Search results
Jump to navigation
Jump to search
- ...ng as a professor, discovers a secret society of masked [[Hacker (computer security)|hackers]] on campus; they seemingly kill his star pupil. Hobson attempts t [[Category:1984 films]] ...2 KB (298 words) - 04:06, 19 January 2025
- ...de]], the sequence of data generated when pressing or releasing a key on a computer keyboard, however, in legacy documents it may still refer to [[scancode]]. ...], an Eastman Kodak's a bar coding placed at regular intervals on negative films ...526 bytes (78 words) - 19:27, 26 January 2024
- ...the film explores the origins and nature of hackers and [[hacker (computer security)|hacking]] by following the adventures of [[Adrian Lamo]], and contrasting ...ic eye by being hacked out of the hands of people who, after making a film about the free flow of information, tried to lock away that information forever. ...4 KB (432 words) - 08:53, 11 September 2023
- Bozzo wrote, directed, and edited three short films. ''For Which It Stands'' (1990) was screened in the [[Sundance Film Festiva Bozzo has finished two feature documentaries, one on [[Hacker (computer security)|hackers]] ([[Hackers Wanted]])<ref>[https://web.archive.org/web/2007101806 ...2 KB (265 words) - 23:33, 13 December 2024
- ===Films=== *[[Core 2 Duo]], a computer processor from manufacturer Intel ...3 KB (362 words) - 06:25, 24 April 2025
- ...k]], directed by [[Eric Corley|Emmanuel Goldstein]] and produced by [[2600 Films]]. ...but nonetheless was incarcerated for five years without [[bail]] in a high-security facility. Freedom Downtime also touches on what happened to other hackers a ...5 KB (768 words) - 23:34, 7 June 2025
- ...rman [[Drama (film and television)|drama]] [[thriller film]] about young [[Security hacker|hacker]] [[Karl Koch (hacker)|Karl Koch]], who died on 23 May 1989, At a meeting of the [[Chaos Computer Club]], Karl gets to know the student David. David and Karl are able to hac ...6 KB (799 words) - 12:11, 7 March 2025
- ...ter in the ''[[This Is England (film series)|This Is England]]'' series of films * [[Gadget (computer science)]], a subset of a problem instance ...2 KB (300 words) - 06:10, 10 March 2025
- ...on of the [[bulletin board system]] (BBS) filmed by [[Software archaeology|computer historian]] [[Jason Scott]] of [[textfiles.com]].<ref>{{cite magazine|url=h # [[FidoNet]]: details the largest volunteer-run computer network in history ...8 KB (1,016 words) - 14:29, 17 May 2025
- {{Computer hacking}} ...18, 1986, by [[Loyd Blankenship]], a [[Hacker (computer security)|computer security hacker]] who went by the [[Pseudonym|handle]] The Mentor, and belonged to t ...6 KB (840 words) - 03:27, 24 May 2025
- ...ill as the protagonist strikes the computer monitor off his desk using his computer keyboard]] ...ted virally online since 1997. The video became a cultural embodiment of [[computer rage]], and is the subject of several parodies and ad campaigns. ...5 KB (794 words) - 10:25, 22 June 2025
- ...center]], in an organization, a centralized unit that deals with computer security issues * [[Separation of concerns]], a program design principle in computer science and software engineering ...4 KB (483 words) - 20:25, 20 April 2025
- ===Films=== ...t in the ''Ruin'' extension of the video game ''[[Five Nights at Freddy's: Security Breach]]'' and title of the derivative third short story in [[List of Five ...3 KB (389 words) - 17:51, 18 June 2025
- ===Films=== * [[BREACH]], a security exploit against the HTTPS protocol ...4 KB (512 words) - 08:52, 25 May 2025
- ...sed by [[20th Century Fox]] about a deceased serial killer with artificial computer intelligence. ...emonstrate a handheld scanner. He copies a page of her address book into a computer. On a rainy night while heading home, Karl hurriedly drives into an oncomin ...10 KB (1,335 words) - 15:37, 27 June 2025
- ...uman trafficking|European prostitution network]]. Despite the considerable security escort, Nexhep's henchmen still manage to set up an ambush. ...ape with Nexhep. They take refuge in the warehouse that is being robbed of computer equipment by the group of criminals. While facing off against the would-be ...4 KB (598 words) - 16:19, 18 June 2025
- ...atalog/MovieDetails/61042?cxt=filmography|website=[[AFI Catalog of Feature Films]]|access-date=27 November 2017}}</ref> ...tells the story of a computer engineering prodigy who matches wits with a security consultant who has taken over his stepsister's school that he used to go to ...9 KB (1,254 words) - 21:38, 24 May 2025
- ...living on one rare vacuum tube, a WFC-11-12-55, due to being infected by a computer virus. Wittgenstein was also aware of Mack's plot and attempted to alert Ro ...transistors were invented. By the start of the film, he is infected with a computer virus, causing him to function improperly. ...10 KB (1,468 words) - 17:09, 1 July 2025
- Relations to other films, like a scene of ice-made [[AT-ST]]'s, mostly resembling the ones from ''[[ The Snowman cannot stop thinking about Santa and his wonderful workshop. It seems that Santa has a marvelous home, ...9 KB (1,306 words) - 05:49, 29 April 2025
- {{About|the 1981 film|other uses|Looker (disambiguation)}} ...m to create [[3D computer graphics|three-dimensional]] (3D) shading with a computer,<ref>{{cite web|url=https://www.filmsite.org/visualeffects11.html|title=Vis ...12 KB (1,781 words) - 00:49, 4 May 2025