This is a little old, but if you want to run as a service, you can do so by reading the following:
(Windows Service)
http://www.realsoftwareblog.com/2012/03/running-standalone-web-application-as.html
(Linux Daemon ~ Works on Mac also, but the preferred method is launchd on Mac)
http://www.realsoftwareblog.com/2012/03/daemonize-your-standalone-web.html
If you want to run a launcher application without seeing the console(s), create a new shell class and execute the application from the shell class. To terminate the application use Shell.Close; as the process is attached to the active shell instance. You can also use a timer to check to see if the shell is still running and if not, restart the web application via shell.
There’s many options available.
By the way, (Lesson of the day)
http://127.0.0.1:PortNumber and http://localhost:PortNumber should work the same, as localhost is an alias for 127.0.0.1
You can also access the application at http://whateveryouwant:PortNumber by modifying the hosts file located at:
C:\Windows\System32\drivers\etc\hosts (you will need to enable “view hidden files and folders” to view this file)
This is the file that most adware/ad blockers use by simply setting the bad domains to 127.0.0.1, and not allowing the domain names to actually direct to their correct DNS entries
For instance my hosts file contains thousands of lines such as:
127.0.0.1 www.007guard.com
127.0.0.1 007guard.com
127.0.0.1 008i.com
127.0.0.1 www.008k.com
127.0.0.1 008k.com
127.0.0.1 www.00hq.com
127.0.0.1 00hq.com
127.0.0.1 010402.com
127.0.0.1 www.032439.com
127.0.0.1 032439.com
of known malware sites, so that they can never be access from my PC In the same token I could access a local web application by pointing to any one of the domains contained within, since they will only direct back to localhost/127.0.0.1. ~MacOS and Linux have a hosts file as well~