
All interviews in this documentary were shot over a long weekend at a 1984 hacker conference by the Whole Earth Catalog editors Stewart Brand and Kevin Kelley in Sausalito, California. The event itself (the hacker conference) was inspired by Steven Levy's classic book "Hackers - Heroes of the Computer Revolution"

All interviews in this documentary were shot over a long weekend at a 1984 hacker conference by the Whole Earth Catalog editors Stewart Brand and Kevin Kelley in Sausalito, California. The event itself (the hacker conference) was inspired by Steven Levy's classic book "Hackers - Heroes of the Computer Revolution"
1984-01-01
7
7.0This movie explores the possibilities of interaction between man and computer, with some historical background. It demonstrates techniques introduced in the Disney movie Tron (1982), combining computer-synthesized animation and real-life object photography.
7.6Caleb, a coder at the world's largest internet company, wins a competition to spend a week at a private mountain retreat belonging to Nathan, the reclusive CEO of the company. But when Caleb arrives at the remote location he finds that he will have to participate in a strange and fascinating experiment in which he must interact with the world's first true artificial intelligence, housed in the body of a beautiful robot girl.
6.7Recent college grad Jaime Reyes returns home full of aspirations for his future, only to find that home is not quite as he left it. As he searches to find his purpose in the world, fate intervenes when Jaime unexpectedly finds himself in possession of an ancient relic of alien biotechnology: the Scarab.
7.9Peter Parker is unmasked and no longer able to separate his normal life from the high-stakes of being a super-hero. When he asks for help from Doctor Strange the stakes become even more dangerous, forcing him to discover what it truly means to be Spider-Man.
8.2After the devastating events of Avengers: Infinity War, the universe is in ruins due to the efforts of the Mad Titan, Thanos. With the help of remaining allies, the Avengers must assemble once more in order to undo Thanos' actions and restore order to the universe once and for all, no matter what consequences may be in store.
8.0The story of J. Robert Oppenheimer's role in the development of the atomic bomb during World War II.
8.2World War II soldier-turned-U.S. Marshal Teddy Daniels investigates the disappearance of a patient from a hospital for the criminally insane, but his efforts are compromised by troubling visions and a mysterious doctor.
8.5The defense and the prosecution have rested and the jury is filing into the jury room to decide if a young Spanish-American is guilty or innocent of murdering his father. What begins as an open and shut case soon becomes a mini-drama of each of the jurors' prejudices and preconceptions about the trial, the accused, and each other.
7.8Paul Atreides, a brilliant and gifted young man born into a great destiny beyond his understanding, must travel to the most dangerous planet in the universe to ensure the future of his family and his people. As malevolent forces explode into conflict over the planet's exclusive supply of the most precious resource in existence-a commodity capable of unlocking humanity's greatest potential-only those who can conquer their fear will survive.
7.5Ex-hitman John Wick comes out of retirement to track down the gangsters that took everything from him.
7.7During a manned mission to Mars, Astronaut Mark Watney is presumed dead after a fierce storm and left behind by his crew. But Watney has survived and finds himself stranded and alone on the hostile planet. With only meager supplies, he must draw upon his ingenuity, wit and spirit to subsist and find a way to signal to Earth that he is alive.
7.0Barbie and Ken are having the time of their lives in the colorful and seemingly perfect world of Barbie Land. However, when they get a chance to go to the real world, they soon discover the joys and perils of living among humans.
7.0When timid bank clerk Stanley Ipkiss discovers a magical mask containing the spirit of the Norse god Loki, his entire life changes. While wearing the mask, Ipkiss becomes a supernatural playboy exuding charm and confidence which allows him to catch the eye of local nightclub singer Tina Carlyle. Unfortunately, under the mask's influence, Ipkiss also robs a bank, which angers junior crime lord Dorian Tyrell, whose goons get blamed for the heist.
8.2Set in the 22nd century, The Matrix tells the story of a computer hacker who joins a group of underground insurgents fighting the vast and powerful computers who now rule the earth.
6.9England, early 20th century. The future writer and philologist John Ronald Reuel Tolkien (1892-1973) and three of his schoolmates create a strong bond between them as they share the same passion for literature and art, a true fellowship that strengthens as they grow up, but the outbreak of World War I threatens to shatter it.
7.6Set more than a decade after the events of the first film, learn the story of the Sully family (Jake, Neytiri, and their kids), the trouble that follows them, the lengths they go to keep each other safe, the battles they fight to stay alive, and the tragedies they endure.
7.7Paul Baumer and his friends Albert and Muller, egged on by romantic dreams of heroism, voluntarily enlist in the German army. Full of excitement and patriotic fervour, the boys enthusiastically march into a war they believe in. But once on the Western Front, they discover the soul-destroying horror of World War I.
6.8When the Emperor of China issues a decree that one man per family must serve in the Imperial Chinese Army to defend the country from Huns, Hua Mulan, the eldest daughter of an honored warrior, steps in to take the place of her ailing father. She is spirited, determined and quick on her feet. Disguised as a man by the name of Hua Jun, she is tested every step of the way and must harness her innermost strength and embrace her true potential.
7.0A feature-length documentary about the Free Kevin movement and the hacker world.
0.0Discover the intoxicating world of hacking through the eyes of Michael “Mafiaboy” Calce, who, at 15, was involved in one of the most egregious and widely covered cybercrimes in North America. As hacking becomes more sophisticated and widespread, and information becomes synonymous with profit, can anyone remain immune to a breach of security?
