1
0
Fork 0
mirror of https://github.com/tldr-pages/tldr.git synced 2025-04-29 23:24:55 +02:00

linux*: refresh old pages part 1 (#16251)

Co-authored-by: Sebastiaan Speck <12570668+sebastiaanspeck@users.noreply.github.com>
This commit is contained in:
Managor 2025-04-25 04:34:04 +03:00 committed by GitHub
parent 33ff957538
commit 1f63ed5e22
No known key found for this signature in database
GPG key ID: B5690EEEBB952194
30 changed files with 80 additions and 80 deletions

View file

@ -2,19 +2,19 @@
> The Let's Encrypt Agent for automatically obtaining and renewing TLS certificates. > The Let's Encrypt Agent for automatically obtaining and renewing TLS certificates.
> Successor to `letsencrypt`. > Successor to `letsencrypt`.
> More information: <https://certbot.eff.org/docs/using.html>. > More information: <https://eff-certbot.readthedocs.io/en/latest/using.html>.
- Obtain a new certificate via webroot authorization, but do not install it automatically: - Obtain a new certificate via webroot authorization, but do not install it automatically:
`sudo certbot certonly --webroot --webroot-path {{path/to/webroot}} --domain {{subdomain.example.com}}` `sudo certbot certonly --webroot {{[-w|--webroot-path]}} {{path/to/webroot}} {{[-d|--domain]}} {{subdomain.example.com}}`
- Obtain a new certificate via nginx authorization, installing the new certificate automatically: - Obtain a new certificate via nginx authorization, installing the new certificate automatically:
`sudo certbot --nginx --domain {{subdomain.example.com}}` `sudo certbot --nginx {{[-d|--domain]}} {{subdomain.example.com}}`
- Obtain a new certificate via apache authorization, installing the new certificate automatically: - Obtain a new certificate via apache authorization, installing the new certificate automatically:
`sudo certbot --apache --domain {{subdomain.example.com}}` `sudo certbot --apache {{[-d|--domain]}} {{subdomain.example.com}}`
- Renew all Let's Encrypt certificates that expire in 30 days or less (don't forget to restart any servers that use them afterwards): - Renew all Let's Encrypt certificates that expire in 30 days or less (don't forget to restart any servers that use them afterwards):
@ -22,8 +22,8 @@
- Simulate the obtaining of a new certificate, but don't actually save any new certificates to disk: - Simulate the obtaining of a new certificate, but don't actually save any new certificates to disk:
`sudo certbot --webroot --webroot-path {{path/to/webroot}} --domain {{subdomain.example.com}} --dry-run` `sudo certbot --webroot {{[-w|--webroot-path]}} {{path/to/webroot}} {{[-d|--domain]}} {{subdomain.example.com}} --dry-run`
- Obtain an untrusted test certificate instead: - Obtain an untrusted test certificate instead:
`sudo certbot --webroot --webroot-path {{path/to/webroot}} --domain {{subdomain.example.com}} --test-cert` `sudo certbot --webroot {{[-w|--webroot-path]}} {{path/to/webroot}} {{[-d|--domain]}} {{subdomain.example.com}} --test-cert`

View file

@ -1,19 +1,19 @@
# cewl # cewl
> URL spidering tool for making a cracking wordlist from web content. > URL spidering tool for making a cracking wordlist from web content.
> More information: <https://digi.ninja/projects/cewl.php>. > More information: <https://digi.ninja/projects/cewl.php#usage>.
- Create a wordlist file from the given URL up to 2 links depth: - Create a wordlist file from the given URL up to 2 links depth:
`cewl --depth {{2}} --write {{path/to/wordlist.txt}} {{url}}` `cewl {{[-d|--depth]}} 2 {{[-w|--write]}} {{path/to/wordlist.txt}} {{url}}`
- Output an alphanumeric wordlist from the given URL with words of minimum 5 characters: - Output an alphanumeric wordlist from the given URL with words of minimum 5 characters:
`cewl --with-numbers --min_word_length {{5}} {{url}}` `cewl --with-numbers {{[-m|--min_word_length]}} 5 {{url}}`
- Output a wordlist from the given URL in debug mode including email addresses: - Output a wordlist from the given URL in debug mode including email addresses:
`cewl --debug --email {{url}}` `cewl --debug {{[-e|--email]}} {{url}}`
- Output a wordlist from the given URL using HTTP Basic or Digest authentication: - Output a wordlist from the given URL using HTTP Basic or Digest authentication:

