Playlists > 👨‍💻 Hackers & cyber crime

👨‍💻 Hackers & cyber crime
Description:

A Dark Web playlist featuring expert hackers, heists and stunts using highly technical knowledge and innovative tech.

See also:
💰 Best heist TV shows
https://www.primewire.tf/playlist/6123


Creator: Greer
Posted: 2 years ago
 
Favorite

11 favorites

3206 views

info
Movie: Generation X ( 1996 )
A group of young mutants--humans with a genetic variation that gives them superpowers and makes them feared by the population at large--begin training at a school for heroes. Their studies are interrupted when they must rescue one of their number from a mad scientist who can enter others' dreams.
info
TV Show: The Undeclared War ( 2022 )
Set in 2024, The Undeclared War tracks a leading team of analysts buried in the heart of GCHQ, secretly working to ward off a series of cyber-attacks on the UK in the run up to a general election. When a routine stress test of internet infrastructure goes awry 21-year-old GCHQ intern Saara Parvin suddenly finds herself operating on the invisible frontier of high-stakes cyber warfare.
info
Movie: The IT Crowd ( 2006 )
Failed US pilot of a popular British show about two computer geeks who work in the IT department of a major company, and their female supervisor who's actually a grifter.
info
TV Show: Betas ( 2013 )
Four computer geeks have what they think is a brilliant idea -- a social networking app that, in the words of ringleader Trey, "introduces you to the people you should know," unlike other popular sites, that simply let you keep up with people you already know. They have the app working (which required hacking into the already popular social networking sites for personal data), but they need an angel -- someone to invest some cash in their dream. They target George Murcheson, an investor who has passed on the likes of Facebook, Foursquare and Pinterest. Unable to get an appointment with the man, they crash his party and demo their app, which his investment adviser proclaims a stalker's dream. Murcheson's money could make or break the guys' futures. Raunchy, and with a lot of emphasis on sex and drugs, this Amazon original is not for the younger crowd, but offers grown-ups a look inside the workings of Silicon Valley and the roller-coaster ride of the start-up.
info
Movie: Hardwired ( 2009 )
After a tragic accident nearly claims the life Luke Gibson (Gooding Jr.) the Hexx Corporation hardwire an implant into Luke's brain, it saves his life, but Luke soon finds out that this new technology comes at price, advertising.
info
Movie: Line Of Duty ( 2019 )
A Young recruit of the Indian army posted at a remote bunker, is asked to forego his principals of humanity against the rigid border regulations. With a natural calamity at hand, are all regulations applicable?
info
Movie: Dear White People ( 2014 )
The lives of four black students at an Ivy League college.
info
Movie: Armed Response ( 2017 )
A team of highly trained operatives find themselves trapped inside an isolated military compound after its AI is suddenly shut down. The crew begins to experience strange and horrific phenomena as they attempt to uncover what killed the previous team.
info
Movie: The Numbers Station ( 2013 )
When the moral values of a longtime wetwork black ops agent is tested during his last operation, he receives an unfavorable psych evaluation. Now he is given a break and a seemingly uncomplicated assignment of simply protecting the security of a young female code announcer, code resources and remote station they are assigned to. After an ambush and one phone call later, it becomes a complicated fight for their survival.
info
Movie: Fateful Findings ( 2014 )
A computer scientist/novelist reunites with his childhood friend and hacks into government databases, while facing the dire and fateful consequences of his mystical actions obtained as a child.
info
Movie: Ghost in the Machine ( 1993 )
Karl Hochman is a technician in a computer store. He is also known as the "Address Book Killer" due to his habit of stealing people's address books and proceeding to murder anyone listed in the book. Terry Munroe and her son Josh come into the store to purchase software, and a salesman uses Terry's address book to demonstrate a handheld scanner. Karl obtains the book, and while driving to Terry's house that night in a thunderstorm, his car runs off the road and lands upside down in a cemetery. While Karl is undergoing an MRI at a hospital, a surge of lightning courses through the building, and Karl's mind is transformed into electrical energy. Karl uses the electrical grid and computer networks to continue his killing spree. It is up to Terry, Josh, and computer hacker Bram Walker to stop him before it is too late.
info
Movie: Hacked ( 2020 )
A young woman finds her life turned upside down when she rejects the advances of a teenage hacker.
info
Movie: Hacker's Game Redux ( 2018 )
Loise and Soyan embark upon an intense but dangerous romance. After being in a virtual world, will Soyan and Loise risk everything for true love?
