Samuel works in Brussels as a pharmaceutical delivery man. His gorgeous girlfriend Mireille heads off to New York to intern at a prestigious architecture firm. Shortly after her departure, Sam's computer is hacked. A series of rather dodgy IT-guys fail to protect his wireless network. The mysterious hacker seems intent on screwing up Samuel's life and his relationship with Mireille. Paranoia kicks in. Sam starts to suspect his neighbors and gets obsessed with WiFi-rays... Love, paranoia and two lovers separated by an ocean of communication devices.
Along with his new friends, a teenager who was arrested by the US Secret Service and banned from using a computer for writing a computer virus discovers a plot by a nefarious hacker, but they must use their computer skills to find the evidence while being pursued by the Secret Service and the evil computer genius behind the virus.
Hacker's Game is a love story between two hackers, Soyan and Loise. Like many other hackers, Soyan works for a company he previously hacked. This "online security" firm runs covert activities for high-profile clients around the world. Loise is a cyber-detective who investigates war crimes for a human rights organization. Obsessed with the truth, she also has spent years searching for an unknown person. The two hackers meet on a rooftop and bond together through a virtual chess game. But Soyan's employer, Russell Belial, has asked him to protect the same arms-dealer that Loise is determined to help to capture. Who will call the game now? What is Soyan's real goal? The pair embarks upon an intense but dangerous romance, playing an elaborate game of deception. After being in a virtual world, will Soyan and Loise risk everything for true love?
Julian Assange is one of the most significant figures of the twenty first century. But before he was famous, before WikiLeaks, before the internet even existed, he was a teenage computer hacker in Melbourne. This is his story. In 1989, known as âMendaxâ, Assange and two friends formed a group called the âInternational Subversivesâ. Using early home computers and defining themselves as âwhite hat hackersâ - those who look but donât steal â they broke into some of the worldâs most powerful and secretive organisations. They were young, brilliant, and in the eyes of the US Government, a major threat to national security.
Mark Thackeray (Poitier) is a West Indian, who in the 1967 film had taken teaching in a London East End school. He spent twenty years teaching and ten in administrative roles. He has taught the children of his former pupils, but is now retiring.
The movie's plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson's "Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl's rather criminal acquaintances senses that there is money in computer cracking - he travels to east Berlin and tries to contact the KGB.
This English-language adaptation of the Swedish novel by Stieg Larsson follows a disgraced journalist, Mikael Blomkvist, as he investigates the disappearance of a weary patriarch's niece from 40 years ago. He is aided by the pierced, tattooed, punk computer hacker named Lisbeth Salander. As they work together in the investigation, Blomkvist and Salander uncover immense corruption beyond anything they have ever imagined.
A man is released from prison to help American and Chinese authorities pursue a mysterious cyber criminal. The dangerous search leads them from Chicago to Hong Kong.
Personal injury attorney Stuart Pepper faces the challenge of his young career when he takes on a controversial case of wrongful death in small town Iowa. Kevin Thacker's body was found in the alley outside the Marshalltown Police Department after the young man was arrested for drunk driving. The arresting officer's story is highly suspicious and everyone involved, from the investigating detective to the FBI, appear to be aiding in covering up what actually happened that fateful night. With a promise made to the Thacker family to expose the truth, Stu dives head first into an uphill battle against lies and corruption. What transpires will change this lawyer's life forever.
Ride with the Devil follows four people who are fighting for truth and justice amidst the turmoil of the American Civil War. Director Ang Lee takes us to a no man's land on the Missouri/Kansas border where a staunch loyalist, an immigrant's son, a freed slave, and a young widow form an unlikely friendship as they learn how to survive in an uncertain time. In a place without rules and redefine the meaning of bravery and honor.
When shadowy U.S. intelligence agents blackmail a reformed computer hacker and his eccentric team of security experts into stealing a code-breaking "black box" from a Soviet-funded genius, they uncover a bigger conspiracy. Now, he and his "sneakers" must save themselves and the world economy by retrieving the box back from their blackmailers.