View file

@ -2,7 +2,7 @@
> Calculate the compression ratio of a set of files on a btrfs filesystem. > Calculate the compression ratio of a set of files on a btrfs filesystem.
> See also `btrfs filesystem` for recompressing a file by defragmenting it. > See also `btrfs filesystem` for recompressing a file by defragmenting it.
> More information: <https://github.com/kilobyte/compsize>. > More information: <https://manned.org/compsize>.
- Calculate the current compression ratio for a file or directory: - Calculate the current compression ratio for a file or directory:
@ -10,8 +10,8 @@
- Don't traverse filesystem boundaries: - Don't traverse filesystem boundaries:
`sudo compsize --one-file-system {{path/to/file_or_directory}}` `sudo compsize {{[-x|--one-file-system]}} {{path/to/file_or_directory}}`
- Show raw byte counts instead of human-readable sizes: - Show raw byte counts instead of human-readable sizes:
`sudo compsize --bytes {{path/to/file_or_directory}}` `sudo compsize {{[-b|--bytes]}} {{path/to/file_or_directory}}`

View file

@ -5,27 +5,27 @@
- Execute all programs in the autostart folders: - Execute all programs in the autostart folders:
`dex --autostart` `dex {{[-a|--autostart]}}`
- Execute all programs in the specified folders: - Execute all programs in the specified folders:
`dex --autostart --search-paths {{path/to/directory1}}:{{path/to/directory2}}:{{path/to/directory3}}:` `dex {{[-a|--autostart]} {{[-s|--search-paths]}} {{path/to/directory1}}:{{path/to/directory2}}:{{path/to/directory3}}:`
- Preview the programs would be executed in a GNOME specific autostart: - Preview the programs would be executed in a GNOME specific autostart:
`dex --autostart --environment {{GNOME}}` `dex {{[-a|--autostart]} {{[-e|--environment]}} {{GNOME}}`
- Preview the programs would be executed in a regular autostart: - Preview the programs would be executed in a regular autostart:
`dex --autostart --dry-run` `dex {{[-a|--autostart]} {{[-d|--dry-run]}}`
- Preview the value of the DesktopEntry property `Name`: - Preview the value of the DesktopEntry property `Name`:
`dex --property {{Name}} {{path/to/file.desktop}}` `dex {{[-p|--property]}} {{Name}} {{path/to/file.desktop}}`
- Create a DesktopEntry for a program in the current directory: - Create a DesktopEntry for a program in the current directory:
`dex --create {{path/to/file.desktop}}` `dex {{[-c|--create]}} {{path/to/file.desktop}}`
- Execute a single program (with `Terminal=true` in the desktop file) in the given terminal: - Execute a single program (with `Terminal=true` in the desktop file) in the given terminal:

View file

@ -1,7 +1,7 @@
# dkms # dkms
> A framework that allows for dynamic building of kernel modules. > A framework that allows for dynamic building of kernel modules.
> More information: <https://github.com/dell/dkms>. > More information: <https://manned.org/dkms>.
- List currently installed modules: - List currently installed modules:

View file

@ -13,7 +13,7 @@
- Display CPU and memory statistics only: - Display CPU and memory statistics only:
`dstat --cpu --mem` `dstat {{[-c|--cpu]}} {{[-m|--mem]}}`
- List all available dstat plugins: - List all available dstat plugins:

View file

@ -1,7 +1,7 @@
# exif # exif
> Show and change EXIF information in JPEG files. > Show and change EXIF information in JPEG files.
> More information: <https://github.com/libexif/exif/>. > More information: <https://manned.org/exif>.
- Show all recognized EXIF information in an image: - Show all recognized EXIF information in an image:
@ -9,16 +9,16 @@
- Show a table listing known EXIF tags and whether each one exists in an image: - Show a table listing known EXIF tags and whether each one exists in an image:
`exif --list-tags --no-fixup {{image.jpg}}` `exif {{[-l|--list-tags]}} --no-fixup {{path/to/image.jpg}}`
- Extract the image thumbnail into the file `thumbnail.jpg`: - Extract the image thumbnail into a separate file:
`exif --extract-thumbnail --output={{thumbnail.jpg}} {{image.jpg}}` `exif {{[-e|--extract-thumbnail]}} {{[-o|--output]}} {{path/to/thumbnail.jpg}} {{path/to/image.jpg}}`
- Show the raw contents of the "Model" tag in the given image: - Show the raw contents of the "Model" tag in the given image:
`exif --ifd={{0}} --tag={{Model}} --machine-readable {{image.jpg}}` `exif --ifd {{0}} {{[-t|--tag]}} "Model" {{[-m|--machine-readable]}} {{path/to/image.jpg}}`
- Change the value of the "Artist" tag to John Smith and save to `new.jpg`: - Change the value of the "Artist" tag to John Smith and save to `new.jpg`:
`exif --output={{new.jpg}} --ifd={{0}} --tag="{{Artist}}" --set-value="{{John Smith}}" --no-fixup {{image.jpg}}` `exif {{[-o|--output]}} {{path/to/new.jpg}} --ifd {{0}} {{[-t|--tag]}} "Artist" --set-value "John Smith" --no-fixup {{path/to/image.jpg}}`

View file

@ -1,7 +1,7 @@
# fail2ban-client # fail2ban-client
> Configure and control fail2ban server. > Configure and control fail2ban server.
> More information: <https://github.com/fail2ban/fail2ban>. > More information: <https://manned.org/fail2ban-client>.
- Retrieve current status of the jail service: - Retrieve current status of the jail service:

View file

@ -1,7 +1,7 @@
# findfs # findfs
> Finds a filesystem by label or UUID. > Finds a filesystem by label or UUID.
> More information: <https://mirrors.edge.kernel.org/pub/linux/utils/util-linux>. > More information: <https://manned.org/findfs>.
- Search block devices by filesystem label: - Search block devices by filesystem label:

View file

@ -1,7 +1,7 @@
# maim # maim
> Screenshot utility. > Screenshot utility.
> More information: <https://github.com/naelstrof/maim>. > More information: <https://manned.org/maim>.
- Capture a screenshot and save it to the given path: - Capture a screenshot and save it to the given path:
@ -9,12 +9,12 @@
- Capture a screenshot of the selected region: - Capture a screenshot of the selected region:
`maim --select {{path/to/screenshot.png}}` `maim {{[-s|--select]}} {{path/to/screenshot.png}}`
- Capture a screenshot of the selected region and save it in the clipboard (requires `xclip`): - Capture a screenshot of the selected region and save it in the clipboard (requires `xclip`):
`maim --select | xclip -selection clipboard -target image/png` `maim {{[-s|--select]}} | xclip {{[-se|-selection]}} {{[c|clipboard]}} {{[-t|-target]}} image/png`
- Capture a screenshot of the current active window (requires `xdotool`): - Capture a screenshot of the current active window (requires `xdotool`):
`maim --window $(xdotool getactivewindow) {{path/to/screenshot.png}}` `maim {{[-i|--window]}} $(xdotool getactivewindow) {{path/to/screenshot.png}}`

View file

@ -1,24 +1,24 @@
# ntpq # ntpq
> Query the Network Time Protocol (NTP) daemon. > Query the Network Time Protocol (NTP) daemon.
> More information: <https://www.eecis.udel.edu/~mills/ntp/html/ntpq.html>. > More information: <https://manned.org/man/ntpq.1>.
- Start `ntpq` in interactive mode: - Start `ntpq` in interactive mode:
`ntpq --interactive` `ntpq`
- Print a list of NTP peers: - Print a list of NTP peers:
`ntpq --peers` `ntpq {{[-p|--peers]}}`
- Print a list of NTP peers without resolving hostnames from IP addresses: - Print a list of NTP peers without resolving hostnames from IP addresses:
`ntpq --numeric --peers` `ntpq {{[-n|--numeric]}} {{[-p|--peers]}}`
- Use `ntpq` in debugging mode: - Use `ntpq` in debugging mode:
`ntpq --debug-level` `ntpq {{[-d|--debug-level]}}`
- Print NTP system variables values: - Print NTP system variables values:
`ntpq --command={{rv}}` `ntpq {{[-c|--command]}} {{rv}}`

