Leo

This can happen to anyone. If you are 18 years old. If your friends are already settled... Who started their own business, who went to college, and who joined the army... And only you don't know who to be yet... As in childhood, a firefighter or a pilot ... and there is no one to ask. You haven't spoken to your parents for half your life, and your little sister is still too young... And for you there is only one window to the world, this is the computer screen. And everything is different inside. There you can start all over again... Find new friends and even love... There you are strong and brave... There you can hear and tell the truth... It's so convenient! But if you had known earlier, how it would end...
2008-12-11
3
6.8A game designer on the run from assassins must play her latest virtual reality creation with a marketing trainee to determine if the game has been damaged.
6.9When shadowy U.S. intelligence agents blackmail a reformed computer hacker and his eccentric team of security experts into stealing a code-breaking 'black box' from a Soviet-funded genius, they uncover a bigger conspiracy. Now, he and his 'sneakers' must save themselves and the world economy by retrieving the box from their blackmailers.
7.8Two guys against globalization want to plant a virus in the network of a finance corporation. On the day of the attack Alex has an accident and cannot remember anything. Visions and reality are thrown together in a confusing maze. Alex tries to escape from this muddle but what he discovers turns out to be rather frightening…
6.8The movie's plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson's "Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl's rather criminal acquaintances senses that there is money in computer cracking - he travels to east Berlin and tries to contact the KGB.
7.1High school student David Lightman has a talent for hacking. But while trying to hack into a computer system to play unreleased video games, he unwittingly taps into the Department of Defense's war computer and initiates a confrontation of global proportions. Together with his friend and a wizardly computer genius, David must race against time to outwit his opponent and prevent a nuclear Armageddon.
5.5Eight strangers awaken with no memory, in a puzzling cube-shaped room where the laws of physics do not always apply.
3.3After being rescued from the ruins of Virtual Space Industries, Jobe is rebuilt and reconnected to virtual reality by corporate mogul Jonathan Walker. Years later, teenage hacker Peter Parkette helps Jobe locate Benjamin Trace, the original creator of virtual reality, only to uncover Jobe’s plan to launch a new world order using Walker’s tech. Now, Peter, Trace, Cori, and a band of runaways must stop Jobe and Walker before they enslave humanity through cyberspace.
6.6A hacker who is spying on a pretty neighbour messes up his assignment to break into Swiss bank accounts for Russian mobsters.
6.1Kevin Mitnick is quite possibly the best hacker in the world. Hunting for more and more information, seeking more and more cyber-trophies every day, he constantly looks for bigger challenges. When he breaks into the computer of a security expert and an ex-hacker, he finds one - and much more than that...
6.9A conflict of interest between two high-kicking assassin sisters is complicated as they're pursued by the criminals who hired them and an equally high-kicking female cop.
5.0Two friends compete for a mysterious woman at a party. Next morning, she's found dead in the apartment of one of them, and they can't remember what happened.
7.5Swedish thriller based on Stieg Larsson's novel about a male journalist and a young female hacker. In the opening of the movie, Mikael Blomkvist, a middle-aged publisher for the magazine Millennium, loses a libel case brought by corrupt Swedish industrialist Hans-Erik Wennerström. Nevertheless, he is hired by Henrik Vanger in order to solve a cold case, the disappearance of Vanger's niece
7.4The story takes place in the year 2034, two years after the events in Ghost in the Shell: S.A.C. 2nd GIG. Female cyborg Major Motoko Kusanagi has left Public Security Section 9, an elite counter-terrorist and anti-crime unit specializing in cyber-warfare, which has expanded to a team of 20 field operatives with Togusa acting as the field lead.
7.0Mikael Blomkvist, publisher of Millennium magazine, has made his living exposing the crooked and corrupt practices of establishment Swedish figures. So when a young journalist approaches him with a meticulously researched thesis about sex trafficking in Sweden and those in high office who abuse underage girls, Blomkvist immediately throws himself into the investigation.
0.0Described as a heist thriller that becomes “a powerful examination of systemic prejudice and economic inequality,” the stranger-than-fiction story follows Smith’s journey from teenage hacker to financial system mastermind. By 18, she had already orchestrated a litany of heists, amassing millions of dollars while evading law enforcement in the process.
7.4In 2003, Harvard undergrad and computer programmer Mark Zuckerberg begins work on a new concept that eventually turns into the global social network known as Facebook. Six years later, Mark is one of the youngest billionaires ever, but his unprecedented success leads to both personal and legal complications when he ends up on the receiving end of two lawsuits, one involving his former friend.
6.5Mr. Takazawa, an elderly invalid who is cared for at his home by Haruko, a young nursing student, is chosen by the Japanese Ministry of Public Welfare to test the Z-001, a computerized hospital bed with robotic features that allegedly displays more efficiency and skills than any human nurse, but Haruko mistrusts a machine unable to consider human feelings.
6.2Rogue agent Gabriel Shear is determined to get his mitts on $9 billion stashed in a secret Drug Enforcement Administration account. He wants the cash to fight terrorism, but lacks the computer skills necessary to hack into the government mainframe. Enter Stanley Jobson, a n'er-do-well encryption expert who can log into anything.
6.516-year-old Lara takes nude photos for her boyfriend, which soon flood social media. Lara's phone has been hacked, the photos published, and she's being blackmailed.