The material below discusses approaches and issues related to securing your personal computer and the data resident on it. Since security is all about balancing risks against benefits, there's an implied calculation behind the development. It is critical to recognize that there are an endless number of implied calculations that anyone could make, all leading to slightly to significantly different final states. That divergence in approach is fine as long as the final goals, a secure malware free computer with measures implemented to insure long term data integrity, are kept in mind and are actually achieved. Due to the length of the thread, an MS Word document of the complete content is attached to this initial post. Use and share this document freely. It is by no means comprehensive or the last word on the topic. For some it will be both a start and an end, while for others it will simply be a start on another path to securing their system. In any event, my hope is that it will provoke a bit of analytic and introspective thought into developing your own approaches to securing your personal computer systems.