witchdoctor@lemmy.basedcount.com to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 1 year agoTorrent client rankingslemmy.basedcount.comimagemessage-square252fedilinkarrow-up11.57Karrow-down180
arrow-up11.49Karrow-down1imageTorrent client rankingslemmy.basedcount.comwitchdoctor@lemmy.basedcount.com to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 1 year agomessage-square252fedilink
minus-squarePraiseTheSoup@lemm.eelinkfedilinkEnglisharrow-up2·1 year agoWhat are the advantages to running it as a daemon outside of the obvious malicious ones?
minus-squaresanzky@beehaw.orglinkfedilinkEnglisharrow-up4·1 year agoI run it headless in a small pc in my basement that I use as server. it also has an http api so other systems can integrate with it (eg another program that looks for torrents and pushes the torrents into it.
What are the advantages to running it as a daemon outside of the obvious malicious ones?
I run it headless in a small pc in my basement that I use as server. it also has an http api so other systems can integrate with it (eg another program that looks for torrents and pushes the torrents into it.