Two thugs are hired by an secret person to assist a hacker for a quick job of hacking. but as times passes, the hacker shows that he is aware of their intentions and as it gets harder and harder for them to get along, secrets about the operation get revealed.
Ramezoon
Mrs. Adine
Two thugs are hired by an secret person to assist a hacker for a quick job of hacking. but as times passes, the hacker shows that he is aware of their intentions and as it gets harder and harder for them to get along, secrets about the operation get revealed.
2018-10-10
0
Sneaking into the web is not without consequences
A financially struggling father is confronted with a moral dilemma when he enters the criminal underworld as a contract killer to support his family.
A Spanish villager during the Franco dictatorship must answer the uncomfortable questions of a Civil Guard detective. This is a reimagining of the opening scene of Inglourious Basterds if it took place in Spain during the Franco dictatorship.
In this classic German thriller, Hans Beckert, a serial killer who preys on children, becomes the focus of a massive Berlin police manhunt. Beckert's heinous crimes are so repellant and disruptive to city life that he is even targeted by others in the seedy underworld network. With both cops and criminals in pursuit, the murderer soon realizes that people are on his trail, sending him into a tense, panicked attempt to escape justice.
High School student David Lightman has a talent for hacking. But while trying to hack into a computer system to play unreleased video games, he unwittingly taps into the Defense Department's war computer and initiates a confrontation of global proportions. Together with his girlfriend and a wizardly computer genius, David must race against time to outwit his opponent and prevent a nuclear Armageddon.
When shadowy U.S. intelligence agents blackmail a reformed computer hacker and his eccentric team of security experts into stealing a code-breaking 'black box' from a Soviet-funded genius, they uncover a bigger conspiracy. Now, he and his 'sneakers' must save themselves and the world economy by retrieving the box from their blackmailers.
By pure coincidence, Mia finds an enigmatic sketch book which leads her to mystical places. There, she gets to know the story of Vera - a story of old myths, of modern technology, and of escape and oblivion.
Two guys against globalization want to plant a virus in the network of a finance corporation. On the day of the attack Alex has an accident and cannot remember anything. Visions and reality are thrown together in a confusing maze. Alex tries to escape from this muddle but what he discovers turns out to be rather frightening…
Eight strangers awaken with no memory, in a puzzling cube-shaped room where the laws of physics do not always apply.
The movie's plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson's "Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl's rather criminal acquaintances senses that there is money in computer cracking - he travels to east Berlin and tries to contact the KGB.
Angela Bennett is a freelance computer systems analyst who tracks down software viruses. At night she hooks up to the internet and chats to others 'surfing the net'. While de-bugging a new high-tech game for a cyber friend, she comes across a top secret program and becomes the target of a mysterious organization who will stop at nothing to erase her identity and her existence, in order to protect the project.
Armed with only a collection of cell phones and a unique talent, a hacker orchestrates an elaborate bank heist from an abandoned building. But when things spin out of control, she has her wits to hold it all together.
John McClane is back and badder than ever, and this time he calls on the services of a young hacker in his bid to stop a ring of Internet terrorists intent on taking control of America's computer infrastructure.
Jimi, a computer game designer, finds that his latest product has been infected by a virus which has given consciousness to the main character of the game, Solo. Tormented by the memory of his fled girlfriend Lisa and begged by Solo to end its useless "life", Jimi begins a search for people who can help him both to discover what happened to Lisa and to delete his game before it is released.
In this indirect sequel to "The Pure and the Damned," childhood friends Ellis and Benny kill time as they await their newest partner in the midst of a robbery.
A timid creature's journey to overcome fear and find the courage to savor life.
Lav is an underground private investigator with the psychic prowess allowing her to read the minds of the living and the recently dead. After a series of seemingly random murders Lav stumbles into a mystery involving a far more omniscient and maleficent force. A force she tries to stop while also battling her own crumbling mental health.