Another option would be some sort of restrictive firewall. There is software for Unix and Windows that can restrict the ability to make connections on a program by program basis. Limit connections only to Tor and you know you won't make any leaks (this could be turned on and off when switching Tor on and off).
-Ben