I am mostly interested in protecting and securing my Linux computer from
outbound malicious scripts and executables (applications). I am not concerned about inbound connections. My question is simply what is the best method on going about doing this ? Which of the following options would be the most secure and hopefully *easiest* method in accomplishing this ?