info
Movie: Cyberbully ( 2015 )
How far will you go to protect your life, Casey is facing every teenager's worst nightmare, as an anonymous hacker plans to leak her private photos to the public through the Internet. She races against time in order to end the stalker's plan and save her identity.
info
Movie: Electric Dreams ( 1984 )
An artificially intelligent PC and his human owner find themselves in a romantic rivalry over a woman.
info
TV Show: Wired ( 2008 )
As single mum, Louise Evans, is given a promotion at her bank only to be coerced into facilitating a £250 million internet bank theft. Wired is a thriller about bank fraud, what happens to our money behind the scenes in the world of "electronic banking", and the shadowy bank robbers who no longer operate with masks and sawn-off shotguns.
info
Movie: Underground: The Julian Assange Story ( 2012 )
A look at the early career of Wikileaks founder, Julian Assange.
info
Movie: Terms and Conditions May Apply ( 2013 )
A documentary that exposes what corporations and governments learn about people through Internet and cell phone usage, and what can be done about it ... if anything.
info
Movie: Lo and Behold: Reveries of the Connected World ( 2016 )
Lo and Behold: Reveries of the Connected World is a movie starring Elon Musk, Lawrence Krauss, and Lucianne Walkowicz. Werner Herzog's exploration of the Internet and the connected world.
info
Movie: Algorithm ( 2014 )
A freelance computer hacker discovers a mysterious government computer program. He breaks into the program and is thrust into a revolution.
info
Movie: Paper Man ( 1971 )
A prank that starts with a group of college students creating a fictitious person so they can get a credit card develops into a plot that takes a murderous turn.
info
Movie: No Place to Hide: The Rehtaeh Parsons Story ( 2015 )
The far-reaching effects of cyberbullying, rape culture and victim blaming - all borne by one girl, Rehtaeh Parsons.
info
Movie: Risk ( 2017 )
The story of WikiLeak's editor-in-chief Julian Assange as seen by documentary filmmaker Laura Poitras.
info
Movie: Prime Risk ( 1985 )
A female engineer, with the assistance of her pilot-wannabe male friend, discovers a way to rip off ATM machines, but in doing so stumbles upon a plot to destroy the U.S. monetary system.
info
Movie: Masterminds ( 1997 )
Trapped in a school in which a gang of criminals has siezed control, a young troublemaker fights a cat and mouse battle from inside.
info
Movie: Cyberbully ( 2011 )
A teenager is subjected to a campaign of bullying by classmates through a social networking site.
info
Movie: Goodbye World ( 2014 )
When a mysterious terrorist attack causes chaos in the cities, a group of friends take refuge in their countryside cabin. But the challenges of living in a post-apocalyptic world soon take their toll on relationships within the group.
info
Movie: 1:54 ( 2017 )
Tim is a grade 11 student dealing with loss of his mother several years ago and his own sexuality at 16 going on 17. He was a star runner as a 12 year old with his mother as his coach. With his mother's death he gave up running and him and his friend are chemistry nerds who are bullied and harassed by the jocks at school. Tim eventually returns to running and expands his group of friends. HIs main competitor on the track, Jeff, continues his harassment and resorts to blackmail to hurt Tim's performance on the track with disastrous results.
info
Movie: Hunt to Kill ( 2010 )
Steve Austin stars as U.S. Border Patrol agent Jim Rhodes, a tough divorce mourning the loss of his murdered partner while struggling to raise his rebellious daughter in the mountains of Montana. But when a crew of trigger-happy fugitives takes Rhodes and his daughter hostage, a rugged wilderness will explode in all-terrain vengeance. Is there any wounded animal more dangerous than a lawman left for dead?
info
Movie: The Hacker Wars ( 2014 )
Ripped from international headlines, The Hacker Wars takes you to the front lines of the high-stakes battle over the fate of the Internet, freedom and privacy.
info
Movie: Tron: The Next Day ( 2011 )
About the "Flynn Lives" movement.
info
Movie: The Bling Ring ( 2011 )
Teenagers break into celebrities houses to experience the rich life by stealing their belongings.
info
Movie: We Are Legion: The Story of the Hacktivists ( 2012 )
A documentary on the workings and beliefs of the self-described "hacktivist" collective, Anonymous.
info
Movie: Takedown ( 2000 )
This film is based on the story of the capture of computer hacker Kevin Mitnick.
