Wow, you guys are a trip.
As for me, I have several versions of Windows running on my devices, (Server 2003 (XP kernel), Vista (32 bit for comparability), Windows 8.1 and 10) and I have one Linux machine that I am having issues with and will probably have to re-install or the hardware is broken. I do have a Windows 2000 box sitting on the floor that has not be turned on since 2001.
I started out with PC's on a TRS-80 Model I, switched to Microsoft MS-DOS at v2.0 and have moved on through the follow on OS versions to Windows 10. I was on the Windows 95, Window 3.0 and Windows NT beta teams. After I received my degree in CS (DEC PDP-11 and a Apple II (for UCSD Pascal - I had Turbo Pascal on my TI-Pro)) I worked on Big Iron (MVS, VM, I worked with Research people using the CDC and Cray) and various PC vendors (Compaq, HP, IBM, Dell and some no names that no longer exist).
I was my engineering groups PC coordinator that implemented all the desktop computers for the organization and brought one, if not the first, production Windows NT server into the company. I still have the Certificate of appreciation for assisting with writing up the first corporate wide Windows NT security guideline and implementation document. I introduced and wrote setup processes for Windows NT (v3.0, 3.51 and 4.0 - Workstation and Server). At the next corporation I worked for I introduced Windows 2000 (Workstation and Server) and XP to the Software Engineering group and the basic setup ended up being the basis for their corporations global roll-out of both OS's to well over 100,000 PCs across the planet (hence Global Network).
At the personal level, I have never had a significant virus infestation on any of my devices. (A Microsoft Word macro issue - but no real viruses)
While on the job the guidelines we used really did not allow for most viruses to get past our firewall. (Not a PC issue in itself, but our security officer locked the campus firewall down to where we had to get technical reasons to open a port to the (get this) Global Corporate Network). If the vendor or software engineer could not justify using a port, it was blocked by default. While I worked there, we missed Code Red and other misbehavior's of the era and had no breaches i.e. nothing, nada, zip for the 9 years I was there.
All that said, here are some basic rules:
- Always do day-to-day work with a reduced privileged account.
- When using a high privileged account (Administrator Group- Windows, root Linux/OSX) Never - ever - go to the internet unless you are absolutely sure that the target is not sending malware.
- Turn on Adblocker, or your favorite blocker, in your browser of choice.
- Never by default have your browser store passwords - EVER.
- Use passphrases, not Words. i.e. Pentax1stheB#st-thing-going - Don't use this one as it is in the "public" arena (No, I do not use this anywhere).
- Get a password vault and use it to keep your passphrases off of the Post It Notes®.
- Run a full virus scan aka "deep scan" at least once a month.
- Get security updates on a regular basis.
- Buy a large (I have a 8TB drive) for full system backups.
- Backup your DATA (yeah I am yelling) as you see fit on something that is not usually connected to your base device.
- If you are running Windows - Rename the "Administrator" built in account to something else. Bob, John, Sue, Mustang - anything but Administrator. I do not believe that root can be renamed to something else on Linux or OSX.
- If you are using Windows 10 - spend the money to upgrade to Pro where you can turn a great deal of the supposedly bad stuff off.