Genius hacker Connor discovers Cicada 3301, an online treasure hunt that could be a recruiting tool for a secret society. Soon Conner, art-expert friend Avi, and secretive librarian Gwen are dashing from graffiti sites to ancient libraries to uncover real-world clues. But they must outrun aggressive NSA agents, also hot on the trail of Cicada, who want the glory for themselves.
A documentary film, created with a grant from Gordon College, telling the story of Ken Olsen, founder of Digital Equipment Corporation in 1957. Olsen revolutionized the electronics industry by making computers smaller and more accessible to both businesses and individuals. In 1986, Fortune magazine selected Olsen as “America’s Most Successful Entrepreneur” and featured him on its cover.
Aiming to defeat the Man of Steel, wealthy executive Ross Webster hires bumbling but brilliant Gus Gorman to develop synthetic kryptonite, which yields some unexpected psychological effects. Between rekindling romance with his high school sweetheart and saving himself, Superman must contend with a powerful supercomputer.
A computer programmer's dream job at a hot Portland-based firm turns nightmarish when he discovers his boss has a secret and ruthless means of dispatching anti-trust problems.
Two brothers, Jake and Max work in product development at the Kitty Carnival Amusement company. The two office workers do not work well together and are sceptical at the new Microsoft Workgroups for Windows operating systems they are being forced to use, but with a looming deadline and some help from Bill Gates, they soon learn to love it, and go on to start their own successful company.
Terry works for a bank, and uses computers to communicate with clients all over the world. One day, she gets a strange coded message from an unknown source. After decoding the message, Terry becomes embroiled in an espionage ring. People are killed, and Terry is chased. Throughout, she remains in contact with this mysterious person, who needs Terry's help save his life.
Alma is a scientist coerced into participating in an extraordinary study in order to obtain research funds for her work. For three weeks, she has to live with a humanoid robot tailored to her character and needs, whose artificial intelligence is designed to be the perfect life partner for her. Enter Tom, a machine in human form in a class of its own, created solely to make her happy.
Ray Breslin manages an elite team of security specialists trained in the art of breaking people out of the world's most impenetrable prisons. When his most trusted operative, Shu Ren, is kidnapped and disappears inside the most elaborate prison ever built, Ray must track him down with the help of some of his former friends.
A family of four isolating against a pandemic virus that spreads through the internet and robs you of your ability to perceive reality - often violently - begins to unravel when they suspect one or all of them might be infected.
Two thugs are hired by an secret person to assist a hacker for a quick job of hacking. but as times passes, the hacker shows that he is aware of their intentions and as it gets harder and harder for them to get along, secrets about the operation get revealed.
John McClane is back and badder than ever, and this time he calls on the services of a young hacker in his bid to stop a ring of Internet terrorists intent on taking control of America's computer infrastructure.
A disgruntled former employee hijacks the Seabourn Legend cruise liner. Set on a fixed course, without any means of communication and at the mercy of the hijacker, it's up to the one cop on vacation, and his soon to be fiancé (hopefully) Annie, to regain control of it before it kills the passengers and causes an environmental disaster. Insurmountable and daunting tasks awaits them on their perilous journey throughout the ship trying to fend off the hijacker and save the passengers.
Angela Bennett is a freelance computer systems analyst who tracks down software viruses. At night she hooks up to the internet and chats to others 'surfing the net'. While de-bugging a new high-tech game for a cyber friend, she comes across a top secret program and becomes the target of a mysterious organization who will stop at nothing to erase her identity and her existence, in order to protect the project.
The gift of a child turns out to be a superintelligent computer that has escaped from security facilities becoming the most wanted child of deep Spain.
The life of a young computer systems analyst is thrown into turmoil after arriving in Istanbul to start a new job. She soon finds her passport missing, her credit cards useless, her bank account empty and her identity stolen. As the story progresses we find people and events may not be what they seem.
The larger-than-life story of Kim Dotcom, the 'most wanted man online', is extraordinary enough, but the battle between Dotcom and the US Government and entertainment industry—being fought in New Zealand—is one that goes to the heart of ownership, privacy and piracy in the digital age.
Highly intelligent hacker Lillian joins a cybersecurity company in order to gain access to the bank where her father used to work. She discovers nothing is what it seems and it turns out she isn’t the only one pretending to be someone else. But where do we draw the line between activism and terrorism?
Popular teen video-bloggers became digital persons after being «hacked» by evil computer virus. They need to find their way back home from this «digital trap».
A domestic house cat named Francis investigates the grisly feline murders taking place in his new neighborhood.
An edgy action thriller set in Las Vegas during a terrorist attack. A genius computer loner takes control of the city and the attack as he fights with his fits of overwhelming depression and obsessions with love and death.