@[email protected] to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish • 2 years agoTorrent client rankingslemmy.basedcount.comimagemessage-square249fedilinkarrow-up11.57K
arrow-up11.57KimageTorrent client rankingslemmy.basedcount.com@[email protected] to Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ@lemmy.dbzer0.comEnglish • 2 years agomessage-square249fedilink
minus-square@[email protected]linkfedilinkEnglish2•2 years agoWhat are the advantages to running it as a daemon outside of the obvious malicious ones?
minus-square@[email protected]linkfedilinkEnglish4•2 years agoI run it headless in a small pc in my basement that I use as server. it also has an http api so other systems can integrate with it (eg another program that looks for torrents and pushes the torrents into it.
What are the advantages to running it as a daemon outside of the obvious malicious ones?
I run it headless in a small pc in my basement that I use as server. it also has an http api so other systems can integrate with it (eg another program that looks for torrents and pushes the torrents into it.