using this technique.

    Overall, you should never click on a link that looks suspicious. , Only turn on your network connection when you need online access.
  3. Step 3: Use a non-standard web browser.

  4. Step 4: Use a non-standard mail application.

  5. Step 5: Never open e-mails that look remotely suspicious.

  6. Step 6: Always hover-over links to verify where the link goes.

  7. Step 7: Physically disconnect or disable your network connection when you are not using it.

Detailed Guide

A large majority of viruses are written for Windows because of the fact that most people use Windows.

Using a Mac or Linux operating system will drastically reduce your chances of getting a virus.

Using a guest account instead of your main account will typically limit exposure of your system to non-essential areas of your operating system. , Again, because a large majority of people use Internet Explorer, most viruses exploit its vulnerabilities more often than Firefox, Safari, or Chrome. , Do not use Microsoft Outlook or Outlook Express. , If a friend of yours sends an e-mail with the subject "Very funny" and the like, you may want to call them to verify that they did indeed send you an e-mail.

If you do not have their phone number, it may be best for you to delete it to be safe. , Note that there are vulnerabilities associated with links, even if using this technique.

Overall, you should never click on a link that looks suspicious. , Only turn on your network connection when you need online access.

About the Author

D

Douglas Simmons

Enthusiastic about teaching home improvement techniques through clear, step-by-step guides.

47 articles
View all articles

Rate This Guide

--
Loading...
5
0
4
0
3
0
2
0
1
0

How helpful was this guide? Click to rate: