Current location - Recipe Complete Network - Complete recipe book - Ask for some movies, TV series, comics and so on. The protagonist is a hacker.
Ask for some movies, TV series, comics and so on. The protagonist is a hacker.
1. War Games (1983)

Plot introduction:

1983, the movie War Games was the first hacker movie. This story happened during Reagan's presidency, at the height of the Cold War. Apple Mac has not yet been born, and computers are just exclusive toys for science geeks. The film scares the audience with the public's fear of nuclear war and unknown new technologies. The main character of the film is a computer genius named david letterman, who has free access to the school computer system to change his test scores, so he has no worries about his studies and spends his time on video games all day. One day, he accidentally bumped into a supercomputer in NORAD, and David used it to play a simulation game of World War III. What he didn't know was that the game was more real than he imagined: when David quit, the game was not over, and the computer of NORAD still thought that the Soviet Union had launched a nuclear war. For the computers of the two superpowers, the war game is not over. ...

========================================================

2. Sports shoes (1992)

Plot introduction:

Thief tells the story of a group of "legitimate hackers" code-named sneakers. Sneakers are industrial spies who know computers. Banks, government agencies and other important institutions pay them to "hack" their own computer systems to test the security of the systems. Bishop is the leader of this gang, silent and low-key, with a dark past, a typical hacker.

One day, a government agency came to the door and asked Bishop's people to steal a computer software online, which could open all the secret computer resources in the world. Rejection is impossible because it holds all the secrets of Bishop's past. The real villain behind the scenes is Cosmo, the world's number one technology criminal. Coupled with corrupt elements in the government, he will be "desperate" than a group of people like Xiao Pu. ...

========================================================

3. Internal induction mower (1992)

Plot introduction:

Telepathy is the first movie based on virtual space. Job Smith, a mower with only a child's intelligence, mows the grass for Dr. Lawrence Angelo regularly. Angelo works for a secret government agency, which is responsible for training high-intelligence gorillas for the army. There is something wrong with Angelo's cooperation with the organization, and the mentally retarded work has attracted his attention. He is determined to take Job as the experimental object and restore his intelligence to a normal level. The result of the experiment was unexpectedly good: Job became the smartest person on the planet. And his potential is still developing, and slowly he becomes some kind of inhuman alien. ...

========================================================

4. Net (1995)

Plot introduction:

Angela Bennett is a computer wizard, who specializes in studying all kinds of viruses in computer programs. She lives in seclusion in California and keeps out of contact with others. Because she accidentally received a floppy disk with hacker evidence, she fell into the trap set by the enemy: when traveling abroad, the beautiful man she met turned out to be a killer; When she got home, she found her car lost, her house sold, and she was accused of being a criminal. ...

Angela started fighting back. Through the Internet, she found that a group of computer criminals calling themselves "guardians" controlled Casad Lal software company. They sell data protection programs and actually set an ambush to copy all their customers' systems. Angela ventured into Casad Lal Software Company and found that her original identity had been replaced by a "praetorian guard". She surfed the Internet at a later computer fair and destroyed the database of "Guard" with a special computer virus.

========================================================

5. Network Panic 2.0 Network 2.0 (2006)

Plot introduction:

Hope Casti, a computer expert, was hired by an international company in Turkey and went to Istanbul alone to repair the network firewall for a financing consortium. After arriving in Istanbul, Hope found that everything in her world had become strange. She is losing her account number, passport, identity and even her own name step by step. After a narrow escape, she decided to use her expertise to fight back those who framed her. The closer she gets to the truth, the more afraid she feels. It turned out that her closest lover accused her of stealing 14 million dollars and murder. ...

========================================================

6. Hackers (1995)

Plot introduction:

Dade Murphy, nicknamed "Zero Cold", is a legend among hackers. 1988, he single-handedly paralyzed the Wall Street 1507 computers, leading to the global financial crisis. Dade, 1 1 years old, so he put his name on the FBI file and was banned from using the keyboard until his 18 birthday. I haven't touched a number in seven years. ...

