This can happen to anyone. If you are 18 years old. If your friends are already settled... Who started their own business, who went to college, and who joined the army... And only you don't know who to be yet... As in childhood, a firefighter or a pilot ... and there is no one to ask. You haven't spoken to your parents for half your life, and your little sister is still too young... And for you there is only one window to the world, this is the computer screen. And everything is different inside. There you can start all over again... Find new friends and even love... There you are strong and brave... There you can hear and tell the truth... It's so convenient! But if you had known earlier, how it would end...
Leo
This can happen to anyone. If you are 18 years old. If your friends are already settled... Who started their own business, who went to college, and who joined the army... And only you don't know who to be yet... As in childhood, a firefighter or a pilot ... and there is no one to ask. You haven't spoken to your parents for half your life, and your little sister is still too young... And for you there is only one window to the world, this is the computer screen. And everything is different inside. There you can start all over again... Find new friends and even love... There you are strong and brave... There you can hear and tell the truth... It's so convenient! But if you had known earlier, how it would end...
2008-12-11
3
Two guys against globalization want to plant a virus in the network of a finance corporation. On the day of the attack Alex has an accident and cannot remember anything. Visions and reality are thrown together in a confusing maze. Alex tries to escape from this muddle but what he discovers turns out to be rather frightening…
The movie's plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson's "Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl's rather criminal acquaintances senses that there is money in computer cracking - he travels to east Berlin and tries to contact the KGB.
Charlie Daines is a morphine-addicted detective on the trail of a psychopath who is setting up murders and broadcasting them live on the internet. As he closes in on the killer, Charlie realises that he is to be the final victim.
A game designer on the run from assassins must play her latest virtual reality creation with a marketing trainee to determine if the game has been damaged.
Jobe is resuscitated by Jonathan Walker. He wants Jobe to create a special computer chip that would connect all the computers in the world into one network, which Walker would control and use. But what Walker doesn't realize is a group of teenage hackers are on to him and out to stop his plan.
A hacker who is spying on a pretty neighbour messes up his assignment to break into Swiss bank accounts for Russian mobsters.
A computer programmer's dream job at a hot Portland-based firm turns nightmarish when he discovers his boss has a secret and ruthless means of dispatching anti-trust problems.
After the brutal death of a friend, a group of friends find themselves in possession of a video-game called "Stay Alive," a blood-curdling true story of a 17th century noblewoman known as the Blood Countess. After playing the game when they know they shouldn't, however, the friends realize that once they die in the game — they die for real!
Along with his new friends, a teenager who was arrested by the US Secret Service and banned from using a computer for writing a computer virus discovers a plot by a nefarious hacker, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.
Kevin Mitnick is quite possibly the best hacker in the world. Hunting for more and more information, seeking more and more cyber-trophies every day, he constantly looks for bigger challenges. When he breaks into the computer of a security expert and an ex-hacker, he finds one - and much more than that...
State-of-the-art security system creator Jack Stanfield has cemented his reputation as a man who's thought of everything. But when a criminal finds a way into his personal life, everything Jack holds dear is suddenly at stake.
Rogue agent Gabriel Shear is determined to get his mitts on $9 billion stashed in a secret Drug Enforcement Administration account. He wants the cash to fight terrorism, but lacks the computer skills necessary to hack into the government mainframe. Enter Stanley Jobson, a n'er-do-well encryption expert who can log into anything.
Salaam Kashmir revolves around two men - Tomy Eeppan Devassy and Sreekumar. Jayaram plays Sreekumar, a character who does all the domestic work expected from a wife in normal course. Into this peaceful world enters Tomy (Suresh Gopi) disrupting the domestic bliss and bringing out an unexpected twist.
A vice detective must decide how far he will go in order to protect his informant.
Jimi, a computer game designer, finds that his latest product has been infected by a virus which has given consciousness to the main character of the game, Solo. Tormented by the memory of his fled girlfriend Lisa and begged by Solo to end its useless "life", Jimi begins a search for people who can help him both to discover what happened to Lisa and to delete his game before it is released.
Highly intelligent hacker Lillian joins a cybersecurity company in order to gain access to the bank where her father used to work. She discovers nothing is what it seems and it turns out she isn’t the only one pretending to be someone else. But where do we draw the line between activism and terrorism?
The story takes place in the year 2034, two years after the events in Ghost in the Shell: S.A.C. 2nd GIG. Female cyborg Major Motoko Kusanagi has left Public Security Section 9, an elite counter-terrorist and anti-crime unit specializing in cyber-warfare, which has expanded to a team of 20 field operatives with Togusa acting as the field lead.
A conflict of interest between two high-kicking assassin sisters is complicated as they're pursued by the criminals who hired them and an equally high-kicking female cop.