The film the voting machine corporations don't want you to see. HACKING DEMOCRACY follows investigator/grandmother, Bev Harris, and her citizen-activists as they set out to uncover how ... See full summary »
While Microsoft may be the biggest software company in the world, not every computer user is a fan of their products, or their way of doing business. While Microsoft's Windows became the ... See full summary »
Richard M. Stallman,
Through eight episodes, director Jason Scott covers the 25 year history of the Dial-Up Bulletin Board System, a modem-connected computer system that let others connect to a computer over a ... See full synopsis »
Jason Scott Sadofsky
The movie's plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his inheritance in a flat and a ... See full summary »
DEFCON is the world's largest hacking conference, held in Las Vegas, Nevada. In 2012 it was held for the 20th time. The conference has strict no-filming policies, but for DEFCON 20, a ... See full summary »
CODE 2600 documents the Info-Tech Age, told by the events and people who helped build and manipulate it. It explores the impact this new connectivity has on our ability to remain human while maintaining our personal privacy and security.
Computer hackers are being portrayed as the newest brand of terrorists. This is a story of a hacker named Kevin Mitnick, imprisoned without bail for nearly five years. Freedom Downtime tries to uncover the reasons why the authorities are so scared of Mitnick as well as define what exactly he did. Surprisingly, no real evidence is ever presented by the authorities to back up the sensationalist claims in mass media. But when a Hollywood studio decides to make a movie about Mitnick's life through the eyes of one of his accusers, hackers turn to activism to get their message out. Through interviews with relatives, friends, lawyers, and experts in the computer and civil liberties arena, a picture of a great injustice becomes apparent. A cross-country journey uncovers some realities of the hacker culture as well as the sobering fact that so many technically-adept young people are being imprisoned.
Editing was done on a 333MHz Macintosh G3 with about 500GB of disk space running EditDV, which was serious power at the time. See more »
...We knew it wouldn't work. We always knew it wouldn't work. But that's what hacking has always been about since the beginning - doing things you knew wouldn't just because you had to.
See more »
as others have, i shall preface this. when i was young, i was what you would call a hacker. now im in network security, and deployment. i am intricately linked with the concept of hackers, and their real world conterparts, good and bad.
now, this move, well, it's just good to watch. if your a hacker, or a geeeek, you probably already know about kevins harrowing experience. if not, buckle up, cause your eyes are about to be pried open to the reality of the justice system, and it's total lack of knowlege about anything with a cpu. you will be struck by the concept that there is indeed a secondary culture growing up right around you. that your neighbors, friends, and even your boss, could have a completely different life from that you know. your children could. yes, thats scary, but whats more frightening, is that thweir life could be ruined, the moment someone decides they know too much, and could POTENTIALLY pose a threat. that was kevins true downfall. he potentially could have posed a threat. something the movie missed is that thousands of people are better hackers then kevin, and they roam the channels freely. mostly it is because they are lucky, and stay under the radar.
as for those of you who ARE already aware of the shafting mitnik, and geeks in general get from the justice system, stick with it, you might see someone you know, and it's a rare chance to see what goes on at the conventions you should get your ass out to...
17 of 18 people found this review helpful.
Was this review helpful to you?
| Report this