CODE 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it.
Herself
Herself
Herself
Himself
Himself
Himself
Himself
Himself
Himself
Himself
John Wick is forced out of retirement by a former associate looking to seize control of a shadowy international assassins’ guild. Bound by a blood oath to aid him, Wick travels to Rome and does battle against some of the world’s most dangerous killers.
When 11-year-old Riley moves to a new city, her Emotions team up to help her through the transition. Joy, Fear, Anger, Disgust and Sadness work together, but when Joy and Sadness get lost, they must journey through unfamiliar places to get back home.
Los Angeles, 1969. TV star Rick Dalton, a struggling actor specializing in westerns, and stuntman Cliff Booth, his best friend, try to survive in a constantly changing movie industry. Dalton is the neighbor of the young and promising actress and model Sharon Tate, who has just married the prestigious Polish director Roman Polanski…
Fifteen years after murdering his sister on Halloween Night 1963, Michael Myers escapes from a mental hospital and returns to the small town of Haddonfield, Illinois to kill again.
The story of the miraculous evacuation of Allied soldiers from Belgium, Britain, Canada and France, who were cut off and surrounded by the German army from the beaches and harbour of Dunkirk between May 26th and June 4th 1940 during World War II.
The adventures of a group of explorers who make use of a newly discovered wormhole to surpass the limitations on human space travel and conquer the vast distances involved in an interstellar voyage.
In this fifth installment, Death is just as omnipresent as ever, and is unleashed after one man’s premonition saves a group of coworkers from a terrifying suspension bridge collapse. But this group of unsuspecting souls was never supposed to survive, and, in a terrifying race against time, the ill-fated group frantically tries to discover a way to escape Death’s sinister agenda.
With his wife's disappearance having become the focus of an intense media circus, a man sees the spotlight turned on him when it's suspected that he may not be innocent.
A spacecraft traveling to a distant colony planet and transporting thousands of people has a malfunction in its sleep chambers. As a result, two passengers are awakened 90 years early.
Tony Lip, a bouncer in 1962, is hired to drive pianist Don Shirley on a tour through the Deep South in the days when African Americans, forced to find alternate accommodations and services due to segregation laws below the Mason-Dixon Line, relied on a guide called The Negro Motorist Green Book.
Mia, an aspiring actress, serves lattes to movie stars in between auditions and Sebastian, a jazz musician, scrapes by playing cocktail party gigs in dingy bars, but as success mounts they are faced with decisions that begin to fray the fragile fabric of their love affair, and the dreams they worked so hard to maintain in each other threaten to rip them apart.
In 1926, Newt Scamander arrives at the Magical Congress of the United States of America with a magically expanded briefcase, which houses a number of dangerous creatures and their habitats. When the creatures escape from the briefcase, it sends the American wizarding authorities after Newt, and threatens to strain even further the state of magical and non-magical relations.
Llewelyn Moss stumbles upon dead bodies, $2 million and a hoard of heroin in a Texas desert, but methodical killer Anton Chigurh comes looking for it, with local sheriff Ed Tom Bell hot on his trail. The roles of prey and predator blur as the violent pursuit of money and justice collide.
Driver is a skilled Hollywood stuntman who moonlights as a getaway driver for criminals. Though he projects an icy exterior, lately he's been warming up to a pretty neighbor named Irene and her young son, Benicio. When Irene's husband gets out of jail, he enlists Driver's help in a million-dollar heist. The job goes horribly wrong, and Driver must risk his life to protect Irene and Benicio from the vengeful masterminds behind the robbery.
Injustice and the demands of the world can cause stress for many people. Some of them, however, explode. This includes a waitress serving a grouchy loan shark, an altercation between two motorists, an ill-fated wedding reception, and a wealthy businessman who tries to buy his family out of trouble.
Carl Fredricksen spent his entire life dreaming of exploring the globe and experiencing life to its fullest. But at age 78, life seems to have passed him by, until a twist of fate (and a persistent 8-year old Wilderness Explorer named Russell) gives him a new lease on life.
The origin story of former Special Forces operative turned mercenary Wade Wilson, who, after being subjected to a rogue experiment that leaves him with accelerated healing powers, adopts the alter ego Deadpool. Armed with his new abilities and a dark, twisted sense of humor, Deadpool hunts down the man who nearly destroyed his life.
Hackers in Wonderland is a 2000 documentary film, produced and directed by Russell Barnes, about hackers in the United Kingdom.
A feature-length documentary about the Free Kevin movement and the hacker world.
Programming prodigy and information activist Aaron Swartz achieved groundbreaking work in social justice and political organizing. His passion for open access ensnared him in a legal nightmare that ended with the taking of his own life at the age of 26.
Hacks is a 73 minute European documentary exploring what nature of "Hacking" is in a social context. In HACKS, the Austrian multimedia artist Christine Bader examines who is the computer hacker and what moves him or her. Is the hacker a Robin Hood in cyber space or an anarchistic agitator? Bader speaks with Dutch, German and American communication freaks who are working with various kinds of network issues, like making the Internet accessible to individual persons (Felipe Rodriguez, founder of Internet provider Xs4all), creating a meeting place in cyber space, or designing an ultramodern communication network on a ‘multimedia art ship‘. ‘Hackers are not encumbered by technical, financial or organizational problems, they just want to do things‘, Rodriguez thinks. That the technological means ‘just to do things‘ are now freely available is demonstrated by the numerous computer initiatives that whiz past in HACKS.
