Sihai network

What are the movies about computer hackers? Recommend some movies about hackers

In real life, there are many hackers, network hackers are more common, so what are the movies related to computer hackers? The following strongly recommend a few movies about hackers, with a small make up to understand it.

War games (1983)

In 1983, the movie "war game" was the first hacker movie. The story takes place during Reagan's presidency, at the height of the cold war. Apple Mac has not yet been born, and computers are only the exclusive toys of science geeks. The movie scares the audience with the public's fear of nuclear war and unknown new technology. The protagonist of the film is a computer genius named David & middot; Letterman, who can freely enter the school computer system to change test scores, so he has no worries about his studies and spends all his time on video games. One day, he accidentally bumped into a super computer of NORAD, and David used it to play the simulation game of World War III. what he didn't know was that the game was more real than he thought: when David quit, the game was not over, and NORAD's computer still thought that the Soviet Union had launched a nuclear war. For the computers of the two superpowers, it was a war game The play is not over.

Sneakers (1992)

"Tongtian Shenjiao" tells the story of a group of "legitimate hackers" code named snakes. Sniffers are computer savvy industrial spies. Banks, government agencies and other important institutions pay them to "hack" their own computer systems in order to detect the security of the system. Bishop is the head of this group, silent, low-key, has a less than light past, typical hacker.

One day, a government agency came to the door and asked Bishop's people to steal a computer software on the Internet, which can open all the secret computer resources in the world. It's impossible to refuse because it's got all the secrets of bishop's past. The real villain behind the scenes is Cosmo, the number one technology criminal in the world. He, together with the corrupt elements in the government, has "cornered" a group of people like bishop.

The lawpower man (1992)

"Heterotopia" is the first film based on virtual space. Job & middot; Smith is a lawn mower with only child intelligence. He mows the lawn for Dr. Lawrence & middot; Angelo regularly. Angelo works for a secret government agency that trains highly intelligent gorillas for the military. Angelo's collaboration with the agency went wrong, and job, the mentally retarded, caught his attention. He was determined to take job as the experimental object and restore his intelligence to normal level. The results were surprisingly good: job became the smartest man on the planet. And his potential is still developing, and gradually he has become a kind of non-human alien.

The net (1995)

Angela Bennett, a computer wizard, specializes in viruses in computer programs. She lives in seclusion in California and has no relationship with others. Because she accidentally received a floppy disk with evidence of hacker crime, she fell into the trap set by the enemy: when she was traveling abroad, the beautiful man she met turned out to be a killer; when she got home, she found that her car had been lost and her house had been sold, and she was also accused of being a criminal & hellip; & hellip;

Angela began to fight back. Through the Internet, she found that a group of computer criminals who called themselves the "guard" had taken control of CASA delare software company. They sold data protection programs and actually set up ambush to copy all customers' systems. Angela venture into Casa delare software company, found that their original identity has been replaced by a 'guard'. She went online at a later computer fair and destroyed the database of the "guard" with a special computer virus.

The thirteenth floor (1999)

The story begins in Los Angeles in 1937, when Hammond fuller returns to the hotel after a tryst with his lover. He leaves a letter to someone and rushes home to see his wife. When he lay down in bed, he suddenly changed time and space to Los Angeles in 1999 & hellip; & hellip;

On the 13th floor of a downtown Los Angeles office building, Douglas hall and Hanan fuller created a virtual 1937 Los Angeles. One day, hall woke up to find Hanan dead, he became the number one suspect.

Hall can't recall whether he was involved in the murder. In order to find out the truth, he went back and forth between the real world and the virtual world in 1937. This dual life made Hall's existence in the real world increasingly blurred & hellip; & hellip; fuller seemed to be involved in a similar dual life before his death. The appearance of the mysterious beauty Jane blurs the boundary between the real world and the illusory world.

Hackers (1995)

Ted Murphy, nicknamed 'zero degree cold', is a legend among hackers. In 1988, he paralyzed 1507 computers on Wall Street, leading to the global financial crisis. As a result, 11-year-old Dade put his name on the FBI file and was banned from keyboards until his 18th birthday. Seven years without a digital & hellip; & hellip; Dade is hungry.

Kate & middot; Libby, nicknamed 'acid etching', is a female hacker who runs on the information superhighway. When "zero degree cold" and "acid etching" meet, an inevitable battle between the sexes is unfolded on the hard drive. At this time, a Hacker Expert employed by a multinational company appeared. He not only wanted to cheat millions of dollars on the Internet, but also wanted to blame Dade, Kate and their friends. In order to get rid of the charges, Dade and Kate recruited a group of hackers to join their counterattack against the conspiracy of big companies.

