HOME
*





Swordfish (film)
''Swordfish'' is a 2001 American action thriller film directed by Dominic Sena, written by Skip Woods, produced by Joel Silver, and starring John Travolta, Hugh Jackman, Halle Berry, Don Cheadle, Vinnie Jones, and Sam Shepard. The film centers on Stanley Jobson, an ex-con and computer hacker who is targeted for recruitment into a bank robbery conspiracy because of his formidable hacking skills. Plot Stanley Jobson is a cyber-hacker who became notorious for infecting the FBI's Carnivore program with a computer virus. Stanley's parole forbids him from accessing the internet and computers while his ex-wife Melissa, an alcoholic and part-time porn star, has issued a restraining order against him. This also prevents him from seeing his only daughter Holly. Ginger Knowles persuades Stanley to work for Gabriel Shear, who threatens him into cracking a secure Defense Department server. After the hack, Gabriel offers Stanley $10 million to program a multi-headed worm, a "hydra", t ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Dominic Sena
Dominic Sena (born April 26, 1949) is an American film director and music video director. As a film director, he is best known for directing the films ''Kalifornia'' (1993), '' Gone in 60 Seconds'' (2000), and '' Swordfish'' (2001). As a music video director, he directed music videos for Richard Marx, Bryan Adams, Peter Cetera, Janet Jackson, and Sting. Life and career Sena was born in Niles, Ohio of Italian-American heritage. His family hails from the town of Bagnoli Irpino, Avellino, Italy. As one of the founders of Propaganda Films, Sena worked primarily in music videos early in his career. He directed several of Janet Jackson's image re-defining music videos from her ''Rhythm Nation 1814'' album. The "Rhythm Nation" music video directed by Sena won the Grammy Award Best Long Form Music Video. Other artists that Sena has directed music videos for include Richard Marx, Tina Turner, Fleetwood Mac, Sheena Easton, Bryan Adams, Michael Bolton, Peter Cetera, E.G. Daily, and St ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Box Office Mojo
Box Office Mojo is an American website that tracks box-office revenue in a systematic, algorithmic way. The site was founded in 1998 by Brandon Gray, and was bought in 2008 by IMDb, which itself is owned by Amazon. History Brandon Gray began the site on August 7, 1998, making forecasts of the top-10 highest-grossing films in the United States for the following weekend. To compare his forecasts to the actual results, he started posting the weekend grosses and wrote a regular column with box-office analysis. In 1999, he started to post the Friday daily box-office grosses, sourced from Exhibitor Relations, so that they were publicly available online on Saturdays and posted the Sunday weekend estimates on Sundays. Along with the weekend grosses, he was publishing the daily grosses, release schedules, and other charts, such as all-time charts, international box-office charts, genre charts, and actor and director charts. The site gradually expanded to include weekend charts going b ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Dog Day Afternoon
''Dog Day Afternoon'' is a 1975 American biographical crime drama film directed by Sidney Lumet and produced by Martin Bregman and Martin Elfand. The film stars Al Pacino, John Cazale, James Broderick, and Charles Durning. The screenplay is written by Frank Pierson and is based on the ''Life'' magazine article "The Boys in the Bank" by P. F. Kluge and Thomas Moore. The feature chronicled the 1972 robbery and hostage situation led by John Wojtowicz and Salvatore Naturile at a Chase Manhattan branch in Brooklyn. Elfand brought Bregman's attention to the article, who proceeded to negotiate a deal with Warner Bros and clear the rights to use the story. Pierson conducted his research and wrote a script that centered the story of the robbery around Wojtowicz. The cast was selected by Lumet and Pacino, with the latter selecting past co-stars from his Off-Broadway plays. Filming took place between September and November 1974, and the production was finished three weeks ahead of schedu ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Claymore Mine
The Claymore mine is a directional anti-personnel mine developed for the United States Armed Forces. Its inventor, Norman MacLeod, named the mine after a large medieval Scottish sword. Unlike a conventional land mine, the Claymore is command-detonated and directional, meaning it is fired by remote-control and shoots a wide pattern of metal balls into the kill zone. The Claymore can also be victim-activated by booby-trapping it with a tripwire firing system for use in area denial operations. The Claymore fires steel balls out to about within a 60° arc in front of the device. It is used primarily in ambushes and as an anti-infiltration device against enemy infantry. It is also used against unarmored vehicles. Many countries have developed and used mines like the Claymore. Examples include former Soviet Union models MON-50, MON-90, MON-100, and MON-200, as well as MRUD (Serbia), MAPED F1 (France), and Mini MS-803 (South Africa). Description The M18A1 Claymore mine has a hor ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Kidnapping
In criminal law, kidnapping is the unlawful confinement of a person against their will, often including transportation/asportation. The asportation and abduction element is typically but not necessarily conducted by means of force or fear: the perpetrator may use a weapon to force the victim into a vehicle, but it is still kidnapping if the victim is enticed to enter the vehicle willingly (e.g. in the belief that it is a taxicab). Kidnapping may be done to demand for ransom in exchange for releasing the victim, or for other illegal purposes. Kidnapping can be accompanied by bodily injury which elevates the crime to aggravated kidnapping. Kidnapping of a child is known as child abduction, which is a separate legal category. Motivations Kidnapping of children is usually done by one parent or others. The kidnapping of adults is often for ransom or to force someone to withdraw money from an Automated teller machine, ATM, but may also be for sexual assault. Children have also been ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

