Hackers in Wonderland is a 2000 documentary film, produced and directed by Russell Barnes, about hackers in the United Kingdom.

Cyber Junkie
Narrator
self
self
self
self
self

Hackers in Wonderland is a 2000 documentary film, produced and directed by Russell Barnes, about hackers in the United Kingdom.
2000-01-01
5
6.4Andrea, a nice girl, move from Veneto (north of Italy) to Roma. She is employed as a nurse in a medical practice. She soon is involved in a never-ending game of misunderstanding, couples exchange, sexual seductions.
7.8During the Napoleonic wars, a Spanish officer and an opposing officer find a book written by the former's grandfather.
7.2Cleo lives in Marseilles and works as a waitress in a waterfront dive. A stranger entices her into coming to Paris to take dancing lessons, but instead she is taken to a baron, who betrays her. In spite of this inauspicious start, Cleo becomes a successful and renowned actress, but her feelings about men have never recovered. She loathes them and uses them only for the money they offer her, which she then hands over to a penniless girl.
6.9Friends battle former U.S. presidents when they come back from the dead as zombies on the Fourth of July.
6.9Popular animated hero Asterix and his faithful sidekick Obelix travel to ancient Egypt to help Cleopatra build a new summer home. Cleopatra and Julius Caesar have made a bet, with Caesar wagering the project cannot be completed in a few weeks time. With the help of a magic potion, Asterix comes to the rescue of the Queen of the Nile as Caesar and an angry architect plot against them.
7.5A meeting in a London bus with jewel thief Lady Christina takes a turn for the worse for the Doctor when the bus takes a detour to a desert-like planet, where the deadly Swarm awaits.
5.4A story of three couples and their intertwining love stories set in 1940s Taiwan and Shanghai, centered around the 1949 sinking of Taiping.
5.5Following a twinning between the national fire brigade and the special forces of the Canadian firefighters, Captain Carter arrives in Rome.
6.5BBC docudrama telling the story of the father of science fiction, HG Wells, and his ambition to avert mankind's headlong course towards self-destruction.
6.3Warren Miller’s “Future Retro” will revel in 71 years of movie magic - with fresh stories and perspectives from across the globe, heroes from the glory days, and that retro energy keeping the winter dream alive.
Cartoon Network holds an awards show awarding cartoon excellence.
6.7In a utopian society created at the end of the third world war, a female warrior who has been plucked from the badlands begins to see cracks in this new facade. And what does this community have planned for the rest of humankind?
7.0When salary man Jun gets home, he finds his wife bleeding from her mouth and lying on the floor. He is shocked by the scene, but it turns out the blood is just ketchup and she is pretending to be dead. Without telling him why, she pretends to be dead everyday. Jun is dumbfounded by his wife's behavior, but he begins to feel uneasy with her.
6.2A mix of guns and mistaken identity leads to chaos in this satirical parody of William S. Hart's melodramatic westerns, finding Buster in the frozen north - "the last stop on the subway".
7.6Promotional video celebrating 20 years of the Naruto animation project.
7.1After taking a bullet to the head, Salander is under close supervision in a hospital and is set to face trial for attempted murder on her eventual release. With the help of journalist Mikael Blomkvist and his researchers at Millennium magazine, Salander must prove her innocence. In doing this she plays against powerful enemies and her own past.
6.5Naruto Shippūden Ultimate Ninja Storm Generations OVA Madara vs Hashirama is the tenth Naruto OVA. It is distributed as part of Naruto Shippūden: Ultimate Ninja Storm Generations.
7.3Naruto faces off against his old pupil Konohamaru in a tournament during the chuunin entrance exams.
0.0Hacking at Leaves documents artist and hazmat-suit aficionado Johannes Grenzfurthner as he attempts to come to terms with the United States' colonial past, Navajo tribal history, and the hacker movement. The story hones in on a small tinker space in Durango, Colorado, that made significant contributions to worldwide COVID relief efforts. But things go awry when Uncle Sam interferes with the film's production.
7.2They call themselves Fancy Bear, Cozy Bear or Voodoo Bear. Elite units of the Russian secret services are hidden behind these code names. They are among the most dangerous hackers in the world. The bears were already in the computer of then-Chancellor Angela Merkel in 2015, interfered in the US election campaign in 2016 and are currently influencing the war in Ukraine. The makers of the successful YouTube channel “Simplicissimus” in co-production with funk and SWR are back and show the destructive potential of state hacking with this documentary. With the help of leading German hackers, cyberspace experts and a lot of humor, they delicately demystify the Russian bears: Who are the people behind them? How do they operate? And what makes them so incredibly dangerous?
6.9A feature-length documentary about the Free Kevin movement and the hacker world.