info
Movie: Deep Web ( 2020 )
A gamer meets a girl on an online forum who introduces him to the deep web an underground network where anything is possible. The pair quickly finds themselves falling dangerously into the depths of a world neither of them knew existed.
info
Movie: The Crash ( 2017 )
In the not-so-distant future, a team of white-collar criminals are enlisted by the Federal government to thwart a cyber-attack that threatens to bankrupt the United States of America.
info
Movie: American Nightmares ( 2018 )
Mr. Malevolent hacks into two millennials' computers and forces them to watch horror tales.
info
Movie: Nicotina ( 2003 )
A real-time dark comedy about a science geek who tangles with a clutch of Russian gangsters after he delivers them the wrong computer disk.
info
TV Show: Cybergeddon ( 2012 )
Cybergeddon follows the story of agent Chloe Jocelyn as she investigates a slew of seemingly unrelated cyber attacks with fellow agent Frank Parker and incarcerated master hacker Chase Rabbit Rosen. Chloe and her team must crack the worldwide cybercrime ring led by Gustov Dobreff before it is too late. In a world where everyone is connected, everyone is at risk.
info
Movie: Terminal Error ( 2002 )
A disgruntled computer hacker, uses the rebellious son of a major software company president, to create Havoc.
info
Movie: Billion Dollar Heist ( 2023 )
The story of one of the most daring cyber heists of all time, the Bangladeshi Central Bank theft. Tracing the origins of cyber-crime, from basic turn of the millennium credit card fraud by individuals to global criminal organizations.
info
Movie: Genius on Hold ( 2013 )
The story of Walter L. Shaw, a telecommunications genius, and his son Walter T. Shaw, a ruthless jewel thief, is a metaphor and a symbol for its time - for the twentieth century and for today.
info
Movie: Suck Me Shakespeer 2 ( 2015 )
Mr. Müller and his class are taking a school trip to Thailand to strengthen the reputation of their school.
info
Movie: Webmaster ( 1998 )
JB is the city's best attacker, who lives a carefully organized life in and outside the network. After hacking into the most powerful of all domains the Stoiser domain, JB thought that the cruel Stoiser would kill him. But instead he gave him a job - as a webmaster.
info
Movie: Ashley Madison: Sex, Lies & Cyber Attacks ( 2016 )
In July 2015, Ashley Madison, 'The Original Extramarital Affairs Site', was hacked. Pandemonium ensued when the names, details, and fetishes of its members were revealed to the world. Families were torn apart, and some people were even driven to suicide. But the leak also uncovered the true sprawl of the Ashley Madison empire, the fragile and fraudulent foundations upon which it was built.
info
Movie: Hacking Democracy ( 2006 )
The film the voting machine corporations don't want you to see. HACKING DEMOCRACY follows investigator/grandmother, Bev Harris, and her citizen-activists as they set out to uncover how America counts its votes. Proving the votes can be stolen without a trace culminates in a duel between the Diebold corporation's voting machines and a computer hacker - with America's democracy at stake.
info
Movie: Coin Heist ( 2017 )
United by dire circumstances, four unlikely allies from a Philadelphia prep school - the hacker, the slacker, the athlete, and the perfect student - band together to attempt the impossible: steal from the U.S. Mint.
info
Movie: Hot Millions ( 1969 )
Paroled London fraudster Marcus Pendleton poses as a computer specialist in order to work for an insurance company that entirely relies on its corporate server.
info
Movie: Frauds ( 1993 )
Story of the ways in which insurance investigator Roland Copping interferes in and manipulates the lives of others with outrageous games and gimmicks. Eventually he becomes involved in an escalating vendetta with a couple who make an unusual insurance claim.
info
Movie: King of Crime ( 2018 )
When the biggest player in British cyber-crime faces destruction by some deadly serious Islamic extremists, he knows it's time to settle old scores and play the biggest scam of his life - before bailing out fast.
info
Movie: Bad Johnson ( 2014 )
A charismatic womanizer receives his comeuppance after his penis mysteriously leaves his body and takes human form.
info
Movie: Hacker's Game Redux ( 2015 )
A love story between two hackers, Soyan and Loise. Like many other hackers, Soyan works for a company he previously hacked.
info
Movie: Boy 7 ( 2015 )
When Sam regains consciousness in the middle of a crowded subway, he doesn't know how he got there, where he came from, or even his own name. He frantically searches for his identity using the contents of his backpack. Slowly but surely he realizes that his life is in great danger.
