Evilspeak

Evilspeak 1981

5.33

Bullied by classmates, a pudgy military-school student fights back by computer with the devil.

1981

Virtual Obsession

Virtual Obsession 1998

3.71

If you were a brilliant young scientist diagnosed with only months to live, what choices would you make? To have faith that you were taken early for a reason and go quietly, or to use cryogenics to hope you could be cured someday in the future, or to download your consciousness into computer memory where you could still continue to interact with the ones you love?

1998

23

23 1998

6.84

The movie's plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson's "Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl's rather criminal acquaintances senses that there is money in computer cracking - he travels to east Berlin and tries to contact the KGB.

1998

The Greening of Whitney Brown

The Greening of Whitney Brown 2011

6.00

Whitney, a spoiled pre-teen from Philadelphia, is forced to move to the country when her parents feel the squeeze of economic hard times. A fish out of water, far from her comfort zone, she befriends an amazing horse, and undertakes a misguided journey back to her old life, only to discover that her family is her home.

2011

Desk Set

Desk Set 1957

7.00

A computer expert tries to prove his electronic brain can replace a television network's research staff.

1957

The Method

The Method 2005

6.68

Seven candidates to a high executive position on a multinational company show up for a selection test in a skyscraper at the financial district. Among them, the most disparate personalities: the winner, the aggressive, the insecure, the critic, the indecisive…

2005

Swiped

Swiped 2018

4.45

James, a college freshman and computer genius, is enlisted by his womanizing roommate, Lance, to code the ultimate hook-up app. But when James discovers that his divorced mother is using the app, unexpected consequences ensue.

2018

Cyber Wars

Cyber Wars 2004

4.86

In the near future in the Asian city-state Sintawan, everyone's identity is recorded in the vast CyberLink. The only way around this is using illegal simulated identity implants (sims). A young bounty hunter who makes her living tracking sims, finds herself the unlikely ally of a police detective who suspects the CyberLink is being perverted for an insidious and deadly purpose.

2004

Behind the Red Door

Behind the Red Door 2003

5.30

Natalie, a gifted New York photographer, has a troubled past reflected in her art. When she struggles to make ends meet in the city, her agent, arranges an assignment in Boston for a considerable sum of money. Unable to turn it down in her dire straits, Natalie takes the job -- only to find that her estranged gay brother, Roy, is the employer. Roy wants to mend their broken past, but must convince her to stay long enough to do so.

2003

Terminal Entry

Terminal Entry 1988

3.80

The USA is attacked by a large group of well organized terrorists who communicate through a computer network via satellite. A bunch of highschool kids has hacked the password and gained access. Believing it's a game they unknowingly cause terror acts all over the country. An anti-terror force fights against the terrorists.

1988

The Olsen Gang Outta Sight

The Olsen Gang Outta Sight 1977

7.00

Egon is starting to be a little forgetful; he forgot the zone number, so he fails to open the strongbox. When he gets out of Vridslose State Prison, Kjeld and Benny have become associates of Yvonne's cousin Georg from America. He is not just some old-fashioned strongbox thief that can't remember like Egon, but a young hip IT criminal, that thinks that everyone else is inferior. However, Egon doesn't take lightly to the Georg's patronizing so he sabotages Georg's computer and ruins his cup. This time Egon's ambitions reaches a new high, when he and his gang break in to the World Bank, and they get away with it. Of course, thanks to Yvonne, they aren't rich very long.

1977

Paper Man

Paper Man 1971

5.80

A prank that starts with a group of college students creating a fictitious person so they can get a credit card develops into a plot that leaves three of them dead.

1971

Bellman and True

Bellman and True 1987

6.30

Hiller, a computer expert, was bribed by group of bank robbers to obtain details of the security system at a newly-built bank. Having obtained the information, he thought he'd seen the last of the robbers. But now they've traced him and his son to London. They hold the son hostage and force Hiller to decode the information about the alarm and then to take part in the robbery.

1987

Breach of Trust

Breach of Trust 1995

4.30

For opposite reasons, an undercover federal agent and a small time hood join forces to take on a union of drug lords and dirty cops.

1995

Install

Install 2004

6.00

High school student Asako moves all of her belongings to the refuse area of her apartment complex and stops attending school. Kazuyoshi, a precocious young boy, invites her to join him in an online chatroom venture where she assumes the identity of a married temptress named "Miyabi".

2004

Scanners III: The Takeover

Scanners III: The Takeover 1992

4.41

A young scanner with extraordinary telepathic powers transforms into a lethal killing machine after taking one of her father's experimental drugs.

1992

Ghost Machine

Ghost Machine 2009

4.76

Two technicians battle a vengeful spirit that has infected their stolen military software.

2009

The Honeymoon Machine

The Honeymoon Machine 1961

6.40

Lt. Fergie Howard teams up with Lt. Beau Gilliam and Navy scientist Jason Eldridge to turn a supercomputer with missile-tracking capabilities into a tool to predict where a roulette ball will land. They dock in Venice, Italy, and begin making a killing at the casino, but their shore-to-ship signals get misinterpreted as signs of attack by Adm. Fitch, putting a serious crimp in the officers' get-rich-quick scheme.

1961

Angel Of Fury

Angel Of Fury 1992

4.00

A security specialist is hired to deliver a valuable computer. She is joined by her former lover who has plans of his own for the computer.

1992

Poke

Poke 1985

1.00

The gift of a child turns out to be a superintelligent computer that has escaped from security facilities becoming the most wanted child of deep Spain.

1985