
Rivolta
Genres
Overview
Discover the intoxicating world of hacking through the eyes of Michael “Mafiaboy” Calce, who, at 15, was involved in one of the most egregious and widely covered cybercrimes in North America. As hacking becomes more sophisticated and widespread, and information becomes synonymous with profit, can anyone remain immune to a breach of security?
Details
Budget
$0
Revenue
$0
Runtime
20 min
Release Date
2017-04-28
Status
Released
Original Language
English
Vote Count
0
Vote Average
0
6.8
All Is One. Except 0
In 1981, Wau Holland and other hackers established the Hamburg based Chaos Computer Club (CCC). The idiosyncratic freethinkers were inspired by Californian technology visionaries and committed themselves to hacker ethics. All information must be free. Use public data, protect private data. But not everyone followed the rules. Computer technology was still in its infancy and the emerging Internet became a projection screen for social utopias. What has become of them? The story of the German hackers, told by the protagonists themselves in a montage of found video and audio material.
2020-10-04 | de
5.2
The New Radical
Uncompromising millennial radicals from the United States and the United Kingdom attack the system through dangerous technological means, which evolves into a high-stakes game with world authorities in the midst of a dramatically changing political landscape.
2017-01-23 | en
6.3
In the Realm of the Hackers
In The Realm of the Hackers is a documentary about the prominent hacker community, centered in Melbourne, Australia in the late 80's to early 1990. The storyline is centered around the Australian teenagers going by the hacker names "Electron" and "Phoenix", who were members of an elite computer hacking group called The Realm and hacked into some of the most secure computer networks in the world, including those of the US Naval Research Laboratory, Lawrence Livermore National Laboratory, a government lab charged with the security of the US nuclear stockpile, and NASA.
2003-05-29 | en
6.4
Hackers Are People Too
A portrait of the hacking community. In an effort to challenge preconceived notions and media-driven stereotypes Hackers Are People Too lets hackers speak for themselves and introduce their community to the public.
2008-08-08 | en
6.9
Revolution OS
REVOLUTION OS tells the inside story of the hackers who rebelled against the proprietary software model and Microsoft to create GNU/Linux and the Open Source movement.
2001-03-09 | en
7.1
Freedom Downtime
A feature-length documentary about the Free Kevin movement and the hacker world.
2001-01-01 | en
7.9
The Internet's Own Boy: The Story of Aaron Swartz
Programming prodigy and information activist Aaron Swartz achieved groundbreaking work in social justice and political organizing. His passion for open access ensnared him in a legal nightmare that ended with the taking of his own life at the age of 26.
2014-06-27 | en
9.0
All Creatures Welcome
All Creatures Welcome explores the world of hackers and nerds at the events of the Chaos Computer Club, Europe's largest hacker association. The film dispels common clichés and draws a utopian picture of a possible society in the digital age.
2018-04-24 | de
7.8
The KGB, the Computer and Me
In 1986, astronomer turned computer scientist Clifford Stoll had just started working on a computer system at the Lawrence Berkeley Laboratory when he noticed a 75-cent discrepancy between the charges printed by two accounting programs responsible for charging people for machine use. Intrigued, he deduced that the system was being hacked, and he determined to find the culprit. This is the re-enactment of how he tracked down KGB cracker Markus Hess through the Ethernet to Hannover, Germany.
1990-10-03 | en
0.0
Do We Belong Here: The Triumphs and Struggles of Cybersecurity's Women
Experience the powerful stories of women in cybersecurity as they share their triumphs and struggles in this inspiring documentary, "Do We Belong Here." This film delves into the challenges faced by women in a male-dominated field and celebrates their achievements in overcoming barriers and breaking new ground. Learn about the personal and professional journeys that are shaping the future of cybersecurity.
2024-09-10 | en
6.8
Cyberbunker: The Criminal Underworld
This documentary reveals how a group of hackers powered the darkest corners of the internet from a Cold War-era bunker in a quiet German tourist town.
2023-11-07 | de
6.5
The Crazy Che
The incredible story of Bill Gaede, an Argentinian engineer, programmer… and Cold War spy.
2015-11-19 | es
6.6
Lo and Behold: Reveries of the Connected World
Werner Herzog's exploration of the Internet and the connected world.
2016-03-04 | en
6.3
Defeating the Hackers
Exploring the murky and fast-paced world of the hackers out to steal money and identities and wreak havoc with people's online lives, and the scientists who are joining forces to help defeat them.
2013-10-26 | en
7.8
Hackers: Outlaws and Angels
This program reveals the daily battle between the Internet’s outlaws and the hackers who oppose them by warding off system attacks, training IT professionals and police officers, and watching cyberspace for signs of imminent infowar. Through interviews with frontline personnel from the Department of Defense, NYPD’s computer crime squad, private detective firm Kroll Associates, X-Force Threat Analysis Service, and several notorious crackers, the program provides penetrating insights into the millions of hack attacks that occur annually in the U.S.—including one that affected the phone bills of millions and another that left confidential details of the B-1 stealth bomber in the hands of teenagers. The liabilities of wireless networks, the Code Red worm, and online movie piracy are also discussed. A Discovery Channel Production. (51 minutes)
2002-10-13 | en
6.5
The 414s
THE 414s tells the story of the first widely recognized computer hackers, a group of Milwaukee teenagers who gained notoriety in 1983 when they broke into dozens of high-profile computer systems, including the Los Alamos National Laboratory, a classified nuclear weapons research facility.
2015-03-11 | en
4.7
Abendland
Some things can be seen more clearly at night.. . A film poem about a continent at night, a culture on which the sun’s going down, though it’s hyper alert at the same time, an “Abendland” that, often somewhat self-obsessively, sees itself as the crown of human civilization, while its service economy is undergoing rapid growth in a thoroughly pragmatic way. Nikolaus Geyrhalter takes a look at a paradise with a quite diverse understanding of protection. Night work juxtaposed with oblivious evening digression, birth and death, questions that await answers in the semi-darkness, a Babel of languages, the routine of the daily news, and political negotiation: All this has been captured in images with a wealth of details that make us look at things in a new way. The longer you consider a word, the more distant is its return gaze: ABENDLAND.
2011-03-31 | de
7.1
We Are Legion: The Story of the Hacktivists
Takes us inside the world of Anonymous, the radical "hacktivist" collective that has redefined civil disobedience for the digital age. The film explores early hacktivist groups like Cult of the Dead Cow and Electronic Disturbance Theater, then moves to Anonymous' raucous beginnings on the website 4chan. Through interviews with current members, people recently returned from prison or facing trial, writers, academics, activists and major players in various "raids," the documentary traces Anonymous’ evolution from merry pranksters to a full-blown movement with a global reach, the most transformative civil disobedience of our time.
2012-01-20 | en
6.7
Code 2600
CODE 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it.
2011-12-30 | en
0.0
My Sextortion Diary
Pati, a young film producer, is fighting to carve out a professional career in the film industry. It is May 2019 when her laptop is stolen during a business trip in Madrid. Two months after, an anonymous Hacker accesses all the stored data in the stolen device and finds three very private photos of Pati. He threatens that if he doesn’t receive $2,400 he will mass-mail the pictures to all her work contacts in order to ruin her professional reputation. The shame, anger and distress caused by the ineffectiveness of the legal forces lead Pati to set out on her own investigation to stop the Hacker and regain control and power over her privacy.
2024-10-13 | ca