Background

Safe Surfing: Narcissist Invades Your Computer

Uploaded 3/22/2011, approx. 4 minute read

My name is Sam Vaknin. I am the author of Malignant Self-Love, Narcissism Revisited.

Your narcissist is likely to haunt you and hunt you, even via your computer, your smartphone, or your personal digital assistant.

Nothing is safe, not your laptop, not your netbook, not even your iPad. The narcissist is likely to install malware, malicious software on your computer, in order to log everything you type, to discover and unearth your passwords, to break into your email accounts, and even into your bank account.

You ought to be very careful, because narcissists tend to engage in identity theft. They tend to install on your computer and other electronic devices, key loggers, trojans, viruses, worms, and other forms of malicious software.

How could you defend and protect yourself against these intrusive and yet surreptitious techniques?

By implementing 12 rules of behavior.

Number one, never click on a link that is contained in an email message, an instant message, or a post to a Usenet or some support group or a forum. Never click on links. Never open or install a program directly from the internet.

First, download the program to your hard disk, then scan it with your antivirus software, and only then, if it proves to be clean, consider installing it. Even when you install it, try to sandbox the installation process. Most antivirus and firewall products provide today the option of installing the program in a sandbox.

In other words, without interacting with the computer itself, and thus neutralizing the program's ability to infect your computer.

Rule number three, never open or install a program directly from a USB, a CD-ROM, or a DVD. Again, first scan these devices with your antivirus software, and only then, if they and the program prove clean, consider installing it in a sandbox mode.

Never enter any personal details in forms which are housed or stored on unknown sites. Very often you visit a site which you have never visited before, and you are asked to provide a lot of personal information. Don't. Never type your user ID or password unless you see the lock icon at the bottom or the top of the screen, and the web address must start with HTTPS.

That means secure. In most browsers, the address bar is colored yellow or green to indicate that the website is safe.

Pay attention to this trio. The lock icon at the bottom or at the top of the screen, the HTTPS address, and the coloring of the address bar.

Never click on a pop-up, no matter what the pop-up says. Do not click on a pop-up even if you just want to close it. Simply ignore the pop-up. Never open attachments that you receive by email. If you are in doubt, save the attachment to your hard disk, scan it with your antivirus software, and only then, if the attachment proves to be clean, open it.

Try to read all your email messages in text format rather than HTML. You can change the settings of your email client, your email program, to read and to write everything, all the messages in text.

Messages in text cannot infect your computer. Messages in HTML can and very often do.

Never visit unfamiliar websites.

First, go to Google, www.google.com, and check whether the site is legitimate and does not carry or is infested with malware. Only if the website is clean, visit the site for the first time using a non-Microsoft browser, preferably Firefox or Chrome, Google Chrome.

Rule number nine, change your passwords frequently.

Use complex passwords containing both numbers and letters and both capitalized letters and cursive ones. Never give your passwords to anyone. Try not to write them down on pieces of paper attached to your computer.

Update your operating system. Update your antivirus program, your firewall, your anti-spyware program, and update all the utilities on your computer. Check for updates daily. These patches are very important. They keep your computer safe and your narcissist out.

Scan your computer for malware every time you use it, after you have used it. Scanning with multiple anti-malware programs is very important.

Finally, anything suspicious happens, stop everything you're doing. Disconnect from the computer, from the internet, and scan the computer for malware.

What do I mean when I say something suspicious?

Examples of suspicious events or behavior?

Well, persistent pop-ups. Or the computer or the connection slowed down considerably. Or repeated reboots, which you have not initiated. Or your mouse and keyboard freeze. Or you get strange messages and alerts. All these are suspicious signs.

Stop everything you're doing. Disconnect from the internet. Scan your computer. Delete the malware. Without malware, your narcissist is helpless. There's nothing he can obtain from you that you do not want to give him.

Malware is the narcissist's back door into your life. He is there even when he is not there. Make sure that he is not there.

If you enjoyed this article, you might like the following:

Expose Narcissist’s Secret Speech

Narcissists communicate using a dual-layered approach, where the overt message conceals a hidden, manipulative intent designed to trigger emotional responses in their targets. This hidden message often employs techniques such as counterfactuality, victimhood, projection, and gaslighting, which distort reality and shift blame onto others. Effective communication with narcissists requires ignoring the hidden messages and, if possible, involving intermediaries to prevent emotional manipulation. Ultimately, understanding the nature of narcissistic communication can help individuals protect themselves from the psychological harm inflicted by these interactions.