Alex, an immigrant from Ukraine comes to Canada and becomes involved with an online criminal organization called Darkweb. What starts off as a way to help his parents financially, soon becomes a personal vendetta against the entire banking system, when his mother is fired from her job at the bank
A look at the relationship between WikiLeaks founder Julian Assange and his early supporter and eventual colleague Daniel Domscheit-Berg, and how the website's growth and influence led to an irreparable rift between the two friends.
Bill Pope is a CIA agent on a mission in London tracking down a shadowy hacker nicknamed "The Dutchman." When he gets mysteriously ambushed and killed, an experimental procedure is used to transfer his memories into dangerous ex-convict Jericho Stewart. When he wakes up with the CIA agent's memories, his mission is to find The Dutchman and eliminate him before the hacker launches ICBM's and starts World War III. But complications soon arise and the mission turns personal.
political thriller that charts the exploits of disillusioned ex-hacker Terell Lessor. A return to New York, coupled with a humiliating attempt at getting a new job, serves as the catalyst for him to take action against those who slighted him in the past. Employing strategically placed spy-cams, and operating in tandem with backer, strategist and lover Olivia, he captures compromising footage and broadcasts the edited clips via a newly-minted website. Recognizing the power of their model, the two begin to target CEOs, politicians, those who represent the worst of the establishment. Soon Terell's every move is front-page news, law enforcement is after him, and copy-catters are taking his abduction-and-confession model to extremes he never imagined. With these forces colliding, Terell has to decide whether his actions are sustainable - a decision that will compromise his agenda, his first taste of romance, and his physical wellbeing.
Hotshot Washington lawyer Robert Dean becomes a victim of high-tech identity theft when a hacker slips an incriminating video into his pocket. Soon, a rogue National Security agent sets out to recover the tape -- and destroy Dean.
FAA system analyzer named Neil McCabe is the only person who seems to have this different hunch towards a group of international terrorists after a horrific plane incident occured. He thinks that an evil genius computer hacker sets out and manipulate the computer electronical system which linked to several airplanes to cause destruction and tragedy. In order to prevent the mishap, McCabe and his teammate, Rudy, finds out about the machine used by the criminals which leads them to a psychotic thrilling fight between the terrorist.
Emma is a young and beautiful graduate student just starting a new life in New York City. Like most people her age, she is always connected - her phone and laptop are constant companions, documenting her most intimate moments. What she doesn't realize is that she's sharing her life with an uninvited and dangerous guest. A hacker is following Emmaâs every move. When the voyeuristic thrill of watching her digitally isn't enough, the situation escalates to a dangerous and terrifying level.
Angela Bennett is a freelance software engineer who lives in a world of computer technology. When a cyber friend asks Bennett to debug a CD-ROM game, she discovers a conspiracy that will turn her life upside down. Soon, her records have been erased, and she's been given a new identity and a police record. Her vacation is ruined as she struggles to determine why she's been deleted from society.
Faced with her parents' recent divorce, her mother working long hours and her high school boyfriend dumping her, 16-year-old Martha looks for solace in the world of Internet chat rooms. Innocent chatting turns deadly as Martha attracts the attention of a pedophile and cyber-kidnapping ring. Martha's mother Connie suspects foul play and begins a frantic search for her daughter, enlisting the help of the police, the FBI and an expert hacker.
Computer hacker Will Farmer (Lanter) engages a government super-computer named Ripley in an online terrorist-attack simulation game. Little does Farmer know that Ripley has been designed to appeal to potential terrorists, and certain software glitches have in turn made him become paranoid.
The story of Jorge, an ambitious hacker with few scruples, which is discovered to divert money from the company where he works and decides to flee. In flight, turns out to have an accident during a snowstorm and, despite being in despair, eventually finding a home.
In the short end of pregnancy, a samba singer sees herself shared between two men that believes to be the father of her baby. Duelling men: a militiaman, a hacker and Shirley, a cross-dresser, best friend of the singer, who really plays the role of head on that family. Dreams, love, jealousy, life and death. Like in our songs.
REVOLUTION OS tells the inside story of the hackers who rebelled against the proprietary software model and Microsoft to create GNU/Linux and the Open Source movement.
