Mad with grief after the death of his Kiowa wife, Talbot awaits death under a tree with her body beside him. She begins to haunt him because he won't burn her. His father, who bought him the wife, thinks her sister might reason with him.
1963, the night before the 18 years old "Birdlace" Eddie and his friends are shipped to Vietnam. They play a dirty game called 'Dogfight': all of them seek a woman for a party, and who ... See full summary »
A recent high school graduate is faced with two options, either go to a business school where his father wants him to go to, or get a full time job. However he decides to defy his father ... See full summary »
Sissy Hankshaw is born with enormous thumbs that help her hitchhiking through the US from a young age. She becomes a model in advertising and her NY agent 'the Countess' sends her to his ... See full summary »
An eccentric and dogmatic inventor sells his house and takes his family to Central America to build an ice factory in the middle of the jungle. Conflicts with his family, a local preacher ... See full summary »
District Attorney Tom Logan is set for higher office, at least until he becomes involved with defence lawyer Laura Kelly and her unpredictable client Chelsea Deardon. It seems the least of ... See full summary »
Dealing with nuclear testing and its long-lasting deadly effects, the story portrays Boy, a young widower living in the desert on a nuclear testing site. Living as a hermit,he waits for the... See full summary »
Martin Bishop is the head of a group of experts who specialise in testing security systems. When he is blackmailed by Government agents into stealing a top secret black box, the team find themselves embroiled in a game of danger and intrigue. After they recover the box, they discover that it has the capability to decode all existing encryption systems around the world, and that the agents who hired them didn't work for the Government after all... Written by
Graeme Roy <email@example.com>
The term commonly used to describe "information phishing" (e.g., trying to get a person to divulge her password) as applied by hackers, is Social Engineering. See more »
In the opening scene set in 1969, the display terminal is clearly showing IBM VGA 40-column text. The IBM VGA standard was not developed until 1987. See more »
But the key meeting took place July 3rd, 1958, when the Air Force brought the space visitor to the White House for an interview with President Eisenhower. And Ike said, "hey look, give us your technology, we'll give you all the cow lips you want."
See more »
After the Universal logo, the first words on screen are A TURNIP CURES ELVIS; the letters then jump onto another line one by one, solving the anagram to form UNIVERSAL PICTURES (and PRESENTS is then added). See more »
Given that this came out in 1992, the level of technology in it is amazing. I watched this twice, the latest in 1999, and still am amazed at some of the things they can do with computers. Of course, some hacking techniques are commonplace and outdated now, but it is still engrossing to see these acts in action.
Watching it a second time gives you a sense of perspective though. Back then, to think that a chip that can control the world was preposterous, but now, with almost everything microchip-controlled, and the ubiquity of the Internet, that thought is not too farfetched.
Talking in movie terms, this ranks as one of the better ones that center around computers. There is some solid acting, and though there are sub-plots within the main plot, they do not grow so much so as to overwhelm the main storyline, which is basically a group of men hired to find the chip-that-controls-everything.
38 of 44 people found this review helpful.
Was this review helpful to you?