0.0A story about the world's best Cyber spies. Their training in Israel's military, and their impact on the world we live in.
0.0Guardians of the New World introduces us to the world of hacker culture. Emerging from the 70’s counterculture around conceptions of personal freedom, decentralisation of power and sharing, hacking really came to prominence with the emergence of the Internet as a ubiquitous public forum from the late 90’s onwards.
9.0All Creatures Welcome explores the world of hackers and nerds at the events of the Chaos Computer Club, Europe's largest hacker association. The film dispels common clichés and draws a utopian picture of a possible society in the digital age.
8.0A small rural hospital in Japan battles an international cybercriminal gang that is holding them ransom with their stolen patient data.
7.6Documentary film investigating allegations of election fraud during the 2004 U.S. presidential election. Electronic voting machines count approximately 90% of America's votes in county, state and federal elections. The technology is also increasingly being used across the world, including in Canada, the United Kingdom, Europe and Latin America. The film uncovers incendiary evidence from the trash cans of Texas to the ballot boxes of Ohio, exposing secrecy, votes in the trash, hackable software and election officials rigging the presidential recount.Ultimately proving our votes can be stolen without a trace "Hacking Democracy" culminates in the famous 'Hursti Hack'; a duel between the Diebold voting machines and a computer hacker from Finland - with America's democracy at stake.
6.9REVOLUTION OS tells the inside story of the hackers who rebelled against the proprietary software model and Microsoft to create GNU/Linux and the Open Source movement.
8.0Sigurdur Thordarson, known as Siggi, becomes a hacker at 12, exposing Icelandic bank corruption at 14. Branded the "teenage whistleblower," he joins WikiLeaks in 2010, mentored by Julian Assange. Siggi leaks globally, but clashes with Assange, prompting him to spy for the FBI at 18. This tale weaves paranoia, hacking, and friendship, portraying Siggi's turbulent journey from trust to betrayal, revealing a heart-wrenching coming-of-age narrative.
6.4In The Realm of the Hackers is a documentary about the prominent hacker community, centered in Melbourne, Australia in the late 80's to early 1990. The storyline is centered around the Australian teenagers going by the hacker names "Electron" and "Phoenix", who were members of an elite computer hacking group called The Realm and hacked into some of the most secure computer networks in the world, including those of the US Naval Research Laboratory, Lawrence Livermore National Laboratory, a government lab charged with the security of the US nuclear stockpile, and NASA.
6.1A portrait of the hacking community. In an effort to challenge preconceived notions and media-driven stereotypes Hackers Are People Too lets hackers speak for themselves and introduce their community to the public.
8.0Amid the growing threat of cyberattacks from Russian hackers, this film dives into their origins, motives, and the dangers they pose to their targets.
7.1Takes us inside the world of Anonymous, the radical "hacktivist" collective that has redefined civil disobedience for the digital age. The film explores early hacktivist groups like Cult of the Dead Cow and Electronic Disturbance Theater, then moves to Anonymous' raucous beginnings on the website 4chan. Through interviews with current members, people recently returned from prison or facing trial, writers, academics, activists and major players in various "raids," the documentary traces Anonymous’ evolution from merry pranksters to a full-blown movement with a global reach, the most transformative civil disobedience of our time.
6.6Werner Herzog's exploration of the Internet and the connected world.
7.6Global, dynamic, and eye-opening, this is story of the most daring cyber heist of all time, the Bangladeshi Central Bank theft, tracing the origins of cyber-crime from basic credit card fraud to the wildly complex criminal organisations in existence today, supported by commentary and fascinating insight from highly regarded cyber security experts.
7.8This program reveals the daily battle between the Internet’s outlaws and the hackers who oppose them by warding off system attacks, training IT professionals and police officers, and watching cyberspace for signs of imminent infowar. Through interviews with frontline personnel from the Department of Defense, NYPD’s computer crime squad, private detective firm Kroll Associates, X-Force Threat Analysis Service, and several notorious crackers, the program provides penetrating insights into the millions of hack attacks that occur annually in the U.S.—including one that affected the phone bills of millions and another that left confidential details of the B-1 stealth bomber in the hands of teenagers. The liabilities of wireless networks, the Code Red worm, and online movie piracy are also discussed. A Discovery Channel Production. (51 minutes)
7.8In 1986, astronomer turned computer scientist Clifford Stoll had just started working on a computer system at the Lawrence Berkeley Laboratory when he noticed a 75-cent discrepancy between the charges printed by two accounting programs responsible for charging people for machine use. Intrigued, he deduced that the system was being hacked, and he determined to find the culprit. This is the re-enactment of how he tracked down KGB cracker Markus Hess through the Ethernet to Hannover, Germany.