6.9REVOLUTION OS tells the inside story of the hackers who rebelled against the proprietary software model and Microsoft to create GNU/Linux and the Open Source movement.
6.516-year-old Lara takes nude photos for her boyfriend, which soon flood social media. Lara's phone has been hacked, the photos published, and she's being blackmailed.
7.8In 1986, astronomer turned computer scientist Clifford Stoll had just started working on a computer system at the Lawrence Berkeley Laboratory when he noticed a 75-cent discrepancy between the charges printed by two accounting programs responsible for charging people for machine use. Intrigued, he deduced that the system was being hacked, and he determined to find the culprit. This is the re-enactment of how he tracked down KGB cracker Markus Hess through the Ethernet to Hannover, Germany.
8.0Amid the growing threat of cyberattacks from Russian hackers, this film dives into their origins, motives, and the dangers they pose to their targets.
6.8The incredible story of Bill Gaede, an Argentinian engineer, programmer… and Cold War spy.
0.0Pati, a young film producer, is fighting to carve out a professional career in the film industry. It is May 2019 when her laptop is stolen during a business trip in Madrid. Two months after, an anonymous Hacker accesses all the stored data in the stolen device and finds three very private photos of Pati. He threatens that if he doesn’t receive $2,400 he will mass-mail the pictures to all her work contacts in order to ruin her professional reputation. The shame, anger and distress caused by the ineffectiveness of the legal forces lead Pati to set out on her own investigation to stop the Hacker and regain control and power over her privacy.
0.0Guardians of the New World introduces us to the world of hacker culture. Emerging from the 70’s counterculture around conceptions of personal freedom, decentralisation of power and sharing, hacking really came to prominence with the emergence of the Internet as a ubiquitous public forum from the late 90’s onwards.
6.1A portrait of the hacking community. In an effort to challenge preconceived notions and media-driven stereotypes Hackers Are People Too lets hackers speak for themselves and introduce their community to the public.
6.4In The Realm of the Hackers is a documentary about the prominent hacker community, centered in Melbourne, Australia in the late 80's to early 1990. The storyline is centered around the Australian teenagers going by the hacker names "Electron" and "Phoenix", who were members of an elite computer hacking group called The Realm and hacked into some of the most secure computer networks in the world, including those of the US Naval Research Laboratory, Lawrence Livermore National Laboratory, a government lab charged with the security of the US nuclear stockpile, and NASA.
7.2They call themselves Fancy Bear, Cozy Bear or Voodoo Bear. Elite units of the Russian secret services are hidden behind these code names. They are among the most dangerous hackers in the world. The bears were already in the computer of then-Chancellor Angela Merkel in 2015, interfered in the US election campaign in 2016 and are currently influencing the war in Ukraine. The makers of the successful YouTube channel “Simplicissimus” in co-production with funk and SWR are back and show the destructive potential of state hacking with this documentary. With the help of leading German hackers, cyberspace experts and a lot of humor, they delicately demystify the Russian bears: Who are the people behind them? How do they operate? And what makes them so incredibly dangerous?
9.0All Creatures Welcome explores the world of hackers and nerds at the events of the Chaos Computer Club, Europe's largest hacker association. The film dispels common clichés and draws a utopian picture of a possible society in the digital age.
5.3A fully automated commercial jetliner is prepared to make its maiden voyage. Without an on-flight pilot, the craft relies on satellite linking for its course. But when the plane suddenly deviates from its determined route and establishes a circular pattern over Seattle, it becomes evident that the craft has been hijacked by a disgruntled former airline employee who has hacked into the flight's computer system from his apartment, somewhere in the United States. Now, a former discredited Navy pilot and an oddball technician must race against the clock to find where the angry employee is, and regain control of the plane before it crashes into the city.
6.5THE 414s tells the story of the first widely recognized computer hackers, a group of Milwaukee teenagers who gained notoriety in 1983 when they broke into dozens of high-profile computer systems, including the Los Alamos National Laboratory, a classified nuclear weapons research facility.
7.8This program reveals the daily battle between the Internet’s outlaws and the hackers who oppose them by warding off system attacks, training IT professionals and police officers, and watching cyberspace for signs of imminent infowar. Through interviews with frontline personnel from the Department of Defense, NYPD’s computer crime squad, private detective firm Kroll Associates, X-Force Threat Analysis Service, and several notorious crackers, the program provides penetrating insights into the millions of hack attacks that occur annually in the U.S.—including one that affected the phone bills of millions and another that left confidential details of the B-1 stealth bomber in the hands of teenagers. The liabilities of wireless networks, the Code Red worm, and online movie piracy are also discussed. A Discovery Channel Production. (51 minutes)
6.6Werner Herzog's exploration of the Internet and the connected world.
5.5Each of the members of a group of hackers is willing to fight against system. Their messages and attacks are political, socially demmanding but also playful. Each of them have reasons to have moved to that virtual side, where they can be who they can't in real life. However, the sudden implication of authorities (pressed by goverment to be tougher against hackers)and of a wise and dangerous cracker will cause a turn in their crusade. Will they use the enemy's means or their ideological motivations imply a respect for law and human life?
7.5The documentary Pirat@ge traces the history of the Internet through the testimonies of those who built it: the hackers. It delves into the concerns of Generation Y, analyzing their networked communication methods, cultural consumption habits, and the sharing of such content.
7.0CODE 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it.