Paloma
Joven Hacker
Agente 2
Policia

Each of the members of a group of hackers is willing to fight against system. Their messages and attacks are political, socially demmanding but also playful. Each of them have reasons to have moved to that virtual side, where they can be who they can't in real life. However, the sudden implication of authorities (pressed by goverment to be tougher against hackers)and of a wise and dangerous cracker will cause a turn in their crusade. Will they use the enemy's means or their ideological motivations imply a respect for law and human life?
2002-01-04
7
7.8Two guys against globalization want to plant a virus in the network of a finance corporation. On the day of the attack Alex has an accident and cannot remember anything. Visions and reality are thrown together in a confusing maze. Alex tries to escape from this muddle but what he discovers turns out to be rather frightening…
5.5Eight strangers awaken with no memory, in a puzzling cube-shaped room where the laws of physics do not always apply.
7.1High school student David Lightman has a talent for hacking. But while trying to hack into a computer system to play unreleased video games, he unwittingly taps into the Department of Defense's war computer and initiates a confrontation of global proportions. Together with his friend and a wizardly computer genius, David must race against time to outwit his opponent and prevent a nuclear Armageddon.
0.0For years now, the Kremlin has been systematically trying to use well-trained hackers for its own benefit. In exchange for freedom and protection, they do the dirty work of the state, interfering in other countries’ elections and penetrating government networks. Just how dangerous is Russia’s cyber army?
7.3Spain, 1939. In the last days of the Spanish Civil War, the young Carlos arrives at the Santa Lucía orphanage, where he will make friends and enemies as he follows the quiet footsteps of a mysterious presence eager for revenge.
6.8The movie's plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson's "Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl's rather criminal acquaintances senses that there is money in computer cracking - he travels to east Berlin and tries to contact the KGB.
6.1With computer genius Luther Stickell at his side and a beautiful thief on his mind, agent Ethan Hunt races across Australia and Spain to stop a former IMF agent from unleashing a genetically engineered biological weapon called Chimera. This mission, should Hunt choose to accept it, plunges him into the center of an international crisis of terrifying magnitude.
6.4During an historic counter-terrorism summit in Spain, the President of the United States is struck down by an assassin's bullet. Eight strangers have a perfect view of the kill, but what did they really see? As the minutes leading up to the fatal shot are replayed through the eyes of each eyewitness, the reality of the assassination takes shape.
6.5Jimi, a computer game designer, finds that his latest product has been infected by a virus which has given consciousness to the main character of the game, Solo. Tormented by the memory of his fled girlfriend Lisa and begged by Solo to end its useless "life", Jimi begins a search for people who can help him both to discover what happened to Lisa and to delete his game before it is released.
7.3The only son of wealthy widow Violet Venable dies while on vacation with his cousin Catherine. What the girl saw was so horrible that she went insane; now Mrs. Venable wants Catherine lobotomized to cover up the truth.
6.0A gentle portrait of the mythical Spanish actor Arturo Fernández (1929-2019) in the hour of his passing, in his own words, through his latest interviews, not previously broadcast, and the words of those who knew him thorough decades of charming and good performance on stage, his true home, as well as in cinema and television.
6.9A conflict of interest between two high-kicking assassin sisters is complicated as they're pursued by the criminals who hired them and an equally high-kicking female cop.
6.5Ten years after ratting on his old mobster friends in exchange for personal immunity, two hit men drive a hardened criminal to Paris for his execution. However, while on the way, whatever can go wrong, does go wrong.
6.2After being enlisted to recover a dangerous computer program, hacker Lisbeth Salander and journalist Mikael Blomkvist find themselves caught in a web of spies, cybercriminals and corrupt government officials.
4.0A journey through the Spain of the Baroque, the glorious 17th century, an unfortunate era of endless wars and political tribulations; but also of great painters and sculptors who created astonishing pieces of art: el Siglo de Oro.
6.3Comedy in five acts by Beaumarchais, filmed by Marcel Bluwal in studio and on location. The cast, in accordance with Marcel Bluwal's wishes, is in keeping with the age and character of the characters, to give it rhythm. At once "a comic baroque play, a bourgeois drama, a chansonnier's number, a social satire, a farce and a very pretty love story" according to Marcel Bluwal, it can also be summed up, according to Beaumarchais, as "the most bantering of intrigues".
6.3Rogue agent Gabriel Shear is determined to get his mitts on $9 billion stashed in a secret Drug Enforcement Administration account. He wants the cash to fight terrorism, but lacks the computer skills necessary to hack into the government mainframe. Enter Stanley Jobson, a n'er-do-well encryption expert who can log into anything.
5.8State-of-the-art security system creator Jack Stanfield has cemented his reputation as a man who's thought of everything. But when a criminal finds a way into his personal life, everything Jack holds dear is suddenly at stake.
