# Command line usage Examples Xpra includes a _start_ GUI capable of replacing most of the example command lines found below. \ These examples should work for the [current versions](https://github.com/Xpra-org/xpra/wiki/Versions).\ Use `man xpra` to get the manual corresponding to the version you have installed. \ On MS Windows, please see [windows command line](./Client.md#command-line). \ ## Simple [seamless](Seamless.md) application forwarding This is how xpra is most often used.\ This command will start an `xterm` (or any graphical application of your choice) on `HOST` and display it to your local desktop through an [SSH](../Network/SSH.md) transport: ```shell xpra seamless ssh://USERNAME@HOST/ --start-child=xterm ```
Step by step Instead of starting and attaching to the session using a single command:\ first connect to the server via ssh and start the xpra server instance on a free display of your choice (`:100 in this example`): ```shell xpra seamless :100 --start=xterm ``` then from the client, just connect to this xpra instance: ```shell xpra attach ssh://USERNAME@HOST/100 ``` (replace `HOST` with the hostname or IP of the server)
Connecting locally If you are attaching from the same machine and using the same user account, this is sufficient: ```shell xpra attach :100 ``` And if there is only a single xpra session running, you can omit the display and simply run: ```shell xpra attach ```
Access without SSH SSH is great, it provides host verification, secure authentication and encryption, it is available on all platforms and is well tested. However, in some cases, you may not want to give remote users shell access, or you may want to share sessions between multiple remote users. \ For this type of use case, you can use TCP sockets: ```shell xpra seamless --start=xterm --bind-tcp=0.0.0.0:10000 ``` Then, assuming that the port you have chosen (`10000` in the example above) is allowed through the firewall, you can connect from the client using: ```shell xpra attach tcp://SERVERHOST:10000/ ``` Beware: this TCP socket is insecure in this example, see [authentication](Authentication.md).
Attach with a session file Typing the same attach commands over and over again can be tedious, especially if you tweak the command line options. Instead, you can create session files and just double-click on them to connect to the session: ```shell cat > ~/Desktop/example.xpra mode=ssh host=YOURSERVER speaker=off ``` For more information, see [session files](./Client.md#session-files)
*** ## Forwarding a [full desktop](Desktop.md) Xpra can also forward a full desktop environment using the [desktop](Desktop.md) mode: ```shell xpra desktop --start-child=fluxbox ``` Just like above, you can connect via SSH, TCP or any other [supported transport](../Network/README.md). *** ## Cloning / [Shadowing](Shadow.md) an existing display This mode allows you to access an existing display remotely.\ Simply run: ```shell xpra shadow ssh://SERVERHOST/ ``` *** ## [Clipboard](../Features/Clipboard.md) sharing tool Xpra synchronizes the clipboard state between the client and server, so it can be used as a clipboard sharing tool: ```shell xpra shadow --clipboard=yes --printing=no --windows=no --speaker=no ssh://SERVERHOST/ ``` (other features are disabled to keep just the clipboard) *** ## [Printer](../Features/Printing.md) forwarder ```shell xpra shadow --printing=yes --windows=no --speaker=no ssh://SERVERHOST/ ``` The local printers should be virtualized on the server. ## Other Documentation Links * [Client](Client.md) - launching the xpra client * [Client OpenGL](Client-OpenGL.md) - for better window rendering performance * [OpenGL](OpenGL.md) - running accelerated OpenGL application on the server * [Configuration](Configuration.md) - using configuration files * [Encodings](Encodings.md) - advanced picture encoding configuration, ie: [NVENC](NVENC.md) * [Logging](Logging.md) - debugging * [Security](Security.md) - hardening, options and using xpra for better security * [Proxy Server](Proxy-Server.md) - using a proxy server as a single entry point * [Apache Proxy Server](Apache-Proxy.md) - using apache * [Nginx Proxy Server](Apache-Proxy.md) - using nginx * [WSL](WSL.md) - Windows Subsystem for Linux * [Xdummy](Xdummy.md) - the alternative virtual framebuffer