witchdoctor@lemmy.basedcount.com to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 2 years agoTorrent client rankingslemmy.basedcount.comimagemessage-square121fedilinkarrow-up1478arrow-down126
arrow-up1452arrow-down1imageTorrent client rankingslemmy.basedcount.comwitchdoctor@lemmy.basedcount.com to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish · 2 years agomessage-square121fedilink
minus-squarePraiseTheSoup@lemm.eelinkfedilinkEnglisharrow-up2·2 years agoWhat are the advantages to running it as a daemon outside of the obvious malicious ones?
minus-squaresanzky@beehaw.orglinkfedilinkEnglisharrow-up4·2 years agoI run it headless in a small pc in my basement that I use as server. it also has an http api so other systems can integrate with it (eg another program that looks for torrents and pushes the torrents into it.
What are the advantages to running it as a daemon outside of the obvious malicious ones?
I run it headless in a small pc in my basement that I use as server. it also has an http api so other systems can integrate with it (eg another program that looks for torrents and pushes the torrents into it.