United States Senator
The United States Senate is the Upper house, upper chamber of the United States Congress, with the United States House of Representatives, House of Representatives being the Lower house, lower chamber. Together they compose the national Bicameralism, bicameral legislature of the United States. The composition and powers of the Senate are established by Article One of the United States Constitution. The Senate is composed of #Membership, senators, each of whom represents a single U.S. state, state in its entirety. Each of the 50 states is equally represented by two senators who serve Classes of United States senators, staggered terms of six years, for a total of 100 senators. The Vice President of the United States, vice president of the United States serves as presiding officer and president of the Senate by Ex officio member, virtue of that office, despite not being a senator, and has a vote only if the Senate is equally divided. In the vice president's absence, the Presiden ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Drug Enforcement Administration
The Drug Enforcement Administration (DEA; ) is a Federal law enforcement in the United States, United States federal law enforcement agency under the U.S. Department of Justice tasked with combating drug trafficking and distribution within the U.S. It is the lead agency for domestic enforcement of the Controlled Substances Act, sharing concurrent jurisdiction with the Federal Bureau of Investigation, the U.S. Immigration and Customs Enforcement, and U.S. Customs and Border Protection although the DEA has sole responsibility for coordinating and pursuing U.S. drug investigations both domestically and abroad. The DEA has an DEA Office of National Security Intelligence, intelligence unit that is also a member of the United States Intelligence Community, U.S. Intelligence Community. While the unit is part of the DEA chain-of-command, it also reports to the Director of National Intelligence. History and mandate The Drug Enforcement Administration was established on July 1, 1973, ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Terrorist
Terrorism, in its broadest sense, is the use of criminal violence to provoke a state of terror or fear, mostly with the intention to achieve political or religious aims. The term is used in this regard primarily to refer to intentional violence during peacetime or in the context of war against non-combatants (mostly civilians and neutral military personnel). The terms "terrorist" and "terrorism" originated during the French Revolution of the late 18th century but became widely used internationally and gained worldwide attention in the 1970s during the Troubles in Northern Ireland, the Basque conflict, and the Israeli–Palestinian conflict. The increased use of suicide attacks from the 1980s onwards was typified by the 2001 September 11 attacks in the United States. There are various different definitions of terrorism, with no universal agreement about it. Terrorism is a charged term. It is often used with the connotation of something that is "morally wrong". Governments a ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Slush Fund
A slush fund is a fund or account that is not properly accounted, such as money used for corrupt or illegal purposes, especially in the political sphere. Such funds may be kept hidden and maintained separately from money that is used for legitimate purposes. Slush funds may be employed by government or corporate officials in efforts to pay influential people discreetly in return for preferential treatment, advance information (such as non-public information in financial transactions), and other services. The funds themselves may not be kept secret but the source of the funds or how they were acquired or for what purposes they are used may be hidden. Use of slush funds to influence government activities may be viewed as subversive of the democratic process. In accounting, the term ''slush fund'' describes a general ledger account of commingled funds to which all manner of transactions can be posted, with debits and credits cancelling each other. Examples Richard Nixon's "Che ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Computer Worm
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers. When these new worm-invaded computers are controlled, the worm will continue to scan and infect other computers using these computers as hosts, and this behaviour will continue. Computer worms use recursive methods to copy themselves without host programs and distribute themselves based on the law of exponential growth, thus controlling and infecting more and more computers in a short time. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer. Many worms are designed only to spread, and do not attempt to change the systems they pass through. However, as th ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

United States Department Of Defense
The United States Department of Defense (DoD, USDOD or DOD) is an executive branch department of the federal government charged with coordinating and supervising all agencies and functions of the government directly related to national security and the United States Armed Forces. The DoD is the largest employer in the world, with over 1.34 million active-duty service members (soldiers, marines, sailors, airmen, and guardians) as of June 2022. The DoD also maintains over 778,000 National Guard and reservists, and over 747,000 civilians bringing the total to over 2.87 million employees. Headquartered at the Pentagon in Arlington, Virginia, just outside Washington, D.C., the DoD's stated mission is to provide "the military forces needed to deter war and ensure our nation's security". The Department of Defense is headed by the secretary of defense, a cabinet-level head who reports directly to the president of the United States. Beneath the Department of Defense are th ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Computer Virus
A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses. Computer viruses generally require a host program. The virus writes its own code into the host program. When the program runs, the written virus program is executed first, causing infection and damage. A computer worm does not need a host program, as it is an independent program or code chunk. Therefore, it is not restricted by the host program, but can run independently and actively carry out attacks. Virus writers use social engineering deceptions and exploit detailed knowledge of security vulnerabilities to initially infect systems and to spread the virus. Viruses use complex anti-detection/stealth strategies to evade antivirus software. Motives for creating viruses can inclu ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]