info
Movie: Chatroom ( 2010 )
5 teenagers are introduced to each other in a chatroom called "Chelsea Teens!", all with different personalities. But when one shows its darker side, it threatens the life of the others.
info
Movie: Kim Dotcom: Caught in the Web ( 2017 )
The story of the most wanted man online
info
Movie: No Contest ( 1995 )
Andrew Dice Clay takes over a hotel during a beauty pageant taking several pageant contestants hostage since one of them is a rich senator's daughter.
info
Movie: Deep Web XXX ( 2018 )
A collection of disturbing, sick, morbid and unusual clips from the world wide web.
info
Movie: Shivaay ( 2016 )
A skilled mountaineer races against time to rescue his mute daughter from the clutches of human traffickers in Bulgaria.
info
Movie: Kahaani ( 2012 )
A pregnant woman's search for her missing husband takes her from London to Kolkata, but everyone she questions denies having ever met him.
info
Movie: Storm Watch ( 2002 )
America's best player is being pulled in to the ultimate cyber-terror. The game's mastermind has stolen his identity, put him on the FBI's Most Wanted List, and is blackmailing him to take a part in a real twisted plan of world destruction. With just hours left, can the code be broken to save the world from total annihilation?
info
Movie: Hackers Wanted ( 2009 )
This film both follows the hacking adventures of famous hacker Adrian Lamo, and uses them as a microcosm for the macrocosm of struggles faced by emerging trends of thought - from the criminal to the philosophical.
info
Movie: The Sense of Wonder ( 2015 )
Louise, a widow with two children, almost crushes a stranger with her car. She takes care of him, even if he's not really wounded. It turns out that he has mental disorders and that they can help each other much more than they thought.
info
Movie: Submit the Documentary: The Virtual Reality of Cyberbullying ( 2013 )
The way we hurt each other has evolved. Submit the Documentary is an in-depth look into the profound, reality of cyberbullying. Cyberbullying is 24x7x365 and reaches as far as the Internet can carry it. Submit the Documentary is a film that is informative and all too telling of an epidemic confronting our children and their well-being. Submit compassionately tells the stories of children and families who are affected by the harsh reality of cyberbullying and features interviews with educators, experts and law enforcement as they tackle this worldwide issue, while offering solutions to this complicated problem.
info
Movie: The Code ( 2001 )
Finnish-made documentary about GNU/Linux, featuring some of the most influential people of the free software (FOSS) movement.
info
Movie: Kahaani 2 ( 2016 )
A woman with a mysterious past is charged with kidnapping and murder.
info
Movie: In ascolto ( 2006 )
Estranged by the degree of corporate influence within the largest U.S. listening station in the world, an aging NSA officer defects and mounts a clandestine counter-listening station high in the Italian alps.
info
Movie: The Hacker ( 2015 )
Success in making computer program 'like a date' that create by billy and Adam did not make Adam feels satisfied so he decided to create his own program. However, after the program success, that program stole by his girlfriend; who actually is a daughter of his lecture who has an original idea of the program. Adam loses everything such as money, the program and girlfriend. After his hardtimeship Adam ask billy and Bryan to help him to get the program back.
info
Movie: Die Hard 4.0: Hacker Underworld ( 2007 )
Mitnick talks about his activities as a professional hacker. Now he is a security consultant to companies battling hackers like him.
info
Movie: H0us3 ( 2019 )
In a peaceful house resort set in Picos de Europa National Park close of the town of Potes, Cantabria (north to Spain), a group of friends from their university times meet to pass a full weekend together after several years.
info
Movie: Reboot ( 2012 )
A young female hacker awakens from a traumatic event that she scarcely remembers, and an iPhone glued to her hand. On the phone, a countdown is ticking away to zero. What happens at zero? Who is she, and why has she become an extension of the device? As the minutes tick away, our heroine must race against time to put the pieces together before the mysterious, pending zero-hour strikes.
info
TV Show: Secrets of the Scammers ( 2015 )
From online swindles to phone scams, Alexis Conran discovers how fraudsters manage to con people out of their hard-earned cash. With the help of fraud experts, he explains how to avoid falling victim to the scammers and their ever-evolving tactics.
info
Movie: Hackers Are People Too ( 2008 )
Hackers do laundry. Hackers like movies. Hackers are people and could be your neighbors, your brother, your friends. Presenting a portrait of the hacking community, created by the community themselves, this film breaks down negative stereotypes by letting hackers show you that they are really no different from anyone else. Delving into areas such as the way hackers think, what is hacking, hackers in the media, and women in the security/hacking field, this film will have you questioning your ideas about what a 'hacker' really is.
