A dramatic thriller based on real events that reveals the quest to expose the deceptions and corruptions of power that turned an Internet upstart into the 21st century's most fiercely debated organization.
Carice van Houten
CODE 2600 documents the Info-Tech Age, told by the events and people who helped build and manipulate it. It explores the impact this new connectivity has on our ability to remain human while maintaining our personal privacy and security.
While Microsoft may be the biggest software company in the world, not every computer user is a fan of their products, or their way of doing business. While Microsoft's Windows became the ... See full summary »
Richard M. Stallman,
Teen Josie tries to make sense of a frightening world in which a sleep condition blurs her dreams into waking life, and comes under the sway of her sister Samantha, whose dark web of secrets she must unravel.
Julian Assange is one of the most significant figures of the twenty first century. But before he was famous, before WikiLeaks, before the internet even existed, he was a teenage computer hacker in Melbourne. This is his story. In 1989, known as 'Mendax', Assange and two friends formed a group called the 'International Subversives'. Using early home computers and defining themselves as 'white hat hackers' - those who look but don't steal - they broke into some of the world's most powerful and secretive organisations. They were young, brilliant, and in the eyes of the US Government, a major threat to national security. At the urging of the FBI, the Australian Federal Police set up a special taskforce to catch them. But at a time when most Australian police had never seen a computer, let alone used one, they had to figure out just where to begin. Police ingenuity and old-fashioned detective work are pitted against nimble, highly skilled young men in this new crime frontier. What follows,... Written by
The "reel to reel" machine shown to be tracing Julian's phone call, is actually a broadcast 1" videotape machine, which were primarily used to record and transmit video in television stations during the 80's and 90's. See more »
Whenever modems are used to dial into a system, the sounds the modem makes when connecting to other systems, known as the carrier detect, is for a 56.6k modem, which weren't available until 1998. Modems more likely used at the time were most likely 300 - 2400 baud, which didn't feature the screeching sound of later modems. See more »
close to truth, excellent biography movie and no matter how low the budget for the movie was the acting was so strong that after first 15 minutes you start not to notice the lacking of resources invested in the project. The story itself is inspiring fact that there are much more brilliant causes in this life than creating apple or face-book. He is our Che Guevara of the modern internet era. Love this movie. Unfortunately enough its not a Hollywood production, and will never gain the popularity of our facebook generation, and many mainstream thinkers will simply vote this down. I would classify this on the ranking list above pirates of the silicon valley with respect to screen shot and acting as well as historical value and society importance. Bravo for our fellows Australians that have made such a wonderful movie four digital hero of the century for our digital robin hood.
25 of 29 people found this review helpful.
Was this review helpful to you?