This documentary looks at the computer hacker community in New York City of today, its meetings and conferences, political annotations, and historically explores the roots of the original definition 'hacking' amongst the model train enthusiasts at MIT.
Pati, a young film producer, is fighting to carve out a professional career in the film industry. It is May 2019 when her laptop is stolen during a business trip in Madrid. Two months after, an anonymous Hacker accesses all the stored data in the stolen device and finds three very private photos of Pati. He threatens that if he doesn’t receive $2,400 he will mass-mail the pictures to all her work contacts in order to ruin her professional reputation. The shame, anger and distress caused by the ineffectiveness of the legal forces lead Pati to set out on her own investigation to stop the Hacker and regain control and power over her privacy.
They call themselves Fancy Bear, Cozy Bear or Voodoo Bear. Elite units of the Russian secret services are hidden behind these code names. They are among the most dangerous hackers in the world. The bears were already in the computer of then-Chancellor Angela Merkel in 2015, interfered in the US election campaign in 2016 and are currently influencing the war in Ukraine. The makers of the successful YouTube channel “Simplicissimus” in co-production with funk and SWR are back and show the destructive potential of state hacking with this documentary. With the help of leading German hackers, cyberspace experts and a lot of humor, they delicately demystify the Russian bears: Who are the people behind them? How do they operate? And what makes them so incredibly dangerous?
A story about the world's best Cyber spies. Their training in Israel's military, and their impact on the world we live in.
A small rural hospital in Japan battles an international cybercriminal gang that is holding them ransom with their stolen patient data.
Does privacy still exist in 2019? In less than a generation, the internet has become a mass surveillance machine based on one simple mindset: If it's free, you're the product. Our information is captured, stored and made accessible to corporations and governments across the world. To the hacker community, Big Brother is real and only a technological battle can defeat him.
Uncompromising millennial radicals from the United States and the United Kingdom attack the system through dangerous technological means, which evolves into a high-stakes game with world authorities in the midst of a dramatically changing political landscape.
In 1981, Wau Holland and other hackers established the Hamburg based Chaos Computer Club (CCC). The idiosyncratic freethinkers were inspired by Californian technology visionaries and committed themselves to hacker ethics. All information must be free. Use public data, protect private data. But not everyone followed the rules. Computer technology was still in its infancy and the emerging Internet became a projection screen for social utopias. What has become of them? The story of the German hackers, told by the protagonists themselves in a montage of found video and audio material.
Documentary film investigating allegations of election fraud during the 2004 U.S. presidential election. Electronic voting machines count approximately 90% of America's votes in county, state and federal elections. The technology is also increasingly being used across the world, including in Canada, the United Kingdom, Europe and Latin America. The film uncovers incendiary evidence from the trash cans of Texas to the ballot boxes of Ohio, exposing secrecy, votes in the trash, hackable software and election officials rigging the presidential recount.Ultimately proving our votes can be stolen without a trace "Hacking Democracy" culminates in the famous 'Hursti Hack'; a duel between the Diebold voting machines and a computer hacker from Finland - with America's democracy at stake.
In The Realm of the Hackers is a documentary about the prominent hacker community, centered in Melbourne, Australia in the late 80's to early 1990. The storyline is centered around the Australian teenagers going by the hacker names "Electron" and "Phoenix", who were members of an elite computer hacking group called The Realm and hacked into some of the most secure computer networks in the world, including those of the US Naval Research Laboratory, Lawrence Livermore National Laboratory, a government lab charged with the security of the US nuclear stockpile, and NASA.
A portrait of the hacking community. In an effort to challenge preconceived notions and media-driven stereotypes Hackers Are People Too lets hackers speak for themselves and introduce their community to the public.
Discover the intoxicating world of hacking through the eyes of Michael “Mafiaboy” Calce, who, at 15, was involved in one of the most egregious and widely covered cybercrimes in North America. As hacking becomes more sophisticated and widespread, and information becomes synonymous with profit, can anyone remain immune to a breach of security?
TPB AFK is a documentary about three computer addicts who redefined the world of media distribution with their hobby homepage The Pirate Bay. How did Tiamo, a beer crazy hardware fanatic, Brokep a tree hugging eco activist and Anakata – a paranoid hacker libertarian – get the White House to threaten the Swedish government with trade sanctions? TPB AFK explores what Hollywood’s most hated pirates go through on a personal level.
Italy’s biggest political party, the Five Star Movement, promotes direct democracy through internet voting. Five Star Movement uses a digital platform named Rousseau, that allows Movement’s members to vote online and express their opinion on various issues. But who governs this data?
In 1986, astronomer turned computer scientist Clifford Stoll had just started working on a computer system at the Lawrence Berkeley Laboratory when he noticed a 75-cent discrepancy between the charges printed by two accounting programs responsible for charging people for machine use. Intrigued, he deduced that the system was being hacked, and he determined to find the culprit. This is the re-enactment of how he tracked down KGB cracker Markus Hess through the Ethernet to Hannover, Germany.