Traditional Culture Encyclopedia - Hotel franchise - Can you introduce some classic movies about hackers?
Can you introduce some classic movies about hackers?
1983, the movie War Games was the first hacker movie. This story happened during Reagan's presidency, at the height of the Cold War. Apple Mac has not yet been born, and computers are just exclusive toys for science geeks. The film scares the audience with the public's fear of nuclear war and unknown new technologies. The main character of the film is a computer genius named david letterman, who has free access to the school computer system to change his test scores, so he has no worries about his studies and spends his time on video games all day. One day, he accidentally bumped into a supercomputer in NORAD, and David used it to play a simulation game of World War III. What he didn't know was that the game was more real than he imagined: when David quit, the game was not over, and the computer of NORAD still thought that the Soviet Union had launched a nuclear war. For the computers of the two superpowers, the war game is not over. ...
2. Sports shoes (1992)
Thief tells the story of a group of "legitimate hackers" code-named sneakers. Sneakers are industrial spies who know computers. Banks, government agencies and other important institutions pay them to "hack" their own computer systems to test the security of the systems. Bishop is the leader of this gang, silent and low-key, with a dark past, a typical hacker.
One day, a government agency came to the door and asked Bishop's people to steal a computer software online, which could open all the secret computer resources in the world. Rejection is impossible because it holds all the secrets of Bishop's past. The real villain behind the scenes is Cosmo, the world's number one technology criminal. Coupled with corrupt elements in the government, he will be "desperate" than a group of people like Xiao Pu. ...
3. Inner feelings of grass cutters (1992)
Telepathy is the first movie based on virtual space. Job Smith, a mower with only a child's intelligence, mows the grass for Dr. Lawrence Angelo regularly. Angelo works for a secret government agency, which is responsible for training high-intelligence gorillas for the army. There is something wrong with Angelo's cooperation with the organization, and his mentally retarded work has attracted his attention. He is determined to take Job as the experimental object and restore his intelligence to a normal level. The result of the experiment was unexpectedly good: Job became the smartest person on the planet. And his potential is still developing, and slowly he becomes some kind of inhuman alien. ...
4. Net (1995)
Angela Bennett is a computer wizard, who specializes in studying all kinds of viruses in computer programs. She lives in seclusion in California and keeps out of contact with others. Because she accidentally received a floppy disk with hacker evidence, she fell into the trap set by the enemy: when traveling abroad, the beautiful man she met turned out to be a killer; When she got home, she found her car lost, her house sold, and she was accused of being a criminal. ...
Angela started fighting back. Through the Internet, she found that a group of computer criminals calling themselves "guardians" controlled Casad Lal software company. They sell data protection programs and actually set an ambush to copy all their customers' systems. Angela ventured into Casad Lal Software Company and found that her original identity had been replaced by a "praetorian guard". She surfed the Internet at a later computer fair and destroyed the database of "Guard" with a special computer virus.
5. 13th floor (1999)
The story begins in Los Angeles on 1937. Hammond Fuller returned to the hotel after a tryst with his lover. After leaving a letter for someone, he hurried home to see his wife. When he was lying in bed, time and space suddenly changed to Los Angeles in 1999. ...
On the 0/3 floor of an office building in a business district of Los Angeles, Douglas Hall and Hanan Fuller created a virtual Los Angeles ... One day, Hall woke up to find Hanan dead and became the prime suspect.
Hall can't remember whether he was involved in the murder. In order to find out the truth, he ran back and forth between the real world and the virtual world of 1937. This double life makes Hall's existence in the real world more and more blurred ... Fuller seems to have participated in a similar double life before his death. The appearance of the mysterious beauty Jane makes the boundary between reality and fantasy world more blurred.
6. Hackers (1995)
Dade Murphy, nicknamed "Zero Cold", is a legend among hackers. 1988, he single-handedly paralyzed the Wall Street 1507 computers, leading to the global financial crisis. Dade, 1 1 years old, so he put his name on the FBI file and was banned from using the keyboard until his 18 birthday. I haven't touched a number for seven years ... Dade is hungry.
Kate Libby, nicknamed "Acid Erosion", is a female hacker who runs rampant on the information superhighway. When "zero cooling" and "acid corrosion" meet, an inevitable battle between the sexes is launched on the hard disk. At this time, a hacker "plague" hired by a multinational company appeared. He not only wants to swindle millions of dollars through the internet, but also wants to frame Dade, Kate and their friends. In order to clear their reputations, Dade and Kate recruited a group of hackers to join their counterattack against the conspiracy of big companies.
7. Exquisite killing hardware 1995
1999, in los Angeles, the government law enforcement technology center developed a prototype simulator for training police detectives. This virtual reality simulator is loaded with the most advanced artificial intelligence technology, and users need to hunt down the computer-generated criminal Sid 6.7 (which combines all the evils of human beings) to exercise their detective skills. However, this complex "cat and mouse" system has a fatal consequence: the cunning Sid 6.7 got rid of the shackles and left the virtual space to enter the real world to do evil. Parker Barnes, a former policeman, is considered to be the best chance to subdue Sid 6.7.