5.1The life of a young computer systems analyst is thrown into turmoil after arriving in Istanbul to start a new job. She soon finds her passport missing, her credit cards useless, her bank account empty and her identity stolen. As the story progresses we find people and events may not be what they seem.
6.1Kevin Mitnick is quite possibly the best hacker in the world. Hunting for more and more information, seeking more and more cyber-trophies every day, he constantly looks for bigger challenges. When he breaks into the computer of a security expert and an ex-hacker, he finds one - and much more than that...
6.2With her husband away at work, and her son at school, Laura dreams of a home-renovation project to supplant her restless days. Elliott, her irresistibly hot private contractor, soon fulfills her more forbidden dreams.
6.4A chilling real-time thriller featuring a teenager, Casey, battling with an anonymous cyber-stalker.
7.3Alex Gibney explores the phenomenon of Stuxnet, a self-replicating computer virus discovered in 2010 by international IT experts. Evidently commissioned by the US and Israeli governments, this malware was designed to specifically sabotage Iran’s nuclear programme. However, the complex computer worm ended up not only infecting its intended target but also spreading uncontrollably.
5.9A computer hacker penetrates Vatican security and sends an urgent anonymous plea to the pope. Handsome Father Quart, of the church's Institute of External Affairs, an arm of the Vatican intelligence, is dispatched to investigate. The message of the hacker concerns a crumbling 17th century Baroque church in the heart of Seville that apparently "kills to defend itself".
6.4A group of teens make a pact that has deadly consequences.
6.9When shadowy U.S. intelligence agents blackmail a reformed computer hacker and his eccentric team of security experts into stealing a code-breaking 'black box' from a Soviet-funded genius, they uncover a bigger conspiracy. Now, he and his 'sneakers' must save themselves and the world economy by retrieving the box from their blackmailers.
6.0On a road trip, Nic and two friends are drawn to an isolated area by a computer genius. When everything suddenly goes dark, Nic regains consciousness – only to find himself in a waking nightmare.
6.6A hacker who is spying on a pretty neighbour messes up his assignment to break into Swiss bank accounts for Russian mobsters.
7.1Takes us inside the world of Anonymous, the radical "hacktivist" collective that has redefined civil disobedience for the digital age. The film explores early hacktivist groups like Cult of the Dead Cow and Electronic Disturbance Theater, then moves to Anonymous' raucous beginnings on the website 4chan. Through interviews with current members, people recently returned from prison or facing trial, writers, academics, activists and major players in various "raids," the documentary traces Anonymous’ evolution from merry pranksters to a full-blown movement with a global reach, the most transformative civil disobedience of our time.
5.9Genius hacker Connor discovers Cicada 3301, an online treasure hunt that could be a recruiting tool for a secret society. Soon Conner, art-expert friend Avi, and secretive librarian Gwen are dashing from graffiti sites to ancient libraries to uncover real-world clues. But they must outrun aggressive NSA agents, also hot on the trail of Cicada, who want the glory for themselves.
6.1After learning that the death of his wife was not an accident, a former CIA Station Chief is forced back into the espionage underworld, teaming up with an adversary to unravel a conspiracy that challenges everything he thought he knew.
6.5Jessica and her fiancé Evan just moved from the city into their dream home on a quiet suburban street. Soon after, Jessica catches her seemingly friendly new neighbor, Simon, in a strange lie and can't let her suspicions rest. The danger escalates when Simon lures her inside his home and imprisons Jessica in his secret bunker, meticulously decorated in the idealized style of the 1950's.
6.9A drifting ex-soldier turns underground fighter with the help of a just-released ex-con, pitting him against corrupt cops and hired killers now gunning for him and all those he cares about.
6.3In 1989, known as Mendax, Julian Assange and two friends formed a group called the International Subversives. Using early home computers and defining themselves as white hat hackers - those who look but don’t steal – they broke into some of the world’s most powerful and secretive organisations. In the eyes of the US Government, they were a major threat to national security.
6.4The Sheffield family reveal and go through some home truths as their middle child inherits the Foxworth mansion. The family's ghosts looming over, and more tragedies are in store as the curse lives on.
6.6A realtor and her daughter are taken hostage by armed robbers.
6.0A look at the relationship between WikiLeaks founder Julian Assange and his early supporter and eventual colleague Daniel Domscheit-Berg, and how the website's growth and influence led to an irreparable rift between the two friends.
5.9Realizing that she cannot take down Fisk alone, Sayen teams up with an underground resistance group with a plan to expose and end Fisk's unchecked plundering once and for all.
6.8Defiant young activists take the women's suffrage movement by storm, putting their lives at risk to help American women win the right to vote.