this post was submitted on 11 Apr 2026
235 points (99.2% liked)
Technology
83705 readers
2392 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Nothing gets my nerdrage on more than using CTRL+w in a browser-based shell and closing the tab.
Pretty much the one and only good thing about work forcing us to switch from Linux laptops to Macbooks.
The mixed used of the command key and CTRL on Macs has tricked me to pressing command+w in a terminal window quite a few times.
I hated the Command + C and Command + V for Copy / Paste until I realized it meant not clobbering ^C in the terminal. Instantly loved it.
The biggest issue I have with it is that I have Linux on all my personal systems and OSX on my work laptop and sometimes switch rapidly between them.
My fingers don't seem to adapt as quickly, though, and I often press the wrong combination between them.
Yeah, annoying that it has different meanings.
They’re common in clouds like Azure, AWS, etc. Life is better with ssh, but sometimes these are useful for bastions.
I prefer an actual client, especially because I press CTRL+w before my brain sets in, but there are plenty of examples. My latest encounter was Rancher, a k8s management thing.
But a client running in a browser window does not imply any remotely exploitable vulnerabilities.