The Royal We 2025 - Movies (Mar 2nd)
Uppercut 2025 - Movies (Mar 2nd)
I Want to Violently Crash into the Windshield of Love 2024 - Movies (Mar 2nd)
Sebastian 2024 - Movies (Oct 2nd)
Hounds of War 2024 - Movies (Oct 2nd)
A Quiet Place Day One 2024 - Movies (Oct 2nd)
Cabrini 2024 - Movies (Oct 2nd)
Fight or Flight 2025 - Movies (Feb 28th)
My Hero Academia Youre Next 2024 - Movies (Feb 28th)
Den of Thieves 2 Pantera 2025 - Movies (Feb 28th)
Marked Men Rule + Shaw 2025 - Movies (Feb 28th)
The Golden Voice 2025 - Movies (Feb 28th)
Raduaa Returns 2024 - Movies (Feb 28th)
Cold Wallet 2024 - Movies (Feb 28th)
Bookworm 2024 - Movies (Feb 28th)
The Thinking Game 2024 - Movies (Feb 28th)
Gladiator II 2024 - Movies (Feb 28th)
Finding Tony 2024 - Movies (Feb 27th)
Captain America Brave New World 2025 - Movies (Feb 27th)
Kraven the Hunter 2024 - Movies (Feb 27th)
Red One 2024 - Movies (Feb 25th)
Prosecuting Evil with Kelly Siegler - (Mar 2nd)
Love Your Weekend with Alan Titchmarsh - (Mar 2nd)
Call the Midwife - (Mar 2nd)
The Great Pottery Throw Down - (Mar 2nd)
Screwballs - (Mar 2nd)
Dancing on Ice - (Mar 2nd)
Saturday Kitchen Live - (Mar 2nd)
Saturday Kitchen Best Bites - (Mar 2nd)
The Only Way Is Essex - (Mar 2nd)
Lidias Kitchen - (Mar 2nd)
48 Hours To Buy - (Mar 2nd)
Alex Witt Reports - (Mar 2nd)
48 Hours - (Mar 2nd)
Inside with Jen Psaki - (Mar 2nd)
The Tommy Tiernan Show - (Mar 2nd)
SkyMed - (Mar 2nd)
Forensics- The Real CSI - (Mar 2nd)
The Kelly Clarkson Show - (Mar 2nd)
The Late Late Show - (Mar 2nd)
SAKAMOTO DAYS - (Mar 2nd)
Stuxnet was malware that flashed around the world via Microsoft computers, triggering arbitrary BSODs and random reboots. In 2010 cybersecurity firms captured and began analyzing the worm. Stuxnet (name derived from merging two random lines in the code) had digital certificates. Digital certificates require biometrics (human identification) and pass codes. But Stuxnet could attain access without that. It ominously coded multiple zero days exploit. Symantec's investigators see maybe one a year, looking at thousands of lines of code. Stuxnet had four. As we learn in the documentary, it also had undoubtedly stolen product identity codes for PLCs (programmable logic controls) from Siemens. Where were these PLCs? Installed on centrifuges at Natanz, an Iranian nuclear site. And the game's afoot. Whose program? To what purpose? Gibney does an excellent job of gearing us up for the technowizardry with hunter/seekers Eric Chien and Liam O'Munchu (Symantec) as geek guides to the nation-state business of cyber espionage and, as General Michael Hayden, former CIA and NSA director calls it, the "hideously classified" world of cyber weaponry. We meet the journalists, bench players and sideline government officialdom who were not a part of, or even aware of, Stuxnet. The documentary is a mild, entertaining but serious call to start a dialogue about cyber weapons and deployment of same. How do countries begin to arbitrate treaties regarding use of life-threatening coding? Filmed well, the effects shrouding the unnamed informant are great viewing. The on-camera personnel are well-chosen, entertaining and as informative as they're able to be. There are enough tech buzzwords to keep nontechs like me interested, and enough about how dangerous coding with a mission to DISRUPT DEGRADE DESTROY can be for those of us who count on critical infrastructure systems.
In 1981, Wau Holland and other hackers established the Hamburg based Chaos Computer Club (CCC). The idiosyncratic freethinkers were inspired by Californian technology visionaries and committed themselves to hacker ethics. All information must be free. Use public data, protect private data. But not everyone followed the rules. Computer technology was still in its infancy and the emerging Internet became a projection screen for social utopias. What has become of them? The story of the German hackers, told by the protagonists themselves in a montage of found video and audio material.
Hacks is a 73 minute European documentary exploring what nature of "Hacking" is in a social context. In HACKS, the Austrian multimedia artist Christine Bader examines who is the computer hacker and what moves him or her. Is the hacker a Robin Hood in cyber space or an anarchistic agitator? Bader speaks with Dutch, German and American communication freaks who are working with various kinds of network issues, like making the Internet accessible to individual persons (Felipe Rodriguez, founder of Internet provider Xs4all), creating a meeting place in cyber space, or designing an ultramodern communication network on a ‘multimedia art ship‘. ‘Hackers are not encumbered by technical, financial or organizational problems, they just want to do things‘, Rodriguez thinks. That the technological means ‘just to do things‘ are now freely available is demonstrated by the numerous computer initiatives that whiz past in HACKS.
Everyone knows something like this is happening. But this is the only experiment to fully demonstrate what excessive openness on the internet means. The filmmaking couple hired youthful-looking (but over 18) actresses to pretend to be prepubescent girls and communicate with strangers who approached them based on their fake accounts. They attracted dozens of men in the first ten days, then hundreds, and finally thousands...
In The Realm of the Hackers is a documentary about the prominent hacker community, centered in Melbourne, Australia in the late 80's to early 1990. The storyline is centered around the Australian teenagers going by the hacker names "Electron" and "Phoenix", who were members of an elite computer hacking group called The Realm and hacked into some of the most secure computer networks in the world, including those of the US Naval Research Laboratory, Lawrence Livermore National Laboratory, a government lab charged with the security of the US nuclear stockpile, and NASA.
For years now, the Kremlin has been systematically trying to use well-trained hackers for its own benefit. In exchange for freedom and protection, they do the dirty work of the state, interfering in other countries’ elections and penetrating government networks. Just how dangerous is Russia’s cyber army?
Italy’s biggest political party, the Five Star Movement, promotes direct democracy through internet voting. Five Star Movement uses a digital platform named Rousseau, that allows Movement’s members to vote online and express their opinion on various issues. But who governs this data?
Does privacy still exist in 2019? In less than a generation, the internet has become a mass surveillance machine based on one simple mindset: If it's free, you're the product. Our information is captured, stored and made accessible to corporations and governments across the world. To the hacker community, Big Brother is real and only a technological battle can defeat him.
Cyberspace is more insecure than ever as hackers exploit human error and technical vulnerability to hold it to ransom for their personal data. Companies, public bodies, schools and individuals have all become victims of cyber attacks. In this revealing documentary, victims tell how internet criminals have destroyed their lives
Documentary film investigating allegations of election fraud during the 2004 U.S. presidential election. Electronic voting machines count approximately 90% of America's votes in county, state and federal elections. The technology is also increasingly being used across the world, including in Canada, the United Kingdom, Europe and Latin America. The film uncovers incendiary evidence from the trash cans of Texas to the ballot boxes of Ohio, exposing secrecy, votes in the trash, hackable software and election officials rigging the presidential recount.Ultimately proving our votes can be stolen without a trace "Hacking Democracy" culminates in the famous 'Hursti Hack'; a duel between the Diebold voting machines and a computer hacker from Finland - with America's democracy at stake.