Guardians of the New World introduces us to the world of hacker culture. Emerging from the 70’s counterculture around conceptions of personal freedom, decentralisation of power and sharing, hacking really came to prominence with the emergence of the Internet as a ubiquitous public forum from the late 90’s onwards.
Guardians of the New World introduces us to the world of hacker culture. Emerging from the 70’s counterculture around conceptions of personal freedom, decentralisation of power and sharing, hacking really came to prominence with the emergence of the Internet as a ubiquitous public forum from the late 90’s onwards.
2017-12-31
0
A disgruntled former employee hijacks the Seabourn Legend cruise liner. Set on a fixed course, without any means of communication and at the mercy of the hijacker, it's up to the one cop on vacation, and his soon to be fiancé (hopefully) Annie, to regain control of it before it kills the passengers and causes an environmental disaster. Insurmountable and daunting tasks awaits them on their perilous journey throughout the ship trying to fend off the hijacker and save the passengers.
When Ethan Hunt, the leader of a crack espionage team whose perilous operation has gone awry with no explanation, discovers that a mole has penetrated the CIA, he's surprised to learn that he's the prime suspect. To clear his name, Hunt now must ferret out the real double agent and, in the process, even the score.
With computer genius Luther Stickell at his side and a beautiful thief on his mind, agent Ethan Hunt races across Australia and Spain to stop a former IMF agent from unleashing a genetically engineered biological weapon called Chimera. This mission, should Hunt choose to accept it, plunges him into the center of an international crisis of terrifying magnitude.
Retired from active duty, and training recruits for the Impossible Mission Force, agent Ethan Hunt faces the toughest foe of his career: Owen Davian, an international broker of arms and information, who's as cunning as he is ruthless. Davian emerges to threaten Hunt and all that he holds dear – including the woman Hunt loves.
Jobe is resuscitated by Jonathan Walker. He wants Jobe to create a special computer chip that would connect all the computers in the world into one network, which Walker would control and use. But what Walker doesn't realize is a group of teenage hackers are on to him and out to stop his plan.
Computer hacker Will Farmer engages a government super-computer named Ripley in an online terrorist-attack simulation game. Little does Farmer know that Ripley has been designed to appeal to potential terrorists, and certain software glitches have in turn made him become paranoid.
High school student David Lightman has a talent for hacking. But while trying to hack into a computer system to play unreleased video games, he unwittingly taps into the Department of Defense's war computer and initiates a confrontation of global proportions. Together with his friend and a wizardly computer genius, David must race against time to outwit his opponent and prevent a nuclear Armageddon.
A hacker who is spying on a pretty neighbour messes up his assignment to break into Swiss bank accounts for Russian mobsters.
A family of four isolating against a pandemic virus that spreads through the internet and robs you of your ability to perceive reality - often violently - begins to unravel when they suspect one or all of them might be infected.
"Welcome to Macintosh" is a documentary that mixes history, criticism and an unapologetic revelry of all things Apple. Whether a long time Mac fanatic or new to computers, Welcome to Macintosh explores the many ways Apple Computer (now Apple, Inc.) has changed the world, from the early days of the Apple-I to the latest the company has to offer.
The U.S. has handed over control of its nuclear defense system to the Colossus supercomputer designed by scientist Dr. Charles Forbin. It soon becomes clear, that the now-sentient Colossus is far more intelligent than its creator realized—with the fate of the world hanging in the balance.
The movie's plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson's "Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl's rather criminal acquaintances senses that there is money in computer cracking - he travels to east Berlin and tries to contact the KGB.
Terry works for a bank, and uses computers to communicate with clients all over the world. One day, she gets a strange coded message from an unknown source. After decoding the message, Terry becomes embroiled in an espionage ring. People are killed, and Terry is chased. Throughout, she remains in contact with this mysterious person, who needs Terry's help save his life.
Along with his new friends, a teenager who was arrested by the US Secret Service and banned from using a computer for writing a computer virus discovers a plot by a nefarious hacker, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.
Kevin Mitnick is quite possibly the best hacker in the world. Hunting for more and more information, seeking more and more cyber-trophies every day, he constantly looks for bigger challenges. When he breaks into the computer of a security expert and an ex-hacker, he finds one - and much more than that...
Highly intelligent hacker Lillian joins a cybersecurity company in order to gain access to the bank where her father used to work. She discovers nothing is what it seems and it turns out she isn’t the only one pretending to be someone else. But where do we draw the line between activism and terrorism?
State-of-the-art security system creator Jack Stanfield has cemented his reputation as a man who's thought of everything. But when a criminal finds a way into his personal life, everything Jack holds dear is suddenly at stake.
The life of a young computer systems analyst is thrown into turmoil after arriving in Istanbul to start a new job. She soon finds her passport missing, her credit cards useless, her bank account empty and her identity stolen. As the story progresses we find people and events may not be what they seem.
Rogue agent Gabriel Shear is determined to get his mitts on $9 billion stashed in a secret Drug Enforcement Administration account. He wants the cash to fight terrorism, but lacks the computer skills necessary to hack into the government mainframe. Enter Stanley Jobson, a n'er-do-well encryption expert who can log into anything.
After being enlisted to recover a dangerous computer program, hacker Lisbeth Salander and journalist Mikael Blomkvist find themselves caught in a web of spies, cybercriminals and corrupt government officials.