"Killing hardware" quality 1995

In 1999, Los Angeles, the government law enforcement technology center developed a prototype simulator for police training. This virtual reality simulator is equipped with the most advanced artificial intelligence technology, and users need to hunt down the computer-generated criminal Sid 6.7 (combining all human evils) to exercise their detective skills. However, this complex cat and mouse system has a fatal consequence: the crafty Sid 6.7 gets rid of the shackles, leaves the virtual space, and goes into the real world to do evil. Former police officer Park & middot Barnes is considered the best chance to subdue Sid 6.7.

With the help of crime expert Carter, Barnes has to travel between the real world and the virtual world to catch Sid before the new millennium. At the same time, Barnes found the shadow of the abnormal killer who killed his wife and daughter in Sid 6.7. The game of hunters has become more complicated and the stakes are higher.

Johnny mnemonic (1995)

In 2021, there will be a huge computer network in the world. More than half of human beings die of environmental pollution caused by electromagnetic waves from electronic devices. Information has become the most expensive commodity, and hackers are rampant, so the most valuable information must be transmitted through the human brain.

Johnny is such a professional in charge of information transmission. Once, Johnny was hired by two scientists who defected from pharmkom, the world's third-largest multinational company, to deliver priceless data to them.

The memory chip in Johnny's brain can't bear the overload of upload. If he doesn't find the decompression password to download the information in time, he will die. In addition, pharmkom hired Yakuza, the world's largest criminal group, to take Johnny's head to recover priceless information.

The matrix (1999)

The people who are the controllers of the computer artificial intelligence system called matrix are like the animals it grazes. The hacker Neo looked up everything about the matrix on the Internet.

Under the guidance of a mysterious girl, treyne, they meet Murphy, the leader of the hacker organization. Together, they embark on the journey of fighting against matrix.

Neo faces another question: is he it? Although I don't know why, Neo's answer is' no '. Morpheus' friend sever agreed with him. Others are less sure. In addition, there are people who are protecting the matrix, and the cold-blooded Agent Smith and his gang hold shocking secrets.

Neo, Murphy and treyne must use their lives against powerful enemies to seek answers and find themselves. Every step of them is in danger.

Swordfish (2001)

Gabriel & middot; hill is a spy agent who has been wandering in the world for many years. He wants to establish his own ultra patriotic organization. In order to raise the fund for the recruitment of the organization, Gabriel decided to venture into cyberspace and steal a multi billion dollar fund. Hill needs the help of a top computer hacker. He's on Stanley & middot; Jason.

Stanley was one of the world's two top computer hackers. He turned the FBI's computer surveillance system upside down, and of course he went to jail for it. Now he lives in a broken Trailer. His wife divorced him and married his little daughter Holly to a big boss who specializes in porn. Gabriel came to ask Stanley out of the mountain and promised to help him regain custody of his daughter. Stanley agreed to take risks, and he became a pawn.

Firewall (2006)

Jack Stanfield, a computer security expert, works for a Pacific Bank in Seattle. He is a highly trusted senior executive. Over the years, he has been responsible for designing the most effective anti-theft computer system to prevent the increasingly rampant computer hackers from stealing bank assets through layers of passwords and firewalls.

Jack is well paid in the company, allowing him, his wife, Beth, as an architect, and a couple of their children to lead a comfortable life, including a luxury house in a high-end suburban residential area.

But Jack's anti-theft system has a fatal weakness, that is, he himself, there is a cruel gangster decided to use this weakness to steal bank money.

For several months, Bill Cox has been observing Jack and his family carefully, and using various advanced electronic instruments to monitor their Internet activities, eavesdrop on their phones, get familiar with their daily routine, and steal their most private information. He knows the names of their children's friends, their medical history, and the password of the community security system they live in.

It took him nearly a year to understand every detail of Jack's family's life, and now he can finally take action. He leads a team to break into the house and put Beth and her children under house arrest, while Jack is forced to help his Pacific Bank steal $100 million.

Jack's every attempt to ask for help and save his family is detected and stopped by Cox, so he has to crack his own computer security system and remit 100 million US dollars to Cox's overseas bank account, which not only makes him a criminal, but also forces him to eliminate all the evidence of Cox's crime. Under close monitoring, he has only a few hours to complete the remittance and find the loophole in the gangster's seemingly seamless plot, hoping to fight against the poison and save the lives of his family.