witchdoctor@lemmy.basedcount.com to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 11 months agoTorrent client rankingslemmy.basedcount.comimagemessage-square253fedilinkarrow-up11.57Karrow-down179
arrow-up11.49Karrow-down1imageTorrent client rankingslemmy.basedcount.comwitchdoctor@lemmy.basedcount.com to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 11 months agomessage-square253fedilink
minus-squarePraiseTheSoup@lemm.eelinkfedilinkEnglisharrow-up2·11 months agoWhat are the advantages to running it as a daemon outside of the obvious malicious ones?
minus-squaresanzky@beehaw.orglinkfedilinkEnglisharrow-up4·11 months agoI run it headless in a small pc in my basement that I use as server. it also has an http api so other systems can integrate with it (eg another program that looks for torrents and pushes the torrents into it.
What are the advantages to running it as a daemon outside of the obvious malicious ones?
I run it headless in a small pc in my basement that I use as server. it also has an http api so other systems can integrate with it (eg another program that looks for torrents and pushes the torrents into it.