Narcissist in Court and Litigation

Narcissists are skilled at distorting reality and presenting plausible alternative scenarios, making it difficult to expose their lies in court. However, it is possible to break a narcissist by finding their weak spots and using them to inflict pain. The narcissist is likely to react with rage to any statement that contradicts their inflated perception of themselves or suggests they are not special. They feel entitled to be treated differently from others and cannot tolerate criticism or being told they are not as intelligent or successful as they think they are.


Destroy the Narcissist in Court: Divorce, Custody, and Aftermath

In summary, to effectively handle a narcissist in court during divorce and custody proceedings, it is crucial to remain calm, composed, and fact-based. Focus on exposing the narcissist's grandiosity and vulnerabilities by challenging their self-perception and accomplishments, while avoiding appearing vengeful or malicious. Provoke the narcissist indirectly by hinting at their shortcomings and mediocrity, ultimately leading them to lose control and expose their true nature. Maintain a holistic strategy that takes into account both the legal aspects and the narcissist's off-court life.


Love Your Narcissist? Make Him Stay, Depend on You (Tips, Resolutions)

In a relationship with a narcissist, it is important to know what not to do and what to do to maintain the relationship. Avoid disagreeing, contradicting, or criticizing the narcissist, and never offer intimacy or challenge their self-image. To make the narcissist dependent on you, listen attentively, agree with everything they say, offer something unique, be patient, and be emotionally and financially independent. It is also crucial to know yourself and set personal boundaries, treating yourself with dignity and demanding respect from others. If the relationship becomes abusive, consider going no-contact and ending the relationship for your own well-being.


Spot a Narcissist or a Psychopath on Your First Date

There are warning signs to identify abusers and narcissists early on in a relationship. One of the first signs is the abuser's tendency to blame others for their mistakes and failures. Other signs include hypersensitivity, eagerness to commit, controlling behavior, patronizing and condescending manner, and devaluing the partner. Abusers may also idealize their partner, have sadistic sexual fantasies, and switch between abusive and loving behavior. Paying attention to body language can also reveal warning signs.


DO THIS When Narcissist Talks to You!

Focus on the underlying motivations behind a narcissist's communication rather than the content of their words, as their speech often serves specific goals such as impressing others, confabulating to fill memory gaps, supporting their grandiose self-image, or manipulating the listener. Narcissists do not engage in genuine communication; instead, they use language as a tool to manage impressions and reinforce their false identities. Their communication is often condescending and aimed at converting others into sources of narcissistic supply or participants in their shared fantasies. Understanding these motivations can help navigate interactions with narcissists more effectively.


Raging Narcissist: Merely Pissed-off?

Narcissistic rage is a phenomenon that occurs when a narcissist is frustrated in their pursuit of narcissistic supply, causing narcissistic injury. The narcissist then projects a bad object onto the source of their frustration and rages against a perceived evil entity that has injured and frustrated them. Narcissistic rage is not the same as normal anger and has two forms: explosive and pernicious or passive-aggressive. People with personality disorders are in a constant state of anger, which is effectively suppressed most of the time, and they are afraid to show that they are angry to meaningful others because they are afraid to lose them.


Narcissist's Language as Weapon

Narcissists use language as a weapon of self-defense, to obscure, not to communicate, and to obtain narcissistic supply. They talk at others or lecture them, exchange subtexts, and spawn private languages, prejudices, superstitions, conspiracy theories, rumors, phobias, and hysterias. The rules that govern the narcissist universe are loopholeed, incomprehensible, open to interpretation so wide and so self-contradictory that it renders them meaningless. The narcissist, in this respect, is a great social menace, undermining language itself.


Impersonal Triangulation

Triangulation involves introducing a third party into a dyadic relationship to manage dynamics, control behaviors, and elicit emotional responses. While it may seem like a useful tool for relationship management, it ultimately fosters insecurity, distrust, and fear, undermining intimacy. Triangulation can occur with real or imaginary third parties and often serves manipulative purposes, such as punishing someone or sustaining a shared fantasy. It is a self-limiting tactic that can manifest in various contexts, not just romantic relationships, and typically involves leveraging insignificant parties to influence more meaningful connections.


Narcissist's Insignificant Other: Typical Spouse or Intimate Partner

Living with a narcissist can be exhilarating, but it is always onerous and often harrowing. Surviving a relationship with a narcissist, maintaining a relationship, preserving it, insisting on remaining with a narcissist, indicates therefore the parameters of the personality of the victim, of the partner, of the spouse. The partner, the spouse, and the mate of a narcissist who insists on remaining in the relationship and preserving it is molded by it into the typical narcissistic mate, spouse, or partner. The two, the narcissist and his spouse, collaborate in this dance macabre.

Transcripts Copyright © Sam Vaknin 2010-2024, under license to William DeGraaf
Website Copyright © William DeGraaf 2022-2024
Get it on Google Play
Privacy policy