info
Movie: Password ( 2019 )
A conscientious police officer trying to track down a criminal who is hell bent on hacking into vital information and destroying human lives, finds himself in a web of violence, deceit and double crossing, as well as shades of pathos in the life of criminals. To destroy this web of cyber crime, he forms a team with ethical hackers.
info
TV Show: Hacking Robot ( 2016 )
Hacking Robot is a live aftershow for Mr. Robot. The show will introduce you to the creator and executive producer of the series along with the stars to find out what made Mr. Robot a success and what to expect for Mr. Robot 2.0.
info
Movie: Deep Web ( 2017 )
Carlos, and his almighty college friends stumble upon a mysterious chat room found in the deep, dark corners of the web. After strange occurrences happen after a man on the chat, threatens to kill them, they soon realize.. - he wasn't kidding.
info
Movie: Shill ( 2015 )
The money, the mouth, the muscle. The jaw dropping story of cyber crimes most audacious heist and the three men who went on a meticulously planned spending spree to hide £100M from the law. Based on actual events.
info
Movie: Revolution OS ( 2002 )
While Microsoft may be the biggest software company in the world, not every computer user is a fan of their products, or their way of doing business. While Microsoft's Windows became the most widely used operating system for personal computers in the world, many experts took issue with Microsoft's strict policies regarding licensing, ownership, distribution, and alteration of their software. The objections of many high-profile technology experts, most notably Richard Stallman, led to what has become known as "the Open Source Movement," which is centered on the belief that computer software should be free both in the economic and intellectual senses of the word. Eventually, one of Stallman's admirers, Linus Torvalds, created a new operating system called Linux, a freely distributed software which many programmers consider to be markedly superior to Windows. Revolution OS is a documentary that examines the genesis of the Open Source Movement, and explores and explains the technical and intellectual issues involved in a manner understandable to computer aficionados and non-techheads alike.
info
Movie: Bedwin Hacker ( 2003 )
From a remote mountain village in Tunisia, Kalt, a female hacker hijacks the airwaves in Northern Africa and France to broadcast political messages. When Julia, a French Intelligence officer, gets on the case, she flies in from France to infiltrate the hacker world and find out who is behind the interruptions. Things quickly turn into a cat-and-mouse game as Kalt and Julia play each other to get what they want.
info
TV Show: Chakravyuh - An Inspector Virkar Crime Thriller ( 2021 )
Virkar is an angry, young cop who seeks to bring justice to whoever he can. When young college students are ruthlessly murdered, Inspector Virkar gets called in. In his investigation, Virkar finds out that there is a whole system of hackers and anonymous blackmailers operating on the internet using social media sites as their hunting ground. With the help of one ethical hacker, a student counsellor and his team, Virkar try to solve the case of the outrageous murders. Will inspector Virkar be able to solve the cases in time? Can he find the answers he is looking for on the dark web? Who is behind the murders and what was their motive?
info
Movie: Kiddo the Hacker ( 2018 )
Umut, a super clever little boy, decides to find his mother before his tenth birthday. He discovers traces of his mother thanks to his intensive computer skills and finds a way to go to Istanbul. He meets a girl named Özge by a strange coincidence and the two get into a really big trouble. As Umut finds himself in a breathtaking rush, he tries not only to trace his mother, but also to elude the men chasing down himself and Özge.
info
TV Show: FACE: Cyber Crime Special Investigation Unit ( 2017 )
Yuki Rin's parents passed away and she has been living with her older brother Koichiro. Koichiro was an IT engineer who worked for the government until he was recruited by a vicious cyber crime group one year ago. That was when Rin's ordinary, happy life crumbled. She miraculously survived despite taking her brother's bullet. Then she was brought into FACE, a cyber crime special investigation unit which the Cabinet created in secret, on the strength of her profiling ability by Minegishi Shugoro. Believing in Minegishi, Rin joins the unit's members to combat cyber crime which can destabilize the nation.
info
Movie: In the Realm of the Hackers ( 2003 )
In the late 1980s two Melbourne teenage computer hackers known as Electron and Phoenix stole a restricted computer security list and used it to break into some of the world's most classified and supposedly secure computer systems. So fast and widespread was the attack no-one could work out how it had happened, until one of the hackers called the New York Times to brag about it. Ten years after their arrest, this dramatized documentary reveals not only how they did it but why, taking us headlong into the clandestine, risky but intoxicating world of the computer underground.