With the help of criminal expert Carter, Barnes must shuttle between the real world and the virtual world in order to catch Sid before the arrival of the new millennium. Meanwhile, Barnes found the shadow of a pervert killer who killed his wife and daughter in Sid 6.7. The hunter's game becomes more complicated and the stakes are higher.
8. Johnny mnemonic (1995)
In 202 1 year, a huge computer network appeared in the world. More than half of mankind died from environmental pollution caused by electromagnetic waves emitted by electronic equipment. Information has become the most expensive commodity and hackers are rampant, so the most valuable information must be transmitted through the human brain.
Johnny is such a professional in charge of information transmission. Once, Johnny was hired by two scientists who defected from Pharmkom, the third largest multinational company in the world, and delivered them priceless data.
The memory chip in Johnny's brain can't bear the overload upload. If he doesn't find the decompression password download information in time, he will die. In addition, Pharmkom hired Yakuza, the largest criminal group in the world, and took Johnny's head to recover priceless information.
9. Matrix (1999)
A person controlled by a computer artificial intelligence system called Matrix is like an animal that eats grass. Hacker neo searched all about the "matrix" on the Internet.
Under the guidance of the mysterious girl Trelawney, they met Morpheus, the leader of the hacker organization, and the three of them embarked on a journey against the "Matrix" together.
Neo faces another question: Is it him? Although I don't know why, Neo's answer is "no". Morpheus's friend Sefer agrees with him. Others are not sure. In addition, there are people who protect Matrix, and ruthless Agent Smith and his gang hold shocking secrets.
Neo, Murphy and Trelawney must use their lives against powerful enemies in order to seek answers and find themselves. Every step they take is full of danger. ...
10. Swordfish (200 1)
Gabriel Hill is a spy who has been wandering in the Jianghu for many years. He wants to set up his own super patriotic organization. In order to raise the funds needed for the recruitment of this organization, Gabriel decided to venture into cyberspace and steal billions of dollars. Hill needs the help of top computer hackers. He's chasing Stanley Gibson.
Stanley used to be one of the top two computer hackers in the world. He turned the computer monitoring system of the FBI upside down, and of course he went to prison for it. Now he lives in a broken trailer, his wife divorced him, and took his little daughter Holly to marry a big boss who specializes in pornography. Gabriel came to invite Stanley out of the mountain and promised to help Stanley regain custody of his daughter after his success. Stanley promised to take risks, and he became a helpless pawn. ...
1 1. Firewall (2006)
Jack stanfield, a computer security expert, works in a Pacific bank in Seattle. He is a trustworthy executive who has been responsible for designing the most effective anti-theft computer system for many years to prevent increasingly rampant computer hackers from stealing bank assets through layers of passwords and firewalls.
Jack's generous treatment in the company allows him to live a comfortable life with his wife Beth, an architect, and their two children, including a mansion in an upscale residential area in the suburbs.
However, Jack's anti-theft system has a fatal weakness, that is, himself, a vicious gangster decided to use this weakness to steal huge amounts of money from the bank.
For several months, Bill Cox has been carefully observing Jack and his family, using all kinds of advanced electronic instruments to monitor their online activities, eavesdrop on their phones, get familiar with their daily lives and steal their most private information. He knows the names of their children's friends, their medical history and the password of the community security system where they live.
It took him nearly a year to know the details of Jack's family's life, and now he can finally act. He led a group of people into the stone house and put Beth and her children under house arrest, while Jack was forced to help the Pacific Bank he served steal a huge sum of 100 million dollars.
Every time Jack tried to seek help and rescue his family, Cox caught him and stopped him, so he had to crack his computer security system and remit a huge sum of $100 million to Cox's overseas bank account, which not only made him a criminal, but also forced him to destroy all Cox's criminal evidence. Under the strict supervision, he only had a few hours to complete the remittance, and found loopholes in the seemingly seamless plot of the gangsters, hoping to fight poison with poison and save his family's life.
- Related articles
- East China Normal University Bai Yulu Student Apartment Address
- What is the fastest and most convenient way to get from Macau to Zhuhai Sanzao Airport?
- What does CTS Bus Mall belong to?
- How far is Nanning Yingcheng Hotel (Nanning College Store) from Qingxiu District?
- How to call the front desk of a hotel room?
- How to take the airport bus when staying in a five-star hotel in Hangzhou?
- Which decoration company is good? (Inventory of the most popular companies)
- How does the hotel cooperate with children's photography?
- How to take a bus from Liupanshui to Beipanjiang Bridge?
- Swimming pool near Honglou, Jinan