Hackers Wanted is an unreleased American documentary film. Directed and written by Sam Bozzo, the film explores the origins and nature of hackers and hacking by following the adventures of Adrian Lamo, and contrasting his story with that of controversial figures throughout history. The film is narrated by Kevin Spacey.
In WikiRebels, we learn about the early hacker life of Julian Assange, and his later decision to form an organization where whistleblowers can anonymously pass information that documents crime and immorality. His stated goal is to expose injustice, and nothing exemplifies this more than the leaked film entitled âCollateral Murder.â WikiRebels shows other films released by WikiLeaks, and catalogs the most significant leaks since its 2006 inception, including the Iceland banking scandal, Kenya corruption and death squads, and toxic dumping in Cote DâIvoire.
The Secret History of Hacking is a 2001 documentary film that focuses on phreaking, computer hacking and social engineering occurring from the 1970s through to the 1990s. Archive footage concerning the subject matter and (computer generated) graphical imagery specifically created for the film are voiced over with narrative audio commentary, intermixed with commentary from people who in one way or another have been closely involved in these matters.
TPB AFK is a documentary about three computer addicts who redefined the world of media distribution with their hobby homepage The Pirate Bay. How did Tiamo, a beer crazy hardware fanatic, Brokep a tree hugging eco activist and Anakata â a paranoid hacker libertarian â get the White House to threaten the Swedish government with trade sanctions? TPB AFK explores what Hollywoodâs most hated pirates go through on a personal level.
Two thieves, a magician, a computer hacker, a wannabe actor and a explosives expert plan a robbery to fulfill the dream of Victor Braganza. Will they be successful or will destiny have something different for them?
Jimi, a computer game designer, finds that his latest product has been infected by a virus which has given consciousness to the main character of the game, Solo. Tormented by the memory of his fled girlfriend Lisa and begged by Solo to end its useless "life", Jimi begins a search for people who can help him both to discover what happened to Lisa and to delete his game before it is released.
Kevin Mitnick is quite possibly the best hacker in the world. Hunting for more and more information, seeking more and more cyber-trophies every day, he constantly looks for bigger challenges. When he breaks into the computer of a security expert and an ex-hacker, he finds one - and much more than that...
John McClane is back and badder than ever, and this time he's working for Homeland Security. He calls on the services of a young hacker in his bid to stop a ring of Internet terrorists intent on taking control of America's computer infrastructure.
Thomas A. Anderson is a man living two lives. By day he is an average computer programmer and by night a malevolent hacker known as Neo, who finds himself targeted by the police when he is contacted by Morpheus, a legendary computer hacker, who reveals the shocking truth about our reality.
When Delhi Police comes across an unusual case revolving around hacking they seek help of an expert who thinks like them only to come across a lazy hacker Mickey Arora.
In a futuristic world, Michelle lives everyday battling with DNA Hackers who use their skills to hack into people's bodies and kill them. She is an assassin, trying to keep her younger brother, Jackie, out of trouble. When Jackie gets involved in a petty crime of robbery, he propels himself into the world of DNA Hackers, Shylocks (Loan Sharks) and Gangs
Notorious hacker Drew Reynolds is captured by the CIA and given a proposition - work for them or spend the rest of his life in prison. Agreeing on the condition that he can form his own team, he puts together a group of "throwaways" - the people deemed expendable and seemingly the worst in the organization.
Young programmer and hacker Gena meets Khottabych - a genie who can't quite understand today life realities after spending thousands of years in a lamp.
When their computer hacker friend accidentally channels a mysterious wireless signal, a group of co-eds rally to stop a terrifying evil from taking over the world.
Pa Hacker and his two mentally deranged sons travel around a rural lakeshore community doing home repairs and odd jobs. They have a special way of handling dissatisfied customers and don't worry about repeat business. A lovely girl is offered a weeks stay at a country estate while the family is on a trip. When the Hackers arrive on the scene to do some repair work, a terrifying chain of events take place with a shocking ending.
Jobe is resuscitated by Jonathan Walker. He wants Jobe to create a special computer chip that would connect all the computers in the world into one network, which Walker would control and use. But what Walker doesn't realize is a group of teenage hackers are on to him and out to stop his plan.
