Just a quick link drop here for future use: Breaking Out of Citrix and other Restricted Desktop Environments. This list is Windows-centric and includes some old tricks that likely don’t work anymore. But even looking at some of the older techniques illustrates the creativity involved in bypassing restrictions (and how features can be abused in unintended ways).