Kate Libby, nicknamed "Acid Erosion", is a female hacker who runs rampant on the information superhighway. When "zero cooling" and "acid corrosion" meet, an inevitable battle between the sexes is launched on the hard disk. At this time, a hacker "plague" hired by a multinational company appeared. He not only wants to swindle millions of dollars through the internet, but also wants to frame Dade, Kate and their friends. In order to clear their reputations, Dade and Kate recruited a group of hackers to join their counterattack against the conspiracy of big companies.

========================================================

7. Killing hardware experts (1995)

Plot introduction:

1999, in los Angeles, the government law enforcement technology center developed a prototype simulator for training police detectives. This virtual reality simulator is loaded with the most advanced artificial intelligence technology, and users need to hunt down the computer-generated criminal Sid 6.7 (which combines all the evils of human beings) to exercise their detective skills. However, this complex "cat and mouse" system has a fatal consequence: the cunning Sid 6.7 got rid of the shackles and left the virtual space to enter the real world to do evil. Parker Barnes, a former policeman, is considered to be the best chance to subdue Sid 6.7.

With the help of criminal expert Carter, Barnes must shuttle between the real world and the virtual world in order to catch Sid before the arrival of the new millennium. Meanwhile, Barnes found the shadow of a pervert killer who killed his wife and daughter in Sid 6.7. The hunter's game becomes more complicated and the stakes are higher.

========================================================

★ Bored old classmates collect and sort out, and refuse to copy and quote ★

========================================================

8. Johnny mnemonic (1995)

Plot introduction:

In 202 1 year, a huge computer network appeared in the world. More than half of mankind died from environmental pollution caused by electromagnetic waves emitted by electronic equipment. Information has become the most expensive commodity and hackers are rampant, so the most valuable information must be transmitted through the human brain.

Johnny is such a professional in charge of information transmission. Once, Johnny was hired by two scientists who defected from Pharmkom, the third largest multinational company in the world, and delivered them priceless data.

The memory chip in Johnny's brain can't bear the overload upload. If he doesn't find the decompression password download information in time, he will die. In addition, Pharmkom hired Yakuza, the largest criminal group in the world, and took Johnny's head to recover priceless information.

========================================================

9. Matrix (1999)

Plot introduction:

A person controlled by a computer artificial intelligence system called Matrix is like an animal that eats grass. Hacker neo searched all about the "matrix" on the Internet.

Under the guidance of the mysterious girl Trelawney, they met Morpheus, the leader of the hacker organization, and the three of them embarked on a journey against the "Matrix" together.

Neo faces another question: Is it him? Although I don't know why, Neo's answer is "no". Morpheus's friend Sefer agrees with him. Others are not sure. In addition, there are people who protect Matrix, and ruthless Agent Smith and his gang hold shocking secrets.

Neo, Murphy and Trelawney must use their lives against powerful enemies in order to seek answers and find themselves. Every step they take is full of danger. ...

========================================================

10. Swordfish (200 1)

Plot introduction:

Gabriel Hill is a spy who has been wandering in the Jianghu for many years. He wants to set up his own super patriotic organization. In order to raise the funds needed for the recruitment of this organization, Gabriel decided to venture into cyberspace and steal billions of dollars. Hill needs the help of top computer hackers. He's chasing Stanley Gibson.

Stanley used to be one of the top two computer hackers in the world. He turned the computer monitoring system of the FBI upside down, and of course he went to prison for it. Now he lives in a broken trailer, his wife divorced him, and took his little daughter Holly to marry a big boss who specializes in pornography. Gabriel came to invite Stanley out of the mountain and promised to help Stanley regain custody of his daughter after his success. Stanley promised to take risks, and he became a helpless pawn. ...

========================================================

1 1. Firewall (2006)

Plot introduction:

Jack stanfield, a computer security expert, works in a Pacific bank in Seattle. He has been responsible for designing the most effective anti-theft computer system for many years to prevent increasingly rampant computer hackers from stealing bank assets through layers of passwords and firewalls.

Jack's generous treatment in the company allows him to live a comfortable life with his wife Beth, an architect, and their two children, including a mansion in an upscale residential area in the suburbs.

However, Jack's anti-theft system has a fatal weakness, that is, himself, a vicious gangster decided to use this weakness to steal huge amounts of money from the bank.

Bill Cox has been carefully observing Jack and his family, and using all kinds of advanced electronic instruments, monitoring their online activities, eavesdropping on their phones, getting familiar with their daily lives and stealing their most private information.

It took him nearly a year to know every detail of Jack's family's life and finally took action. He led a group of people into the stone house and put Beth and her children under house arrest, while Jack was forced to help the Pacific Bank he served steal a huge sum of 100 million dollars.

Every time Jack tried to seek help and rescue his family, Cox caught him and stopped him. He had to crack his computer security system and remit 1 billion dollars to Cox's overseas bank account, which not only made him a criminal, but also forced him to destroy all Cox's criminal evidence. Under the strict supervision, he only had a few hours to complete the remittance and find the loopholes in the gangster's seemingly seamless plot, hoping to save his family's life.

========================================================

12. 13th floor/3rd floor (1999).

Plot introduction:

The story begins in Los Angeles on 1937. Hammond Fuller returned to the hotel after a tryst with his lover. After leaving a letter for someone, he hurried home to see his wife. When he was lying in bed, time and space suddenly changed to Los Angeles in 1999. ...

On the 0/3 floor of an office building in a business district of Los Angeles, Douglas Hall and Hanan Fuller created a virtual Los Angeles ... One day, Hall woke up to find Hanan dead and became the prime suspect.

Hall can't remember whether he was involved in the murder. In order to find out the truth, he ran back and forth between the real world and the virtual world of 1937. This double life makes Hall's existence in the real world more and more blurred ... Fuller seems to have participated in a similar double life before his death. The appearance of the mysterious beauty Jane makes the boundary between reality and fantasy world more blurred.

========================================================

13. Hacker Punisher/Computer Crime Silicon Tower (1999)

Plot introduction:

not have

========================================================

14. wanted order for hackers (2000)

Plot introduction:

Kevin Minika is the most powerful computer hacker in history. He invaded the computers of a telecom company and the FBI, and became the most elusive hacker king in the online world. However, he wants to meet the real challenge. When he began to invade the computer system of a famous physicist and computer genius, his wish finally came true, which may be beyond his ability to cope. ...

========================================================

15. Rowen version 4.0 "Live Free or Die Hard in Rowen" (2007).

Plot introduction:

Years later, john mclean (Bruce Willis), who is always a dirty policeman but always has no intention to save people, finally reappears in people's sight. In the era when terrorists are rampant, it seems that old police officer John will face new challenges. Clever foreign terrorists have learned to use the most advanced computer hacking technology to achieve their ulterior motives. Obviously, the "Earth Gendarmerie" America has become the primary target of this "terrorist attack". After careful planning, extremist terrorists are going to use hacking technology to collectively paralyze the American computer system on Independence Day, thus realizing their attempt to control the world.

This police officer McClane, who was still indifferent to the boss's words, was addicted to alcohol, and was on and off with his wife, sweating, and was shot dead in time. On the jubilant National Day of the United States, with the professional help of Matt Foster, a small computer hacker, a group of foreign hackers' seamless computer system intrusion plans were broken. Finally meet the evil terrorists again. In the meantime, the desperate struggle with an Asian female terrorist, Mai Lin, is even more fascinating.

Finally, after some indiscriminate bombing, everything was calm, and john mclean saved the world again.

========================================================

16. Sports shoes (1992)

Plot introduction:

Bishop and Cosmao are old friends in college, and they are both experts in computer. Later, they got into trouble together, Bishop survived, and Cosmao went to prison. Twenty-five years later, Bishop still makes a living by his own skills, specializing in network penetration, eavesdropping and password cracking. These high-tech people form a group called "stalkers", as long as there is nothing impossible. But this time they are going to meet their opponents. Cosmo is out. He is not a friend, but an enemy. They aimed at another mysterious black box. If they fall into the wrong hands, the world will be in chaos. ...