An intrusion secure personal computer system includes a central processing
unit, a data storage means, a memory means, a primary operating system, a
virtual machine operating system providing an isolated secondary
operating environment functioning separate from the primary operating
system and controlling operations of the personal computer system within
the isolated secondary operating environment and at least one
input/output (I/O) connection in operative communication with an external
data source, where the personal computer system is secured from malicious
code contained in a file downloaded from the external data source.