How to Run Your Computer Without Security Software
Consider using a non-standard operating system., Create a second account that has very little privileges., Use a non-standard web browser., Use a non-standard mail application., Never open e-mails that look remotely suspicious., Always hover-over...
Step-by-Step Guide
-
Step 1: Consider using a non-standard operating system.
A large majority of viruses are written for Windows because of the fact that most people use Windows.
Using a Mac or Linux operating system will drastically reduce your chances of getting a virus. -
Step 2: Create a second account that has very little privileges.
Using a guest account instead of your main account will typically limit exposure of your system to non-essential areas of your operating system. , Again, because a large majority of people use Internet Explorer, most viruses exploit its vulnerabilities more often than Firefox, Safari, or Chrome. , Do not use Microsoft Outlook or Outlook Express. , If a friend of yours sends an e-mail with the subject "Very funny" and the like, you may want to call them to verify that they did indeed send you an e-mail.
If you do not have their phone number, it may be best for you to delete it to be safe. , Note that there are vulnerabilities associated with links, even if using this technique.
Overall, you should never click on a link that looks suspicious. , Only turn on your network connection when you need online access. -
Step 3: Use a non-standard web browser.
-
Step 4: Use a non-standard mail application.
-
Step 5: Never open e-mails that look remotely suspicious.
-
Step 6: Always hover-over links to verify where the link goes.
-
Step 7: Physically disconnect or disable your network connection when you are not using it.
Detailed Guide
A large majority of viruses are written for Windows because of the fact that most people use Windows.
Using a Mac or Linux operating system will drastically reduce your chances of getting a virus.
Using a guest account instead of your main account will typically limit exposure of your system to non-essential areas of your operating system. , Again, because a large majority of people use Internet Explorer, most viruses exploit its vulnerabilities more often than Firefox, Safari, or Chrome. , Do not use Microsoft Outlook or Outlook Express. , If a friend of yours sends an e-mail with the subject "Very funny" and the like, you may want to call them to verify that they did indeed send you an e-mail.
If you do not have their phone number, it may be best for you to delete it to be safe. , Note that there are vulnerabilities associated with links, even if using this technique.
Overall, you should never click on a link that looks suspicious. , Only turn on your network connection when you need online access.
About the Author
Douglas Simmons
Enthusiastic about teaching home improvement techniques through clear, step-by-step guides.
Rate This Guide
How helpful was this guide? Click to rate: