logologo
MovieVerse© 2024
Privacy PolicyTerms of ServiceContact Us
Made with ❤️ by Thathsara
movie poster
HIPERTEXTO
Sign in to create your own watchlist

HIPERTEXTO

May 28, 2022
0
★ 10.0

Overview

Genres

Science Fiction
Documentary

Production Companies

cybercult

Cast

Itú

cyborg 1

Itú

Lua

cyborg 2

Lua

savi

cyborg 3

savi

Lua

produto alimenticio 1

Lua

Itú

produto alimenticio 2

Itú

HIPERTEXTO Trailers

No Trailers found.

You may also like

Pulse
5.1

Pulse

Aug 11, 2006

When the dead discover a means to contact the living through electronic devices, cellphones and computers become open gateways to monstrosities and destruction.

Johnny Mnemonic
5.8

Johnny Mnemonic

May 26, 1995

In a dystopian 2021, Johnny is a data trafficker who has an implant that allows him to securely store data too sensitive for regular computer networks. On one delivery run, he accepts a package that not only exceeds the implant's safety limits—and will kill him if the data is not removed in time—but also contains information far more important and valuable than he had ever imagined. On a race against time, he must avoid the assassins sent to kill him and remove the data before it, too, ends his life.

Freedom Downtime
6.9

Freedom Downtime

Jan 1, 2001

A feature-length documentary about the Free Kevin movement and the hacker world.

The New Radical
5.2

The New Radical

Jan 23, 2017

Uncompromising millennial radicals from the United States and the United Kingdom attack the system through dangerous technological means, which evolves into a high-stakes game with world authorities in the midst of a dramatically changing political landscape.

Trust Me
8.0

Trust Me

Oct 8, 2020

Trust Me uses stories, facts and experts to explain how our lack of media literacy is hurting us and how the media is negatively affecting our perspective of the world. True stories of how mis-information can result in real problems are meant to provoke thought and action in viewers.

Hacking Bloggers
1.9

Hacking Bloggers

Nov 10, 2016

Popular teen video-bloggers became digital persons after being «hacked» by evil computer virus. They need to find their way back home from this «digital trap».

planet v
0.0

planet v

Jul 6, 2024

Fidgeting fish, dancing on the train, big stages – we scroll through a phone gallery. How do you find your own identity between ever-changing trends? When do the borders between real and virtual life blur? A documentary about a self-made musician who wants to stand her ground in a digital world.

Billion Dollar Heist
7.5

Billion Dollar Heist

Aug 5, 2023

Global, dynamic, and eye-opening, this is story of the most daring cyber heist of all time, the Bangladeshi Central Bank theft, tracing the origins of cyber-crime from basic credit card fraud to the wildly complex criminal organisations in existence today, supported by commentary and fascinating insight from highly regarded cyber security experts.

Kung Fury
7.5

Kung Fury

May 22, 2015

During an unfortunate series of events, a friend of Kung Fury is assassinated by the most dangerous kung fu master criminal of all time, Adolf Hitler, a.k.a Kung Führer. Kung Fury decides to travel back in time to Nazi Germany in order to kill Hitler and end the Nazi empire once and for all.

The Matrix
8.2

The Matrix

Mar 31, 1999

Set in the 22nd century, The Matrix tells the story of a computer hacker who joins a group of underground insurgents fighting the vast and powerful computers who now rule the earth.

Star Wars Kid: The Rise of the Digital Shadows
7.8

Star Wars Kid: The Rise of the Digital Shadows

Mar 30, 2022

Ghyslain Raza, better known as the “Star Wars Kid,” breaks his silence to reflect on our hunger for content and the right to be forgotten in the digital age.

Tron
6.6

Tron

Jul 9, 1982

When brilliant video game maker Flynn hacks the mainframe of his ex-employer, he is beamed inside an astonishing digital world and becomes part of the very game he is designing. In his mission through cyberspace, Flynn matches wits with a maniacal Master Control Program and teams up with Tron, a security measure created to bring balance to the digital environment.

No Image Available
0.0

North-South.com

Invalid Date

Since the arrival of the Internet in the African republic of Cameroon, Internet Cafes have mushroomed. In a country where nearly half the population lives under the poverty threshold, many young women, who dream of escaping a life of misery by marrying a rich, white foreigner, surf the Internet for European marriage prospects at cybercafes such as Love.com, Affection.org, Flirt.net and Meeting.com.

The Internet's Own Boy: The Story of Aaron Swartz
7.9

The Internet's Own Boy: The Story of Aaron Swartz

Jun 27, 2014

Programming prodigy and information activist Aaron Swartz achieved groundbreaking work in social justice and political organizing. His passion for open access ensnared him in a legal nightmare that ended with the taking of his own life at the age of 26.

Cube 2: Hypercube
5.5

Cube 2: Hypercube

Apr 15, 2002

Eight strangers awaken with no memory, in a puzzling cube-shaped room where the laws of physics do not always apply.

WarGames
7.1

WarGames

Jun 3, 1983

High school student David Lightman has a talent for hacking. But while trying to hack into a computer system to play unreleased video games, he unwittingly taps into the Department of Defense's war computer and initiates a confrontation of global proportions. Together with his friend and a wizardly computer genius, David must race against time to outwit his opponent and prevent a nuclear Armageddon.

No Image Available
2.5

New York City Hackers

Dec 1, 2000

This documentary looks at the computer hacker community in New York City of today, its meetings and conferences, political annotations, and historically explores the roots of the original definition 'hacking' amongst the model train enthusiasts at MIT.

Hacks
6.5

Hacks

Jan 1, 1997

Hacks is a 73 minute European documentary exploring what nature of "Hacking" is in a social context. In HACKS, the Austrian multimedia artist Christine Bader examines who is the computer hacker and what moves him or her. Is the hacker a Robin Hood in cyber space or an anarchistic agitator? Bader speaks with Dutch, German and American communication freaks who are working with various kinds of network issues, like making the Internet accessible to individual persons (Felipe Rodriguez, founder of Internet provider Xs4all), creating a meeting place in cyber space, or designing an ultramodern communication network on a ‘multimedia art ship‘. ‘Hackers are not encumbered by technical, financial or organizational problems, they just want to do things‘, Rodriguez thinks. That the technological means ‘just to do things‘ are now freely available is demonstrated by the numerous computer initiatives that whiz past in HACKS.

Pulse 2: Afterlife
4.3

Pulse 2: Afterlife

Sep 30, 2008

The world has been reshaped by the invasion of ghosts via the wireless internet. Cities are deserted, technology has been destroyed and the few remaining human beings eschew anything electrical in order to avoid a confrontation with the soulless ghosts that now wander the planet. Most of the ghosts are doomed to a repetitive loop of something they did while they were still despairing humans (a man repeatedly hangs himself, for example), but there are some ghosts so locked in denial, they do not know they are dead. They continue to haunt their homes, wrapped in fear that their souls will soon be torn from them.

Fake Famous
7.1

Fake Famous

Feb 2, 2021

Explores the meaning of fame and influence in the digital age through an innovative social experiment. Following three Los Angeles-based people with relatively small followings, the film explores the attempts made to turn them into famous influencers by purchasing fake followers and bots to “engage” with their social media accounts.