Thats not "secure"
I suggest you run a BSD/nix vbox with a real firewall and route the traffic through that.
Run snort, blacklisting etc.
Move homefolder to other partition.
Amongst a couple other things I cant name right now.
Move homefolder to other partition. - why does this help?
"blacklisting"? of what? ips?
-------------------------------
That does not sound secure and is completely unneeded. You will never be secure if you don't know what you are doing, no matter how much AV's and FW's you install.
Basically you only need malwarebytes to do a scan once a month or so, everything else is replaced by common sense.
Set downloads folder to only be written? no, that is not how windows attributes work.
Secure boot? that won't help if you get a rootkit.
No shares enabled? makes life harder. Just set a password, or only share stuff when you need stuff shared...
The VM for unknown crap and disabled autorun are the only wise decisions IMO.
What I can suggest is read more on social engineering, windows filesystems, learn a bit of coding and develop a common sense. Also you might want to look at ProcessHacker, it's awesome.
And 64bit? only if you have 4+GB of RAM, otherwise you don't need 64bit.
Might as well consider using online file scanners to check an executable, fuck virus makers, I hate malware actually, when the sole purpose of it is to mess the system up...
What about an AV? which one do you consider good? are there any good free ones?
About the dl folder when I tried to execute an exe from a folder with only r&w it didn't let me, so i considered it another step into a more secure zone.
What about dual boot - one secure partition and one for crap software?