View file

@ -1,15 +1,15 @@
# openfortivpn # openfortivpn
> A VPN client, for Fortinet's proprietary PPP+SSL VPN solution. > A VPN client, for Fortinet's proprietary PPP+SSL VPN solution.
> More information: <https://github.com/adrienverge/openfortivpn>. > More information: <https://manned.org/openfortivpn>.
- Connect to a VPN with a username and password: - Connect to a VPN with a username and password:
`openfortivpn --username={{username}} --password={{password}}` `openfortivpn {{[-u|--username]}} {{username}} {{[-p|--password]}} {{password}}`
- Connect to a VPN using a specific configuration file (defaults to `/etc/openfortivpn/config`): - Connect to a VPN using a specific configuration file (defaults to `/etc/openfortivpn/config`):
`sudo openfortivpn --config={{path/to/config}}` `sudo openfortivpn {{[-c|--config]}} {{path/to/config}}`
- Connect to a VPN by specifying the host and port: - Connect to a VPN by specifying the host and port:
@ -17,4 +17,4 @@
- Trust a given gateway by passing in its certificate's sha256 sum: - Trust a given gateway by passing in its certificate's sha256 sum:
`openfortivpn --trusted-cert={{sha256_sum}}` `openfortivpn --trusted-cert {{sha256_sum}}`

View file

@ -2,7 +2,7 @@
> Deleted file recovery tool. > Deleted file recovery tool.
> It is recommended to write recovered files to a disk separate to the one being recovered from. > It is recommended to write recovered files to a disk separate to the one being recovered from.
> More information: <https://www.cgsecurity.org/wiki/PhotoRec>. > More information: <https://www.cgsecurity.org/wiki/PhotoRec_Step_By_Step>.
- Run PhotoRec on a specific device: - Run PhotoRec on a specific device:

View file

@ -9,15 +9,15 @@
- Mount a device with a specific filesystem type to `/media/label`: - Mount a device with a specific filesystem type to `/media/label`:
`pmount --type {{filesystem}} {{/dev/to/block/device}} {{label}}` `pmount {{[-t|--type]}} {{filesystem}} {{/dev/to/block/device}} {{label}}`
- Mount a CD-ROM (filesystem type ISO9660) in read-only mode: - Mount a CD-ROM (filesystem type ISO9660) in read-only mode:
`pmount --type {{iso9660}} --read-only {{/dev/cdrom}}` `pmount {{[-t|--type]}} iso9660 {{[-r|--read-only]}} {{/dev/cdrom}}`
- Mount an NTFS-formatted disk, forcing read-write access: - Mount an NTFS-formatted disk, forcing read-write access:
`pmount --type {{ntfs}} --read-write {{/dev/sdX}}` `pmount {{[-t|--type]}} ntfs {{[-w|--read-write]}} {{/dev/sdX}}`
- Display all mounted removable devices: - Display all mounted removable devices:

View file

@ -11,6 +11,6 @@
`resolveip {{1.1.1.1}}` `resolveip {{1.1.1.1}}`
- Silent mode. Produces less output: - Resolve a hostname to an IP address with less output:
`resolveip --silent {{example.org}}` `resolveip {{[-s|--silent]}} {{example.org}}`

View file

@ -5,19 +5,19 @@
- Connect to a remote host: - Connect to a remote host:
`rpcclient --user {{domain}}\{{username}}%{{password}} {{ip}}` `rpcclient {{[-U|--user]}} {{domain}}\{{username}}%{{password}} {{ip}}`
- Connect to a remote host on a domain without a password: - Connect to a remote host on a domain without a password:
`rpcclient --user {{username}} --workgroup {{domain}} --no-pass {{ip}}` `rpcclient {{[-U|--user]}} {{username}} {{[-W|--workgroup]}} {{domain}} {{[-N|--no-pass]}} {{ip}}`
- Connect to a remote host, passing the password hash: - Connect to a remote host, passing the password hash:
`rpcclient --user {{domain}}\{{username}} --pw-nt-hash {{ip}}` `rpcclient {{[-U|--user]}} {{domain}}\{{username}} --pw-nt-hash {{ip}}`
- Execute shell commands on a remote host: - Execute shell commands on a remote host:
`rpcclient --user {{domain}}\{{username}}%{{password}} --command {{semicolon_separated_commands}} {{ip}}` `rpcclient {{[-U|--user]}} {{domain}}\{{username}}%{{password}} {{[-c|--command]}} {{semicolon_separated_commands}} {{ip}}`
- Display domain users: - Display domain users:

