A virtual machine. You build it from a "golden" image. Nothing exists when you wipe out the VM because even the "disks" get wiped out.Taking into account that software the kind of software that keyloggers etc. are in cybersecurity, taking into account that for example in Windows when you reset it recycling it all the malicious software previously explained gets out of Operative System system ´ś files partition but remain in the rest of partitions and answer my question remembering the answer to if when you reset Windows recycling it the malicious software previously explained can´t come from the rest of the partitions that remains with the malicious software previously explained to the Operative System system ´ś files partition.