Steps 4 & 5 look nearly the same to me. Could you be more explicit about which differences you mean?
I’d like to see some changes to the security tango regarding rootkits. All the recommended anti-malware apps are to be installed on potentially infected operating systems. The problem is that rootkits operate at such a low-level that they can hide themselves from the operating system and therefore also any installed programs. The guys are obviously aware of this since whenever the phrase rootkit comes up they recommend taking the drive out and checking it using another known good operating system. Instead of going through all that trouble, many producers of anti-malware include a bootable CD or USB disk. Using those will bypass the potentially infected operating system, as long as they are downloaded and burned on a non-infected computer.