View file

@ -1,7 +1,7 @@
# sam # sam
> AWS Serverless Application Model (SAM) CLI. > AWS Serverless Application Model (SAM) CLI.
> More information: <https://github.com/awslabs/aws-sam-cli>. > More information: <https://docs.aws.amazon.com/serverless-application-model/latest/developerguide/using-sam-cli-corecommands.html>.
- Initialize a serverless application: - Initialize a serverless application:
@ -9,7 +9,7 @@
- Initialize a serverless application with a specific runtime: - Initialize a serverless application with a specific runtime:
`sam init --runtime {{python3.7}}` `sam init {{[-r|--runtime]}} {{python3.7}}`
- Package a SAM application: - Package a SAM application:

View file

@ -5,8 +5,8 @@
- List available scanners to ensure the target device is connected and recognized: - List available scanners to ensure the target device is connected and recognized:
`scanimage -L` `scanimage {{[-L|--list-devices]}}`
- Scan an image and save it to a file: - Scan an image and save it to a file:
`scanimage --format={{pnm|tiff|png|jpeg}} > {{path/to/new_image}}` `scanimage --format {{pnm|tiff|png|jpeg}} > {{path/to/new_image}}`

View file

@ -13,8 +13,8 @@
- Connect with a username and password: - Connect with a username and password:
`smbget {{smb://server/share/file}} --user {{username%password}}` `smbget {{smb://server/share/file}} {{[-U|--user]}} {{username%password}}`
- Require encrypted transfers: - Require encrypted transfers:
`smbget {{smb://server/share/file}} --encrypt` `smbget {{smb://server/share/file}} {{[-e|--encrypt]}}`

View file

@ -9,8 +9,8 @@
- Submit an interactive job with different attributes: - Submit an interactive job with different attributes:
`srun --ntasks-per-node={{num_cores}} --mem-per-cpu={{memory_MB}} --pty /bin/bash` `srun --ntasks-per-node {{num_cores}} --mem-per-cpu {{memory_MB}} --pty /bin/bash`
- Connect to a worker node with a job running: - Connect to a worker node with a job running:
`srun --jobid={{job_id}} --pty /bin/bash` `srun --jobid {{job_id}} --pty /bin/bash`

View file

@ -1,7 +1,7 @@
# tcptraceroute # tcptraceroute
> A traceroute implementation using TCP packets. > A traceroute implementation using TCP packets.
> More information: <https://github.com/mct/tcptraceroute>. > More information: <https://manned.org/tcptraceroute>.
- Trace the route to a host: - Trace the route to a host:

View file

@ -1,7 +1,7 @@
# tic # tic
> Compile terminfo and install for ncurses. > Compile terminfo and install for ncurses.
> More information: <https://pubs.opengroup.org/onlinepubs/007908799/xcurses/terminfo.html>. > More information: <https://manned.org/tic>.
- Compile and install terminfo for a terminal: - Compile and install terminfo for a terminal:

View file

@ -1,7 +1,7 @@
# timeshift # timeshift
> System restore utility. > System restore utility.
> More information: <https://github.com/teejee2008/timeshift>. > More information: <https://github.com/linuxmint/timeshift>.
- List snapshots: - List snapshots:

View file

@ -2,7 +2,7 @@
> Advanced power management for Linux. > Advanced power management for Linux.
> See also `tlp-stat`. > See also `tlp-stat`.
> More information: <https://linrunner.de/tlp/>. > More information: <https://linrunner.de/tlp/usage/tlp.html>.
- Apply settings (according to the actual power source): - Apply settings (according to the actual power source):

View file

@ -1,7 +1,7 @@
# unshadow # unshadow
> Utility provided by the John the Ripper project to obtain the traditional Unix password file if the system uses shadow passwords. > Utility provided by the John the Ripper project to obtain the traditional Unix password file if the system uses shadow passwords.
> More information: <https://www.openwall.com/john/>. > More information: <https://www.openwall.com/john/doc/>.
- Combine the `/etc/shadow` and `/etc/passwd` of the current system: - Combine the `/etc/shadow` and `/etc/passwd` of the current system:

