In addition to the tips already mentioned, I always use a keylogger. Itās not necessary when using a virtual machine of course but it adds extra annoyance value for your victim when the scammer tries to syskey you thinking heās played his ace card and locked you out of your machine.
They get rather annoyed when you bring up your key logger and say āCouldnāt you think of a better password than 1,2,3,4ā (one tried on me) or whatever else they choose.