A.D. 2400, DEVA's central council detects an incident of unauthorized access into their mainframe. Someone on Earth was trying to hack into the system. The only information DEVA was able to retrieve was that hacker referred to themselves as "Frontier Setter." To investigate the mysterious hacker's motives, the high officials of DEVA dispatch system Security Third Officer Angela Balzac to the Earth's surface. Equipped with a prosthetic "material body," Angela attempts to make contact with a local agent Dingo, but what awaited her instead was a swarm of Sandworms now infesting the Earth's surface. Angela intercepts the gruesome pests with her exoskeleton powered suit Arhan.
In the year 2029, Section 9, a group of cybernetically enhanced cops, are called in to investigate and stop a highly-wanted hacker known as 'The Puppetmaster'. Ghost in the Shell 2.0 is a reproduced version of its original 1995 counterpart. Among a numerous enhancements, for the film's 2.0 release, were a number of scenes were overhauled with 3D animation, visual improvements, and soundtrack rerecorded in 6.1 surround sound.
Rogue agent Gabriel Shear is determined to get his mitts on $9 billion stashed in a secret Drug Enforcement Administration account. He wants the cash to fight terrorism, but lacks the computer skills necessary to hack into the government mainframe. Enter Stanley Jobson, a n'er-do-well encryption expert who can log into anything.
During the Civil War, a Confederate spy takes a job as marshal of a small western town as a cover for his espionage activities. However, he soon finds out that a local businessman is selling weapons to a band of rampaging Indians.
Six young computer hackers sent to work on a derelict space freighter, are forced to match wits with a vengeful artificial intelligence that would kill to be human.
In the year 2029, the barriers of our world have been broken down by the net and by cybernetics, but this brings new vulnerability to humans in the form of brain-hacking. When a highly-wanted hacker known as 'The Puppetmaster' begins involving them in politics, Section 9, a group of cybernetically enhanced cops, are called in to investigate and stop the Puppetmaster.
High School student David Lightman (Matthew Broderick) has a talent for hacking. But while trying to hack into a computer system to play unreleased video games, he unwittingly taps into the Defense Department's war computer and initiates a confrontation of global proportions! Together with his girlfriend (Ally Sheedy) and a wizardly computer genius (John Wood), David must race against time to outwit his opponent...and prevent a nuclear Armageddon.
After taking a bullet to the head, Salander is under close supervision in a hospital and is set to face trial for attempted murder on her eventual release. With the help of journalist Mikael Blomkvist and his researchers at Millennium magazine, Salander must prove her innocence. In doing this she plays against powerful enemies and her own past.
Highly intelligent hacker Lillian joins a cybersecurity company in order to gain access to the bank where her father used to work. She discovers nothing is what it seems and it turns out she isnât the only one pretending to be someone else. But where do we draw the line between activism and terrorism?
The sequel to the low budget first film âCube.â This time the prisoners find them selves in a more advanced cube environment that they must escape from before they are killed. A science fiction film where space and time have more than one path.
Please enter your e-mail address to subscribe for updates
The General Data Protection Regulation (GDPR) and Cookies
On 25 May 2018, the General Data Protection Regulation (GDPR) (EU) 2016/679 will come into force. The GDPR strengthens and clarifies the rights of EU-resident natural persons with regard to their personal information The Terms and Conditions and the Privacy Policy for Valossa services have been updated accordingly.
Please review Valossa's updated Terms and Conditions, Privacy Policy and the Cookie Policy. If you use our services to process personal information of EU-resident natural persons you need to comply with the GDPR. By using our services on or after 25 May 2018, you will be agreeing to the changes.
Under the GDPR, you have several rights, such as accessing your own personal data, erasing of that data, and the right to be notified within 72 hours of a data breach that is likely to result in a risk for your rights and freedoms. You may reach the Data Protection Officer (DPO) of Valossa when needed, and the details for doing so can be found in the updated Privacy Policy.
Click 'OK' to agree and continue using WhatIsMyMovie.com.