View file

@ -1,20 +1,20 @@
# veracrypt # veracrypt
> Free and open source disk encryption software. > Free and open source disk encryption software.
> More information: <https://www.veracrypt.fr/code/VeraCrypt/plain/doc/html/Documentation.html>. > More information: <https://arcanecode.com/2021/06/21/veracrypt-on-the-command-line-for-ubuntu-linux/>.
- Create a new volume through a text user interface and use `/dev/urandom` as a source of random data: - Create a new volume through a text user interface and use `/dev/urandom` as a source of random data:
`veracrypt --text --create --random-source={{/dev/urandom}}` `veracrypt {{[-t|--text]}} {{[-c|--create]}} --random-source={{/dev/urandom}}`
- Decrypt a volume interactively through a text user interface and mount it to a directory: - Decrypt a volume interactively through a text user interface and mount it to a directory:
`veracrypt --text {{path/to/volume}} {{path/to/mount_point}}` `veracrypt {{[-t|--text]}} {{path/to/volume}} {{path/to/mount_point}}`
- Decrypt a partition using a keyfile and mount it to a directory: - Decrypt a partition using a keyfile and mount it to a directory:
`veracrypt --keyfiles={{path/to/keyfile}} {{/dev/sdXN}} {{path/to/mount_point}}` `veracrypt {{[-k|--keyfiles]}} {{path/to/keyfile}} {{/dev/sdXN}} {{path/to/mount_point}}`
- Dismount a volume on the directory it is mounted to: - Dismount a volume on the directory it is mounted to:
`veracrypt --dismount {{path/to/mounted_point}}` `veracrypt {{[-d|--dismount]}} {{path/to/mounted_point}}`

View file

@ -1,7 +1,7 @@
# wg-quick # wg-quick
> Quickly set up WireGuard tunnels based on config files. > Quickly set up WireGuard tunnels based on config files.
> More information: <https://www.wireguard.com/quickstart/>. > More information: <https://manned.org/wg-quick>.
- Set up a VPN tunnel: - Set up a VPN tunnel:

View file

@ -1,7 +1,7 @@
# xbacklight # xbacklight
> Utility to adjust backlight brightness using the RandR extension. > Utility to adjust backlight brightness using the RandR extension.
> More information: <https://gitlab.freedesktop.org/xorg/app/xbacklight>. > More information: <https://manned.org/xbacklight>.
- Get the current screen brightness as a percentage: - Get the current screen brightness as a percentage:

View file

@ -15,15 +15,15 @@
- Copy the output from a command to the system clipboard, using short notation: - Copy the output from a command to the system clipboard, using short notation:
`echo 123 | xclip {{[-se|-selection]}} clip` `echo 123 | xclip {{[-se|-selection]}} {{[c|clipboard]}}`
- Copy the contents of a file into the system clipboard: - Copy the contents of a file into the system clipboard:
`xclip {{[-se|-selection]}} clip {{input_file.txt}}` `xclip {{[-se|-selection]}} {{[c|clipboard]}} {{input_file.txt}}`
- Copy the contents of a PNG into the system clipboard (can be pasted in other programs correctly): - Copy the contents of a PNG into the system clipboard (can be pasted in other programs correctly):
`xclip {{[-se|-selection]}} clip {{[-t|-target]}} image/png {{input_file.png}}` `xclip {{[-se|-selection]}} {{[c|clipboard]}} {{[-t|-target]}} image/png {{input_file.png}}`
- Copy the user input in the console into the system clipboard: - Copy the user input in the console into the system clipboard:
@ -35,4 +35,4 @@
- Paste the contents of the system clipboard to the console: - Paste the contents of the system clipboard to the console:
`xclip {{[-o|-out]}} {{[-se|-selection]}} clip` `xclip {{[-o|-out]}} {{[-se|-selection]}} {{[c|clipboard]}}`

View file

@ -1,7 +1,7 @@
# xvfb-run # xvfb-run
> Run a command in a virtual X server environment. > Run a command in a virtual X server environment.
> More information: <https://www.x.org/wiki/>. > More information: <https://manned.org/xvfb-run>.
- Run the specified command in a virtual X server: - Run the specified command in a virtual X server:
@ -9,8 +9,8 @@
- Try to get a free server number, if the default (99) is not available: - Try to get a free server number, if the default (99) is not available:
`xvfb-run --auto-servernum {{command}}` `xvfb-run {{[-a|--auto-servernum]}} {{command}}`
- Pass arguments to the Xvfb server: - Pass arguments to the Xvfb server:
`xvfb-run --server-args "{{-screen 0 1024x768x24}}" {{command}}` `xvfb-run {{[-s|--server-args]}} "{{-screen 0 1024x768x24}}" {{command}}`