info
Movie: Chokepoint ( 2014 )
'Der Spiegel' journalist Marcel Rosenbach visits the German satellite communications company Stellar PCS near Cologne. He presents the engineers classified documents that describe 'Treasure Map', a top secret NSA program. Stellar PCS provides internet access to remote portions of the globe via satellite, and the documents show that the company and their customers have been penetrated by the U.S. National Security Agency and the British spy agency GCHQ. The head engineer says that intelligence services could use this data to shut down the internet in entire African countries that are provided access via the satellite connections. This short documentary was published online together with articles by 'The Intercept' and 'Der Spiegel' on September 14th in 2014.
info
Movie: Secret History of Hacking ( 2001 )
A history of hacking focusing on Captain Crunch, Steve Wozniak and Kevin Mitnick.
info
Movie: Mickey Virus ( 2013 )
MICKEY VIRUS is a comic thriller set in Delhi, India. When Delhi Police comes across a case revolving around hacking, they begin there search to find a computer expert who can help them crack this case. The head of the police team ACP Siddhanth (Manish Choudhary), stumbles across Mickey Arora (Manish Paul), a lazy but street smart hacker who can actually help them solve the case. Mickey runs a grocery store in day time and creates virus's for anti virus companies in the night. He is also head over heals in love with a character he has created in his game called "Kung Fu Chameli" and will do anything to get out of hard work to do whatever he wants to do. Little does he know that ACP Siddhanth accompanied by Inspector Bhalla (Varun Badola) is a tough nut to crack...
info
TV Show: Tiger Team ( 2007 )
In the military the elite forces used to test defenses are known as tiger teams. The show follows a civilian tiger team composed of Chris Nickerson, Luke McOmie and Ryan Jones, who are hired to infiltrate organizations with the objective of testing their weaknesses to electronic, psychological, tactical, and physical threats. Attacks executed on organizations in this television show include social engineering, wired and wireless hacking, and physically breaking into buildings.
info
Movie: Irumbu Thirai ( 2018 )
An Army Major tries to find a hacker when his money goes missing from his account.
info
Movie: Freedom Downtime ( 2001 )
Computer hackers are being portrayed as the newest brand of terrorists. This is a story of a hacker named Kevin Mitnick, imprisoned without bail for nearly five years. Freedom Downtime tries to uncover the reasons why the authorities are so scared of Mitnick as well as define what exactly he did. Surprisingly, no real evidence is ever presented by the authorities to back up the sensationalist claims in mass media. But when a Hollywood studio decides to make a movie about Mitnick's life through the eyes of one of his accusers, hackers turn to activism to get their message out. Through interviews with relatives, friends, lawyers, and experts in the computer and civil liberties arena, a picture of a great injustice becomes apparent. A cross-country journey uncovers some realities of the hacker culture as well as the sobering fact that so many technically young adept people are being imprisoned.
info
Movie: Scene Queen ( 2015 )
SCENE QUEEN is a movie about teen girls who get into fights and post them on the internet. Will our heroine stop them, or become their victim?
info
Movie: On the Mountains ( 2018 )
An outwardly prosperous Czech family decided to spend a weekend in the mountains. But, as it turned out, these plans became known not only to them. Along the way, their teenage son was repeatedly subjected to violence by only one well-known blackmailer. Which made the boy ask his parents under various pretexts to stop, in order to retire, to take several photos for him.
info
Movie: Hackers: Wizards of the Electronic Age ( 1984 )
All interviews in this documentary were shot over a long weekend at a 1984 hacker conference by the Whole Earth Catalog editors Stewart Brand and Kevin Kelley in Sausalito, California. The event itself (the hacker conference) was inspired by Steven Levy's classic book "Hackers - Heroes of the Computer Revolution".
info
Movie: Hackers in Wonderland ( 2000 )
Hackers in Wonderland is a 2000 documentary film, produced and directed by Russell Barnes, about hackers in the United Kingdom.
info
info
Movie: Hide and Seek ( 1984 )
Before WAR GAMES there was Canada's HIDE & SEEK. Watch this and you will see how close the movies are. High school computer wiz kid's program accidently hooks into the main frame computer of a nuclear power plant and nearly causes a melt down!
info
info
Movie: Neulovimye ( 2015 )